![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Mathematical Cryptology, Volume 10
Volume 10, Number 1, March 2016
- Claude Carlet, David Joyner, Pantelimon Stanica, Deng Tang:
Cryptographic properties of monotone Boolean functions. 1-14 - Giulia Bianco, Elisa Gorla:
Compression for trace zero points on twisted Edwards curves. 15-34 - Colleen M. Swanson, Douglas R. Stinson:
Unconditionally secure signature schemes revisited. 35-67
Volume 10, Number 2, June 2016
- Subhabrata Samajder
, Palash Sarkar:
Another look at normal approximations in cryptanalysis. 69-99 - Dustin Moody
, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier. 101-133 - Dimitrios Poulakis:
New lattice attacks on DSA schemes. 135-144
Volume 10, Numbers 3-4, December 2016
- Thomas W. Cusick, K. V. Lakshmy
, Madathil Sethumadhavan
:
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach. 145-156 - Ashwin Jha
, Mridul Nandi
:
Revisiting structure graphs: Applications to CBC-MAC and EMAC. 157-180 - Mridul Nandi
, Tapas Pandit
:
On the security of joint signature and encryption revisited. 181-221
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.