default search action
Journal of Mathematical Cryptology, Volume 4
Volume 4, Number 1, July 2010
- Koray Karabina:
Factor-4 and 6 compression of cyclotomic subgroups of and. 1-42 - Farbod Shokrieh:
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. 43-56 - M. Jason Hinek, Charles C. Y. Lam:
Common modulus attacks on small private exponent RSA and some fast variants (in practice). 58-93
Volume 4, Number 2, October 2010
- Jaume Martí-Farré, Carles Padró:
On secret sharing schemes, matroids and polymatroids. 95-120 - Basel Alomair, Andrew Clark, Radha Poovendran:
The power of primes: security of authentication based on a universal hash-function family. 121-148 - Natalia Mosina, Alexander Ushakov:
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. 149-174 - Koray Karabina, Alfred Menezes, Carl Pomerance, Igor E. Shparlinski:
On the asymptotic effectiveness of Weil descent attacks. 175-191 - Simon R. Blackburn:
The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem. 193-198
Volume 4, Number 3, December 2010
- Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. 199-238 - Juha Kortelainen, Kimmo Halunen, Tuomas Kortelainen:
Multicollision attacks and generalized iterated hash functions. 239-270 - Pavol Svaba, Tran van Trung:
Public key cryptosystem MST3: cryptanalysis and realization. 271-315
Volume 4, Number 4, April 2011
- Elmar Tischhauser:
Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY. 317-348 - Rajesh P. Singh, Anupam Saikia, B. K. Sarma:
Poly-Dragon: an efficient multivariate public key cryptosystem. 349-364 - Ciaran Mullan:
Cryptanalysing variants of Stickel's key agreement scheme. 365-373 - Christopher Wolf, Bart Preneel:
Equivalent keys in ℳultivariate uadratic public key systems. 375-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.