Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Mathematical Cryptology, Volume 7
Volume 7, Number 1, July 2013
- Tamir Tassa, Ayman Jarrous, Yonatan Ben-Ya'akov:
Oblivious evaluation of multivariate polynomials. 1-29 - Steven D. Galbraith, Chang-An Zhao:
Self-pairings on hyperelliptic curves. 31-42 - Jean-Pierre Flori, Sihem Mesnager:
An efficient characterization of a family of hyper-bent functions with multiple trace terms. 43-68 - Tianze Wang, Dongdai Lin:
A method for counting the number of polynomial equivalence classes. 69-95
Volume 7, Number 2, September 2013
- Rebecca E. Field, Brant C. Jones:
Using carry-truncated addition to analyze add-rotate-xor hash algorithms. 97-110 - Yanling Chen, Danilo Gligoroski, Svein J. Knapskog:
On a special class of multivariate quadratic quasigroups (MQQs). 111-141 - Motahhareh Gharahi, Massoud Hadian Dehkordi:
Perfect secret sharing schemes for graph access structures on six participants. 143-146 - Reiner Staszewski, Tran van Trung:
Strongly aperiodic logarithmic signatures. 147-179
Volume 7, Number 3, October 2013
- Spyros S. Magliveras:
Foreword. 181-182 - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. 183-216 - Otokar Grosek, Stefan Porubský:
Coprime solutions to ax≡b (mod n). 217-224 - Neal Koblitz, Alfred Menezes:
Another look at HMAC. 225-251 - Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. 253-277
Volume 7, Number 4, December 2013
- Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini:
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure. 279-296 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New leakage-resilient CCA-secure public key encryption. 297-312 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security analysis of linearly filtered NLFSRs. 313-332 - Joachim von zur Gathen, Igor E. Shparlinski:
Generating safe primes. 333-365 - Pavol Zajac:
A new method to solve MRHS equation systems and its connection to group factorization. 367-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.