default search action
Journal of Mathematical Cryptology, Volume 9
Volume 9, Number 1, March 2015
- Kisoon Yoon:
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. 1-9 - Bilal Alam, Ferruh Özbudak, Oguz Yayla:
Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic cryptosystems. 11-22 - Rüdiger Sparr, Ralph Wernsdorf:
The round functions of KASUMI generate the alternating group. 23-32 - David Garber, Delaram Kahrobaei, Ha T. Lam:
Length-based attacks in polycyclic groups. 33-43 - Thomas W. Cusick, Younhwan Cheon:
Theory of 3-rotation symmetric cubic Boolean functions. 45-62
Volume 9, Number 2, June 2015
- Jiageng Chen, Keita Emura, Atsuko Miyaji:
SKENO: Secret key encryption with non-interactive opening. 63-74 - Boaz Tsaban, Noam Lifshitz:
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme. 75-78 - Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky:
Towards efficient private distributed computation on unbounded input streams. 79-94 - Kim Laine, Kristin E. Lauter:
Time-memory trade-offs for index calculus in genus 3. 95-114 - Benjamin Justus:
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. II. 115-137
Volume 9, Number 3, October 2015
- Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen:
Two-permutation-based hashing with binary mixing. 139-150 - Luigi Accardi, Massimo Regoli:
On a class of strongly asymmetric PKA algorithms. 151-159 - Matvei Kotov, Alexander Ushakov:
Analysis of a certain polycyclic-group-based cryptosystem. 161-167 - Martin R. Albrecht, Rachel Player, Sam Scott:
On the concrete hardness of Learning with Errors. 169-203
Volume 9, Number 4, December 2015
- Chris Dowden:
Secure message transmission in the presence of a fully generalised adversary. 205-214 - Maura B. Paterson, Douglas R. Stinson:
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. 215-225 - Ali Hameed, Arkadii Slinko:
A characterisation of ideal weighted secret sharing schemes. 227-244 - Kevin J. Henry, Douglas R. Stinson:
Linear approaches to resilient aggregation in sensor networks. 245-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.