Search dblp for Publications

export results for "toc:db/journals/jmc/jmc12.bht:"

 download as .bib file

@article{DBLP:journals/jmc/BanegasBBCDGGHK18,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Brice Odilon Boidje and
                  Pierre{-}Louis Cayrel and
                  Gilbert Ndollane Dione and
                  Kris Gaj and
                  Cheikh Thi{\'{e}}coumba Gueye and
                  Richard Haeussler and
                  Jean Belo Klamti and
                  Ousmane Ndiaye and
                  Duc Tri Nguyen and
                  Edoardo Persichetti and
                  Jefferson E. Ricardini},
  title        = {{DAGS:} Key encapsulation using dyadic {GS} codes},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {221--239},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2018-0027},
  doi          = {10.1515/JMC-2018-0027},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BanegasBBCDGGHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortiDN18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi},
  title        = {On the optimality of non-linear computations for symmetric key primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {241--259},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0011},
  doi          = {10.1515/JMC-2017-0011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortiDN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChatterjeeDK18,
  author       = {Sanjit Chatterjee and
                  M. Prem Laxman Das and
                  R. Kabaleeshwaran},
  title        = {Converting pairing-based cryptosystems from composite to prime order
                  setting - {A} comparative analysis},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {159--190},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0042},
  doi          = {10.1515/JMC-2017-0042},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChatterjeeDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DeyS18,
  author       = {Sabyasachi Dey and
                  Santanu Sarkar},
  title        = {Generalization of Roos bias in {RC4} and some results on key-keystream
                  relations},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {43--56},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0061},
  doi          = {10.1515/JMC-2016-0061},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DeyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FotiadisK18,
  author       = {Georgios Fotiadis and
                  Elisavet Konstantinou},
  title        = {Generating pairing-friendly elliptic curve parameters using sparse
                  families},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {83--99},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0024},
  doi          = {10.1515/JMC-2017-0024},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FotiadisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JirakitpuwapatC18,
  author       = {Wachirapong Jirakitpuwapat and
                  Parin Chaipunya and
                  Poom Kumam and
                  Sompong Dhompongsa and
                  Phatiphat Thounthong},
  title        = {New methods of construction of cartesian authentication codes from
                  geometries over finite commutative rings},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {119--136},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0057},
  doi          = {10.1515/JMC-2017-0057},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JirakitpuwapatC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KotovU18,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a key exchange protocol based on tropical matrix algebra},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {137--141},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0064},
  doi          = {10.1515/JMC-2016-0064},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KotovU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Kushwaha18,
  author       = {Prabhat Kushwaha},
  title        = {Improved lower bound for Diffie-Hellman problem using multiplicative
                  group of a finite field as auxiliary group},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {101--118},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0053},
  doi          = {10.1515/JMC-2017-0053},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Kushwaha18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LaingS18,
  author       = {Thalia M. Laing and
                  Douglas R. Stinson},
  title        = {A survey and refinement of repairable threshold schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {57--81},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0058},
  doi          = {10.1515/JMC-2017-0058},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LaingS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MahriSBDW18,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {A fundamental flaw in the ++AE authenticated encryption mode},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {37--42},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0037},
  doi          = {10.1515/JMC-2016-0037},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MahriSBDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Partala18,
  author       = {Juha Partala},
  title        = {Algebraic generalization of Diffie-Hellman key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {1--21},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0015},
  doi          = {10.1515/JMC-2017-0015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Partala18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonSU18,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {Multi-prover proof of retrievability},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {203--220},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2018-0012},
  doi          = {10.1515/JMC-2018-0012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PintoP18,
  author       = {Eduardo Carvalho Pinto and
                  Christophe Petit},
  title        = {Better path-finding algorithms in {LPS} Ramanujan graphs},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {191--202},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0051},
  doi          = {10.1515/JMC-2017-0051},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PintoP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RaddumZ18,
  author       = {H{\aa}vard Raddum and
                  Pavol Zajac},
  title        = {{MRHS} solver based on linear algebra and exhaustive search},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {143--157},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0005},
  doi          = {10.1515/JMC-2017-0005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/RaddumZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Trung18,
  author       = {Tran van Trung},
  title        = {Construction of strongly aperiodic logarithmic signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {23--35},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0048},
  doi          = {10.1515/JMC-2017-0048},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Trung18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics