Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jmc/jmc18.bht:"
@article{DBLP:journals/jmc/CalderiniCI24, author = {Marco Calderini and Roberto Civino and Riccardo Invernizzi}, title = {Differential experiments using parallel alternative operations}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0030}, doi = {10.1515/JMC-2023-0030}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CalderiniCI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CalderiniLSV24, author = {Marco Calderini and Riccardo Longo and Massimiliano Sala and Irene Villa}, title = {Searchable encryption with randomized ciphertext and randomized keyword search}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0029}, doi = {10.1515/JMC-2023-0029}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CalderiniLSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CianfrigliaOP24, author = {Marco Cianfriglia and Elia Onofri and Marco Pedicini}, title = {mRLWE-CP-ABE: {A} revocable {CP-ABE} for post-quantum cryptography}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0026}, doi = {10.1515/JMC-2023-0026}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CianfrigliaOP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ErdelyiHKN24, author = {M{\'{a}}rton Erd{\'{e}}lyi and P{\'{a}}l Heged{\"{u}}s and S{\'{a}}ndor Z. Kiss and G{\'{a}}bor P{\'{e}}ter Nagy}, title = {On linear codes with random multiplier vectors and the maximum trace dimension property}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0022}, doi = {10.1515/JMC-2023-0022}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ErdelyiHKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GhantousPV24, author = {Wissam Ghantous and Federico Pintore and Mattia Veroni}, title = {Efficiency of SIDH-based signatures (yes, {SIDH)}}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0023}, doi = {10.1515/JMC-2023-0023}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GhantousPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RouquetteMS24, author = {Lo{\"{\i}}c Rouquette and Marine Minier and Christine Solnon}, title = {Automatic boomerang attacks search on Rijndael}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0027}, doi = {10.1515/JMC-2023-0027}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SalaT24, author = {Massimiliano Sala and Daniele Taufer}, title = {Group structure of elliptic curves over {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)}}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0025}, doi = {10.1515/JMC-2023-0025}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SalaT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Timpanella24, author = {Marco Timpanella}, title = {On a generalization of the Deligne-Lusztig curve of Suzuki type and application to {AG} codes}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0024}, doi = {10.1515/JMC-2023-0024}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Timpanella24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YamashitaH24, author = {Kyosuke Yamashita and Keisuke Hara}, title = {On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0028}, doi = {10.1515/JMC-2023-0028}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YamashitaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.