Search dblp for Publications

export results for "toc:db/journals/jmc/jmc18.bht:"

 download as .bib file

@article{DBLP:journals/jmc/CalderiniCI24,
  author       = {Marco Calderini and
                  Roberto Civino and
                  Riccardo Invernizzi},
  title        = {Differential experiments using parallel alternative operations},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0030},
  doi          = {10.1515/JMC-2023-0030},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CalderiniCI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CalderiniLSV24,
  author       = {Marco Calderini and
                  Riccardo Longo and
                  Massimiliano Sala and
                  Irene Villa},
  title        = {Searchable encryption with randomized ciphertext and randomized keyword
                  search},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0029},
  doi          = {10.1515/JMC-2023-0029},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CalderiniLSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CianfrigliaOP24,
  author       = {Marco Cianfriglia and
                  Elia Onofri and
                  Marco Pedicini},
  title        = {mRLWE-CP-ABE: {A} revocable {CP-ABE} for post-quantum cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0026},
  doi          = {10.1515/JMC-2023-0026},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CianfrigliaOP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ErdelyiHKN24,
  author       = {M{\'{a}}rton Erd{\'{e}}lyi and
                  P{\'{a}}l Heged{\"{u}}s and
                  S{\'{a}}ndor Z. Kiss and
                  G{\'{a}}bor P{\'{e}}ter Nagy},
  title        = {On linear codes with random multiplier vectors and the maximum trace
                  dimension property},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0022},
  doi          = {10.1515/JMC-2023-0022},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ErdelyiHKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GhantousPV24,
  author       = {Wissam Ghantous and
                  Federico Pintore and
                  Mattia Veroni},
  title        = {Efficiency of SIDH-based signatures (yes, {SIDH)}},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0023},
  doi          = {10.1515/JMC-2023-0023},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GhantousPV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RouquetteMS24,
  author       = {Lo{\"{\i}}c Rouquette and
                  Marine Minier and
                  Christine Solnon},
  title        = {Automatic boomerang attacks search on Rijndael},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0027},
  doi          = {10.1515/JMC-2023-0027},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SalaT24,
  author       = {Massimiliano Sala and
                  Daniele Taufer},
  title        = {Group structure of elliptic curves over {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)}},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0025},
  doi          = {10.1515/JMC-2023-0025},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SalaT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Timpanella24,
  author       = {Marco Timpanella},
  title        = {On a generalization of the Deligne-Lusztig curve of Suzuki type and
                  application to {AG} codes},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0024},
  doi          = {10.1515/JMC-2023-0024},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Timpanella24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YamashitaH24,
  author       = {Kyosuke Yamashita and
                  Keisuke Hara},
  title        = {On the Black-Box impossibility of multi-designated verifiers signature
                  schemes from ring signature schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0028},
  doi          = {10.1515/JMC-2023-0028},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YamashitaH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics