Eskeland, Sigurd Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection. (English) Zbl 07819573 J. Math. Cryptol. 18, Article ID 20230032, 8 p. (2024). MSC: 68P27 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{S. Eskeland}, J. Math. Cryptol. 18, Article ID 20230032, 8 p. (2024; Zbl 07819573) Full Text: DOI OA License
Calderini, Marco; Civino, Roberto; Invernizzi, Riccardo Differential experiments using parallel alternative operations. (English) Zbl 07819572 J. Math. Cryptol. 18, Article ID 20230030, 9 p. (2024). MSC: 20B35 94A60 68P25 PDFBibTeX XMLCite \textit{M. Calderini} et al., J. Math. Cryptol. 18, Article ID 20230030, 9 p. (2024; Zbl 07819572) Full Text: DOI arXiv OA License
Calderini, Marco; Longo, Riccardo; Sala, Massimiliano; Villa, Irene Searchable encryption with randomized ciphertext and randomized keyword search. (English) Zbl 07819571 J. Math. Cryptol. 18, Article ID 20230029, 14 p. (2024). MSC: 94A60 14H52 94A62 68W40 PDFBibTeX XMLCite \textit{M. Calderini} et al., J. Math. Cryptol. 18, Article ID 20230029, 14 p. (2024; Zbl 07819571) Full Text: DOI OA License
Yamashita, Kyosuke; Hara, Keisuke On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes. (English) Zbl 07819570 J. Math. Cryptol. 18, Article ID 20230028, 12 p. (2024). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{K. Yamashita} and \textit{K. Hara}, J. Math. Cryptol. 18, Article ID 20230028, 12 p. (2024; Zbl 07819570) Full Text: DOI OA License
Rouquette, Loïc; Minier, Marine; Solnon, Christine Automatic boomerang attacks search on Rijndael. (English) Zbl 07819569 J. Math. Cryptol. 18, Article ID 20230027, 16 p. (2024). MSC: 94A60 90C27 90C30 68P25 PDFBibTeX XMLCite \textit{L. Rouquette} et al., J. Math. Cryptol. 18, Article ID 20230027, 16 p. (2024; Zbl 07819569) Full Text: DOI OA License
Cianfriglia, Marco; Onofri, Elia; Pedicini, Marco \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography. (English) Zbl 07819568 J. Math. Cryptol. 18, Article ID 20230026, 22 p. (2024). MSC: 94A60 68P25 68Q25 81P94 PDFBibTeX XMLCite \textit{M. Cianfriglia} et al., J. Math. Cryptol. 18, Article ID 20230026, 22 p. (2024; Zbl 07819568) Full Text: DOI OA License
Timpanella, Marco On a generalization of the Deligne-Lusztig curve of Suzuki type and application to AG codes. (English) Zbl 07819566 J. Math. Cryptol. 18, Article ID 20230024, 11 p. (2024). MSC: 94B27 PDFBibTeX XMLCite \textit{M. Timpanella}, J. Math. Cryptol. 18, Article ID 20230024, 11 p. (2024; Zbl 07819566) Full Text: DOI arXiv OA License
Ghantous, Wissam; Pintore, Federico; Veroni, Mattia Efficiency of SIDH-based signatures (yes, SIDH). (English) Zbl 07819565 J. Math. Cryptol. 18, Article ID 20230023, 22 p. (2024). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{W. Ghantous} et al., J. Math. Cryptol. 18, Article ID 20230023, 22 p. (2024; Zbl 07819565) Full Text: DOI OA License
Liu, Zhenyu; Zhuo, Zepeng Further research results on confusion coefficient of Boolean functions. (English) Zbl 07787354 J. Math. Cryptol. 17, Article ID 20210039, 8 p. (2023). MSC: 94D10 PDFBibTeX XMLCite \textit{Z. Liu} and \textit{Z. Zhuo}, J. Math. Cryptol. 17, Article ID 20210039, 8 p. (2023; Zbl 07787354) Full Text: DOI OA License
Kawa, Renata; Kula, Mieczysław Access structures determined by uniform polymatroids. (English) Zbl 1526.94051 J. Math. Cryptol. 17, Article ID 20220017, 26 p. (2023). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Kawa} and \textit{M. Kula}, J. Math. Cryptol. 17, Article ID 20220017, 26 p. (2023; Zbl 1526.94051) Full Text: DOI arXiv OA License
Moch, Alexander Provable security against generic attacks on stream ciphers. (English) Zbl 07715934 J. Math. Cryptol. 17, Article ID 20220033, 27 p. (2023). MSC: 68P25 94A55 94A60 PDFBibTeX XMLCite \textit{A. Moch}, J. Math. Cryptol. 17, Article ID 20220033, 27 p. (2023; Zbl 07715934) Full Text: DOI
Klamti, Jean Belo; Hasan, M. Anwarul A code-based hybrid signcryption scheme. (English) Zbl 1518.94074 J. Math. Cryptol. 17, Article ID 20220002, 22 p. (2023). MSC: 94A60 94A62 94B99 PDFBibTeX XMLCite \textit{J. B. Klamti} and \textit{M. A. Hasan}, J. Math. Cryptol. 17, Article ID 20220002, 22 p. (2023; Zbl 1518.94074) Full Text: DOI arXiv
Isobe, Shuji; Koizumi, Eisuke A construction of encryption protocols over some semidirect products. (English) Zbl 1514.94102 J. Math. Cryptol. 17, Article ID 20220018, 24 p. (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Isobe} and \textit{E. Koizumi}, J. Math. Cryptol. 17, Article ID 20220018, 24 p. (2023; Zbl 1514.94102) Full Text: DOI
Brown, Daniel R. L. Plactic key agreement (insecure?). (English) Zbl 1509.94073 J. Math. Cryptol. 17, Article ID 20220010, 22 p. (2023). MSC: 94A60 05E10 PDFBibTeX XMLCite \textit{D. R. L. Brown}, J. Math. Cryptol. 17, Article ID 20220010, 22 p. (2023; Zbl 1509.94073) Full Text: DOI
Roman’kov, Vitaly; Ushakov, Alexander; Shpilrain, Vladimir Algebraic and quantum attacks on two digital signature schemes. (English) Zbl 1509.94166 J. Math. Cryptol. 17, Article ID 20220023, 7 p. (2023). MSC: 94A62 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{V. Roman'kov} et al., J. Math. Cryptol. 17, Article ID 20220023, 7 p. (2023; Zbl 1509.94166) Full Text: DOI
Dadhwal, Madhu; Pankaj Group codes over binary tetrahedral group. (English) Zbl 1520.94086 J. Math. Cryptol. 16, 310-319 (2022). Reviewer: Carolin Hannusch (Debrecen) MSC: 94B05 20B35 20C05 PDFBibTeX XMLCite \textit{M. Dadhwal} and \textit{Pankaj}, J. Math. Cryptol. 16, 310--319 (2022; Zbl 1520.94086) Full Text: DOI
Koshelev, Dmitrii The most efficient indifferentiable hashing to elliptic curves of \(j\)-invariant 1728. (English) Zbl 1502.14068 J. Math. Cryptol. 16, 298-309 (2022). Reviewer: Sami Omar (Sukhair) MSC: 14G50 94A60 11G20 11T71 14H52 14J26 14J27 14J32 14J30 14E05 14E08 14G15 PDFBibTeX XMLCite \textit{D. Koshelev}, J. Math. Cryptol. 16, 298--309 (2022; Zbl 1502.14068) Full Text: DOI
Battarbee, Christopher; Kahrobaei, Delaram; Tailor, Dylan; Shahandashti, Siamak F. On the efficiency of a general attack against the MOBS cryptosystem. (English) Zbl 1505.94068 J. Math. Cryptol. 16, 289-297 (2022). MSC: 94A60 20M12 PDFBibTeX XMLCite \textit{C. Battarbee} et al., J. Math. Cryptol. 16, 289--297 (2022; Zbl 1505.94068) Full Text: DOI arXiv
Vivek, Srinivas; Murthy, Shyam; Kumaraswamy, Deepak Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting. (English) Zbl 1495.68053 J. Math. Cryptol. 16, 251-277 (2022). MSC: 68P25 68P10 94A60 PDFBibTeX XMLCite \textit{S. Vivek} et al., J. Math. Cryptol. 16, 251--277 (2022; Zbl 1495.68053) Full Text: DOI
Mejia, Carolina; Montoya, Juan Andres Abelian sharing, common informations, and linear rank inequalities. (English) Zbl 1497.94145 J. Math. Cryptol. 16, 233-250 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{C. Mejia} and \textit{J. A. Montoya}, J. Math. Cryptol. 16, 233--250 (2022; Zbl 1497.94145) Full Text: DOI
Mishra, Prasanna R.; Pandey, Shashi Kant On the algebraic immunity of multiplexer Boolean functions. (English) Zbl 1498.94116 J. Math. Cryptol. 16, 198-204 (2022). MSC: 94D10 PDFBibTeX XMLCite \textit{P. R. Mishra} and \textit{S. K. Pandey}, J. Math. Cryptol. 16, 198--204 (2022; Zbl 1498.94116) Full Text: DOI
Tinani, Simran; Rosenthal, Joachim A deterministic algorithm for the discrete logarithm problem in a semigroup. (English) Zbl 1509.94135 J. Math. Cryptol. 16, 141-155 (2022). MSC: 94A60 11Y16 20M13 68Q25 PDFBibTeX XMLCite \textit{S. Tinani} and \textit{J. Rosenthal}, J. Math. Cryptol. 16, 141--155 (2022; Zbl 1509.94135) Full Text: DOI arXiv
Anokhin, Mikhail Pseudo-free families and cryptographic primitives. (English) Zbl 1494.94031 J. Math. Cryptol. 16, 114-140 (2022). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 08A70 08A60 08A62 PDFBibTeX XMLCite \textit{M. Anokhin}, J. Math. Cryptol. 16, 114--140 (2022; Zbl 1494.94031) Full Text: DOI
Qi, Mingping An efficient post-quantum KEM from CSIDH. (English) Zbl 1492.81044 J. Math. Cryptol. 16, 103-113 (2022). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{M. Qi}, J. Math. Cryptol. 16, 103--113 (2022; Zbl 1492.81044) Full Text: DOI
Brown, Daniel R. L.; Koblitz, Neal; LeGrow, Jason T. Cryptanalysis of “MAKE”. (English) Zbl 1484.94017 J. Math. Cryptol. 16, 98-102 (2022). MSC: 94A60 11T71 15B33 20H20 PDFBibTeX XMLCite \textit{D. R. L. Brown} et al., J. Math. Cryptol. 16, 98--102 (2022; Zbl 1484.94017) Full Text: DOI
Chakraborty, Bishwajit; Nandi, Mridul The \(\mathsf{mF}\) mode of authenticated encryption with associated data. (English) Zbl 07481652 J. Math. Cryptol. 16, 73-97 (2022). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{B. Chakraborty} and \textit{M. Nandi}, J. Math. Cryptol. 16, 73--97 (2022; Zbl 07481652) Full Text: DOI
Rahman, Nael; Shpilrain, Vladimir MAKE: a matrix action key exchange. (English) Zbl 1483.94053 J. Math. Cryptol. 16, 64-72 (2022). MSC: 94A60 20H20 PDFBibTeX XMLCite \textit{N. Rahman} and \textit{V. Shpilrain}, J. Math. Cryptol. 16, 64--72 (2022; Zbl 1483.94053) Full Text: DOI arXiv
Craven, Matthew J.; Woodward, John R. Evolution of group-theoretic cryptology attacks using hyper-heuristics. (English) Zbl 1487.94108 J. Math. Cryptol. 16, 49-63 (2022). MSC: 94A60 20P05 68W30 90C27 PDFBibTeX XMLCite \textit{M. J. Craven} and \textit{J. R. Woodward}, J. Math. Cryptol. 16, 49--63 (2022; Zbl 1487.94108) Full Text: DOI arXiv
Santini, Paolo; Persichetti, Edoardo; Baldi, Marco Reproducible families of codes and cryptographic applications. (English) Zbl 1476.94043 J. Math. Cryptol. 16, 20-48 (2022). MSC: 94B05 94A60 11T71 PDFBibTeX XMLCite \textit{P. Santini} et al., J. Math. Cryptol. 16, 20--48 (2022; Zbl 1476.94043) Full Text: DOI
Basso, Andrea; Pazuki, Fabien On the supersingular GPST attack. (English) Zbl 1478.14052 J. Math. Cryptol. 16, 14-19 (2022). Reviewer: Manjit Singh (Murthal) MSC: 14H52 14K02 11T71 94A60 81P94 PDFBibTeX XMLCite \textit{A. Basso} and \textit{F. Pazuki}, J. Math. Cryptol. 16, 14--19 (2022; Zbl 1478.14052) Full Text: DOI arXiv
Zhou, Yu; Hu, Jianyong; Miao, Xudong; Han, Yu; Zhang, Fuzhong On the confusion coefficient of Boolean functions. (English) Zbl 1497.94227 J. Math. Cryptol. 16, 1-13 (2022). MSC: 94D10 94A60 PDFBibTeX XMLCite \textit{Y. Zhou} et al., J. Math. Cryptol. 16, 1--13 (2022; Zbl 1497.94227) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif Revocable attribute-based proxy re-encryption. (English) Zbl 1482.94053 J. Math. Cryptol. 15, 465-482 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Luo} and \textit{S. Al-Kuwari}, J. Math. Cryptol. 15, 465--482 (2021; Zbl 1482.94053) Full Text: DOI
Xiao, Guanju; Luo, Lixia; Deng, Yingpu Constructing cycles in isogeny graphs of supersingular elliptic curves. (English) Zbl 1471.11190 J. Math. Cryptol. 15, 454-464 (2021). MSC: 11G05 11G15 14H52 94A60 PDFBibTeX XMLCite \textit{G. Xiao} et al., J. Math. Cryptol. 15, 454--464 (2021; Zbl 1471.11190) Full Text: DOI arXiv
Zhang, Jing; Li, Yuan; Adeyeye, John O. Sensitivities and block sensitivities of elementary symmetric Boolean functions. (English) Zbl 1482.94094 J. Math. Cryptol. 15, 434-453 (2021). MSC: 94D10 PDFBibTeX XMLCite \textit{J. Zhang} et al., J. Math. Cryptol. 15, 434--453 (2021; Zbl 1482.94094) Full Text: DOI
Dugardin, Margaux; Schindler, Werner; Guilley, Sylvain Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. (English) Zbl 1469.94093 J. Math. Cryptol. 15, 408-433 (2021). MSC: 94A60 60G99 62F10 PDFBibTeX XMLCite \textit{M. Dugardin} et al., J. Math. Cryptol. 15, 408--433 (2021; Zbl 1469.94093) Full Text: DOI
Ekerå, Martin Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. (English) Zbl 1485.68100 J. Math. Cryptol. 15, 359-407 (2021). Reviewer: Alexander Yurevich Vlasov (Sankt-Peterburg) MSC: 68Q12 81P68 94A60 PDFBibTeX XMLCite \textit{M. Ekerå}, J. Math. Cryptol. 15, 359--407 (2021; Zbl 1485.68100) Full Text: DOI
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin Isogenies on twisted Hessian curves. (English) Zbl 1467.14076 J. Math. Cryptol. 15, 345-358 (2021). MSC: 14H52 14K02 94A60 14G50 PDFBibTeX XMLCite \textit{F. L. Perez Broon} et al., J. Math. Cryptol. 15, 345--358 (2021; Zbl 1467.14076) Full Text: DOI
Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul The Oribatida v1.3 family of lightweight authenticated encryption schemes. (English) Zbl 1468.94393 J. Math. Cryptol. 15, 305-344 (2021). MSC: 94A60 94A62 11T06 11T71 11Y16 PDFBibTeX XMLCite \textit{A. Bhattacharjee} et al., J. Math. Cryptol. 15, 305--344 (2021; Zbl 1468.94393) Full Text: DOI
Reid, Elizabeth M. Using inclusion/exclusion to find bent and balanced monomial rotation symmetric functions. (English) Zbl 1468.94974 J. Math. Cryptol. 15, 298-304 (2021). MSC: 94D10 11T71 94A60 PDFBibTeX XMLCite \textit{E. M. Reid}, J. Math. Cryptol. 15, 298--304 (2021; Zbl 1468.94974) Full Text: DOI
Cascudo, Ignacio; Schnyder, Reto A note on secure multiparty computation via higher residue symbols. (English) Zbl 1468.94395 J. Math. Cryptol. 15, 284-297 (2021). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{I. Cascudo} and \textit{R. Schnyder}, J. Math. Cryptol. 15, 284--297 (2021; Zbl 1468.94395) Full Text: DOI
Rudy, Dylan; Monico, Chris Remarks on a tropical key exchange system. (English) Zbl 1466.94036 J. Math. Cryptol. 15, 280-283 (2021). MSC: 94A60 14T10 15A80 PDFBibTeX XMLCite \textit{D. Rudy} and \textit{C. Monico}, J. Math. Cryptol. 15, 280--283 (2021; Zbl 1466.94036) Full Text: DOI arXiv
Pandey, Atul; Gupta, Indivar; Singh, Dhiraj Kumar Improved cryptanalysis of a ElGamal cryptosystem based on matrices over group rings. (English) Zbl 1466.94035 J. Math. Cryptol. 15, 266-279 (2021). Reviewer: Aaron Lye (Bremen) MSC: 94A60 PDFBibTeX XMLCite \textit{A. Pandey} et al., J. Math. Cryptol. 15, 266--279 (2021; Zbl 1466.94035) Full Text: DOI
Zhou, Yu; Mu, Daoguang; Dong, Xinfeng On cryptographic properties of \((n+1)\)-bit S-boxes constructed by known \(n\)-bit S-boxes. (English) Zbl 1468.94424 J. Math. Cryptol. 15, 258-265 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Zhou} et al., J. Math. Cryptol. 15, 258--265 (2021; Zbl 1468.94424) Full Text: DOI
Araujo, Filipe; Neves, Samuel The circulant hash revisited. (English) Zbl 1473.94092 J. Math. Cryptol. 15, 250-257 (2021). Reviewer: Edgar Martinez-Moro (Soria) MSC: 94A60 94A62 11T71 68P25 68P05 PDFBibTeX XMLCite \textit{F. Araujo} and \textit{S. Neves}, J. Math. Cryptol. 15, 250--257 (2021; Zbl 1473.94092) Full Text: DOI
Kotov, Matvei; Menshov, Anton; Ushakov, Alexander Attack on Kayawood protocol: uncloaking private keys. (English) Zbl 1466.94032 J. Math. Cryptol. 15, 237-249 (2021). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{M. Kotov} et al., J. Math. Cryptol. 15, 237--249 (2021; Zbl 1466.94032) Full Text: DOI
Anokhin, Mikhail Pseudo-free families of computational universal algebras. (English) Zbl 1466.94019 J. Math. Cryptol. 15, 197-222 (2021). MSC: 94A60 08A70 08A62 68Q17 PDFBibTeX XMLCite \textit{M. Anokhin}, J. Math. Cryptol. 15, 197--222 (2021; Zbl 1466.94019) Full Text: DOI
Paterson, Maura B.; Stinson, Douglas R. On the equivalence of authentication codes and robust (2, 2)-threshold schemes. (English) Zbl 1466.94047 J. Math. Cryptol. 15, 179-196 (2021). MSC: 94A62 94A60 05B05 05B10 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, J. Math. Cryptol. 15, 179--196 (2021; Zbl 1466.94047) Full Text: DOI arXiv
Csirmaz, Laszlo Secret sharing and duality. (English) Zbl 1466.94044 J. Math. Cryptol. 15, 157-173 (2021). MSC: 94A62 05B35 94A15 06D50 PDFBibTeX XMLCite \textit{L. Csirmaz}, J. Math. Cryptol. 15, 157--173 (2021; Zbl 1466.94044) Full Text: DOI arXiv
Tibouchi, Mehdi; Wallet, Alexandre One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips. (English) Zbl 1464.94052 J. Math. Cryptol. 15, 131-142 (2021). MSC: 94A60 62F30 60D05 PDFBibTeX XMLCite \textit{M. Tibouchi} and \textit{A. Wallet}, J. Math. Cryptol. 15, 131--142 (2021; Zbl 1464.94052) Full Text: DOI
Sica, Francesco Factoring with hints. (English) Zbl 1461.11173 J. Math. Cryptol. 15, 123-130 (2021). MSC: 11Y40 11M06 94A60 PDFBibTeX XMLCite \textit{F. Sica}, J. Math. Cryptol. 15, 123--130 (2021; Zbl 1461.11173) Full Text: DOI arXiv
Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria Towards a ring analogue of the leftover hash lemma. (English) Zbl 1464.94032 J. Math. Cryptol. 15, 87-110 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., J. Math. Cryptol. 15, 87--110 (2021; Zbl 1464.94032) Full Text: DOI
Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria (In)security of ring-LWE under partial key exposure. (English) Zbl 1464.94031 J. Math. Cryptol. 15, 72-86 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., J. Math. Cryptol. 15, 72--86 (2021; Zbl 1464.94031) Full Text: DOI
Laarhoven, Thijs Approximate Voronoi cells for lattices, revisited. (English) Zbl 1470.11191 J. Math. Cryptol. 15, 60-71 (2021). Reviewer: Steven T. Dougherty (Scranton) MSC: 11H06 52B11 52C07 94A60 PDFBibTeX XMLCite \textit{T. Laarhoven}, J. Math. Cryptol. 15, 60--71 (2021; Zbl 1470.11191) Full Text: DOI arXiv
Murphy, Sean; Player, Rachel Discretisation and product distributions in ring-LWE. (English) Zbl 1464.94042 J. Math. Cryptol. 15, 45-59 (2021). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{S. Murphy} and \textit{R. Player}, J. Math. Cryptol. 15, 45--59 (2021; Zbl 1464.94042) Full Text: DOI
Takahashi, Yasushi; Kudo, Momonari; Fukasaku, Ryoya; Ikematsu, Yasuhiko; Yasuda, Masaya; Yokoyama, Kazuhiro Algebraic approaches for solving isogeny problems of prime power degrees. (English) Zbl 1465.14027 J. Math. Cryptol. 15, 31-44 (2021). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 14G50 94A60 PDFBibTeX XMLCite \textit{Y. Takahashi} et al., J. Math. Cryptol. 15, 31--44 (2021; Zbl 1465.14027) Full Text: DOI
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T. Towards isogeny-based password-authenticated key establishment. (English) Zbl 1464.94065 J. Math. Cryptol. 15, 18-30 (2021). MSC: 94A62 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{O. Taraskin} et al., J. Math. Cryptol. 15, 18--30 (2021; Zbl 1464.94065) Full Text: DOI
Biasse, Jean-François; Bonnetain, Xavier; Pring, Benjamin; Schrottenloher, André; Youmans, William A trade-off between classical and quantum circuit size for an attack against CSIDH. (English) Zbl 1464.94028 J. Math. Cryptol. 15, 4-17 (2021). MSC: 94A60 68Q12 68Q15 81P68 11Y16 14Q05 14G50 81P94 PDFBibTeX XMLCite \textit{J.-F. Biasse} et al., J. Math. Cryptol. 15, 4--17 (2021; Zbl 1464.94028) Full Text: DOI
Yokoyama, Kazuhiro; Yasuda, Masaya; Takahashi, Yasushi; Kogure, Jun Complexity bounds on Semaev’s naive index calculus method for ECDLP. (English) Zbl 1464.94054 J. Math. Cryptol. 14, 460-485 (2020). MSC: 94A60 14G50 13P10 PDFBibTeX XMLCite \textit{K. Yokoyama} et al., J. Math. Cryptol. 14, 460--485 (2020; Zbl 1464.94054) Full Text: DOI
Di Crescenzo, Giovanni; Khodjaeva, Matluba; Kahrobaei, Delaram; Shpilrain, Vladimir Delegating a product of group exponentiations with application to signature schemes. (English) Zbl 1464.94034 J. Math. Cryptol. 14, 438-459 (2020). MSC: 94A60 94A62 11T71 PDFBibTeX XMLCite \textit{G. Di Crescenzo} et al., J. Math. Cryptol. 14, 438--459 (2020; Zbl 1464.94034) Full Text: DOI
Colò, Leonardo; Kohel, David Orienting supersingular isogeny graphs. (English) Zbl 1460.11080 J. Math. Cryptol. 14, 414-437 (2020). MSC: 11G05 11T71 14H52 14K02 94A60 PDFBibTeX XMLCite \textit{L. Colò} and \textit{D. Kohel}, J. Math. Cryptol. 14, 414--437 (2020; Zbl 1460.11080) Full Text: DOI arXiv
Cheon, Jung Hee; Cho, Wonhee; Hhan, Minki; Kim, Jiseung; Lee, Changmin Algorithms for CRT-variant of approximate greatest common divisor problem. (English) Zbl 1466.11097 J. Math. Cryptol. 14, 397-413 (2020). MSC: 11Y16 94A60 11A05 PDFBibTeX XMLCite \textit{J. H. Cheon} et al., J. Math. Cryptol. 14, 397--413 (2020; Zbl 1466.11097) Full Text: DOI
Joux, Antoine (ed.); Pomykała, Jacek (ed.) Preface for the number-theoretic methods in cryptology conferences. Invited talk based on the presentations at the 3rd conference, Paris, France, June 2019. (English) Zbl 07347749 J. Math. Cryptol. 14, 393-396 (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XML Full Text: DOI
Coron, Jean-Sébastien; Gini, Agnese Improved cryptanalysis of the AJPS Mersenne based cryptosystem. (English) Zbl 1462.94033 J. Math. Cryptol. 14, 218-223 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{A. Gini}, J. Math. Cryptol. 14, 218--223 (2020; Zbl 1462.94033) Full Text: DOI
Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik A framework for cryptographic problems from linear algebra. (English) Zbl 1460.94037 J. Math. Cryptol. 14, 202-217 (2020). MSC: 94A60 13M10 11T71 11H06 PDFBibTeX XMLCite \textit{C. Bootland} et al., J. Math. Cryptol. 14, 202--217 (2020; Zbl 1460.94037) Full Text: DOI
Chakraborty, Suvradip; Alawatugoda, Janaka; Rangan, Chandrasekaran Pandu New approach to practical leakage-resilient public-key cryptography. (English) Zbl 1462.94032 J. Math. Cryptol. 14, 172-201 (2020). MSC: 94A60 94A62 14G50 11T71 68P25 68M12 PDFBibTeX XMLCite \textit{S. Chakraborty} et al., J. Math. Cryptol. 14, 172--201 (2020; Zbl 1462.94032) Full Text: DOI
Zhang, Liang Feng; Safavi-Naini, Reihaneh Privacy-preserving verifiable delegation of polynomial and matrix functions. (English) Zbl 1503.68072 J. Math. Cryptol. 14, 153-171 (2020). MSC: 68Q10 11T71 68M11 68P27 94A60 PDFBibTeX XMLCite \textit{L. F. Zhang} and \textit{R. Safavi-Naini}, J. Math. Cryptol. 14, 153--171 (2020; Zbl 1503.68072) Full Text: DOI
Goel, Neha; Gupta, Indivar; Dass, B. K. Survey on SAP and its application in public-key cryptography. (English) Zbl 1462.94037 J. Math. Cryptol. 14, 144-152 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Goel} et al., J. Math. Cryptol. 14, 144--152 (2020; Zbl 1462.94037) Full Text: DOI
Lesavourey, Andrea; Plantard, Thomas; Susilo, Willy Short principal ideal problem in multicubic fields. (English) Zbl 1462.94044 J. Math. Cryptol. 14, 359-392 (2020). MSC: 94A60 81P94 81P68 PDFBibTeX XMLCite \textit{A. Lesavourey} et al., J. Math. Cryptol. 14, 359--392 (2020; Zbl 1462.94044) Full Text: DOI
Kim, Taechan; Tibouchi, Mehdi Equidistribution among cosets of elliptic curve points in intervals. (English) Zbl 1462.94041 J. Math. Cryptol. 14, 339-345 (2020). MSC: 94A60 94A62 11G20 11L03 11Y05 PDFBibTeX XMLCite \textit{T. Kim} and \textit{M. Tibouchi}, J. Math. Cryptol. 14, 339--345 (2020; Zbl 1462.94041) Full Text: DOI
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. (English) Zbl 1462.94030 J. Math. Cryptol. 14, 316-338 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Boura} et al., J. Math. Cryptol. 14, 316--338 (2020; Zbl 1462.94030) Full Text: DOI
Castryck, Wouter; Decru, Thomas; Smith, Benjamin Hash functions from superspecial genus-2 curves using Richelot isogenies. (English) Zbl 1462.14047 J. Math. Cryptol. 14, 268-292 (2020). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14K02 14G50 94A60 11G10 PDFBibTeX XMLCite \textit{W. Castryck} et al., J. Math. Cryptol. 14, 268--292 (2020; Zbl 1462.14047) Full Text: DOI arXiv
Joye, Marc Protecting ECC against fault attacks: the ring extension method revisited. (English) Zbl 1461.14032 J. Math. Cryptol. 14, 254-267 (2020). Reviewer: Guillermo Morales Luna (Ciudad de México) MSC: 14G50 14H52 94A60 68M15 PDFBibTeX XMLCite \textit{M. Joye}, J. Math. Cryptol. 14, 254--267 (2020; Zbl 1461.14032) Full Text: DOI
Tomkins, Hayley; Nevins, Monica; Salmasian, Hadi New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\). (English) Zbl 1465.94091 J. Math. Cryptol. 14, 236-253 (2020). MSC: 94A60 11T71 20E05 PDFBibTeX XMLCite \textit{H. Tomkins} et al., J. Math. Cryptol. 14, 236--253 (2020; Zbl 1465.94091) Full Text: DOI
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDFBibTeX XMLCite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. (English) Zbl 1452.81087 J. Math. Cryptol. 14, 129-138 (2020). MSC: 81P94 68Q12 94A60 PDFBibTeX XMLCite \textit{D. Jao} et al., J. Math. Cryptol. 14, 129--138 (2020; Zbl 1452.81087) Full Text: DOI
Urbanik, David; Jao, David New techniques for SIDH-based NIKE. (English) Zbl 1448.94233 J. Math. Cryptol. 14, 120-128 (2020). MSC: 94A60 14G50 14K02 PDFBibTeX XMLCite \textit{D. Urbanik} and \textit{D. Jao}, J. Math. Cryptol. 14, 120--128 (2020; Zbl 1448.94233) Full Text: DOI
De Micheli, Gabrielle; Heninger, Nadia; Shani, Barak Characterizing overstretched NTRU attacks. (English) Zbl 1448.94241 J. Math. Cryptol. 14, 110-119 (2020). MSC: 94A62 11T71 94A60 PDFBibTeX XMLCite \textit{G. De Micheli} et al., J. Math. Cryptol. 14, 110--119 (2020; Zbl 1448.94241) Full Text: DOI
Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo Designing efficient dyadic operations for cryptographic applications. (English) Zbl 1441.94069 J. Math. Cryptol. 14, 95-109 (2020). Reviewer: Steven T. Dougherty (Scranton) MSC: 94A60 11T71 81P94 PDFBibTeX XMLCite \textit{G. Banegas} et al., J. Math. Cryptol. 14, 95--109 (2020; Zbl 1441.94069) Full Text: DOI
Yasuda, Masaya Self-dual DeepBKZ for finding short lattice vectors. (English) Zbl 1448.94235 J. Math. Cryptol. 14, 84-94 (2020). MSC: 94A60 68P25 68W30 PDFBibTeX XMLCite \textit{M. Yasuda}, J. Math. Cryptol. 14, 84--94 (2020; Zbl 1448.94235) Full Text: DOI
Doröz, Yarkın; Sunar, Berk Flattening NTRU for evaluation key free homomorphic encryption. (English) Zbl 1448.94196 J. Math. Cryptol. 14, 66-83 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Y. Doröz} and \textit{B. Sunar}, J. Math. Cryptol. 14, 66--83 (2020; Zbl 1448.94196) Full Text: DOI
Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik Efficiently processing complex-valued data in homomorphic encryption. (English) Zbl 1448.94189 J. Math. Cryptol. 14, 55-65 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Bootland} et al., J. Math. Cryptol. 14, 55--65 (2020; Zbl 1448.94189) Full Text: DOI
Hoffstein, Jeffrey; Silverman, Joseph H.; Whyte, William; Zhang, Zhenfei A signature scheme from the finite field isomorphism problem. (English) Zbl 1450.94051 J. Math. Cryptol. 14, 39-54 (2020). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Hoffstein} et al., J. Math. Cryptol. 14, 39--54 (2020; Zbl 1450.94051) Full Text: DOI
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. (English) Zbl 1450.94036 J. Math. Cryptol. 14, 25-38 (2020). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 94A60 11T06 11T71 PDFBibTeX XMLCite \textit{M.-D. Huang} et al., J. Math. Cryptol. 14, 25--38 (2020; Zbl 1450.94036) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Guilley, Sylvain; Naccache, David; Tibouchi, Mehdi Recovering secrets from prefix-dependent leakage. (English) Zbl 1448.94243 J. Math. Cryptol. 14, 15-24 (2020). MSC: 94A62 11T71 PDFBibTeX XMLCite \textit{H. Ferradi} et al., J. Math. Cryptol. 14, 15--24 (2020; Zbl 1448.94243) Full Text: DOI
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark Multiparty non-interactive key exchange and more from isogenies on elliptic curves. (English) Zbl 1445.14043 J. Math. Cryptol. 14, 5-14 (2020). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14G50 94A60 14K02 14H52 14Q20 PDFBibTeX XMLCite \textit{D. Boneh} et al., J. Math. Cryptol. 14, 5--14 (2020; Zbl 1445.14043) Full Text: DOI arXiv
Cheon, Jung Hee (ed.); Lauter, Kristin (ed.); Yhee, Donggeon (ed.) Preface to the first annual MathCrypt proceedings volume. (English) Zbl 1484.00120 J. Math. Cryptol. 14, 1-4 (2020). MSC: 00B25 94-06 PDFBibTeX XMLCite \textit{J. H. Cheon} (ed.) et al., J. Math. Cryptol. 14, 1--4 (2020; Zbl 1484.00120) Full Text: DOI
Kousidis, Stavros; Wiemers, Andreas On the first fall degree of summation polynomials. (English) Zbl 1427.13039 J. Math. Cryptol. 13, No. 3-4, 229-237 (2019). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 13P15 13P10 14H52 94A60 13-11 PDFBibTeX XMLCite \textit{S. Kousidis} and \textit{A. Wiemers}, J. Math. Cryptol. 13, No. 3--4, 229--237 (2019; Zbl 1427.13039) Full Text: DOI arXiv
Nandi, Mridul; Pandit, Tapas Predicate signatures from pair encodings via dual system proof technique. (English) Zbl 1457.94167 J. Math. Cryptol. 13, No. 3-4, 197-228 (2019). MSC: 94A60 94A62 11T71 14G50 PDFBibTeX XMLCite \textit{M. Nandi} and \textit{T. Pandit}, J. Math. Cryptol. 13, No. 3--4, 197--228 (2019; Zbl 1457.94167) Full Text: DOI
Sipasseuth, Arnaud; Plantard, Thomas; Susilo, Willy Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices. (English) Zbl 1468.94417 J. Math. Cryptol. 13, No. 3-4, 169-196 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sipasseuth} et al., J. Math. Cryptol. 13, No. 3--4, 169--196 (2019; Zbl 1468.94417) Full Text: DOI
Biasse, Jean-François; Song, Fang On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\). (English) Zbl 1454.11223 J. Math. Cryptol. 13, No. 3-4, 151-168 (2019). MSC: 11T71 94A60 PDFBibTeX XMLCite \textit{J.-F. Biasse} and \textit{F. Song}, J. Math. Cryptol. 13, No. 3--4, 151--168 (2019; Zbl 1454.11223) Full Text: DOI
Bansal, Tarun Kumar; Boyen, Xavier; Pieprzyk, Josef Signcryption schemes with insider security in an ideal permutation model. (English) Zbl 1443.94044 J. Math. Cryptol. 13, No. 2, 117-150 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. K. Bansal} et al., J. Math. Cryptol. 13, No. 2, 117--150 (2019; Zbl 1443.94044) Full Text: DOI
Harsányi, Károly; Ligeti, Péter Exact information ratios for secret sharing on small graphs with girth at least 5. (English) Zbl 1443.94092 J. Math. Cryptol. 13, No. 2, 107-116 (2019). MSC: 94A62 05C90 PDFBibTeX XMLCite \textit{K. Harsányi} and \textit{P. Ligeti}, J. Math. Cryptol. 13, No. 2, 107--116 (2019; Zbl 1443.94092) Full Text: DOI
Lavauzelle, Julien; Levy-dit-Vehel, Françoise Generic constructions of PoRs from codes and instantiations. (English) Zbl 1443.94106 J. Math. Cryptol. 13, No. 2, 81-106 (2019). MSC: 94B05 11T71 68P20 68P25 PDFBibTeX XMLCite \textit{J. Lavauzelle} and \textit{F. Levy-dit-Vehel}, J. Math. Cryptol. 13, No. 2, 81--106 (2019; Zbl 1443.94106) Full Text: DOI HAL
Kaji, Shizuo; Maeno, Toshiaki; Nuida, Koji; Numata, Yasuhide Polynomial expressions of \(p\)-ary auction functions. (English) Zbl 1443.94066 J. Math. Cryptol. 13, No. 2, 69-80 (2019). MSC: 94A60 94A62 11T71 68R05 PDFBibTeX XMLCite \textit{S. Kaji} et al., J. Math. Cryptol. 13, No. 2, 69--80 (2019; Zbl 1443.94066) Full Text: DOI arXiv
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus Estimation of the hardness of the learning with errors problem with a restricted number of samples. (English) Zbl 1458.94214 J. Math. Cryptol. 13, No. 1, 47-67 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bindel} et al., J. Math. Cryptol. 13, No. 1, 47--67 (2019; Zbl 1458.94214) Full Text: DOI
Wunderer, Thomas A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. (English) Zbl 1415.94466 J. Math. Cryptol. 13, No. 1, 1-26 (2019). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{T. Wunderer}, J. Math. Cryptol. 13, No. 1, 1--26 (2019; Zbl 1415.94466) Full Text: DOI
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul On the optimality of non-linear computations for symmetric key primitives. (English) Zbl 1420.94028 J. Math. Cryptol. 12, No. 4, 241-259 (2018). MSC: 94A40 68P25 94A62 PDFBibTeX XMLCite \textit{A. Chakraborti} et al., J. Math. Cryptol. 12, No. 4, 241--259 (2018; Zbl 1420.94028) Full Text: DOI
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E. DAGS: key encapsulation using dyadic GS codes. (English) Zbl 1420.94102 J. Math. Cryptol. 12, No. 4, 221-239 (2018). MSC: 94B05 11T71 94A60 PDFBibTeX XMLCite \textit{G. Banegas} et al., J. Math. Cryptol. 12, No. 4, 221--239 (2018; Zbl 1420.94102) Full Text: DOI Link
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj Multi-prover proof of retrievability. (English) Zbl 1420.94089 J. Math. Cryptol. 12, No. 4, 203-220 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. B. Paterson} et al., J. Math. Cryptol. 12, No. 4, 203--220 (2018; Zbl 1420.94089) Full Text: DOI arXiv Link
Carvalho Pinto, Eduardo; Petit, Christophe Better path-finding algorithms in LPS Ramanujan graphs. (English) Zbl 1420.94045 J. Math. Cryptol. 12, No. 4, 191-202 (2018). MSC: 94A60 05C25 PDFBibTeX XMLCite \textit{E. Carvalho Pinto} and \textit{C. Petit}, J. Math. Cryptol. 12, No. 4, 191--202 (2018; Zbl 1420.94045) Full Text: DOI Link