×

Journal of Mathematical Cryptology

Short Title: J. Math. Cryptol.
Publisher: De Gruyter, Berlin
ISSN: 1862-2976; 1862-2984/e
Online: http://www.degruyter.com/view/j/jmc
Comments: Indexed cover-to-cover
Documents Indexed: 280 Publications (since 2007)
References Indexed: 207 Publications with 4,395 References.
all top 5

Authors

12 Stinson, Douglas Robert
8 Nandi, Mridul
7 Shparlinski, Igor E.
7 Ushakov, Alexander S.
6 Paterson, Maura Beth
5 Blackburn, Simon R.
5 Cusick, Thomas W.
5 Koblitz, Neal I.
5 Yao, David D. W.
5 Yasuda, Masaya
4 Lauter, Kristin Estella
4 Menezes, Alfred J.
4 Persichetti, Edoardo
4 Pieprzyk, Josef P.
4 Tibouchi, Mehdi
4 Yokoyama, Kazuhiro
3 Bartlett, Harry
3 Biasse, Jean-François
3 Castryck, Wouter
3 Cheon, Jung Hee
3 Dawson, Edward
3 Galbraith, Steven D.
3 Guilley, Sylvain
3 Hadian Dehkordi, Massoud
3 Hinek, M. Jason
3 Joye, Marc
3 Kogure, Jun
3 Kotov, Matvei
3 LeGrow, Jason Travis
3 Li, Yuan
3 Moody, Dustin
3 Mullan, Ciaran
3 Murphy, Sean
3 Naccache, David
3 Preneel, Bart
3 Tsaban, Boaz
3 Upadhyay, Jalaj
3 Wong, Kenneth Koon-Ho
2 Alawatugoda, Janaka
2 Anokhin, Mikhail
2 Asghar, Hassan Jameel
2 Banegas, Gustavo
2 Barreto, Paulo S. L. M.
2 Blake, Ian F.
2 Bootland, Carl
2 Carlet, Claude
2 Childs, Andrew M.
2 Cid, Carlos Frederico
2 Colbourn, Charles J.
2 Csirmaz, László
2 Dachman-Soled, Dana
2 Duquesne, Sylvain
2 Faugère, Jean-Charles
2 Ferradi, Houda
2 Fouotsa, Emmanuel
2 Gong, Huijing
2 Grošek, Otokar
2 Gupta, Indivar
2 Jetchev, Dimitar P.
2 Joux, Antoine
2 Justus, Benjamin
2 Kahrobaei, Delaram
2 Karabina, Koray
2 Karmakar, Sudhangshu B.
2 Kolesnikov, Vladimir
2 Koshiba, Takeshi
2 Kulkarni, Mukul
2 Lam, Charles C. Y.
2 Ligeti, Péter
2 Pandit, Tapas
2 Petit, Christophe
2 Plantard, Thomas
2 Player, Rachel
2 Pomykała, Jacek M.
2 Pring, Benjamin
2 Rijmen, Vincent
2 Safavi-Naini, Reihaneh
2 Samajder, Subhabrata
2 Santini, Paolo Maria
2 Sarkar, Palash
2 Sarkar, Santanu
2 Schindler, Werner
2 Shahverdi, Aria
2 Shimoyama, Takeshi
2 Shpilrain, Vladimir
2 Sica, Francesco
2 Simpson, Leonie Ruth
2 Soukharev, Vladimir
2 Stănică, Pantelimon
2 Steinfeld, Ron
2 Susilo, Willy
2 Takahashi, Yasushi
2 Trung, Tran Van
2 Vercauteren, Frederik
2 von zur Gathen, Joachim
2 Winterhof, Arne
2 Wu, Jiang
2 Zajac, Pavol
2 Zhang, Liang Feng
2 Zhou, Yu
...and 397 more Authors

Publications by Year

Citations contained in zbMATH Open

141 Publications have been cited 729 times in 614 Documents Cited by Year
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
62
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
61
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
51
2014
Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117
Nguyen, Phong Q.; Vidick, Thomas
31
2008
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
26
2009
Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048
Gaudry, P.
25
2007
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
20
2010
Perfect hash families: constructions and existence. Zbl 1128.05012
Walker, Robert A. II; Colbourn, Charles J.
19
2007
Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028
Daemen, Joan; Rijmen, Vincent
16
2007
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
12
2010
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
12
2009
Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067
Myasnikov, Alexei G.; Ushakov, Alexander
12
2008
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
11
2011
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
11
2012
Distribution of some sequences of points on elliptic curves. Zbl 1129.14040
Lange, Tanja; Shparlinski, Igor E.
10
2007
On the security of multi-prime RSA. Zbl 1146.94008
Hinek, M. Jason
8
2008
Polylogarithmic two-round argument systems. Zbl 1158.94003
Mie, Thilo
8
2008
Minimal weight expansions in Pisot bases. Zbl 1170.11003
Frougny, Christiane; Steiner, Wolfgang
8
2008
A summary of McEliece-type cryptosystems and their security. Zbl 1278.94047
Engelbert, D.; Overbeck, R.; Schmidt, Arthur
8
2007
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
7
2012
On the \(k\)-error linear complexity of cyclotomic sequences. Zbl 1147.11065
Aly, Hassan; Meidl, Wilfried; Winterhof, Arne
7
2007
Strict avalanche criterion over finite fields. Zbl 1145.11082
Li, Yuan; Cusick, T. W.
7
2007
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
7
2018
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032
Avanzi, R.; Thériault, N.; Wang, Z.
6
2008
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
6
2010
Another look at HMQV. Zbl 1211.94032
Menezes, Alfred
6
2007
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
6
2009
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
6
2013
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
5
2020
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
5
2010
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
5
2012
Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357
Koblitz, Neal; Menezes, Alfred
5
2008
Distortion maps for supersingular genus two curves. Zbl 1232.11075
Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin
5
2009
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022
Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon
5
2009
On hashing into elliptic curves. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
5
2009
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006
Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam
4
2008
Improved security analysis of PMAC. Zbl 1146.94009
Nandi, Mridul; Mandal, Avradip
4
2008
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
4
2016
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
4
2016
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
4
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
4
2015
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
4
2013
Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359
Nandi, Mridul
4
2009
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
4
2014
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
4
2013
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
3
2020
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
3
2021
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
3
2019
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113
Schindler, Werner
3
2008
Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317
Longrigg, Jonathan; Ushakov, Alexander
3
2008
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
3
2016
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
3
2010
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
3
2010
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
3
2015
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
3
2015
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
3
2013
Minimal weight and colexicographically minimal integer representations. Zbl 1161.11002
Heuberger, Clemens; Muir, James A.
3
2007
An attack on disguised elliptic curves. Zbl 1140.94011
Morales, David J. Mireles
3
2008
\(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041
Brandstätter, Nina; Winterhof, Arne
3
2009
A recursive construction for perfect hash families. Zbl 1190.05029
Colbourn, Charles J.; Ling, Alan C. H.
3
2009
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
3
2018
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
3
2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
3
2020
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
2
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883
Biasse, Jean-François; Pring, Benjamin
2
2021
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
2
2021
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. Zbl 1251.94020
Attrapadung, Nuttapong; Libert, Benoît
2
2011
Cryptanalysis of three matrix-based key establishment protocols. Zbl 1248.94059
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
2
2011
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092
Mosina, Natalia; Ushakov, Alexander
2
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
2
2012
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
2
2015
An efficient and secure two-flow zero-knowledge identification protocol. Zbl 1211.94039
Stinson, D. R.; Wu, J.
2
2007
Simplified pairing computation and security implications. Zbl 1145.11047
Galbraith, Steven D.; Ó hÉigeartaigh, Colm; Sheedy, Caroline
2
2007
The combinatorics of generalised cumulative arrays. Zbl 1203.68118
Martin, Keith; Ng, Siaw-Lynn
2
2007
A geometric view of cryptographic equation solving. Zbl 1146.68072
Murphy, S.; Paterson, M. B.
2
2008
Subset sum pseudorandom numbers: fast generation and distribution. Zbl 1236.11067
von zur Gathen, Joachim; Shparlinski, Igor E.
2
2009
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
2
2018
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2013
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
2
2020
Efficiently processing complex-valued data in homomorphic encryption. Zbl 1448.94189
Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik
2
2020
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
2
2020
MAKE: a matrix action key exchange. Zbl 1483.94053
Rahman, Nael; Shpilrain, Vladimir
1
2022
Protecting ECC against fault attacks: the ring extension method revisited. Zbl 1461.14032
Joye, Marc
1
2020
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
1
2020
Survey on SAP and its application in public-key cryptography. Zbl 1462.94037
Goel, Neha; Gupta, Indivar; Dass, B. K.
1
2020
MAKE: a matrix action key exchange. Zbl 1483.94053
Rahman, Nael; Shpilrain, Vladimir
1
2022
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
3
2021
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
2
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883
Biasse, Jean-François; Pring, Benjamin
2
2021
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
2
2021
A trade-off between classical and quantum circuit size for an attack against CSIDH. Zbl 1464.94028
Biasse, Jean-François; Bonnetain, Xavier; Pring, Benjamin; Schrottenloher, André; Youmans, William
1
2021
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. Zbl 1466.94047
Paterson, Maura B.; Stinson, Douglas R.
1
2021
Pseudo-free families of computational universal algebras. Zbl 1466.94019
Anokhin, Mikhail
1
2021
Remarks on a tropical key exchange system. Zbl 1466.94036
Rudy, Dylan; Monico, Chris
1
2021
The Oribatida v1.3 family of lightweight authenticated encryption schemes. Zbl 1468.94393
Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul
1
2021
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
5
2020
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
3
2020
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
3
2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
3
2020
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
2
2020
Efficiently processing complex-valued data in homomorphic encryption. Zbl 1448.94189
Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik
2
2020
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
2
2020
Protecting ECC against fault attacks: the ring extension method revisited. Zbl 1461.14032
Joye, Marc
1
2020
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
1
2020
Survey on SAP and its application in public-key cryptography. Zbl 1462.94037
Goel, Neha; Gupta, Indivar; Dass, B. K.
1
2020
A framework for cryptographic problems from linear algebra. Zbl 1460.94037
Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik
1
2020
Delegating a product of group exponentiations with application to signature schemes. Zbl 1464.94034
Di Crescenzo, Giovanni; Khodjaeva, Matluba; Kahrobaei, Delaram; Shpilrain, Vladimir
1
2020
Designing efficient dyadic operations for cryptographic applications. Zbl 1441.94069
Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo
1
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
3
2019
Exact information ratios for secret sharing on small graphs with girth at least 5. Zbl 1443.94092
Harsányi, Károly; Ligeti, Péter
1
2019
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\). Zbl 1454.11223
Biasse, Jean-François; Song, Fang
1
2019
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
7
2018
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
3
2018
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
2
2018
Multi-prover proof of retrievability. Zbl 1420.94089
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
1
2018
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Isolated elliptic curves and the MOV attack. Zbl 1432.11066
Scholl, Travis
1
2017
The complexity of the connected graph access structure on seven participants. Zbl 1405.68247
Hadian Dehkordi, Massoud; Safi, Ali
1
2017
On the leakage-resilient key exchange. Zbl 1376.94023
Alawatugoda, Janaka
1
2017
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
4
2016
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
4
2016
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
3
2016
Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073
Jha, Ashwin; Nandi, Mridul
1
2016
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
1
2016
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
62
2015
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
4
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
4
2015
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
3
2015
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
3
2015
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
2
2015
A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096
Hameed, Ali; Slinko, Arkadii
1
2015
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030
Yoon, Kisoon
1
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
61
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
51
2014
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
4
2014
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves. Zbl 1353.11111
Sha, Min
1
2014
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067
Justus, Benjamin
1
2014
Infinite secret sharing – examples. Zbl 1330.94055
Dibert, Alexander; Csirmaz, László
1
2014
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
6
2013
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
4
2013
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
4
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
3
2013
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2013
Self-pairings on hyperelliptic curves. Zbl 1273.14051
Galbraith, Steven D.; Zhao, Chang-An
1
2013
Generating safe primes. Zbl 1280.11055
von zur Gathen, Joachim; Shparlinski, Igor E.
1
2013
On a special class of multivariate quadratic quasigroups (MQQs). Zbl 1285.20065
Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein J.
1
2013
Strongly aperiodic logarithmic signatures. Zbl 1305.94078
Staszewski, Reiner; van Trung, Tran
1
2013
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
11
2012
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
7
2012
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
5
2012
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
2
2012
On the \(\rho \)-values of complete families of pairing-friendly elliptic curves. Zbl 1279.94110
Okano, Keiji
1
2012
Aperiodic logarithmic signatures. Zbl 1276.94023
Baumeister, Barbara; de Wiljes, Jan-Hendrik
1
2012
Analysis of a key distribution scheme in secure multicasting. Zbl 1277.94034
Maze, Gérard
1
2012
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
11
2011
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. Zbl 1251.94020
Attrapadung, Nuttapong; Libert, Benoît
2
2011
Cryptanalysis of three matrix-based key establishment protocols. Zbl 1248.94059
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
2
2011
Security of blind signatures under aborts and applications to adaptive oblivious transfer. Zbl 1251.94029
Fischlin, Marc; Schröder, Dominique
1
2011
A family of weak keys in HFE and the corresponding practical key-recovery. Zbl 1251.94023
Bouillaguet, Charles; Fouque, Pierre-Alain; Joux, Antoine; Treger, Joana
1
2011
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
20
2010
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
12
2010
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
6
2010
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
5
2010
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
3
2010
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
3
2010
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092
Mosina, Natalia; Ushakov, Alexander
2
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
On the asymptotic effectiveness of Weil descent attacks. Zbl 1252.94080
Karabina, Koray; Menezes, Alfred; Pomerance, Carl; Shparlinski, Igor E.
1
2010
Multicollision attacks and generalized iterated hash functions. Zbl 1203.94110
Kortelainen, Juha; Halunen, Kimmo; Kortelainen, Tuomas
1
2010
Common modulus attacks on small private exponent RSA and some fast variants (in practice). Zbl 1194.94186
Hinek, M. Jason; Lam, Charles C. Y.
1
2010
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
26
2009
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
12
2009
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
6
2009
...and 41 more Documents
all top 5

Cited by 1,080 Authors

12 Farràs, Oriol
10 Colbourn, Charles J.
10 Padró, Carles
10 Yao, David D. W.
9 Costello, Craig
9 Laarhoven, Thijs
9 Medina, Luis A.
9 Yasuda, Masaya
8 Azarderakhsh, Reza
8 Cusick, Thomas W.
7 Castro, Francis Noel
7 Lauter, Kristin Estella
7 Sarkar, Palash
7 Takagi, Tsuyoshi
6 Castryck, Wouter
6 Galbraith, Steven D.
6 Koziel, Brian
6 Petit, Christophe
6 Shparlinski, Igor E.
6 Vercauteren, Frederik
5 Biasse, Jean-François
5 Ducas, Léo
5 Farashahi, Reza Rezaeian
5 Faugère, Jean-Charles
5 Joux, Antoine
5 Kirshanova, Elena
5 Kudo, Momonari
5 LeGrow, Jason Travis
5 Longa, Patrick
5 May, Alexander
5 Nakamura, Satoshi
5 Nandi, Mridul
5 Paul, Goutam
5 Persichetti, Edoardo
5 Robert, Damien
5 Stehlé, Damien
5 Trung, Tran Van
4 Aragona, Riccardo
4 Barreto, Paulo S. L. M.
4 De Feo, Luca
4 Gama, Nicolas
4 Gaudry, Pierrick
4 Heuberger, Clemens
4 Khazaei, Shahram
4 Koblitz, Neal I.
4 Kunihiro, Noboru
4 Lange, Tanja
4 Lubicz, David
4 Maitra, Subhamoy
4 Martí-Farré, Jaume
4 Menezes, Alfred J.
4 Nyberg, Kaisa
4 Raddum, Håvard
4 Sakzad, Amin
4 Samajder, Subhabrata
4 Sarkar, Santanu
4 Sepúlveda, L. Brehsner
4 Steinfeld, Ron
4 Stinson, Douglas Robert
4 Takashima, Katsuyuki
4 Takayasu, Atsushi
4 Tischhauser, Elmar
4 Ushakov, Alexander S.
4 Zajac, Pavol
3 Albrecht, Martin R.
3 Bernstein, Daniel Julius
3 Bitansky, Nir
3 Blondeau, Celine
3 Bogdanov, Andrey
3 Canetti, Ran
3 Carlet, Claude
3 Chen, Yilei
3 Chen, Zhixiong
3 Cheon, Jung Hee
3 Chiesa, Alessandro
3 Ding, Jintai
3 Georgieva, Mariya
3 González, Oscar E.
3 Gueye, Cheikh Thiecoumba
3 Guilley, Sylvain
3 Han, Kyoohyung
3 Herold, Gottfried
3 Ikematsu, Yasuhiko
3 Iliashenko, Ilia
3 Izabachène, Malika
3 Jacobson, Michael John jun.
3 Klamti, Jean Belo
3 Kutas, Péter
3 Li, Chao
3 Lyubashevsky, Vadim
3 Martindale, Chloe
3 Moody, Dustin
3 Mosca, Michele
3 Mozaffari-Kermani, Mehran
3 Naehrig, Michael
3 Otmani, Ayoub
3 Perret, Ludovic
3 Qu, Longjiang
3 Renes, Joost
3 Rijmen, Vincent
...and 980 more Authors
all top 5

Cited in 111 Journals

71 Designs, Codes and Cryptography
48 Journal of Mathematical Cryptology
21 Journal of Cryptology
15 Theoretical Computer Science
15 Finite Fields and their Applications
13 Cryptography and Communications
12 Discrete Applied Mathematics
10 Advances in Mathematics of Communications
9 Groups, Complexity, Cryptology
8 Journal of Number Theory
8 LMS Journal of Computation and Mathematics
7 Mathematics of Computation
6 Information Sciences
6 Journal of Symbolic Computation
6 Applicable Algebra in Engineering, Communication and Computing
5 Information Processing Letters
5 Matematicheskie Voprosy Kriptografii
4 Communications in Algebra
4 Tatra Mountains Mathematical Publications
4 Mathematics in Computer Science
4 JSIAM Letters
3 Discrete Mathematics
3 Facta Universitatis. Series Mathematics and Informatics
3 SIAM Journal on Discrete Mathematics
3 Cybernetics and Systems Analysis
3 Journal of Combinatorial Optimization
3 Annals of Combinatorics
3 Journal of Discrete Mathematical Sciences & Cryptography
3 Journal of Applied Mathematics and Computing
2 Journal of Combinatorial Theory. Series A
2 Journal of Computational and Applied Mathematics
2 Journal of Pure and Applied Algebra
2 International Journal of Computer Mathematics
2 Experimental Mathematics
2 Journal of Algebraic Combinatorics
2 Journal of Mathematical Sciences (New York)
2 The Electronic Journal of Combinatorics
2 Journal of Statistical Theory and Practice
2 Forum of Mathematics, Sigma
2 Prikladnaya Diskretnaya Matematika
1 International Journal of Theoretical Physics
1 Journal d’Analyse Mathématique
1 Mathematische Semesterberichte
1 Advances in Mathematics
1 Annali di Matematica Pura ed Applicata. Serie Quarta
1 Applied Mathematics and Computation
1 Automatica
1 Canadian Journal of Mathematics
1 Compositio Mathematica
1 Computing
1 Functiones et Approximatio. Commentarii Mathematici
1 Illinois Journal of Mathematics
1 Inventiones Mathematicae
1 Journal of Algebra
1 Journal of Geometry
1 Journal of Statistical Planning and Inference
1 Mathematica Slovaca
1 Mathematische Zeitschrift
1 Mathematika
1 Michigan Mathematical Journal
1 SIAM Journal on Computing
1 Transactions of the American Mathematical Society
1 Ergodic Theory and Dynamical Systems
1 Combinatorica
1 Acta Mathematica Hungarica
1 Bulletin of the Iranian Mathematical Society
1 Algorithmica
1 Journal of the American Mathematical Society
1 Mathematical and Computer Modelling
1 Forum Mathematicum
1 Annals of Operations Research
1 International Journal of Algebra and Computation
1 International Journal of Foundations of Computer Science
1 IMRN. International Mathematics Research Notices
1 Communications of the ACM
1 Linear Algebra and its Applications
1 Journal of Knot Theory and its Ramifications
1 Computational Complexity
1 Complexity
1 Arab Journal of Mathematical Sciences
1 Séminaire Lotharingien de Combinatoire
1 The Ramanujan Journal
1 Theory of Computing Systems
1 Soft Computing
1 Informatica (Vilnius)
1 Journal of Integer Sequences
1 Interdisciplinary Information Sciences (IIS)
1 Acta Mathematica Sinica. English Series
1 Computational Geosciences
1 Fundamenta Informaticae
1 Integers
1 Journal of Systems Science and Complexity
1 Journal of Applied Mathematics
1 Central European Journal of Mathematics
1 Quantum Information Processing
1 Journal of Algebra and its Applications
1 Mediterranean Journal of Mathematics
1 Mathematical Biosciences and Engineering
1 Discrete Optimization
1 International Journal of Number Theory
...and 11 more Journals
all top 5

Cited in 38 Fields

474 Information and communication theory, circuits (94-XX)
176 Number theory (11-XX)
134 Computer science (68-XX)
117 Algebraic geometry (14-XX)
68 Quantum theory (81-XX)
66 Combinatorics (05-XX)
37 Group theory and generalizations (20-XX)
15 Order, lattices, ordered algebraic structures (06-XX)
13 Operations research, mathematical programming (90-XX)
11 Statistics (62-XX)
10 Linear and multilinear algebra; matrix theory (15-XX)
9 Commutative algebra (13-XX)
8 Convex and discrete geometry (52-XX)
7 Numerical analysis (65-XX)
5 Probability theory and stochastic processes (60-XX)
4 Associative rings and algebras (16-XX)
4 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
3 Field theory and polynomials (12-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Geometry (51-XX)
3 Manifolds and cell complexes (57-XX)
2 Mathematical logic and foundations (03-XX)
2 General algebraic systems (08-XX)
2 Measure and integration (28-XX)
2 Dynamical systems and ergodic theory (37-XX)
1 History and biography (01-XX)
1 Nonassociative rings and algebras (17-XX)
1 Topological groups, Lie groups (22-XX)
1 Several complex variables and analytic spaces (32-XX)
1 Special functions (33-XX)
1 Abstract harmonic analysis (43-XX)
1 Differential geometry (53-XX)
1 Algebraic topology (55-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Mechanics of particles and systems (70-XX)
1 Fluid mechanics (76-XX)
1 Statistical mechanics, structure of matter (82-XX)
1 Systems theory; control (93-XX)

Citations by Year