×

Journal of Mathematical Cryptology

Short Title: J. Math. Cryptol.
Publisher: De Gruyter, Berlin
ISSN: 1862-2976; 1862-2984/e
Online: http://www.degruyter.com/view/j/jmc
Comments: Journal; Indexed cover-to-cover
Documents Indexed: 310 Publications (since 2007)
References Indexed: 236 Publications with 5,136 References.
all top 5

Authors

12 Stinson, Douglas Robert
8 Nandi, Mridul
8 Ushakov, Alexander S.
7 Shparlinski, Igor E.
6 Paterson, Maura Beth
5 Blackburn, Simon R.
5 Cusick, Thomas W.
5 Jao, David
5 Koblitz, Neal I.
5 Yasuda, Masaya
4 Lauter, Kristin Estella
4 Menezes, Alfred J.
4 Persichetti, Edoardo
4 Pieprzyk, Josef P.
4 Shpilrain, Vladimir
4 Tibouchi, Mehdi
4 Yokoyama, Kazuhiro
3 Bartlett, Harry
3 Biasse, Jean-François
3 Castryck, Wouter
3 Cheon, Jung Hee
3 Dawson, Edward
3 Galbraith, Steven D.
3 Guilley, Sylvain
3 Hadian Dehkordi, Massoud
3 Hinek, M. Jason
3 Joye, Marc
3 Kahrobaei, Delaram
3 Klamti, Jean Belo
3 Kogure, Jun
3 Kotov, Matvei
3 LeGrow, Jason Travis
3 Li, Yuan
3 Moody, Dustin
3 Mullan, Ciaran
3 Murphy, Sean
3 Naccache, David
3 Preneel, Bart
3 Sala, Massimiliano
3 Tran Van Trung
3 Tsaban, Boaz
3 Upadhyay, Jalaj
3 Wong, Kenneth Koon-Ho
2 Alawatugoda, Janaka
2 Anokhin, Mikhail
2 Asghar, Hassan Jameel
2 Azizi, Abdelmalek
2 Banegas, Gustavo
2 Barreto, Paulo S. L. M.
2 Blake, Ian Fraser
2 Bootland, Carl
2 Brown, Daniel R. L.
2 Calderini, Marco
2 Carlet, Claude
2 Childs, Andrew M.
2 Cid, Carlos Frederico
2 Colbourn, Charles J.
2 Csirmaz, László
2 Dachman-Soled, Dana
2 Duquesne, Sylvain
2 Faugère, Jean-Charles
2 Ferradi, Houda
2 Fouotsa, Emmanuel
2 Gong, Huijing
2 Grošek, Otokar
2 Gupta, Indivar
2 Hasan, Mohammed Anwarul
2 Jetchev, Dimitar P.
2 Joux, Antoine
2 Justus, Benjamin
2 Karabina, Koray
2 Karmakar, Sudhangshu B.
2 Kolesnikov, Vladimir
2 Koshiba, Takeshi
2 Kulkarni, Mukul
2 Lam, Charles C. Y.
2 Ligeti, Péter
2 Pandit, Tapas
2 Petit, Christophe
2 Plantard, Thomas
2 Player, Rachel
2 Pomykała, Jacek M.
2 Pring, Benjamin
2 Rijmen, Vincent
2 Safavi-Naini, Reihaneh
2 Samajder, Subhabrata
2 Santini, Paolo
2 Sarkar, Palash
2 Sarkar, Santanu
2 Schindler, Werner
2 Shahandashti, Siamak F.
2 Shahverdi, Aria
2 Shimoyama, Takeshi
2 Sica, Francesco
2 Simpson, Leonie Ruth
2 Smith, Benjamin Andrew
2 Soukharev, Vladimir
2 Stănică, Pantelimon
2 Steinfeld, Ron
2 Susilo, Willy
...and 457 more Authors

Publications by Year

Citations contained in zbMATH Open

192 Publications have been cited 1,396 times in 1,146 Documents Cited by Year
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
184
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
133
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
92
2014
Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117
Nguyen, Phong Q.; Vidick, Thomas
68
2008
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
61
2009
Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048
Gaudry, P.
38
2007
Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028
Daemen, Joan; Rijmen, Vincent
33
2007
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
26
2020
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
24
2010
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
20
2012
Perfect hash families: constructions and existence. Zbl 1128.05012
Walker, Robert A. II; Colbourn, Charles J.
20
2007
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
16
2009
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
16
2010
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
15
2020
Polylogarithmic two-round argument systems. Zbl 1158.94003
Mie, Thilo
15
2008
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
14
2020
Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067
Myasnikov, Alexei G.; Ushakov, Alexander
14
2008
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
14
2018
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
13
2011
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
13
2018
Distribution of some sequences of points on elliptic curves. Zbl 1129.14040
Lange, Tanja; Shparlinski, Igor E.
13
2007
A summary of McEliece-type cryptosystems and their security. Zbl 1278.94047
Engelbert, D.; Overbeck, R.; Schmidt, Arthur
12
2007
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
11
2014
Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357
Koblitz, Neal; Menezes, Alfred
11
2008
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
11
2010
Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359
Nandi, Mridul
11
2009
Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073
Jha, Ashwin; Nandi, Mridul
9
2016
Strict avalanche criterion over finite fields. Zbl 1145.11082
Li, Yuan; Cusick, T. W.
9
2007
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
8
2012
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
8
2013
On the security of multi-prime RSA. Zbl 1146.94008
Hinek, M. Jason
8
2008
Improved security analysis of PMAC. Zbl 1146.94009
Nandi, Mridul; Mandal, Avradip
8
2008
On the \(k\)-error linear complexity of cyclotomic sequences. Zbl 1147.11065
Aly, Hassan; Meidl, Wilfried; Winterhof, Arne
8
2007
Another look at HMQV. Zbl 1211.94032
Menezes, Alfred
8
2007
Minimal weight expansions in Pisot bases. Zbl 1170.11003
Frougny, Christiane; Steiner, Wolfgang
8
2008
Distortion maps for supersingular genus two curves. Zbl 1232.11075
Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin
8
2009
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032
Avanzi, R.; Thériault, N.; Wang, Z.
8
2008
Remarks on a tropical key exchange system. Zbl 1466.94036
Rudy, Dylan; Monico, Chris
7
2021
On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022
Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon
7
2009
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
7
2009
On hashing into elliptic curves. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
7
2009
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
6
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
6
2015
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
6
2021
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
6
2013
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
6
2017
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
6
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
6
2019
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
6
2007
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
6
2015
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
6
2010
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
6
2010
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
5
2021
MAKE: a matrix action key exchange. Zbl 1483.94053
Rahman, Nael; Shpilrain, Vladimir
5
2022
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
5
2012
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
5
2016
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
5
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
5
2013
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
5
2013
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\). Zbl 1365.94447
Lu, Yao; Peng, Liqiang; Sarkar, Santanu
5
2017
Generating safe primes. Zbl 1280.11055
von zur Gathen, Joachim; Shparlinski, Igor E.
5
2013
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
5
2016
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
5
2016
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113
Schindler, Werner
5
2008
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
5
2020
One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips. Zbl 1464.94052
Tibouchi, Mehdi; Wallet, Alexandre
4
2021
Cryptanalysis of “MAKE”. Zbl 1484.94017
Brown, Daniel R. L.; Koblitz, Neal; LeGrow, Jason T.
4
2022
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
4
2014
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
4
2011
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
4
2015
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
4
2018
\(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041
Brandstätter, Nina; Winterhof, Arne
4
2009
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
4
2016
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
4
2010
A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006
Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam
4
2008
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
4
2020
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
4
2021
Discretisation and product distributions in ring-LWE. Zbl 1464.94042
Murphy, Sean; Player, Rachel
3
2021
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
(In)security of ring-LWE under partial key exposure. Zbl 1464.94031
Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria
3
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 1522.68230
Biasse, Jean-François; Pring, Benjamin
3
2021
On the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomial. Zbl 1468.11088
Di Scala, Antonio J.; Sanna, Carlo; Signorini, Edoardo
3
2021
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
3
2012
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Short principal ideal problem in multicubic fields. Zbl 1462.94044
Lesavourey, Andrea; Plantard, Thomas; Susilo, Willy
3
2020
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
3
2013
On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul
3
2018
A survey and refinement of repairable threshold schemes. Zbl 1391.94834
Laing, Thalia M.; Stinson, Douglas R.
3
2018
An efficient and secure two-flow zero-knowledge identification protocol. Zbl 1211.94039
Stinson, D. R.; Wu, J.
3
2007
Simplified pairing computation and security implications. Zbl 1145.11047
Galbraith, Steven D.; Ó hÉigeartaigh, Colm; Sheedy, Caroline
3
2007
Minimal weight and colexicographically minimal integer representations. Zbl 1161.11002
Heuberger, Clemens; Muir, James A.
3
2007
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
An attack on disguised elliptic curves. Zbl 1140.94011
Morales, David J. Mireles
3
2008
A recursive construction for perfect hash families. Zbl 1190.05029
Colbourn, Charles J.; Ling, Alan C. H.
3
2009
Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317
Longrigg, Jonathan; Ushakov, Alexander
3
2008
Plactic key agreement (insecure?). Zbl 1509.94073
Brown, Daniel R. L.
1
2023
MAKE: a matrix action key exchange. Zbl 1483.94053
Rahman, Nael; Shpilrain, Vladimir
5
2022
Cryptanalysis of “MAKE”. Zbl 1484.94017
Brown, Daniel R. L.; Koblitz, Neal; LeGrow, Jason T.
4
2022
DLP in semigroups: algorithms and lower bounds. Zbl 1520.11104
Han, Jiao; Zhuang, Jincheng
2
2022
On the efficiency of a general attack against the MOBS cryptosystem. Zbl 1505.94068
Battarbee, Christopher; Kahrobaei, Delaram; Tailor, Dylan; Shahandashti, Siamak F.
2
2022
A deterministic algorithm for the discrete logarithm problem in a semigroup. Zbl 1509.94135
Tinani, Simran; Rosenthal, Joachim
1
2022
The \(\mathsf{mF}\) mode of authenticated encryption with associated data. Zbl 1542.68042
Chakraborty, Bishwajit; Nandi, Mridul
1
2022
Pseudo-free families and cryptographic primitives. Zbl 1494.94031
Anokhin, Mikhail
1
2022
The most efficient indifferentiable hashing to elliptic curves of \(j\)-invariant 1728. Zbl 1502.14068
Koshelev, Dmitrii
1
2022
On the confusion coefficient of Boolean functions. Zbl 1497.94227
Zhou, Yu; Hu, Jianyong; Miao, Xudong; Han, Yu; Zhang, Fuzhong
1
2022
Remarks on a tropical key exchange system. Zbl 1466.94036
Rudy, Dylan; Monico, Chris
7
2021
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
6
2021
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
5
2021
One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips. Zbl 1464.94052
Tibouchi, Mehdi; Wallet, Alexandre
4
2021
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
4
2021
Discretisation and product distributions in ring-LWE. Zbl 1464.94042
Murphy, Sean; Player, Rachel
3
2021
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
(In)security of ring-LWE under partial key exposure. Zbl 1464.94031
Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria
3
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 1522.68230
Biasse, Jean-François; Pring, Benjamin
3
2021
On the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomial. Zbl 1468.11088
Di Scala, Antonio J.; Sanna, Carlo; Signorini, Edoardo
3
2021
The Oribatida v1.3 family of lightweight authenticated encryption schemes. Zbl 1468.94393
Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul
3
2021
A trade-off between classical and quantum circuit size for an attack against CSIDH. Zbl 1464.94028
Biasse, Jean-François; Bonnetain, Xavier; Pring, Benjamin; Schrottenloher, André; Youmans, William
2
2021
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. Zbl 1466.94047
Paterson, Maura B.; Stinson, Douglas R.
2
2021
Pseudo-free families of computational universal algebras. Zbl 1466.94019
Anokhin, Mikhail
2
2021
Lattice sieving in three dimensions for discrete log in medium characteristic. Zbl 1468.11243
McGuire, Gary; Robinson, Oisín
2
2021
Constructing cycles in isogeny graphs of supersingular elliptic curves. Zbl 1471.11190
Xiao, Guanju; Luo, Lixia; Deng, Yingpu
2
2021
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. Zbl 1485.68100
Ekerå, Martin
2
2021
Attack on Kayawood protocol: uncloaking private keys. Zbl 1466.94032
Kotov, Matvei; Menshov, Anton; Ushakov, Alexander
1
2021
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. Zbl 1469.94093
Dugardin, Margaux; Schindler, Werner; Guilley, Sylvain
1
2021
Sensitivities and block sensitivities of elementary symmetric Boolean functions. Zbl 1482.94094
Zhang, Jing; Li, Yuan; Adeyeye, John O.
1
2021
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
26
2020
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
15
2020
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
14
2020
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
6
2020
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
5
2020
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
4
2020
Short principal ideal problem in multicubic fields. Zbl 1462.94044
Lesavourey, Andrea; Plantard, Thomas; Susilo, Willy
3
2020
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
3
2020
Survey on SAP and its application in public-key cryptography. Zbl 1462.94037
Goel, Neha; Gupta, Indivar; Dass, B. K.
2
2020
New number-theoretic cryptographic primitives. Zbl 1465.94059
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David
2
2020
A framework for cryptographic problems from linear algebra. Zbl 1460.94037
Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik
2
2020
Efficiently processing complex-valued data in homomorphic encryption. Zbl 1448.94189
Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik
2
2020
Designing efficient dyadic operations for cryptographic applications. Zbl 1441.94069
Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo
2
2020
Integer factoring and compositeness witnesses. Zbl 1468.11244
Pomykała, Jacek; Radziejewski, Maciej
1
2020
Algorithms for CRT-variant of approximate greatest common divisor problem. Zbl 1466.11097
Cheon, Jung Hee; Cho, Wonhee; Hhan, Minki; Kim, Jiseung; Lee, Changmin
1
2020
Delegating a product of group exponentiations with application to signature schemes. Zbl 1464.94034
Di Crescenzo, Giovanni; Khodjaeva, Matluba; Kahrobaei, Delaram; Shpilrain, Vladimir
1
2020
New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\). Zbl 1465.94091
Tomkins, Hayley; Nevins, Monica; Salmasian, Hadi
1
2020
Protecting ECC against fault attacks: the ring extension method revisited. Zbl 1461.14032
Joye, Marc
1
2020
A signature scheme from the finite field isomorphism problem. Zbl 1450.94051
Hoffstein, Jeffrey; Silverman, Joseph H.; Whyte, William; Zhang, Zhenfei
1
2020
Characterizing overstretched NTRU attacks. Zbl 1448.94241
De Micheli, Gabrielle; Heninger, Nadia; Shani, Barak
1
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
6
2019
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\). Zbl 1454.11223
Biasse, Jean-François; Song, Fang
2
2019
Polynomial expressions of \(p\)-ary auction functions. Zbl 1443.94066
Kaji, Shizuo; Maeno, Toshiaki; Nuida, Koji; Numata, Yasuhide
1
2019
Generic constructions of PoRs from codes and instantiations. Zbl 1443.94106
Lavauzelle, Julien; Levy-dit-Vehel, Françoise
1
2019
Exact information ratios for secret sharing on small graphs with girth at least 5. Zbl 1443.94092
Harsányi, Károly; Ligeti, Péter
1
2019
Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices. Zbl 1468.94417
Sipasseuth, Arnaud; Plantard, Thomas; Susilo, Willy
1
2019
Predicate signatures from pair encodings via dual system proof technique. Zbl 1457.94167
Nandi, Mridul; Pandit, Tapas
1
2019
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
14
2018
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
13
2018
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
4
2018
On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul
3
2018
A survey and refinement of repairable threshold schemes. Zbl 1391.94834
Laing, Thalia M.; Stinson, Douglas R.
3
2018
Multi-prover proof of retrievability. Zbl 1420.94089
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2018
New methods of construction of Cartesian authentication codes from geometries over finite commutative rings. Zbl 1435.94133
Jirakitpuwapat, Wachirapong; Chaipunya, Parin; Kumam, Poom; Dhompongsa, Sompong; Thounthong, Phatiphat
2
2018
Generating pairing-friendly elliptic curve parameters using sparse families. Zbl 1496.94043
Fotiadis, Georgios; Konstantinou, Elisavet
1
2018
A fundamental flaw in the ++AE authenticated encryption mode. Zbl 1391.94790
Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho
1
2018
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
6
2017
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\). Zbl 1365.94447
Lu, Yao; Peng, Liqiang; Sarkar, Santanu
5
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
The complexity of the connected graph access structure on seven participants. Zbl 1405.68247
Hadian Dehkordi, Massoud; Safi, Ali
2
2017
A secure anonymous proxy signcryption scheme. Zbl 1364.94566
Saraswat, Vishal; Sahu, Rajeev Anand; Awasthi, Amit K.
2
2017
Isolated elliptic curves and the MOV attack. Zbl 1432.11066
Scholl, Travis
1
2017
On the leakage-resilient key exchange. Zbl 1376.94023
Alawatugoda, Janaka
1
2017
Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073
Jha, Ashwin; Nandi, Mridul
9
2016
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
5
2016
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
5
2016
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
5
2016
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
4
2016
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier. Zbl 1408.94954
Moody, Dustin; Paul, Souradyuti; Smith-Tone, Daniel
1
2016
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
184
2015
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
6
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
6
2015
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
6
2015
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
4
2015
A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096
Hameed, Ali; Slinko, Arkadii
2
2015
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
2
2015
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030
Yoon, Kisoon
1
2015
Theory of 3-rotation symmetric cubic Boolean functions. Zbl 1308.94121
Cusick, Thomas W.; Cheon, Younhwan
1
2015
On a class of strongly asymmetric PKA algorithms. Zbl 1352.94022
Accardi, Luigi; Regoli, Massimo
1
2015
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Zbl 1403.94073
Paterson, Maura B.; Stinson, Douglas R.
1
2015
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme. Zbl 1330.94051
Tsaban, Boaz; Lifshitz, Noam
1
2015
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. II. Zbl 1343.94068
Justus, Benjamin
1
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
133
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
92
2014
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
11
2014
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
4
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves. Zbl 1353.11111
Sha, Min
1
2014
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067
Justus, Benjamin
1
2014
...and 92 more Documents
all top 5

Cited by 1,826 Authors

17 Petit, Christophe
17 Takagi, Tsuyoshi
15 Costello, Craig
14 De Feo, Luca
13 Castryck, Wouter
13 Farràs, Oriol
13 Lauter, Kristin Estella
13 Nandi, Mridul
12 Albrecht, Martin R.
12 Cheon, Jung Hee
12 Galbraith, Steven D.
12 Jao, David
12 Laarhoven, Thijs
11 Colbourn, Charles J.
11 Kirshanova, Elena
11 Medina, Luis A.
11 Padró, Carles
11 Vercauteren, Frederik
11 Yasuda, Masaya
10 Azarderakhsh, Reza
10 Cusick, Thomas W.
10 Ducas, Léo
10 Fouotsa, Tako Boris
10 Stehlé, Damien
9 Ding, Jintai
9 May, Alexander
9 Panny, Lorenz
9 Sarkar, Palash
8 Kudo, Momonari
8 Kutas, Péter
8 Micciancio, Daniele
8 Robert, Damien
8 Takashima, Katsuyuki
7 Beullens, Ward
7 Biasse, Jean-François
7 Castro, Francis Noel
7 Farashahi, Reza Rezaeian
7 Ikematsu, Yasuhiko
7 Joux, Antoine
7 Kahrobaei, Delaram
7 Lange, Tanja
7 Persichetti, Edoardo
7 Prest, Thomas
7 Shparlinski, Igor E.
7 Smith, Benjamin Andrew
7 Song, Yongsoo
7 Standaert, Francois-Xavier
7 Steinfeld, Ron
7 Tran Van Trung
7 Wesolowski, Benjamin
6 Barreto, Paulo S. L. M.
6 Boneh, Dan
6 Dutta, Avijit
6 Faugère, Jean-Charles
6 Gaudry, Pierrick
6 Guo, Qian
6 Izabachène, Malika
6 Jha, Ashwin
6 Katsumata, Shuichi
6 Koziel, Brian
6 LeGrow, Jason Travis
6 Pedersen, Robi
6 Perret, Ludovic
6 Postlethwaite, Eamonn W.
6 Renes, Joost
6 Sakzad, Amin
6 Verbel, Javier A.
6 Virdia, Fernando
6 Yu, Yang
5 Aggarwal, Divesh
5 Aragona, Riccardo
5 Bai, Shi
5 Banegas, Gustavo
5 Bernstein, Daniel Julius
5 Bitansky, Nir
5 Canetti, Ran
5 Chen, Zhixiong
5 Chi-Domínguez, Jesús-Javier
5 Chillotti, Ilaria
5 Das, Dipayan
5 Decru, Thomas
5 Espitau, Thomas
5 Esser, Andre
5 Furue, Hiroki
5 Gama, Nicolas
5 Han, Kyoohyung
5 Jacobson, Michael John jun.
5 Khazaei, Shahram
5 Klamti, Jean Belo
5 Leroux, Antonin
5 Li, Yuan
5 Longa, Patrick
5 Lubicz, David
5 Lyubashevsky, Vadim
5 Mårtensson, Erik
5 Martí-Farré, Jaume
5 Menezes, Alfred J.
5 Naehrig, Michael
5 Nakamura, Satoshi
5 Paul, Goutam
...and 1,726 more Authors
all top 5

Cited in 146 Journals

85 Designs, Codes and Cryptography
63 Journal of Mathematical Cryptology
29 Journal of Cryptology
24 Finite Fields and their Applications
22 Theoretical Computer Science
20 Advances in Mathematics of Communications
20 Cryptography and Communications
14 Discrete Applied Mathematics
11 Quantum Information Processing
11 Groups, Complexity, Cryptology
9 Information Sciences
9 Journal of Number Theory
9 Journal of Algebra and its Applications
9 JSIAM Letters
9 Matematicheskie Voprosy Kriptografii
8 Applicable Algebra in Engineering, Communication and Computing
8 LMS Journal of Computation and Mathematics
7 Mathematics of Computation
7 Journal of Symbolic Computation
6 Communications in Algebra
5 Information Processing Letters
5 Mathematics in Computer Science
5 La Matematica
4 Discrete Mathematics
4 Cybernetics and Systems Analysis
4 Tatra Mountains Mathematical Publications
4 The Electronic Journal of Combinatorics
4 Journal of Combinatorial Optimization
4 Journal of Discrete Mathematical Sciences & Cryptography
4 Prikladnaya Diskretnaya Matematika
3 Journal of Combinatorial Theory. Series A
3 Journal of Complexity
3 Information and Computation
3 Facta Universitatis. Series Mathematics and Informatics
3 SIAM Journal on Discrete Mathematics
3 Annals of Combinatorics
3 Journal of Applied Mathematics and Computing
3 Involve
3 Discrete Mathematics, Algorithms and Applications
3 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
3 Research in Number Theory
2 Applied Mathematics and Computation
2 Canadian Journal of Mathematics
2 Journal of Algebra
2 Journal of Computational and Applied Mathematics
2 Journal of the London Mathematical Society. Second Series
2 Journal of Pure and Applied Algebra
2 Transactions of the American Mathematical Society
2 International Journal of Algebra and Computation
2 International Journal of Computer Mathematics
2 Experimental Mathematics
2 Journal of Algebraic Combinatorics
2 Journal of Mathematical Sciences (New York)
2 Soft Computing
2 Integers
2 Journal of Systems Science and Complexity
2 Journal of Statistical Theory and Practice
2 Science China. Information Sciences
2 Forum of Mathematics, Sigma
1 International Journal of Theoretical Physics
1 Journal d’Analyse Mathématique
1 Mathematical Methods in the Applied Sciences
1 Mathematische Semesterberichte
1 Physica A
1 ACM Transactions on Mathematical Software
1 Advances in Mathematics
1 Annali di Matematica Pura ed Applicata. Serie Quarta
1 Archiv der Mathematik
1 Automatica
1 Compositio Mathematica
1 Computing
1 Functiones et Approximatio. Commentarii Mathematici
1 Gaṇita
1 Illinois Journal of Mathematics
1 Inventiones Mathematicae
1 Journal of Geometry
1 Journal of the Korean Mathematical Society
1 Journal of Statistical Planning and Inference
1 Mathematica Slovaca
1 Mathematische Zeitschrift
1 Mathematika
1 Michigan Mathematical Journal
1 SIAM Journal on Computing
1 Ergodic Theory and Dynamical Systems
1 Combinatorica
1 Chinese Annals of Mathematics. Series B
1 Acta Mathematica Hungarica
1 Bulletin of the Iranian Mathematical Society
1 Algorithmica
1 Numerical Methods for Partial Differential Equations
1 Journal of the American Mathematical Society
1 Mathematical and Computer Modelling
1 Forum Mathematicum
1 Annals of Operations Research
1 International Journal of Foundations of Computer Science
1 IMRN. International Mathematics Research Notices
1 Applications of Mathematics
1 Discrete Mathematics and Applications
1 Numerical Algorithms
1 Communications of the ACM
...and 46 more Journals
all top 5

Cited in 41 Fields

926 Information and communication theory, circuits (94-XX)
295 Number theory (11-XX)
233 Computer science (68-XX)
205 Algebraic geometry (14-XX)
194 Quantum theory (81-XX)
94 Combinatorics (05-XX)
51 Group theory and generalizations (20-XX)
24 Commutative algebra (13-XX)
18 Order, lattices, ordered algebraic structures (06-XX)
17 Linear and multilinear algebra; matrix theory (15-XX)
17 Operations research, mathematical programming (90-XX)
16 Numerical analysis (65-XX)
15 Statistics (62-XX)
11 Convex and discrete geometry (52-XX)
8 Associative rings and algebras (16-XX)
6 Probability theory and stochastic processes (60-XX)
5 General algebraic systems (08-XX)
5 Field theory and polynomials (12-XX)
5 Geometry (51-XX)
5 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
4 Dynamical systems and ergodic theory (37-XX)
4 Harmonic analysis on Euclidean spaces (42-XX)
3 Manifolds and cell complexes (57-XX)
3 Statistical mechanics, structure of matter (82-XX)
2 Mathematical logic and foundations (03-XX)
2 Topological groups, Lie groups (22-XX)
2 Measure and integration (28-XX)
2 Several complex variables and analytic spaces (32-XX)
2 Systems theory; control (93-XX)
1 History and biography (01-XX)
1 Nonassociative rings and algebras (17-XX)
1 \(K\)-theory (19-XX)
1 Special functions (33-XX)
1 Ordinary differential equations (34-XX)
1 Partial differential equations (35-XX)
1 Abstract harmonic analysis (43-XX)
1 Differential geometry (53-XX)
1 Algebraic topology (55-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Mechanics of particles and systems (70-XX)
1 Fluid mechanics (76-XX)

Citations by Year