Journal of Mathematical Cryptology Short Title: J. Math. Cryptol. Publisher: De Gruyter, Berlin ISSN: 1862-2976; 1862-2984/e Online: http://www.degruyter.com/view/j/jmc Comments: Journal; Indexed cover-to-cover Documents Indexed: 289 Publications (since 2007) References Indexed: 216 Publications with 4,621 References. all top 5 Latest Issues 17 (2023) 16 (2022) 15 (2021) 14 (2020) 13, No. 3-4 (2019) 13, No. 2 (2019) 13, No. 1 (2019) 12, No. 4 (2018) 12, No. 3 (2018) 12, No. 2 (2018) 12, No. 1 (2018) 11, No. 4 (2017) 11, No. 3 (2017) 11, No. 2 (2017) 11, No. 1 (2017) 10, No. 3-4 (2016) 10, No. 2 (2016) 10, No. 1 (2016) 9, No. 4 (2015) 9, No. 3 (2015) 9, No. 2 (2015) 9, No. 1 (2015) 8, No. 4 (2014) 8, No. 3 (2014) 8, No. 2 (2014) 8, No. 1 (2014) 7, No. 4 (2013) 7, No. 3 (2013) 7, No. 2 (2013) 7, No. 1 (2013) 6, No. 3-4 (2012) 6, No. 2 (2012) 6, No. 1 (2012) 5, No. 3-4 (2011) 5, No. 2 (2011) 5, No. 1 (2011) 4, No. 4 (2010) 4, No. 3 (2010) 4, No. 2 (2010) 4, No. 1 (2010) 3, No. 4 (2009) 3, No. 3 (2009) 3, No. 2 (2009) 3, No. 1 (2009) 2, No. 4 (2008) 2, No. 3 (2008) 2, No. 2 (2008) 2, No. 1 (2008) 1, No. 4 (2007) 1, No. 3 (2007) 1, No. 2 (2007) 1, No. 1 (2007) all top 5 Authors 12 Stinson, Douglas Robert 8 Nandi, Mridul 8 Ushakov, Alexander S. 7 Shparlinski, Igor E. 6 Paterson, Maura Beth 5 Blackburn, Simon R. 5 Cusick, Thomas W. 5 Koblitz, Neal I. 5 Yao, David D. W. 5 Yasuda, Masaya 4 Lauter, Kristin Estella 4 Menezes, Alfred J. 4 Persichetti, Edoardo 4 Pieprzyk, Josef P. 4 Tibouchi, Mehdi 4 Yokoyama, Kazuhiro 3 Bartlett, Harry 3 Biasse, Jean-François 3 Castryck, Wouter 3 Cheon, Jung Hee 3 Dawson, Edward 3 Galbraith, Steven D. 3 Guilley, Sylvain 3 Hadian Dehkordi, Massoud 3 Hinek, M. Jason 3 Joye, Marc 3 Kahrobaei, Delaram 3 Kogure, Jun 3 Kotov, Matvei 3 LeGrow, Jason Travis 3 Li, Yuan 3 Moody, Dustin 3 Mullan, Ciaran 3 Murphy, Sean 3 Naccache, David 3 Preneel, Bart 3 Shpilrain, Vladimir 3 Tsaban, Boaz 3 Upadhyay, Jalaj 3 Wong, Kenneth Koon-Ho 2 Alawatugoda, Janaka 2 Anokhin, Mikhail 2 Asghar, Hassan Jameel 2 Banegas, Gustavo 2 Barreto, Paulo S. L. M. 2 Blake, Ian F. 2 Bootland, Carl 2 Brown, Daniel R. L. 2 Carlet, Claude 2 Childs, Andrew M. 2 Cid, Carlos Frederico 2 Colbourn, Charles J. 2 Csirmaz, László 2 Dachman-Soled, Dana 2 Duquesne, Sylvain 2 Faugère, Jean-Charles 2 Ferradi, Houda 2 Fouotsa, Emmanuel 2 Gong, Huijing 2 Grošek, Otokar 2 Gupta, Indivar 2 Jetchev, Dimitar P. 2 Joux, Antoine 2 Justus, Benjamin 2 Karabina, Koray 2 Karmakar, Sudhangshu B. 2 Klamti, Jean Belo 2 Kolesnikov, Vladimir 2 Koshiba, Takeshi 2 Kulkarni, Mukul 2 Lam, Charles C. Y. 2 Ligeti, Péter 2 Pandit, Tapas 2 Petit, Christophe 2 Plantard, Thomas 2 Player, Rachel 2 Pomykała, Jacek M. 2 Pring, Benjamin 2 Rijmen, Vincent 2 Safavi-Naini, Reihaneh 2 Samajder, Subhabrata 2 Santini, Paolo Maria 2 Sarkar, Palash 2 Sarkar, Santanu 2 Schindler, Werner 2 Shahandashti, Siamak F. 2 Shahverdi, Aria 2 Shimoyama, Takeshi 2 Sica, Francesco 2 Simpson, Leonie Ruth 2 Soukharev, Vladimir 2 Stănică, Pantelimon 2 Steinfeld, Ron 2 Susilo, Willy 2 Takahashi, Yasushi 2 Trung, Tran Van 2 Vercauteren, Frederik 2 von zur Gathen, Joachim 2 Winterhof, Arne 2 Wu, Jiang ...and 413 more Authors all top 5 Fields 261 Information and communication theory, circuits (94-XX) 123 Number theory (11-XX) 79 Computer science (68-XX) 47 Algebraic geometry (14-XX) 19 Group theory and generalizations (20-XX) 15 Combinatorics (05-XX) 15 Quantum theory (81-XX) 9 Order, lattices, ordered algebraic structures (06-XX) 5 Commutative algebra (13-XX) 5 Linear and multilinear algebra; matrix theory (15-XX) 5 Statistics (62-XX) 4 General and overarching topics; collections (00-XX) 4 Probability theory and stochastic processes (60-XX) 4 Numerical analysis (65-XX) 3 General algebraic systems (08-XX) 2 Operations research, mathematical programming (90-XX) 1 Associative rings and algebras (16-XX) 1 Geometry (51-XX) 1 Convex and discrete geometry (52-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 162 Publications have been cited 948 times in 787 Documents Cited by ▼ Year ▼ On the concrete hardness of learning with errors. Zbl 1352.94023Albrecht, Martin R.; Player, Rachel; Scott, Sam 91 2015 Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419De Feo, Luca; Jao, David; Plût, Jérôme 77 2014 Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046Childs, Andrew; Jao, David; Soukharev, Vladimir 58 2014 Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic 42 2009 Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117Nguyen, Phong Q.; Vidick, Thomas 39 2008 Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048Gaudry, P. 34 2007 Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028Daemen, Joan; Rijmen, Vincent 25 2007 On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111Martí-Farré, Jaume; Padró, Carles 22 2010 Perfect hash families: constructions and existence. Zbl 1128.05012Walker, Robert A. II; Colbourn, Charles J. 19 2007 Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037Persichetti, Edoardo 16 2012 Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067Myasnikov, Alexei G.; Ushakov, Alexander 14 2008 The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173Shokrieh, Farbod 14 2010 Distribution of some sequences of points on elliptic curves. Zbl 1129.14040Lange, Tanja; Shparlinski, Igor E. 13 2007 Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106Bisson, Gaetan 13 2011 Hash function requirements for Schnorr signatures. Zbl 1165.94323Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan 12 2009 A summary of McEliece-type cryptosystems and their security. Zbl 1278.94047Engelbert, D.; Overbeck, R.; Schmidt, Arthur 11 2007 DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E. 10 2018 Polylogarithmic two-round argument systems. Zbl 1158.94003Mie, Thilo 9 2008 Orienting supersingular isogeny graphs. Zbl 1460.11080Colò, Leonardo; Kohel, David 9 2020 Minimal weight expansions in Pisot bases. Zbl 1170.11003Frougny, Christiane; Steiner, Wolfgang 8 2008 Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032Avanzi, R.; Thériault, N.; Wang, Z. 8 2008 On the security of multi-prime RSA. Zbl 1146.94008Hinek, M. Jason 8 2008 On the \(k\)-error linear complexity of cyclotomic sequences. Zbl 1147.11065Aly, Hassan; Meidl, Wilfried; Winterhof, Arne 8 2007 Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082Kotov, Matvei; Ushakov, Alexander 8 2018 Recursive weights for some Boolean functions. Zbl 1277.94016Brown, Alyssa; Cusick, Thomas W. 8 2012 Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073Jha, Ashwin; Nandi, Mridul 7 2016 Distortion maps for supersingular genus two curves. Zbl 1232.11075Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin 7 2009 Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359Nandi, Mridul 7 2009 Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050Childs, Andrew M.; Ivanyos, Gábor 7 2014 Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029Wolf, Christopher; Preneel, Bart 7 2010 On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon 7 2009 Improved security analysis of PMAC. Zbl 1146.94009Nandi, Mridul; Mandal, Avradip 7 2008 Another look at HMQV. Zbl 1211.94032Menezes, Alfred 7 2007 Strict avalanche criterion over finite fields. Zbl 1145.11082Li, Yuan; Cusick, T. W. 7 2007 Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047Castryck, Wouter; Decru, Thomas; Smith, Benjamin 7 2020 Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090Gharahi, Motahhareh; Hadian Dehkordi, Massoud 7 2013 Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357Koblitz, Neal; Menezes, Alfred 6 2008 Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran 6 2009 Another look at normal approximations in cryptanalysis. Zbl 1408.94962Samajder, Subhabrata; Sarkar, Palash 5 2016 Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522Laine, Kim; Lauter, Kristin 5 2015 The round functions of KASUMI generate the alternating group. Zbl 1307.94099Sparr, Rüdiger; Wernsdorf, Ralph 5 2015 Length-based attacks in polycyclic groups. Zbl 1323.94112Garber, David; Kahrobaei, Delaram; Lam, Ha T. 5 2015 Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125Svaba, Pavol; van Trung, Tran 5 2010 On hashing into elliptic curves. Zbl 1200.94043Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe 5 2009 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 Another look at HMAC. Zbl 1327.94085Koblitz, Neal; Menezes, Alfred 5 2013 Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark 5 2020 A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141Zajac, Pavol 5 2013 The effectiveness of the linear hull effect. Zbl 1279.94105Murphy, Sean 5 2012 Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M. 4 2016 Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187Karabina, Koray 4 2010 \(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041Brandstätter, Nina; Winterhof, Arne 4 2009 Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051Singh, Rajesh P.; Saikia, A.; Sarma, B. K. 4 2010 A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam 4 2008 Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113Schindler, Werner 4 2008 Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439Samajder, Subhabrata; Sarkar, Palash 4 2017 Oblivious evaluation of multivariate polynomials. Zbl 1316.94092Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan 4 2013 An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136Flori, Jean-Pierre; Mesnager, Sihem 4 2013 Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang 4 2020 New techniques for SIDH-based NIKE. Zbl 1448.94233Urbanik, David; Jao, David 4 2020 A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466Wunderer, Thomas 4 2019 An attack on disguised elliptic curves. Zbl 1140.94011Morales, David J. Mireles 3 2008 Cryptographic properties of monotone Boolean functions. Zbl 1338.94070Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng 3 2016 The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018Alomair, Basel; Clark, Andrew; Poovendran, Radha 3 2010 Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044Kotov, Matvei; Ushakov, Alexander 3 2015 Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2014 Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel 3 2014 Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033Mullan, Ciaran 3 2010 A recursive construction for perfect hash families. Zbl 1190.05029Colbourn, Charles J.; Ling, Alan C. H. 3 2009 Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317Longrigg, Jonathan; Ushakov, Alexander 3 2008 Minimal weight and colexicographically minimal integer representations. Zbl 1161.11002Heuberger, Clemens; Muir, James A. 3 2007 Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004Grošek, Otokar; Porubský, Štefan 3 2013 On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul 3 2018 Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787Partala, Juha 3 2018 CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar 3 2020 Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T. 3 2021 Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191Laarhoven, Thijs 3 2021 A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883Biasse, Jean-François; Pring, Benjamin 3 2021 Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi 3 2017 Families of elliptic curves with rational 3-torsion. Zbl 1253.11068Moody, Dustin; Wu, Hongfeng 3 2011 Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235Yasuda, Masaya 3 2020 A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis 3 2020 Secret sharing and duality. Zbl 1466.94044Csirmaz, Laszlo 3 2021 Remarks on a tropical key exchange system. Zbl 1466.94036Rudy, Dylan; Monico, Chris 3 2021 Isogenies on twisted Hessian curves. Zbl 1467.14076Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin 3 2021 Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014Boxall, John 3 2012 The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093Banin, Matan; Tsaban, Boaz 3 2012 A geometric view of cryptographic equation solving. Zbl 1146.68072Murphy, S.; Paterson, M. B. 2 2008 New lattice attacks on DSA schemes. Zbl 1408.94960Poulakis, Dimitrios 2 2016 Subset sum pseudorandom numbers: fast generation and distribution. Zbl 1236.11067von zur Gathen, Joachim; Shparlinski, Igor E. 2 2009 Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092Mosina, Natalia; Ushakov, Alexander 2 2010 On the asymptotic effectiveness of Weil descent attacks. Zbl 1252.94080Karabina, Koray; Menezes, Alfred; Pomerance, Carl; Shparlinski, Igor E. 2 2010 Some remarks on FCSRs and implications for stream ciphers. Zbl 1234.94022Fischer, Simon; Meier, Willi; Stegemann, Dirk 2 2009 Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena 2 2015 Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2010 Multicollision attacks and generalized iterated hash functions. Zbl 1203.94110Kortelainen, Juha; Halunen, Kimmo; Kortelainen, Tuomas 2 2010 An exploration of affine group laws for elliptic curves. Zbl 1248.94070Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed 2 2011 An efficient and secure two-flow zero-knowledge identification protocol. Zbl 1211.94039Stinson, D. R.; Wu, J. 2 2007 Simplified pairing computation and security implications. Zbl 1145.11047Galbraith, Steven D.; Ó hÉigeartaigh, Colm; Sheedy, Caroline 2 2007 The combinatorics of generalised cumulative arrays. Zbl 1203.68118Martin, Keith; Ng, Siaw-Lynn 2 2007 MAKE: a matrix action key exchange. Zbl 1483.94053Rahman, Nael; Shpilrain, Vladimir 1 2022 Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T. 3 2021 Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191Laarhoven, Thijs 3 2021 A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883Biasse, Jean-François; Pring, Benjamin 3 2021 Secret sharing and duality. Zbl 1466.94044Csirmaz, Laszlo 3 2021 Remarks on a tropical key exchange system. Zbl 1466.94036Rudy, Dylan; Monico, Chris 3 2021 Isogenies on twisted Hessian curves. Zbl 1467.14076Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin 3 2021 A trade-off between classical and quantum circuit size for an attack against CSIDH. Zbl 1464.94028Biasse, Jean-François; Bonnetain, Xavier; Pring, Benjamin; Schrottenloher, André; Youmans, William 2 2021 (In)security of ring-LWE under partial key exposure. Zbl 1464.94031Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria 2 2021 One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips. Zbl 1464.94052Tibouchi, Mehdi; Wallet, Alexandre 2 2021 On the equivalence of authentication codes and robust (2, 2)-threshold schemes. Zbl 1466.94047Paterson, Maura B.; Stinson, Douglas R. 2 2021 The Oribatida v1.3 family of lightweight authenticated encryption schemes. Zbl 1468.94393Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul 2 2021 Discretisation and product distributions in ring-LWE. Zbl 1464.94042Murphy, Sean; Player, Rachel 1 2021 On the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomial. Zbl 1468.11088Di Scala, Antonio J.; Sanna, Carlo; Signorini, Edoardo 1 2021 Pseudo-free families of computational universal algebras. Zbl 1466.94019Anokhin, Mikhail 1 2021 Lattice sieving in three dimensions for discrete log in medium characteristic. Zbl 1468.11243McGuire, Gary; Robinson, Oisín 1 2021 Attack on Kayawood protocol: uncloaking private keys. Zbl 1466.94032Kotov, Matvei; Menshov, Anton; Ushakov, Alexander 1 2021 Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. Zbl 1485.68100Ekerå, Martin 1 2021 Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. Zbl 1469.94093Dugardin, Margaux; Schindler, Werner; Guilley, Sylvain 1 2021 Sensitivities and block sensitivities of elementary symmetric Boolean functions. Zbl 1482.94094Zhang, Jing; Li, Yuan; Adeyeye, John O. 1 2021 Orienting supersingular isogeny graphs. Zbl 1460.11080Colò, Leonardo; Kohel, David 9 2020 Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047Castryck, Wouter; Decru, Thomas; Smith, Benjamin 7 2020 Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark 5 2020 Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang 4 2020 New techniques for SIDH-based NIKE. Zbl 1448.94233Urbanik, David; Jao, David 4 2020 CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar 3 2020 Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235Yasuda, Masaya 3 2020 A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis 3 2020 Survey on SAP and its application in public-key cryptography. Zbl 1462.94037Goel, Neha; Gupta, Indivar; Dass, B. K. 2 2020 A framework for cryptographic problems from linear algebra. Zbl 1460.94037Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik 2 2020 Efficiently processing complex-valued data in homomorphic encryption. Zbl 1448.94189Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik 2 2020 Designing efficient dyadic operations for cryptographic applications. Zbl 1441.94069Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo 2 2020 Protecting ECC against fault attacks: the ring extension method revisited. Zbl 1461.14032Joye, Marc 1 2020 Integer factoring and compositeness witnesses. Zbl 1468.11244Pomykała, Jacek; Radziejewski, Maciej 1 2020 Short principal ideal problem in multicubic fields. Zbl 1462.94044Lesavourey, Andrea; Plantard, Thomas; Susilo, Willy 1 2020 Algorithms for CRT-variant of approximate greatest common divisor problem. Zbl 1466.11097Cheon, Jung Hee; Cho, Wonhee; Hhan, Minki; Kim, Jiseung; Lee, Changmin 1 2020 Delegating a product of group exponentiations with application to signature schemes. Zbl 1464.94034Di Crescenzo, Giovanni; Khodjaeva, Matluba; Kahrobaei, Delaram; Shpilrain, Vladimir 1 2020 A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466Wunderer, Thomas 4 2019 Polynomial expressions of \(p\)-ary auction functions. Zbl 1443.94066Kaji, Shizuo; Maeno, Toshiaki; Nuida, Koji; Numata, Yasuhide 1 2019 Generic constructions of PoRs from codes and instantiations. Zbl 1443.94106Lavauzelle, Julien; Levy-dit-Vehel, Françoise 1 2019 Exact information ratios for secret sharing on small graphs with girth at least 5. Zbl 1443.94092Harsányi, Károly; Ligeti, Péter 1 2019 On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\). Zbl 1454.11223Biasse, Jean-François; Song, Fang 1 2019 Predicate signatures from pair encodings via dual system proof technique. Zbl 1457.94167Nandi, Mridul; Pandit, Tapas 1 2019 DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E. 10 2018 Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082Kotov, Matvei; Ushakov, Alexander 8 2018 On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul 3 2018 Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787Partala, Juha 3 2018 Multi-prover proof of retrievability. Zbl 1420.94089Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj 2 2018 New methods of construction of Cartesian authentication codes from geometries over finite commutative rings. Zbl 1435.94133Jirakitpuwapat, Wachirapong; Chaipunya, Parin; Kumam, Poom; Dhompongsa, Sompong; Thounthong, Phatiphat 1 2018 A fundamental flaw in the ++AE authenticated encryption mode. Zbl 1391.94790Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho 1 2018 Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439Samajder, Subhabrata; Sarkar, Palash 4 2017 Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi 3 2017 On the leakage-resilient key exchange. Zbl 1376.94023Alawatugoda, Janaka 1 2017 Isolated elliptic curves and the MOV attack. Zbl 1432.11066Scholl, Travis 1 2017 The complexity of the connected graph access structure on seven participants. Zbl 1405.68247Hadian Dehkordi, Massoud; Safi, Ali 1 2017 A secure anonymous proxy signcryption scheme. Zbl 1364.94566Saraswat, Vishal; Sahu, Rajeev Anand; Awasthi, Amit K. 1 2017 Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\). Zbl 1365.94447Lu, Yao; Peng, Liqiang; Sarkar, Santanu 1 2017 Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073Jha, Ashwin; Nandi, Mridul 7 2016 Another look at normal approximations in cryptanalysis. Zbl 1408.94962Samajder, Subhabrata; Sarkar, Palash 5 2016 Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M. 4 2016 Cryptographic properties of monotone Boolean functions. Zbl 1338.94070Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng 3 2016 New lattice attacks on DSA schemes. Zbl 1408.94960Poulakis, Dimitrios 2 2016 On the concrete hardness of learning with errors. Zbl 1352.94023Albrecht, Martin R.; Player, Rachel; Scott, Sam 91 2015 Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522Laine, Kim; Lauter, Kristin 5 2015 The round functions of KASUMI generate the alternating group. Zbl 1307.94099Sparr, Rüdiger; Wernsdorf, Ralph 5 2015 Length-based attacks in polycyclic groups. Zbl 1323.94112Garber, David; Kahrobaei, Delaram; Lam, Ha T. 5 2015 Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044Kotov, Matvei; Ushakov, Alexander 3 2015 Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena 2 2015 A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096Hameed, Ali; Slinko, Arkadii 1 2015 A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030Yoon, Kisoon 1 2015 Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419De Feo, Luca; Jao, David; Plût, Jérôme 77 2014 Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046Childs, Andrew; Jao, David; Soukharev, Vladimir 58 2014 Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050Childs, Andrew M.; Ivanyos, Gábor 7 2014 Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2014 Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel 3 2014 On the non-idealness of cyclotomic families of pairing-friendly elliptic curves. Zbl 1353.11111Sha, Min 1 2014 The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067Justus, Benjamin 1 2014 Infinite secret sharing – examples. Zbl 1330.94055Dibert, Alexander; Csirmaz, László 1 2014 Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090Gharahi, Motahhareh; Hadian Dehkordi, Massoud 7 2013 Another look at HMAC. Zbl 1327.94085Koblitz, Neal; Menezes, Alfred 5 2013 A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141Zajac, Pavol 5 2013 Oblivious evaluation of multivariate polynomials. Zbl 1316.94092Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan 4 2013 An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136Flori, Jean-Pierre; Mesnager, Sihem 4 2013 Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004Grošek, Otokar; Porubský, Štefan 3 2013 A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj 2 2013 Generating safe primes. Zbl 1280.11055von zur Gathen, Joachim; Shparlinski, Igor E. 2 2013 Self-pairings on hyperelliptic curves. Zbl 1273.14051Galbraith, Steven D.; Zhao, Chang-An 1 2013 On a special class of multivariate quadratic quasigroups (MQQs). Zbl 1285.20065Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein J. 1 2013 Strongly aperiodic logarithmic signatures. Zbl 1305.94078Staszewski, Reiner; van Trung, Tran 1 2013 Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037Persichetti, Edoardo 16 2012 Recursive weights for some Boolean functions. Zbl 1277.94016Brown, Alyssa; Cusick, Thomas W. 8 2012 The effectiveness of the linear hull effect. Zbl 1279.94105Murphy, Sean 5 2012 Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014Boxall, John 3 2012 The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093Banin, Matan; Tsaban, Boaz 3 2012 On the \(\rho \)-values of complete families of pairing-friendly elliptic curves. Zbl 1279.94110Okano, Keiji 1 2012 Aperiodic logarithmic signatures. Zbl 1276.94023Baumeister, Barbara; de Wiljes, Jan-Hendrik 1 2012 Analysis of a key distribution scheme in secure multicasting. Zbl 1277.94034Maze, Gérard 1 2012 Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106Bisson, Gaetan 13 2011 Families of elliptic curves with rational 3-torsion. Zbl 1253.11068Moody, Dustin; Wu, Hongfeng 3 2011 An exploration of affine group laws for elliptic curves. Zbl 1248.94070Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed 2 2011 ...and 62 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 1,341 Authors 12 Farràs, Oriol 12 Takagi, Tsuyoshi 11 Costello, Craig 11 Laarhoven, Thijs 11 Nandi, Mridul 11 Yao, David D. W. 10 Colbourn, Charles J. 10 Padró, Carles 9 Azarderakhsh, Reza 9 Castryck, Wouter 9 Cusick, Thomas W. 9 Galbraith, Steven D. 9 Medina, Luis A. 9 Yasuda, Masaya 8 Lauter, Kristin Estella 8 May, Alexander 8 Petit, Christophe 8 Sarkar, Palash 8 Vercauteren, Frederik 7 Castro, Francis Noel 7 Farashahi, Reza Rezaeian 7 Kirshanova, Elena 7 Shparlinski, Igor E. 7 Takashima, Katsuyuki 6 Albrecht, Martin R. 6 Biasse, Jean-François 6 Ducas, Léo 6 Ikematsu, Yasuhiko 6 Jha, Ashwin 6 Koziel, Brian 6 Kudo, Momonari 6 Persichetti, Edoardo 6 Robert, Damien 6 Stehlé, Damien 5 Chen, Zhixiong 5 De Feo, Luca 5 Ding, Jintai 5 Faugère, Jean-Charles 5 Gama, Nicolas 5 Gaudry, Pierrick 5 Joux, Antoine 5 Klamti, Jean Belo 5 LeGrow, Jason Travis 5 Longa, Patrick 5 Martí-Farré, Jaume 5 Menezes, Alfred J. 5 Nakamura, Satoshi 5 Paul, Goutam 5 Standaert, Francois-Xavier 5 Stinson, Douglas Robert 5 Susilo, Willy 5 Trung, Tran Van 5 Ushakov, Alexander S. 4 Aragona, Riccardo 4 Barreto, Paulo S. L. M. 4 Bellini, Emanuele 4 Beullens, Ward 4 Cheon, Jung Hee 4 Chi-Domínguez, Jesús-Javier 4 Chillotti, Ilaria 4 Datta, Nilanjan 4 Esser, Andre 4 Gueye, Cheikh Thiecoumba 4 Guilley, Sylvain 4 Han, Kyoohyung 4 Heuberger, Clemens 4 Iliashenko, Ilia 4 Ionica, Sorina 4 Izabachène, Malika 4 Khazaei, Shahram 4 Koblitz, Neal I. 4 Kunihiro, Noboru 4 Lange, Tanja 4 Li, Yuan 4 Lubicz, David 4 Lyubashevsky, Vadim 4 Maitra, Subhamoy 4 Micciancio, Daniele 4 Moody, Dustin 4 Nyberg, Kaisa 4 Pedersen, Robi 4 Raddum, Håvard 4 Roman’kov, Vitaly Anatol’evich 4 Sakzad, Amin 4 Samajder, Subhabrata 4 Sarkar, Santanu 4 Sepúlveda, L. Brehsner 4 Smart, Nigel Paul 4 Stebila, Douglas 4 Steinfeld, Ron 4 Takayasu, Atsushi 4 Tibouchi, Mehdi 4 Tischhauser, Elmar 4 Verbel, Javier A. 4 Vitse, Vanessa 4 Wang, Yacheng 4 Yasuda, Takanori 4 Zajac, Pavol 3 Aggarwal, Divesh 3 Avanzi, Roberto Maria ...and 1,241 more Authors all top 5 Cited in 129 Journals 74 Designs, Codes and Cryptography 56 Journal of Mathematical Cryptology 22 Journal of Cryptology 18 Theoretical Computer Science 18 Finite Fields and their Applications 17 Cryptography and Communications 14 Advances in Mathematics of Communications 12 Discrete Applied Mathematics 11 Groups, Complexity, Cryptology 9 Quantum Information Processing 8 Journal of Number Theory 8 LMS Journal of Computation and Mathematics 7 Mathematics of Computation 6 Information Sciences 6 Journal of Symbolic Computation 6 Applicable Algebra in Engineering, Communication and Computing 6 JSIAM Letters 6 Matematicheskie Voprosy Kriptografii 5 Communications in Algebra 5 Information Processing Letters 4 Tatra Mountains Mathematical Publications 4 Journal of Discrete Mathematical Sciences & Cryptography 4 Mathematics in Computer Science 3 Discrete Mathematics 3 Journal of Combinatorial Theory. Series A 3 Facta Universitatis. Series Mathematics and Informatics 3 SIAM Journal on Discrete Mathematics 3 Cybernetics and Systems Analysis 3 The Electronic Journal of Combinatorics 3 Journal of Combinatorial Optimization 3 Annals of Combinatorics 3 Journal of Applied Mathematics and Computing 2 Applied Mathematics and Computation 2 Journal of Algebra 2 Journal of Computational and Applied Mathematics 2 Journal of the London Mathematical Society. Second Series 2 Journal of Pure and Applied Algebra 2 Journal of Complexity 2 International Journal of Computer Mathematics 2 Experimental Mathematics 2 Journal of Algebraic Combinatorics 2 Journal of Mathematical Sciences (New York) 2 Soft Computing 2 Journal of Algebra and its Applications 2 Journal of Statistical Theory and Practice 2 Involve 2 Science China. Information Sciences 2 Forum of Mathematics, Sigma 2 Prikladnaya Diskretnaya Matematika 1 International Journal of Theoretical Physics 1 Journal d’Analyse Mathématique 1 Mathematische Semesterberichte 1 Physica A 1 ACM Transactions on Mathematical Software 1 Advances in Mathematics 1 Annali di Matematica Pura ed Applicata. Serie Quarta 1 Automatica 1 Canadian Journal of Mathematics 1 Compositio Mathematica 1 Computing 1 Functiones et Approximatio. Commentarii Mathematici 1 Illinois Journal of Mathematics 1 Inventiones Mathematicae 1 Journal of Geometry 1 Journal of Statistical Planning and Inference 1 Mathematica Slovaca 1 Mathematische Zeitschrift 1 Mathematika 1 Michigan Mathematical Journal 1 SIAM Journal on Computing 1 Transactions of the American Mathematical Society 1 Ergodic Theory and Dynamical Systems 1 Combinatorica 1 Acta Mathematica Hungarica 1 Bulletin of the Iranian Mathematical Society 1 Algorithmica 1 Information and Computation 1 Journal of the American Mathematical Society 1 Mathematical and Computer Modelling 1 Forum Mathematicum 1 Annals of Operations Research 1 International Journal of Algebra and Computation 1 International Journal of Foundations of Computer Science 1 IMRN. International Mathematics Research Notices 1 Applications of Mathematics 1 Communications of the ACM 1 Linear Algebra and its Applications 1 Journal of Knot Theory and its Ramifications 1 Computational Complexity 1 Complexity 1 Arab Journal of Mathematical Sciences 1 Mathematical Problems in Engineering 1 Séminaire Lotharingien de Combinatoire 1 The Ramanujan Journal 1 Theory of Computing Systems 1 Informatica (Vilnius) 1 Journal of Integer Sequences 1 Interdisciplinary Information Sciences (IIS) 1 Acta Mathematica Sinica. English Series 1 Communications in Nonlinear Science and Numerical Simulation ...and 29 more Journals all top 5 Cited in 39 Fields 611 Information and communication theory, circuits (94-XX) 217 Number theory (11-XX) 164 Computer science (68-XX) 145 Algebraic geometry (14-XX) 104 Quantum theory (81-XX) 76 Combinatorics (05-XX) 42 Group theory and generalizations (20-XX) 17 Order, lattices, ordered algebraic structures (06-XX) 15 Commutative algebra (13-XX) 13 Linear and multilinear algebra; matrix theory (15-XX) 13 Operations research, mathematical programming (90-XX) 12 Statistics (62-XX) 10 Convex and discrete geometry (52-XX) 10 Numerical analysis (65-XX) 6 Associative rings and algebras (16-XX) 5 Probability theory and stochastic processes (60-XX) 4 Field theory and polynomials (12-XX) 4 Dynamical systems and ergodic theory (37-XX) 4 Harmonic analysis on Euclidean spaces (42-XX) 4 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 3 General algebraic systems (08-XX) 3 Geometry (51-XX) 3 Manifolds and cell complexes (57-XX) 2 Mathematical logic and foundations (03-XX) 2 Measure and integration (28-XX) 2 Several complex variables and analytic spaces (32-XX) 2 Statistical mechanics, structure of matter (82-XX) 2 Systems theory; control (93-XX) 1 History and biography (01-XX) 1 Nonassociative rings and algebras (17-XX) 1 Topological groups, Lie groups (22-XX) 1 Special functions (33-XX) 1 Ordinary differential equations (34-XX) 1 Abstract harmonic analysis (43-XX) 1 Differential geometry (53-XX) 1 Algebraic topology (55-XX) 1 Global analysis, analysis on manifolds (58-XX) 1 Mechanics of particles and systems (70-XX) 1 Fluid mechanics (76-XX) Citations by Year