×

Journal of Mathematical Cryptology

Short Title: J. Math. Cryptol.
Publisher: De Gruyter, Berlin
ISSN: 1862-2976; 1862-2984/e
Online: http://www.degruyter.com/view/j/jmc
Comments: Journal; Indexed cover-to-cover
Documents Indexed: 289 Publications (since 2007)
References Indexed: 216 Publications with 4,621 References.
all top 5

Authors

12 Stinson, Douglas Robert
8 Nandi, Mridul
8 Ushakov, Alexander S.
7 Shparlinski, Igor E.
6 Paterson, Maura Beth
5 Blackburn, Simon R.
5 Cusick, Thomas W.
5 Koblitz, Neal I.
5 Yao, David D. W.
5 Yasuda, Masaya
4 Lauter, Kristin Estella
4 Menezes, Alfred J.
4 Persichetti, Edoardo
4 Pieprzyk, Josef P.
4 Tibouchi, Mehdi
4 Yokoyama, Kazuhiro
3 Bartlett, Harry
3 Biasse, Jean-François
3 Castryck, Wouter
3 Cheon, Jung Hee
3 Dawson, Edward
3 Galbraith, Steven D.
3 Guilley, Sylvain
3 Hadian Dehkordi, Massoud
3 Hinek, M. Jason
3 Joye, Marc
3 Kahrobaei, Delaram
3 Kogure, Jun
3 Kotov, Matvei
3 LeGrow, Jason Travis
3 Li, Yuan
3 Moody, Dustin
3 Mullan, Ciaran
3 Murphy, Sean
3 Naccache, David
3 Preneel, Bart
3 Shpilrain, Vladimir
3 Tsaban, Boaz
3 Upadhyay, Jalaj
3 Wong, Kenneth Koon-Ho
2 Alawatugoda, Janaka
2 Anokhin, Mikhail
2 Asghar, Hassan Jameel
2 Banegas, Gustavo
2 Barreto, Paulo S. L. M.
2 Blake, Ian F.
2 Bootland, Carl
2 Brown, Daniel R. L.
2 Carlet, Claude
2 Childs, Andrew M.
2 Cid, Carlos Frederico
2 Colbourn, Charles J.
2 Csirmaz, László
2 Dachman-Soled, Dana
2 Duquesne, Sylvain
2 Faugère, Jean-Charles
2 Ferradi, Houda
2 Fouotsa, Emmanuel
2 Gong, Huijing
2 Grošek, Otokar
2 Gupta, Indivar
2 Jetchev, Dimitar P.
2 Joux, Antoine
2 Justus, Benjamin
2 Karabina, Koray
2 Karmakar, Sudhangshu B.
2 Klamti, Jean Belo
2 Kolesnikov, Vladimir
2 Koshiba, Takeshi
2 Kulkarni, Mukul
2 Lam, Charles C. Y.
2 Ligeti, Péter
2 Pandit, Tapas
2 Petit, Christophe
2 Plantard, Thomas
2 Player, Rachel
2 Pomykała, Jacek M.
2 Pring, Benjamin
2 Rijmen, Vincent
2 Safavi-Naini, Reihaneh
2 Samajder, Subhabrata
2 Santini, Paolo Maria
2 Sarkar, Palash
2 Sarkar, Santanu
2 Schindler, Werner
2 Shahandashti, Siamak F.
2 Shahverdi, Aria
2 Shimoyama, Takeshi
2 Sica, Francesco
2 Simpson, Leonie Ruth
2 Soukharev, Vladimir
2 Stănică, Pantelimon
2 Steinfeld, Ron
2 Susilo, Willy
2 Takahashi, Yasushi
2 Trung, Tran Van
2 Vercauteren, Frederik
2 von zur Gathen, Joachim
2 Winterhof, Arne
2 Wu, Jiang
...and 413 more Authors

Publications by Year

Citations contained in zbMATH Open

162 Publications have been cited 948 times in 787 Documents Cited by Year
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
91
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
77
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
58
2014
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
42
2009
Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117
Nguyen, Phong Q.; Vidick, Thomas
39
2008
Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048
Gaudry, P.
34
2007
Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028
Daemen, Joan; Rijmen, Vincent
25
2007
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
22
2010
Perfect hash families: constructions and existence. Zbl 1128.05012
Walker, Robert A. II; Colbourn, Charles J.
19
2007
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
16
2012
Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067
Myasnikov, Alexei G.; Ushakov, Alexander
14
2008
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
14
2010
Distribution of some sequences of points on elliptic curves. Zbl 1129.14040
Lange, Tanja; Shparlinski, Igor E.
13
2007
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
13
2011
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
12
2009
A summary of McEliece-type cryptosystems and their security. Zbl 1278.94047
Engelbert, D.; Overbeck, R.; Schmidt, Arthur
11
2007
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
10
2018
Polylogarithmic two-round argument systems. Zbl 1158.94003
Mie, Thilo
9
2008
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
9
2020
Minimal weight expansions in Pisot bases. Zbl 1170.11003
Frougny, Christiane; Steiner, Wolfgang
8
2008
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032
Avanzi, R.; Thériault, N.; Wang, Z.
8
2008
On the security of multi-prime RSA. Zbl 1146.94008
Hinek, M. Jason
8
2008
On the \(k\)-error linear complexity of cyclotomic sequences. Zbl 1147.11065
Aly, Hassan; Meidl, Wilfried; Winterhof, Arne
8
2007
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
8
2018
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
8
2012
Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073
Jha, Ashwin; Nandi, Mridul
7
2016
Distortion maps for supersingular genus two curves. Zbl 1232.11075
Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin
7
2009
Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359
Nandi, Mridul
7
2009
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
7
2014
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
7
2010
On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022
Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon
7
2009
Improved security analysis of PMAC. Zbl 1146.94009
Nandi, Mridul; Mandal, Avradip
7
2008
Another look at HMQV. Zbl 1211.94032
Menezes, Alfred
7
2007
Strict avalanche criterion over finite fields. Zbl 1145.11082
Li, Yuan; Cusick, T. W.
7
2007
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
7
2020
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
7
2013
Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357
Koblitz, Neal; Menezes, Alfred
6
2008
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
6
2009
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
5
2016
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
5
2015
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
5
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
5
2015
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
5
2010
On hashing into elliptic curves. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
5
2009
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
5
2013
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
5
2020
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
5
2012
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
4
2016
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
\(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041
Brandstätter, Nina; Winterhof, Arne
4
2009
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
4
2010
A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006
Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam
4
2008
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113
Schindler, Werner
4
2008
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
4
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
4
2013
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
4
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
4
2019
An attack on disguised elliptic curves. Zbl 1140.94011
Morales, David J. Mireles
3
2008
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
3
2016
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
3
2015
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
3
2010
A recursive construction for perfect hash families. Zbl 1190.05029
Colbourn, Charles J.; Ling, Alan C. H.
3
2009
Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317
Longrigg, Jonathan; Ushakov, Alexander
3
2008
Minimal weight and colexicographically minimal integer representations. Zbl 1161.11002
Heuberger, Clemens; Muir, James A.
3
2007
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul
3
2018
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
3
2018
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
3
2020
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
3
2021
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883
Biasse, Jean-François; Pring, Benjamin
3
2021
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
3
2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
3
2020
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
3
2021
Remarks on a tropical key exchange system. Zbl 1466.94036
Rudy, Dylan; Monico, Chris
3
2021
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
3
2021
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
3
2012
A geometric view of cryptographic equation solving. Zbl 1146.68072
Murphy, S.; Paterson, M. B.
2
2008
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
2
2016
Subset sum pseudorandom numbers: fast generation and distribution. Zbl 1236.11067
von zur Gathen, Joachim; Shparlinski, Igor E.
2
2009
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092
Mosina, Natalia; Ushakov, Alexander
2
2010
On the asymptotic effectiveness of Weil descent attacks. Zbl 1252.94080
Karabina, Koray; Menezes, Alfred; Pomerance, Carl; Shparlinski, Igor E.
2
2010
Some remarks on FCSRs and implications for stream ciphers. Zbl 1234.94022
Fischer, Simon; Meier, Willi; Stegemann, Dirk
2
2009
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
2
2015
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
Multicollision attacks and generalized iterated hash functions. Zbl 1203.94110
Kortelainen, Juha; Halunen, Kimmo; Kortelainen, Tuomas
2
2010
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
An efficient and secure two-flow zero-knowledge identification protocol. Zbl 1211.94039
Stinson, D. R.; Wu, J.
2
2007
Simplified pairing computation and security implications. Zbl 1145.11047
Galbraith, Steven D.; Ó hÉigeartaigh, Colm; Sheedy, Caroline
2
2007
The combinatorics of generalised cumulative arrays. Zbl 1203.68118
Martin, Keith; Ng, Siaw-Lynn
2
2007
MAKE: a matrix action key exchange. Zbl 1483.94053
Rahman, Nael; Shpilrain, Vladimir
1
2022
Towards isogeny-based password-authenticated key establishment. Zbl 1464.94065
Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.
3
2021
Approximate Voronoi cells for lattices, revisited. Zbl 1470.11191
Laarhoven, Thijs
3
2021
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE. Zbl 07350883
Biasse, Jean-François; Pring, Benjamin
3
2021
Secret sharing and duality. Zbl 1466.94044
Csirmaz, Laszlo
3
2021
Remarks on a tropical key exchange system. Zbl 1466.94036
Rudy, Dylan; Monico, Chris
3
2021
Isogenies on twisted Hessian curves. Zbl 1467.14076
Perez Broon, Fouazou Lontouo; Dang, Thinh; Fouotsa, Emmanuel; Moody, Dustin
3
2021
A trade-off between classical and quantum circuit size for an attack against CSIDH. Zbl 1464.94028
Biasse, Jean-François; Bonnetain, Xavier; Pring, Benjamin; Schrottenloher, André; Youmans, William
2
2021
(In)security of ring-LWE under partial key exposure. Zbl 1464.94031
Dachman-Soled, Dana; Gong, Huijing; Kulkarni, Mukul; Shahverdi, Aria
2
2021
One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips. Zbl 1464.94052
Tibouchi, Mehdi; Wallet, Alexandre
2
2021
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. Zbl 1466.94047
Paterson, Maura B.; Stinson, Douglas R.
2
2021
The Oribatida v1.3 family of lightweight authenticated encryption schemes. Zbl 1468.94393
Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul
2
2021
Discretisation and product distributions in ring-LWE. Zbl 1464.94042
Murphy, Sean; Player, Rachel
1
2021
On the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomial. Zbl 1468.11088
Di Scala, Antonio J.; Sanna, Carlo; Signorini, Edoardo
1
2021
Pseudo-free families of computational universal algebras. Zbl 1466.94019
Anokhin, Mikhail
1
2021
Lattice sieving in three dimensions for discrete log in medium characteristic. Zbl 1468.11243
McGuire, Gary; Robinson, Oisín
1
2021
Attack on Kayawood protocol: uncloaking private keys. Zbl 1466.94032
Kotov, Matvei; Menshov, Anton; Ushakov, Alexander
1
2021
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. Zbl 1485.68100
Ekerå, Martin
1
2021
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. Zbl 1469.94093
Dugardin, Margaux; Schindler, Werner; Guilley, Sylvain
1
2021
Sensitivities and block sensitivities of elementary symmetric Boolean functions. Zbl 1482.94094
Zhang, Jing; Li, Yuan; Adeyeye, John O.
1
2021
Orienting supersingular isogeny graphs. Zbl 1460.11080
Colò, Leonardo; Kohel, David
9
2020
Hash functions from superspecial genus-2 curves using Richelot isogenies. Zbl 1462.14047
Castryck, Wouter; Decru, Thomas; Smith, Benjamin
7
2020
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
5
2020
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
4
2020
New techniques for SIDH-based NIKE. Zbl 1448.94233
Urbanik, David; Jao, David
4
2020
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Zbl 1462.94030
Boura, Christina; Gama, Nicolas; Georgieva, Mariya; Jetchev, Dimitar
3
2020
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
3
2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. Zbl 1452.81087
Jao, David; LeGrow, Jason; Leonardi, Christopher; Ruiz-Lopez, Luis
3
2020
Survey on SAP and its application in public-key cryptography. Zbl 1462.94037
Goel, Neha; Gupta, Indivar; Dass, B. K.
2
2020
A framework for cryptographic problems from linear algebra. Zbl 1460.94037
Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik
2
2020
Efficiently processing complex-valued data in homomorphic encryption. Zbl 1448.94189
Bootland, Carl; Castryck, Wouter; Iliashenko, Ilia; Vercauteren, Frederik
2
2020
Designing efficient dyadic operations for cryptographic applications. Zbl 1441.94069
Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo
2
2020
Protecting ECC against fault attacks: the ring extension method revisited. Zbl 1461.14032
Joye, Marc
1
2020
Integer factoring and compositeness witnesses. Zbl 1468.11244
Pomykała, Jacek; Radziejewski, Maciej
1
2020
Short principal ideal problem in multicubic fields. Zbl 1462.94044
Lesavourey, Andrea; Plantard, Thomas; Susilo, Willy
1
2020
Algorithms for CRT-variant of approximate greatest common divisor problem. Zbl 1466.11097
Cheon, Jung Hee; Cho, Wonhee; Hhan, Minki; Kim, Jiseung; Lee, Changmin
1
2020
Delegating a product of group exponentiations with application to signature schemes. Zbl 1464.94034
Di Crescenzo, Giovanni; Khodjaeva, Matluba; Kahrobaei, Delaram; Shpilrain, Vladimir
1
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
4
2019
Polynomial expressions of \(p\)-ary auction functions. Zbl 1443.94066
Kaji, Shizuo; Maeno, Toshiaki; Nuida, Koji; Numata, Yasuhide
1
2019
Generic constructions of PoRs from codes and instantiations. Zbl 1443.94106
Lavauzelle, Julien; Levy-dit-Vehel, Françoise
1
2019
Exact information ratios for secret sharing on small graphs with girth at least 5. Zbl 1443.94092
Harsányi, Károly; Ligeti, Péter
1
2019
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\). Zbl 1454.11223
Biasse, Jean-François; Song, Fang
1
2019
Predicate signatures from pair encodings via dual system proof technique. Zbl 1457.94167
Nandi, Mridul; Pandit, Tapas
1
2019
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
10
2018
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
8
2018
On the optimality of non-linear computations for symmetric key primitives. Zbl 1420.94028
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul
3
2018
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
3
2018
Multi-prover proof of retrievability. Zbl 1420.94089
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2018
New methods of construction of Cartesian authentication codes from geometries over finite commutative rings. Zbl 1435.94133
Jirakitpuwapat, Wachirapong; Chaipunya, Parin; Kumam, Poom; Dhompongsa, Sompong; Thounthong, Phatiphat
1
2018
A fundamental flaw in the ++AE authenticated encryption mode. Zbl 1391.94790
Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho
1
2018
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
On the leakage-resilient key exchange. Zbl 1376.94023
Alawatugoda, Janaka
1
2017
Isolated elliptic curves and the MOV attack. Zbl 1432.11066
Scholl, Travis
1
2017
The complexity of the connected graph access structure on seven participants. Zbl 1405.68247
Hadian Dehkordi, Massoud; Safi, Ali
1
2017
A secure anonymous proxy signcryption scheme. Zbl 1364.94566
Saraswat, Vishal; Sahu, Rajeev Anand; Awasthi, Amit K.
1
2017
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\). Zbl 1365.94447
Lu, Yao; Peng, Liqiang; Sarkar, Santanu
1
2017
Revisiting structure graphs: applications to CBC-MAC and EMAC. Zbl 1384.94073
Jha, Ashwin; Nandi, Mridul
7
2016
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
5
2016
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
4
2016
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
3
2016
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
2
2016
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
91
2015
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
5
2015
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
5
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
5
2015
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
3
2015
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
2
2015
A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096
Hameed, Ali; Slinko, Arkadii
1
2015
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030
Yoon, Kisoon
1
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
77
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
58
2014
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
7
2014
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves. Zbl 1353.11111
Sha, Min
1
2014
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067
Justus, Benjamin
1
2014
Infinite secret sharing – examples. Zbl 1330.94055
Dibert, Alexander; Csirmaz, László
1
2014
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
7
2013
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
5
2013
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
4
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
4
2013
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2013
Generating safe primes. Zbl 1280.11055
von zur Gathen, Joachim; Shparlinski, Igor E.
2
2013
Self-pairings on hyperelliptic curves. Zbl 1273.14051
Galbraith, Steven D.; Zhao, Chang-An
1
2013
On a special class of multivariate quadratic quasigroups (MQQs). Zbl 1285.20065
Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein J.
1
2013
Strongly aperiodic logarithmic signatures. Zbl 1305.94078
Staszewski, Reiner; van Trung, Tran
1
2013
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
16
2012
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
8
2012
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
5
2012
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
3
2012
On the \(\rho \)-values of complete families of pairing-friendly elliptic curves. Zbl 1279.94110
Okano, Keiji
1
2012
Aperiodic logarithmic signatures. Zbl 1276.94023
Baumeister, Barbara; de Wiljes, Jan-Hendrik
1
2012
Analysis of a key distribution scheme in secure multicasting. Zbl 1277.94034
Maze, Gérard
1
2012
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
13
2011
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
...and 62 more Documents
all top 5

Cited by 1,341 Authors

12 Farràs, Oriol
12 Takagi, Tsuyoshi
11 Costello, Craig
11 Laarhoven, Thijs
11 Nandi, Mridul
11 Yao, David D. W.
10 Colbourn, Charles J.
10 Padró, Carles
9 Azarderakhsh, Reza
9 Castryck, Wouter
9 Cusick, Thomas W.
9 Galbraith, Steven D.
9 Medina, Luis A.
9 Yasuda, Masaya
8 Lauter, Kristin Estella
8 May, Alexander
8 Petit, Christophe
8 Sarkar, Palash
8 Vercauteren, Frederik
7 Castro, Francis Noel
7 Farashahi, Reza Rezaeian
7 Kirshanova, Elena
7 Shparlinski, Igor E.
7 Takashima, Katsuyuki
6 Albrecht, Martin R.
6 Biasse, Jean-François
6 Ducas, Léo
6 Ikematsu, Yasuhiko
6 Jha, Ashwin
6 Koziel, Brian
6 Kudo, Momonari
6 Persichetti, Edoardo
6 Robert, Damien
6 Stehlé, Damien
5 Chen, Zhixiong
5 De Feo, Luca
5 Ding, Jintai
5 Faugère, Jean-Charles
5 Gama, Nicolas
5 Gaudry, Pierrick
5 Joux, Antoine
5 Klamti, Jean Belo
5 LeGrow, Jason Travis
5 Longa, Patrick
5 Martí-Farré, Jaume
5 Menezes, Alfred J.
5 Nakamura, Satoshi
5 Paul, Goutam
5 Standaert, Francois-Xavier
5 Stinson, Douglas Robert
5 Susilo, Willy
5 Trung, Tran Van
5 Ushakov, Alexander S.
4 Aragona, Riccardo
4 Barreto, Paulo S. L. M.
4 Bellini, Emanuele
4 Beullens, Ward
4 Cheon, Jung Hee
4 Chi-Domínguez, Jesús-Javier
4 Chillotti, Ilaria
4 Datta, Nilanjan
4 Esser, Andre
4 Gueye, Cheikh Thiecoumba
4 Guilley, Sylvain
4 Han, Kyoohyung
4 Heuberger, Clemens
4 Iliashenko, Ilia
4 Ionica, Sorina
4 Izabachène, Malika
4 Khazaei, Shahram
4 Koblitz, Neal I.
4 Kunihiro, Noboru
4 Lange, Tanja
4 Li, Yuan
4 Lubicz, David
4 Lyubashevsky, Vadim
4 Maitra, Subhamoy
4 Micciancio, Daniele
4 Moody, Dustin
4 Nyberg, Kaisa
4 Pedersen, Robi
4 Raddum, Håvard
4 Roman’kov, Vitaly Anatol’evich
4 Sakzad, Amin
4 Samajder, Subhabrata
4 Sarkar, Santanu
4 Sepúlveda, L. Brehsner
4 Smart, Nigel Paul
4 Stebila, Douglas
4 Steinfeld, Ron
4 Takayasu, Atsushi
4 Tibouchi, Mehdi
4 Tischhauser, Elmar
4 Verbel, Javier A.
4 Vitse, Vanessa
4 Wang, Yacheng
4 Yasuda, Takanori
4 Zajac, Pavol
3 Aggarwal, Divesh
3 Avanzi, Roberto Maria
...and 1,241 more Authors
all top 5

Cited in 129 Journals

74 Designs, Codes and Cryptography
56 Journal of Mathematical Cryptology
22 Journal of Cryptology
18 Theoretical Computer Science
18 Finite Fields and their Applications
17 Cryptography and Communications
14 Advances in Mathematics of Communications
12 Discrete Applied Mathematics
11 Groups, Complexity, Cryptology
9 Quantum Information Processing
8 Journal of Number Theory
8 LMS Journal of Computation and Mathematics
7 Mathematics of Computation
6 Information Sciences
6 Journal of Symbolic Computation
6 Applicable Algebra in Engineering, Communication and Computing
6 JSIAM Letters
6 Matematicheskie Voprosy Kriptografii
5 Communications in Algebra
5 Information Processing Letters
4 Tatra Mountains Mathematical Publications
4 Journal of Discrete Mathematical Sciences & Cryptography
4 Mathematics in Computer Science
3 Discrete Mathematics
3 Journal of Combinatorial Theory. Series A
3 Facta Universitatis. Series Mathematics and Informatics
3 SIAM Journal on Discrete Mathematics
3 Cybernetics and Systems Analysis
3 The Electronic Journal of Combinatorics
3 Journal of Combinatorial Optimization
3 Annals of Combinatorics
3 Journal of Applied Mathematics and Computing
2 Applied Mathematics and Computation
2 Journal of Algebra
2 Journal of Computational and Applied Mathematics
2 Journal of the London Mathematical Society. Second Series
2 Journal of Pure and Applied Algebra
2 Journal of Complexity
2 International Journal of Computer Mathematics
2 Experimental Mathematics
2 Journal of Algebraic Combinatorics
2 Journal of Mathematical Sciences (New York)
2 Soft Computing
2 Journal of Algebra and its Applications
2 Journal of Statistical Theory and Practice
2 Involve
2 Science China. Information Sciences
2 Forum of Mathematics, Sigma
2 Prikladnaya Diskretnaya Matematika
1 International Journal of Theoretical Physics
1 Journal d’Analyse Mathématique
1 Mathematische Semesterberichte
1 Physica A
1 ACM Transactions on Mathematical Software
1 Advances in Mathematics
1 Annali di Matematica Pura ed Applicata. Serie Quarta
1 Automatica
1 Canadian Journal of Mathematics
1 Compositio Mathematica
1 Computing
1 Functiones et Approximatio. Commentarii Mathematici
1 Illinois Journal of Mathematics
1 Inventiones Mathematicae
1 Journal of Geometry
1 Journal of Statistical Planning and Inference
1 Mathematica Slovaca
1 Mathematische Zeitschrift
1 Mathematika
1 Michigan Mathematical Journal
1 SIAM Journal on Computing
1 Transactions of the American Mathematical Society
1 Ergodic Theory and Dynamical Systems
1 Combinatorica
1 Acta Mathematica Hungarica
1 Bulletin of the Iranian Mathematical Society
1 Algorithmica
1 Information and Computation
1 Journal of the American Mathematical Society
1 Mathematical and Computer Modelling
1 Forum Mathematicum
1 Annals of Operations Research
1 International Journal of Algebra and Computation
1 International Journal of Foundations of Computer Science
1 IMRN. International Mathematics Research Notices
1 Applications of Mathematics
1 Communications of the ACM
1 Linear Algebra and its Applications
1 Journal of Knot Theory and its Ramifications
1 Computational Complexity
1 Complexity
1 Arab Journal of Mathematical Sciences
1 Mathematical Problems in Engineering
1 Séminaire Lotharingien de Combinatoire
1 The Ramanujan Journal
1 Theory of Computing Systems
1 Informatica (Vilnius)
1 Journal of Integer Sequences
1 Interdisciplinary Information Sciences (IIS)
1 Acta Mathematica Sinica. English Series
1 Communications in Nonlinear Science and Numerical Simulation
...and 29 more Journals
all top 5

Cited in 39 Fields

611 Information and communication theory, circuits (94-XX)
217 Number theory (11-XX)
164 Computer science (68-XX)
145 Algebraic geometry (14-XX)
104 Quantum theory (81-XX)
76 Combinatorics (05-XX)
42 Group theory and generalizations (20-XX)
17 Order, lattices, ordered algebraic structures (06-XX)
15 Commutative algebra (13-XX)
13 Linear and multilinear algebra; matrix theory (15-XX)
13 Operations research, mathematical programming (90-XX)
12 Statistics (62-XX)
10 Convex and discrete geometry (52-XX)
10 Numerical analysis (65-XX)
6 Associative rings and algebras (16-XX)
5 Probability theory and stochastic processes (60-XX)
4 Field theory and polynomials (12-XX)
4 Dynamical systems and ergodic theory (37-XX)
4 Harmonic analysis on Euclidean spaces (42-XX)
4 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
3 General algebraic systems (08-XX)
3 Geometry (51-XX)
3 Manifolds and cell complexes (57-XX)
2 Mathematical logic and foundations (03-XX)
2 Measure and integration (28-XX)
2 Several complex variables and analytic spaces (32-XX)
2 Statistical mechanics, structure of matter (82-XX)
2 Systems theory; control (93-XX)
1 History and biography (01-XX)
1 Nonassociative rings and algebras (17-XX)
1 Topological groups, Lie groups (22-XX)
1 Special functions (33-XX)
1 Ordinary differential equations (34-XX)
1 Abstract harmonic analysis (43-XX)
1 Differential geometry (53-XX)
1 Algebraic topology (55-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Mechanics of particles and systems (70-XX)
1 Fluid mechanics (76-XX)

Citations by Year