Hash functions from superspecial genus-2 curves using Richelot isogenies
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/JMC-2019-0021
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0079
New number-theoretic cryptographic primitives
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0035
Secret sharing and duality
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0045
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠 )
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2015-0046
The Eleventh Power Residue Symbol
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0077
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2016-0044
Discretisation and Product Distributions in Ring-LWE
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0073
Exact information ratios for secret sharing on small graphs with girth at least 5
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0024
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0030
A framework for cryptographic problems from linear algebra
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0032
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0031
Improved cryptanalysis of the AJPS Mersenne based cryptosystem
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0027
Polynomial expressions of p-ary auction functions
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0016
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0048
Capitulation of the 2-ideal classes of type (2,\u202f2,\u202f2) of some quartic cyclic number fields
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2017-0037
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0025
Predicate signatures from pair encodings via dual system proof technique
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2017-0007
Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2016-0066
Generic constructions of PoRs from codes and instantiations
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0018
Signcryption schemes with insider security in an ideal permutation model
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0006