default search action
Journal of Mathematical Cryptology, Volume 1
Volume 1, Number 1, January 2007
- Tanja Lange, Igor E. Shparlinski:
Distribution of some sequences of points on elliptic curves. 1-11 - Keith M. Martin, Siaw-Lynn Ng:
The combinatorics of generalised cumulative arrays. 13-32 - Douglas R. Stinson, Ruizhong Wei:
Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols. 33-46 - Alfred Menezes:
Another look at HMQV. 47-64 - Yuan Li, Thomas W. Cusick:
Strict avalanche criterion over finite fields. 65-78 - Tomohiro Harayama, Donald K. Friesen:
Weil sum for birthday attack in multivariate quadratic cryptosystem. 79-104
Volume 1, Number 2, April 2007
- Robert D. Silverman:
Optimal Parameterization of SNFS. 105-124 - Robert A. Walker, Charles J. Colbourn:
Perfect Hash Families: Constructions and Existence. 125-150 - Daniela Engelbert, Raphael Overbeck, Arthur Schmidt:
A Summary of McEliece-Type Cryptosystems and their Security. 151-199
Volume 1, Number 3, August 2007
- Douglas R. Stinson, Jiang Wu:
An efficient and secure two-flow zero-knowledge identification protocol. 201-220 - Joan Daemen, Vincent Rijmen:
Probability distributions of correlation and differentials in block ciphers. 221-242 - Pierrick Gaudry:
Fast genus 2 arithmetic based on Theta functions. 243-265 - Steven D. Galbraith, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. 267-281 - Hassan Aly, Wilfried Meidl, Arne Winterhof:
On the k-error linear complexity of cyclotomic sequences. 283-296
Volume 1, Number 4, December 2007
- Clemens Heuberger, James A. Muir:
Minimal weight and colexicographically minimal integer representations. 297-328 - Ian F. Blake, Igor E. Shparlinski:
Statistical distribution and collisions of VSH. 329-349 - Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. 351-358 - Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: the case of Thompson's group. 359-372 - Sarang Aravamuthan, Sachin Lodha:
The average transmission overhead for broadcast encryption. 373 - Neal Koblitz:
Another look at automated theorem-proving. 385-403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.