


default search action
Journal of Mathematical Cryptology, Volume 15
Volume 15, Number 1, 2021
- Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:

Editor's Preface for the Second Annual MathCrypt Proceedings Volume. 1-3 - Jean-François Biasse

, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans
:
A trade-off between classical and quantum circuit size for an attack against CSIDH. 4-17 - Oleg Taraskin, Vladimir Soukharev, David Jao

, Jason T. LeGrow
:
Towards Isogeny-Based Password-Authenticated Key Establishment. 18-30 - Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama:

Algebraic approaches for solving isogeny problems of prime power degrees. 31-44 - Sean Murphy, Rachel Player:

Discretisation and Product Distributions in Ring-LWE. 45-59 - Thijs Laarhoven

:
Approximate Voronoi cells for lattices, revisited. 60-71 - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:

(In)Security of Ring-LWE Under Partial Key Exposure. 72-86 - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:

Towards a Ring Analogue of the Leftover Hash Lemma. 87-110 - Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache:

The Eleventh Power Residue Symbol. 111-122 - Francesco Sica

:
Factoring with Hints. 123-130 - Mehdi Tibouchi, Alexandre Wallet

:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. 131-142 - Jean-François Biasse

, Benjamin Pring:
A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE. 143-156 - László Csirmaz:

Secret sharing and duality. 157-173 - Antonio J. Di Scala

, Carlo Sanna
, Edoardo Signorini
:
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial. 174-178 - Maura B. Paterson, Douglas R. Stinson:

On the equivalence of authentication codes and robust (2, 2)-threshold schemes. 179-196 - Mikhail Anokhin

:
Pseudo-free families of computational universal algebras. 197-222 - Gary McGuire, Oisín Robinson:

Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic. 223-236 - Matvei Kotov

, Anton Menshov, Alexander Ushakov
:
Attack on Kayawood protocol: uncloaking private keys. 237-249 - Filipe Araújo

, Samuel Neves
:
The circulant hash revisited. 250-257 - Yu Zhou, Daoguang Mu, Xinfeng Dong:

On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes. 258-265 - Atul Pandey

, Indivar Gupta, Dhiraj Kumar Singh:
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings. 266-279 - Dylan Rudy, Chris Monico:

Remarks on a Tropical Key Exchange System. 280-283 - Ignacio Cascudo

, Reto Schnyder
:
A note on secure multiparty computation via higher residue symbols. 284-297 - Elizabeth M. Reid:

Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions. 298-304 - Arghya Bhattacharjee

, Cuauhtemoc Mancillas López
, Eik List, Mridul Nandi:
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes. 305-344 - Fouazou Lontouo Perez Broon, Thinh Dang, Emmanuel Fouotsa, Dustin Moody:

Isogenies on twisted Hessian curves. 345-358 - Martin Ekerå:

Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. 359-407 - Margaux Dugardin, Werner Schindler

, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. 408-433 - Jing Zhang, Yuan Li, John O. Adeyeye:

Sensitivities and block sensitivities of elementary symmetric Boolean functions. 434-453 - Guanju Xiao, Lixia Luo, Yingpu Deng:

Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves. 454-464 - Fucai Luo, Saif M. Al-Kuwari:

Revocable attribute-based proxy re-encryption. 465-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














