![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Mathematical Cryptology, Volume 18
Volume 18, Number 1, February 2024
- Márton Erdélyi, Pál Hegedüs, Sándor Z. Kiss, Gábor Péter Nagy
:
On linear codes with random multiplier vectors and the maximum trace dimension property. - Massimiliano Sala
, Daniele Taufer
:
Group structure of elliptic curves over ℤ/Nℤ. - Marco Cianfriglia
, Elia Onofri
, Marco Pedicini
:
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography. - Kyosuke Yamashita, Keisuke Hara:
On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes. - Marco Calderini
, Riccardo Longo
, Massimiliano Sala
, Irene Villa
:
Searchable encryption with randomized ciphertext and randomized keyword search. - Marco Calderini
, Roberto Civino, Riccardo Invernizzi
:
Differential experiments using parallel alternative operations. - Marco Timpanella
:
On a generalization of the Deligne-Lusztig curve of Suzuki type and application to AG codes. - Loïc Rouquette, Marine Minier, Christine Solnon:
Automatic boomerang attacks search on Rijndael. - Wissam Ghantous, Federico Pintore, Mattia Veroni:
Efficiency of SIDH-based signatures (yes, SIDH).
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.