


default search action
Journal of Mathematical Cryptology, Volume 9
Volume 9, Number 1, March 2015
- Kisoon Yoon:

A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. 1-9 - Bilal Alam, Ferruh Özbudak

, Oguz Yayla
:
Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic cryptosystems. 11-22 - Rüdiger Sparr, Ralph Wernsdorf:

The round functions of KASUMI generate the alternating group. 23-32 - David Garber, Delaram Kahrobaei

, Ha T. Lam:
Length-based attacks in polycyclic groups. 33-43 - Thomas W. Cusick, Younhwan Cheon:

Theory of 3-rotation symmetric cubic Boolean functions. 45-62
Volume 9, Number 2, June 2015
- Jiageng Chen

, Keita Emura
, Atsuko Miyaji
:
SKENO: Secret key encryption with non-interactive opening. 63-74 - Boaz Tsaban, Noam Lifshitz:

Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme. 75-78 - Shlomi Dolev

, Juan A. Garay, Niv Gilboa
, Vladimir Kolesnikov, Yelena Yuditsky:
Towards efficient private distributed computation on unbounded input streams. 79-94 - Kim Laine, Kristin E. Lauter:

Time-memory trade-offs for index calculus in genus 3. 95-114 - Benjamin Justus:

The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. II. 115-137
Volume 9, Number 3, October 2015
- Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen:

Two-permutation-based hashing with binary mixing. 139-150 - Luigi Accardi, Massimo Regoli:

On a class of strongly asymmetric PKA algorithms. 151-159 - Matvei Kotov, Alexander Ushakov:

Analysis of a certain polycyclic-group-based cryptosystem. 161-167 - Martin R. Albrecht, Rachel Player, Sam Scott:

On the concrete hardness of Learning with Errors. 169-203
Volume 9, Number 4, December 2015
- Chris Dowden:

Secure message transmission in the presence of a fully generalised adversary. 205-214 - Maura B. Paterson, Douglas R. Stinson:

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. 215-225 - Ali Hameed, Arkadii Slinko:

A characterisation of ideal weighted secret sharing schemes. 227-244 - Kevin J. Henry, Douglas R. Stinson:

Linear approaches to resilient aggregation in sensor networks. 245-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














