Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jmc/jmc7.bht:"
@article{DBLP:journals/jmc/ChenGK13, author = {Yanling Chen and Danilo Gligoroski and Svein J. Knapskog}, title = {On a special class of multivariate quadratic quasigroups (MQQs)}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {111--141}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0006}, doi = {10.1515/JMC-2012-0006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChenGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FieldJ13, author = {Rebecca E. Field and Brant C. Jones}, title = {Using carry-truncated addition to analyze add-rotate-xor hash algorithms}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {97--110}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0019}, doi = {10.1515/JMC-2012-0019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FieldJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FloriM13, author = {Jean{-}Pierre Flori and Sihem Mesnager}, title = {An efficient characterization of a family of hyper-bent functions with multiple trace terms}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {43--68}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0013}, doi = {10.1515/JMC-2012-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FloriM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithZ13, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Self-pairings on hyperelliptic curves}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {31--42}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0009}, doi = {10.1515/JMC-2012-0009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GathenS13, author = {Joachim von zur Gathen and Igor E. Shparlinski}, title = {Generating safe primes}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {333--365}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5011}, doi = {10.1515/JMC-2013-5011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GathenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GharahiD13, author = {Motahhareh Gharahi and Massoud Hadian Dehkordi}, title = {Perfect secret sharing schemes for graph access structures on six participants}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {143--146}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0026}, doi = {10.1515/JMC-2012-0026}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GharahiD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GrosekP13, author = {Otokar Grosek and Stefan Porubsk{\'{y}}}, title = {Coprime solutions to ax{\(\equiv\)}b (mod n)}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {217--224}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5003}, doi = {10.1515/JMC-2013-5003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/GrosekP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JhanwarS13, author = {Mahabir Prasad Jhanwar and Reihaneh Safavi{-}Naini}, title = {Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {279--296}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5006}, doi = {10.1515/JMC-2013-5006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/JhanwarS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at {HMAC}}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {225--251}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5004}, doi = {10.1515/JMC-2013-5004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KurosawaNP13, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New leakage-resilient CCA-secure public key encryption}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {297--312}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5007}, doi = {10.1515/JMC-2013-5007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Magliveras13, author = {Spyros S. Magliveras}, title = {Foreword}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {181--182}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5001}, doi = {10.1515/JMC-2013-5001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Magliveras13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MashrafiBDSW13, author = {Mufeed Al Mashrafi and Harry Bartlett and Ed Dawson and Leonie Simpson and Kenneth Koon{-}Ho Wong}, title = {Indirect message injection for {MAC} generation}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {253--277}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5005}, doi = {10.1515/JMC-2013-5005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MashrafiBDSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/OrumiehchihaPSB13, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett}, title = {Security analysis of linearly filtered NLFSRs}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {313--332}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5009}, doi = {10.1515/JMC-2013-5009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/OrumiehchihaPSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonSU13, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {183--216}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5002}, doi = {10.1515/JMC-2013-5002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/PatersonSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/StaszewskiT13, author = {Reiner Staszewski and Tran van Trung}, title = {Strongly aperiodic logarithmic signatures}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {147--179}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5000}, doi = {10.1515/JMC-2013-5000}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/StaszewskiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TassaJB13, author = {Tamir Tassa and Ayman Jarrous and Yonatan Ben{-}Ya'akov}, title = {Oblivious evaluation of multivariate polynomials}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {1--29}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0007}, doi = {10.1515/JMC-2012-0007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/TassaJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WangL13, author = {Tianze Wang and Dongdai Lin}, title = {A method for counting the number of polynomial equivalence classes}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {69--95}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0017}, doi = {10.1515/JMC-2012-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Zajac13, author = {Pavol Zajac}, title = {A new method to solve {MRHS} equation systems and its connection to group factorization}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {367--381}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5012}, doi = {10.1515/JMC-2013-5012}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Zajac13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.