Search dblp for Publications

export results for "toc:db/journals/jmc/jmc7.bht:"

 download as .bib file

@article{DBLP:journals/jmc/ChenGK13,
  author       = {Yanling Chen and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {On a special class of multivariate quadratic quasigroups (MQQs)},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {111--141},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0006},
  doi          = {10.1515/JMC-2012-0006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChenGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FieldJ13,
  author       = {Rebecca E. Field and
                  Brant C. Jones},
  title        = {Using carry-truncated addition to analyze add-rotate-xor hash algorithms},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {97--110},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0019},
  doi          = {10.1515/JMC-2012-0019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FieldJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FloriM13,
  author       = {Jean{-}Pierre Flori and
                  Sihem Mesnager},
  title        = {An efficient characterization of a family of hyper-bent functions
                  with multiple trace terms},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {43--68},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0013},
  doi          = {10.1515/JMC-2012-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FloriM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithZ13,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Self-pairings on hyperelliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {31--42},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0009},
  doi          = {10.1515/JMC-2012-0009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GathenS13,
  author       = {Joachim von zur Gathen and
                  Igor E. Shparlinski},
  title        = {Generating safe primes},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {333--365},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5011},
  doi          = {10.1515/JMC-2013-5011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GathenS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GharahiD13,
  author       = {Motahhareh Gharahi and
                  Massoud Hadian Dehkordi},
  title        = {Perfect secret sharing schemes for graph access structures on six
                  participants},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {143--146},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0026},
  doi          = {10.1515/JMC-2012-0026},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GharahiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GrosekP13,
  author       = {Otokar Grosek and
                  Stefan Porubsk{\'{y}}},
  title        = {Coprime solutions to ax{\(\equiv\)}b (mod n)},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {217--224},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5003},
  doi          = {10.1515/JMC-2013-5003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/GrosekP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JhanwarS13,
  author       = {Mahabir Prasad Jhanwar and
                  Reihaneh Safavi{-}Naini},
  title        = {Unconditionally-secure ideal robust secret sharing schemes for threshold
                  and multilevel access structure},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {279--296},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5006},
  doi          = {10.1515/JMC-2013-5006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JhanwarS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at {HMAC}},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {225--251},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5004},
  doi          = {10.1515/JMC-2013-5004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KurosawaNP13,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {New leakage-resilient CCA-secure public key encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {297--312},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5007},
  doi          = {10.1515/JMC-2013-5007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Magliveras13,
  author       = {Spyros S. Magliveras},
  title        = {Foreword},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {181--182},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5001},
  doi          = {10.1515/JMC-2013-5001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Magliveras13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MashrafiBDSW13,
  author       = {Mufeed Al Mashrafi and
                  Harry Bartlett and
                  Ed Dawson and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Indirect message injection for {MAC} generation},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {253--277},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5005},
  doi          = {10.1515/JMC-2013-5005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MashrafiBDSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/OrumiehchihaPSB13,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Harry Bartlett},
  title        = {Security analysis of linearly filtered NLFSRs},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {313--332},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5009},
  doi          = {10.1515/JMC-2013-5009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/OrumiehchihaPSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonSU13,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {A coding theory foundation for the analysis of general unconditionally
                  secure proof-of-retrievability schemes for cloud storage},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {183--216},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5002},
  doi          = {10.1515/JMC-2013-5002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StaszewskiT13,
  author       = {Reiner Staszewski and
                  Tran van Trung},
  title        = {Strongly aperiodic logarithmic signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {147--179},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5000},
  doi          = {10.1515/JMC-2013-5000},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/StaszewskiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TassaJB13,
  author       = {Tamir Tassa and
                  Ayman Jarrous and
                  Yonatan Ben{-}Ya'akov},
  title        = {Oblivious evaluation of multivariate polynomials},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {1--29},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0007},
  doi          = {10.1515/JMC-2012-0007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/TassaJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WangL13,
  author       = {Tianze Wang and
                  Dongdai Lin},
  title        = {A method for counting the number of polynomial equivalence classes},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {69--95},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0017},
  doi          = {10.1515/JMC-2012-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Zajac13,
  author       = {Pavol Zajac},
  title        = {A new method to solve {MRHS} equation systems and its connection to
                  group factorization},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {367--381},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5012},
  doi          = {10.1515/JMC-2013-5012},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Zajac13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics