Eskeland, Sigurd Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection. (English) Zbl 07819573 J. Math. Cryptol. 18, Article ID 20230032, 8 p. (2024). MSC: 68P27 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{S. Eskeland}, J. Math. Cryptol. 18, Article ID 20230032, 8 p. (2024; Zbl 07819573) Full Text: DOI OA License
Calderini, Marco; Longo, Riccardo; Sala, Massimiliano; Villa, Irene Searchable encryption with randomized ciphertext and randomized keyword search. (English) Zbl 07819571 J. Math. Cryptol. 18, Article ID 20230029, 14 p. (2024). MSC: 94A60 14H52 94A62 68W40 PDFBibTeX XMLCite \textit{M. Calderini} et al., J. Math. Cryptol. 18, Article ID 20230029, 14 p. (2024; Zbl 07819571) Full Text: DOI OA License
Yamashita, Kyosuke; Hara, Keisuke On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes. (English) Zbl 07819570 J. Math. Cryptol. 18, Article ID 20230028, 12 p. (2024). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{K. Yamashita} and \textit{K. Hara}, J. Math. Cryptol. 18, Article ID 20230028, 12 p. (2024; Zbl 07819570) Full Text: DOI OA License
Ghantous, Wissam; Pintore, Federico; Veroni, Mattia Efficiency of SIDH-based signatures (yes, SIDH). (English) Zbl 07819565 J. Math. Cryptol. 18, Article ID 20230023, 22 p. (2024). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{W. Ghantous} et al., J. Math. Cryptol. 18, Article ID 20230023, 22 p. (2024; Zbl 07819565) Full Text: DOI OA License
Lubicz, David; Fischer, Viktor Entropy computation for oscillator-based physical random number generators. (English) Zbl 07814956 J. Cryptology 37, No. 2, Paper No. 13, 33 p. (2024). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{D. Lubicz} and \textit{V. Fischer}, J. Cryptology 37, No. 2, Paper No. 13, 33 p. (2024; Zbl 07814956) Full Text: DOI OA License
Hofheinz, Dennis; Koch, Jessica; Striecks, Christoph Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. (English) Zbl 07814955 J. Cryptology 37, No. 2, Paper No. 12, 33 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Hofheinz} et al., J. Cryptology 37, No. 2, Paper No. 12, 33 p. (2024; Zbl 07814955) Full Text: DOI OA License
Koshelev, Dmitrii Hashing to elliptic curves through Cipolla-Lehmer-Müller’s square root algorithm. (English) Zbl 07814954 J. Cryptology 37, No. 2, Paper No. 11, 19 p. (2024). MSC: 94A60 94A62 68P25 14G50 11G30 11G20 14H52 11Y16 11T71 PDFBibTeX XMLCite \textit{D. Koshelev}, J. Cryptology 37, No. 2, Paper No. 11, 19 p. (2024; Zbl 07814954) Full Text: DOI
Akshima; Guo, Siyao; Liu, Qipeng Time-space lower bounds for finding collisions in Merkle-Damgård Hash functions. (English) Zbl 07814953 J. Cryptology 37, No. 2, Paper No. 10, 39 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{Akshima} et al., J. Cryptology 37, No. 2, Paper No. 10, 39 p. (2024; Zbl 07814953) Full Text: DOI
Fischlin, Marc; Günther, Felix; Janson, Christian Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3. (English) Zbl 07814952 J. Cryptology 37, No. 2, Paper No. 9, 49 p. (2024). MSC: 94A40 94A60 94A62 PDFBibTeX XMLCite \textit{M. Fischlin} et al., J. Cryptology 37, No. 2, Paper No. 9, 49 p. (2024; Zbl 07814952) Full Text: DOI OA License
Tan, Syh-Yuan; Heng, Swee-Huay Comment on: “An efficient identity-based signature scheme with provable security”. (English) Zbl 07806127 Inf. Sci. 659, Article ID 120079, 5 p. (2024). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S.-Y. Tan} and \textit{S.-H. Heng}, Inf. Sci. 659, Article ID 120079, 5 p. (2024; Zbl 07806127) Full Text: DOI
Chen, Qi; Ren, Xiaojun; Hu, Li; Cao, Yongzhi Ideal uniform multipartite secret sharing schemes. (English) Zbl 07803418 Inf. Sci. 655, Article ID 119907, 20 p. (2024). MSC: 94A62 94A60 68P25 94B05 PDFBibTeX XMLCite \textit{Q. Chen} et al., Inf. Sci. 655, Article ID 119907, 20 p. (2024; Zbl 07803418) Full Text: DOI
Rass, Stefan Tell me who you are friends with and I will tell you who you are: unique neighborhoods in random graphs. (English) Zbl 07802232 Theor. Comput. Sci. 988, Article ID 114386, 14 p. (2024). MSC: 68Qxx PDFBibTeX XMLCite \textit{S. Rass}, Theor. Comput. Sci. 988, Article ID 114386, 14 p. (2024; Zbl 07802232) Full Text: DOI
Feng, Xiu-Fang; Jiang, Mei-Ru; Zhang, Hao; Wang, Chun-Peng Robust multifunctional watermarking system based zero-watermarking and polar harmonic Fourier moments. (English) Zbl 07800584 J. Franklin Inst. 361, No. 1, 319-340 (2024). MSC: 94A62 PDFBibTeX XMLCite \textit{X.-F. Feng} et al., J. Franklin Inst. 361, No. 1, 319--340 (2024; Zbl 07800584) Full Text: DOI
Cini, Valerio; Ramacher, Sebastian; Slamanig, Daniel; Striecks, Christoph; Tairi, Erkan (Inner-product) functional encryption with updatable ciphertexts. (English) Zbl 07793136 J. Cryptology 37, No. 1, Paper No. 8, 40 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{V. Cini} et al., J. Cryptology 37, No. 1, Paper No. 8, 40 p. (2024; Zbl 07793136) Full Text: DOI OA License
De Micheli, Gabrielle; Gaudry, Pierrick; Pierrot, Cécile Lattice enumeration and automorphisms for tower NFS: a 521-bit discrete logarithm computation. (English) Zbl 07793134 J. Cryptology 37, No. 1, Paper No. 6, 45 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{G. De Micheli} et al., J. Cryptology 37, No. 1, Paper No. 6, 45 p. (2024; Zbl 07793134) Full Text: DOI
Barthe, Gilles; Belaïd, Sonia; Espitau, Thomas; Fouque, Pierre-Alain; Grégoire, Benjamin; Rossi, Mélissa; Tibouchi, Mehdi Masking the GLP lattice-based signature scheme at any order. (English) Zbl 07793133 J. Cryptology 37, No. 1, Paper No. 5, 58 p. (2024). MSC: 94A62 94A60 94A40 PDFBibTeX XMLCite \textit{G. Barthe} et al., J. Cryptology 37, No. 1, Paper No. 5, 58 p. (2024; Zbl 07793133) Full Text: DOI
Zhang, Jiang; Chen, Yu; Zhang, Zhenfeng Lattice-based programmable hash functions and applications. (English) Zbl 07793132 J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024; Zbl 07793132) Full Text: DOI
Drucker, Nir; Moshkowich, Guy; Pelleg, Tomer; Shaul, Hayim BLEACH: cleaning errors in discrete computations over CKKS. (English) Zbl 1527.94032 J. Cryptology 37, No. 1, Paper No. 3, 35 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{N. Drucker} et al., J. Cryptology 37, No. 1, Paper No. 3, 35 p. (2024; Zbl 1527.94032) Full Text: DOI
Boyle, Elette; Cohen, Ran; Goel, Aarushi Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party. (English) Zbl 1527.94023 J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Boyle} et al., J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024; Zbl 1527.94023) Full Text: DOI arXiv
Ishai, Yuval; Korb, Alexis; Lou, Paul; Sahai, Amit Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation. (English) Zbl 1527.94047 J. Cryptology 37, No. 1, Paper No. 1, 74 p. (2024). MSC: 94A60 94A62 94A05 94A29 PDFBibTeX XMLCite \textit{Y. Ishai} et al., J. Cryptology 37, No. 1, Paper No. 1, 74 p. (2024; Zbl 1527.94047) Full Text: DOI OA License
Ha, Guanxiong; Jia, Chunfu; Ge, Xiaowei; Yuan, Jiawei; Chen, Hang; Li, Mingyue Efficient and anonymous password-hardened encryption services. (English) Zbl 1526.94050 Inf. Sci. 653, Article ID 119771, 16 p. (2024). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{G. Ha} et al., Inf. Sci. 653, Article ID 119771, 16 p. (2024; Zbl 1526.94050) Full Text: DOI
Matúš, František Algebraic matroids are almost entropic. (English) Zbl 07757726 Proc. Am. Math. Soc. 152, No. 1, 1-6 (2024). Reviewer: Büşra Sert (Dresden) MSC: 05B35 94A17 94A62 12F20 11G25 52B40 PDFBibTeX XMLCite \textit{F. Matúš}, Proc. Am. Math. Soc. 152, No. 1, 1--6 (2024; Zbl 07757726) Full Text: DOI
Tan, Chik How; Prabowo, Theo Fanuela A new key recovery attack on a code-based signature from the Lyubashevsky framework. (English) Zbl 07749683 Inf. Process. Lett. 183, Article ID 106422, 7 p. (2024). MSC: 94A62 PDFBibTeX XMLCite \textit{C. H. Tan} and \textit{T. F. Prabowo}, Inf. Process. Lett. 183, Article ID 106422, 7 p. (2024; Zbl 07749683) Full Text: DOI
Park, Je Hong; Kim, Woo-Hwan Security weakness of a certificate-based proxy signature scheme for IIoT environments. (English) Zbl 07749676 Inf. Process. Lett. 183, Article ID 106406, 5 p. (2024). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Park} and \textit{W.-H. Kim}, Inf. Process. Lett. 183, Article ID 106406, 5 p. (2024; Zbl 07749676) Full Text: DOI
Graves, Eric; Beemer, Allison; Kliewer, Jörg; Kosut, Oliver; Yu, Paul L. Keyless authentication for AWGN channels. (English) Zbl 07818576 IEEE Trans. Inf. Theory 69, No. 1, 496-519 (2023). MSC: 94-XX PDFBibTeX XMLCite \textit{E. Graves} et al., IEEE Trans. Inf. Theory 69, No. 1, 496--519 (2023; Zbl 07818576) Full Text: DOI arXiv
Inassaridze, N.; Khazaradze, M.; Khmaladze, E.; Mesablishvili, B. On one-way ring homomorphisms. (English. Russian original) Zbl 07800727 J. Math. Sci., New York 275, No. 6, 728-734 (2023); translation from Itogi Nauki Tekh., Ser. Sovrem. Mat. Prilozh., Temat. Obz. 177, 80-86 (2020). MSC: 94A62 94A60 16S34 PDFBibTeX XMLCite \textit{N. Inassaridze} et al., J. Math. Sci., New York 275, No. 6, 728--734 (2023; Zbl 07800727); translation from Itogi Nauki Tekh., Ser. Sovrem. Mat. Prilozh., Temat. Obz. 177, 80--86 (2020) Full Text: DOI
Zhong, Jifeng; Ruan, Banyao; Liu, Zhihao Quantum secret sharing with identity authentication based on GHZ states entanglement swapping. (English) Zbl 07798714 Int. J. Theor. Phys. 62, No. 12, Paper No. 266, 13 p. (2023). MSC: 81Pxx 94Axx 15Axx PDFBibTeX XMLCite \textit{J. Zhong} et al., Int. J. Theor. Phys. 62, No. 12, Paper No. 266, 13 p. (2023; Zbl 07798714) Full Text: DOI
Xu, Yuguang; Zhang, Lu; Zhu, Hongfeng Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling. (English) Zbl 07798692 Int. J. Theor. Phys. 62, No. 11, Paper No. 244, 14 p. (2023). MSC: 81Pxx 94Axx 68Qxx PDFBibTeX XMLCite \textit{Y. Xu} et al., Int. J. Theor. Phys. 62, No. 11, Paper No. 244, 14 p. (2023; Zbl 07798692) Full Text: DOI
Falcón, Raúl M.; Aparna, Venkitachalam; Mohanapriya, Nagaraj Optimal secret share distribution in degree splitting communication networks. (English) Zbl 07798678 Netw. Heterog. Media 18, No. 4, 1713-1746 (2023). MSC: 94A62 94A60 68P25 05C82 68R10 PDFBibTeX XMLCite \textit{R. M. Falcón} et al., Netw. Heterog. Media 18, No. 4, 1713--1746 (2023; Zbl 07798678) Full Text: DOI
Henge, Santosh Kumar; Jayaraman, Gitanjali; Sreedevi, M.; Rajakumar, R.; Rashid, Mamoon; Alshamrani, Sultan S.; Alnfiai, Mrim M.; AlGhamdi, Ahmed Saeed Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology. (English) Zbl 07798660 Netw. Heterog. Media 18, No. 3, 1313-1334 (2023). MSC: 68P25 68P05 94A60 94A62 81P94 PDFBibTeX XMLCite \textit{S. K. Henge} et al., Netw. Heterog. Media 18, No. 3, 1313--1334 (2023; Zbl 07798660) Full Text: DOI
Kim, Jinsu Analysis of the security of generic homomorphic authenticated encryption. (English) Zbl 07794191 East Asian Math. J. 39, No. 3, 291-298 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Kim}, East Asian Math. J. 39, No. 3, 291--298 (2023; Zbl 07794191) Full Text: DOI
Garcia-Hernandez, Jose Juan; Briones-Segovia, Victor Alejandro; Feregrino-Uribe, Claudia On a self-recovery digital watermarking scheme robust against spatial and temporal attacks on compressed video. (English) Zbl 07790003 J. Franklin Inst. 360, No. 17, 13482-13508 (2023). MSC: 94A62 94A60 94A08 PDFBibTeX XMLCite \textit{J. J. Garcia-Hernandez} et al., J. Franklin Inst. 360, No. 17, 13482--13508 (2023; Zbl 07790003) Full Text: DOI
Li, Guo-Dong; Cheng, Wen-Chuan; Wang, Qing-Le; Liu, Jia-Cheng A measurement device independent multi-party quantum key agreement protocol with identity authentication. (English) Zbl 07789893 Quantum Inf. Process. 22, No. 12, Paper No. 443, 24 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{G.-D. Li} et al., Quantum Inf. Process. 22, No. 12, Paper No. 443, 24 p. (2023; Zbl 07789893) Full Text: DOI
Li, Guo-Dong; Luo, Jun-Jie; Wang, Qing-Le Twin-field quantum encryption protocol for E-payment based on blockchain. (English) Zbl 07789880 Quantum Inf. Process. 22, No. 12, Paper No. 430, 20 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{G.-D. Li} et al., Quantum Inf. Process. 22, No. 12, Paper No. 430, 20 p. (2023; Zbl 07789880) Full Text: DOI
Azahari, Nur Shahirah; Harun, Nur Ziadah; Ramli, Sofia Najwa; Zukarnain, Zuriati Binti Ahmad Secured shared authentication key with two-way clock synchronization over multiparty quantum communication. (English) Zbl 07789860 Quantum Inf. Process. 22, No. 11, Paper No. 410, 25 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{N. S. Azahari} et al., Quantum Inf. Process. 22, No. 11, Paper No. 410, 25 p. (2023; Zbl 07789860) Full Text: DOI
Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo Rinocchio: SNARKs for ring arithmetic. (English) Zbl 1527.94039 J. Cryptology 36, No. 4, Paper No. 41, 50 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Ganesh} et al., J. Cryptology 36, No. 4, Paper No. 41, 50 p. (2023; Zbl 1527.94039) Full Text: DOI
Wang, Chaonan; Zhu, Hongfeng An authenticated controlled quantum dialogue protocol using double-linked GHZ-like states in cross-domain setting. (English) Zbl 07764989 Int. J. Theor. Phys. 62, No. 9, Paper No. 211, 13 p. (2023). MSC: 81Pxx 94Axx 81Qxx PDFBibTeX XMLCite \textit{C. Wang} and \textit{H. Zhu}, Int. J. Theor. Phys. 62, No. 9, Paper No. 211, 13 p. (2023; Zbl 07764989) Full Text: DOI
Kawa, Renata; Kula, Mieczysław Access structures determined by uniform polymatroids. (English) Zbl 1526.94051 J. Math. Cryptol. 17, Article ID 20220017, 26 p. (2023). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Kawa} and \textit{M. Kula}, J. Math. Cryptol. 17, Article ID 20220017, 26 p. (2023; Zbl 1526.94051) Full Text: DOI arXiv OA License
Rotem, Lior; Segev, Gil Non-malleable vector commitments via local equivocability. (English) Zbl 1525.94052 J. Cryptology 36, No. 4, Paper No. 40, 59 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Rotem} and \textit{G. Segev}, J. Cryptology 36, No. 4, Paper No. 40, 59 p. (2023; Zbl 1525.94052) Full Text: DOI
Cristiani, Valence; Lecomte, Maxime; Maurine, Philippe Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs. (English) Zbl 1525.94035 J. Cryptology 36, No. 4, Paper No. 38, 42 p. (2023). MSC: 94A60 94A62 68T07 94A15 PDFBibTeX XMLCite \textit{V. Cristiani} et al., J. Cryptology 36, No. 4, Paper No. 38, 42 p. (2023; Zbl 1525.94035) Full Text: DOI
Robinson, Angela The mathematics of digital signatures. (English) Zbl 1522.94106 Notices Am. Math. Soc. 70, No. 6, 998-999 (2023). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Robinson}, Notices Am. Math. Soc. 70, No. 6, 998--999 (2023; Zbl 1522.94106) Full Text: DOI
Yadav, Raman; Singh, Phool Asymmetric image authentication algorithm using double random modulus decomposition and CGI. (English) Zbl 07745068 Comput. Appl. Math. 42, No. 7, Paper No. 305, 23 p. (2023). MSC: 94A60 94A08 65T50 49M27 PDFBibTeX XMLCite \textit{R. Yadav} and \textit{P. Singh}, Comput. Appl. Math. 42, No. 7, Paper No. 305, 23 p. (2023; Zbl 07745068) Full Text: DOI
Ye, Qing; Lang, Yongkang; Guo, Hongfu; Tang, Yongli Efficient lattice-based traceable ring signature scheme with its application in blockchain. (English) Zbl 1521.94067 Inf. Sci. 648, Article ID 119536, 19 p. (2023). MSC: 94A62 94A60 91B99 PDFBibTeX XMLCite \textit{Q. Ye} et al., Inf. Sci. 648, Article ID 119536, 19 p. (2023; Zbl 1521.94067) Full Text: DOI
Akhmetzyanova, L. R.; Alekseev, E. K.; Babueva, A. A.; Smyshlyaev, S. V. On the (im)possibility of secure ElGamal blind signatures. (English) Zbl 1522.94096 Mat. Vopr. Kriptografii 14, No. 2, 25-42 (2023). Reviewer: Jaak Henno (Tallinn) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{L. R. Akhmetzyanova} et al., Mat. Vopr. Kriptografii 14, No. 2, 25--42 (2023; Zbl 1522.94096) Full Text: DOI MNR
Samadder Chaudhury, Shion; Samanta, Asmita; Maitra, Arpita Quantum attribute-based encryption: a comprehensive study. (English) Zbl 07739413 Quantum Inf. Process. 22, No. 9, Paper No. 335, 34 p. (2023). MSC: 81P68 81P68 94A60 94A62 PDFBibTeX XMLCite \textit{S. Samadder Chaudhury} et al., Quantum Inf. Process. 22, No. 9, Paper No. 335, 34 p. (2023; Zbl 07739413) Full Text: DOI
Liu, I-Cheng; Hwang, Tzonelih; Wei, Hsu-Chen Three-party authenticated lightweight quantum key distribution without pre-shared key between participants. (English) Zbl 07739400 Quantum Inf. Process. 22, No. 8, Paper No. 322, 15 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{I-C. Liu} et al., Quantum Inf. Process. 22, No. 8, Paper No. 322, 15 p. (2023; Zbl 07739400) Full Text: DOI
Deng, Zhi-Ming; Lu, Dian-Jun; Chen, Teng; Mou, Hua-Jian; Wei, Xing-Jia Quantum \((t, m, n)\) threshold group blind signature scheme with flexible number of participants. (English) Zbl 07738887 Int. J. Theor. Phys. 62, No. 9, Paper No. 201, 34 p. (2023). MSC: 81P40 81P65 94A62 05E18 PDFBibTeX XMLCite \textit{Z.-M. Deng} et al., Int. J. Theor. Phys. 62, No. 9, Paper No. 201, 34 p. (2023; Zbl 07738887) Full Text: DOI
Paterson, Maura B.; Stinson, Douglas R. Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. (English) Zbl 1520.05019 Adv. Math. Commun. 17, No. 6, 1364-1387 (2023). MSC: 05B05 05B10 94A60 PDFBibTeX XMLCite \textit{M. B. Paterson} and \textit{D. R. Stinson}, Adv. Math. Commun. 17, No. 6, 1364--1387 (2023; Zbl 1520.05019) Full Text: DOI arXiv
Hsu, Chingfang; Xia, Zhe; Harn, Lein; Au, Man Ho; Cui, Jianqun; Zhao, Zhuo Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities. (English) Zbl 1520.94076 Inf. Sci. 647, Article ID 119488, 14 p. (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Hsu} et al., Inf. Sci. 647, Article ID 119488, 14 p. (2023; Zbl 1520.94076) Full Text: DOI
Cheng, Leixiao; Qin, Jing; Feng, Feng; Meng, Fei Security-enhanced public-key authenticated searchable encryption. (English) Zbl 07735591 Inf. Sci. 647, Article ID 119454, 10 p. (2023). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{L. Cheng} et al., Inf. Sci. 647, Article ID 119454, 10 p. (2023; Zbl 07735591) Full Text: DOI
Battagliola, Michele; Longo, Riccardo; Meneghetti, Alessio; Sala, Massimiliano Provably unforgeable threshold EdDSA with an offline participant and trustless setup. (English) Zbl 1520.94040 Mediterr. J. Math. 20, No. 5, Paper No. 253, 30 p. (2023). MSC: 94A60 94A62 12E20 14H52 68W40 14G50 PDFBibTeX XMLCite \textit{M. Battagliola} et al., Mediterr. J. Math. 20, No. 5, Paper No. 253, 30 p. (2023; Zbl 1520.94040) Full Text: DOI
Robert, Léo; Miyahara, Daiki; Lafourcade, Pascal; Mizuki, Takaaki Physical ZKP protocols for Nurimisaki and Kurodoko. (English) Zbl 1522.94087 Theor. Comput. Sci. 972, Article ID 114071, 15 p. (2023). MSC: 94A60 94A62 91A80 PDFBibTeX XMLCite \textit{L. Robert} et al., Theor. Comput. Sci. 972, Article ID 114071, 15 p. (2023; Zbl 1522.94087) Full Text: DOI
Abe, Masayuki; Hofheinz, Dennis; Nishimaki, Ryo; Ohkubo, Miyako; Pan, Jiaxin Compact structure-preserving signatures with almost tight security. (English) Zbl 1519.94209 J. Cryptology 36, No. 4, Paper No. 37, 41 p. (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., J. Cryptology 36, No. 4, Paper No. 37, 41 p. (2023; Zbl 1519.94209) Full Text: DOI
Attema, Thomas; Fehr, Serge; Klooß, Michael Fiat-Shamir transformation of multi-round interactive proofs (Extended version). (English) Zbl 1519.94040 J. Cryptology 36, No. 4, Paper No. 36, 45 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Attema} et al., J. Cryptology 36, No. 4, Paper No. 36, 45 p. (2023; Zbl 1519.94040) Full Text: DOI
van Dijk, Marten; Jin, Chenglu A theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle model. (English) Zbl 1519.94191 J. Cryptology 36, No. 4, Paper No. 35, 64 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. van Dijk} and \textit{C. Jin}, J. Cryptology 36, No. 4, Paper No. 35, 64 p. (2023; Zbl 1519.94191) Full Text: DOI
Nieminen, Raine; Schneider, Thomas Breaking and fixing garbled circuits when a gate has duplicate input wires. (English) Zbl 07730742 J. Cryptology 36, No. 4, Paper No. 34, 12 p. (2023). MSC: 68P25 68M14 94A60 94A62 PDFBibTeX XMLCite \textit{R. Nieminen} and \textit{T. Schneider}, J. Cryptology 36, No. 4, Paper No. 34, 12 p. (2023; Zbl 07730742) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin; Chen, Yu Fine-grained secure attribute-based encryption. (English) Zbl 1519.94195 J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023; Zbl 1519.94195) Full Text: DOI
Tian, Song Cover attacks for elliptic curves over cubic extension fields. (English) Zbl 1519.94189 J. Cryptology 36, No. 4, Paper No. 32, 40 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Tian}, J. Cryptology 36, No. 4, Paper No. 32, 40 p. (2023; Zbl 1519.94189) Full Text: DOI arXiv
Belorgey, Mariya Georgieva; Carpov, Sergiu; Deforth, Kevin; Jetchev, Dimitar; Sae-Tang, Abson; Vuille, Marius; Gama, Nicolas; Katz, Jon; Leontiadis, Iraklis; Mohammadi, Mohsen Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic. (English) Zbl 07730739 J. Cryptology 36, No. 3, Paper No. 31, 47 p. (2023). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. G. Belorgey} et al., J. Cryptology 36, No. 3, Paper No. 31, 47 p. (2023; Zbl 07730739) Full Text: DOI
Csirmaz, Laszlo Infinite probabilistic secret sharing. (English) Zbl 07729607 Kybernetika 59, No. 2, 179-197 (2023). MSC: 60B05 94A62 46C99 54D10 PDFBibTeX XMLCite \textit{L. Csirmaz}, Kybernetika 59, No. 2, 179--197 (2023; Zbl 07729607) Full Text: DOI arXiv
Mahmoud, Qassim Al; Besoul, Khaldoun; Alhalaybeh, Ayman Unconditionally secure fair \((t, n)\)-secret sharing scheme. (English) Zbl 07727298 Adv. Appl. Discrete Math. 38, No. 1, 127-143 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Q. A. Mahmoud} et al., Adv. Appl. Discrete Math. 38, No. 1, 127--143 (2023; Zbl 07727298) Full Text: DOI
Zhang, Ling; Zhang, Jia-Hao; Xin, Xiang-Jun; Li, Chao-Yang; Huang, Min Quantum designated verifier signature scheme with semi-trusted third-party. (English) Zbl 1522.81075 Int. J. Theor. Phys. 62, No. 8, Paper No. 166, 13 p. (2023). MSC: 81P94 94A62 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Int. J. Theor. Phys. 62, No. 8, Paper No. 166, 13 p. (2023; Zbl 1522.81075) Full Text: DOI
Liu, Hao; Zhang, Yewei; Li, Yuzhe; Niu, Ben Proactive attack detection scheme based on watermarking and moving target defense. (English) Zbl 1520.93191 Automatica 155, Article ID 111163, 13 p. (2023). MSC: 93B70 93C83 94A62 PDFBibTeX XMLCite \textit{H. Liu} et al., Automatica 155, Article ID 111163, 13 p. (2023; Zbl 1520.93191) Full Text: DOI
Bagherpour, Bagher A bivariate polynomial-based cryptographic hard problem and its applications. (English) Zbl 1518.94042 Des. Codes Cryptography 91, No. 8, 2723-2735 (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B. Bagherpour}, Des. Codes Cryptography 91, No. 8, 2723--2735 (2023; Zbl 1518.94042) Full Text: DOI
Hoepman, Jaap-Henk Two faces of blindness. (English) Zbl 1518.94115 Des. Codes Cryptography 91, No. 8, 2705-2721 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J.-H. Hoepman}, Des. Codes Cryptography 91, No. 8, 2705--2721 (2023; Zbl 1518.94115) Full Text: DOI
Lu, Wei; Wu, Xia; Wang, Yufei; Cao, Xiwang A general construction of regular complete permutation polynomials. (English) Zbl 07720061 Des. Codes Cryptography 91, No. 8, 2627-2647 (2023). MSC: 11T06 94B05 94A62 PDFBibTeX XMLCite \textit{W. Lu} et al., Des. Codes Cryptography 91, No. 8, 2627--2647 (2023; Zbl 07720061) Full Text: DOI arXiv
Patra, Arpita; Ravi, Divya Beyond honest majority: the round complexity of fair and robust multi-party computation. (English) Zbl 1518.94085 J. Cryptology 36, No. 3, Paper No. 30, 56 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Patra} and \textit{D. Ravi}, J. Cryptology 36, No. 3, Paper No. 30, 56 p. (2023; Zbl 1518.94085) Full Text: DOI
Dowerah, Uddipana; Dutta, Subhranil; Mitrokotsa, Aikaterini; Mukherjee, Sayantan; Pal, Tapas Unbounded predicate inner product functional encryption from pairings. (English) Zbl 1518.94056 J. Cryptology 36, No. 3, Paper No. 29, 73 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{U. Dowerah} et al., J. Cryptology 36, No. 3, Paper No. 29, 73 p. (2023; Zbl 1518.94056) Full Text: DOI
Bergerat, Loris; Boudi, Anas; Bourgerie, Quentin; Chillotti, Ilaria; Ligier, Damien; Orfila, Jean-Baptiste; Tap, Samuel Parameter optimization and larger precision for (T)FHE. (English) Zbl 1518.94045 J. Cryptology 36, No. 3, Paper No. 28, 65 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Bergerat} et al., J. Cryptology 36, No. 3, Paper No. 28, 65 p. (2023; Zbl 1518.94045) Full Text: DOI
Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio Candidate iO from homomorphic encryption schemes. (English) Zbl 1518.94048 J. Cryptology 36, No. 3, Paper No. 27, 41 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., J. Cryptology 36, No. 3, Paper No. 27, 41 p. (2023; Zbl 1518.94048) Full Text: DOI
Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan Actively secure garbled circuits with constant communication overhead in the plain model. (English) Zbl 1518.94066 J. Cryptology 36, No. 3, Paper No. 26, 66 p. (2023). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 36, No. 3, Paper No. 26, 66 p. (2023; Zbl 1518.94066) Full Text: DOI
Alon, Bar; Cohen, Ran; Omri, Eran; Suad, Tom On the power of an honest majority in three-party computation without broadcast. (English) Zbl 1518.94037 J. Cryptology 36, No. 3, Paper No. 25, 41 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B. Alon} et al., J. Cryptology 36, No. 3, Paper No. 25, 41 p. (2023; Zbl 1518.94037) Full Text: DOI
Alon, Bar; Omri, Eran Almost-optimally fair multiparty coin-tossing with nearly three-quarters malicious. (English) Zbl 1518.94038 J. Cryptology 36, No. 3, Paper No. 24, 39 p. (2023). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{B. Alon} and \textit{E. Omri}, J. Cryptology 36, No. 3, Paper No. 24, 39 p. (2023; Zbl 1518.94038) Full Text: DOI
Klamti, Jean Belo; Hasan, M. Anwarul A code-based hybrid signcryption scheme. (English) Zbl 1518.94074 J. Math. Cryptol. 17, Article ID 20220002, 22 p. (2023). MSC: 94A60 94A62 94B99 PDFBibTeX XMLCite \textit{J. B. Klamti} and \textit{M. A. Hasan}, J. Math. Cryptol. 17, Article ID 20220002, 22 p. (2023; Zbl 1518.94074) Full Text: DOI arXiv
Cao, Jie; Xin, Xiangjun; Li, Chaoyang; Li, Fagen Security analysis and improvement of a blind semi-quantum signature. (English) Zbl 1528.81106 Int. J. Theor. Phys. 62, No. 4, Paper No. 87, 14 p. (2023). MSC: 81P94 94A60 94A62 68M25 81P40 70F10 PDFBibTeX XMLCite \textit{J. Cao} et al., Int. J. Theor. Phys. 62, No. 4, Paper No. 87, 14 p. (2023; Zbl 1528.81106) Full Text: DOI
Pandey, Atul; Gupta, Indivar; Singh, Dhiraj Kumar On the security of DLCSP over \(\mathrm{GL}_n (\mathbb{F}_q [S_r])\). (English) Zbl 1518.94084 Appl. Algebra Eng. Commun. Comput. 34, No. 4, 619-628 (2023). MSC: 94A60 94A62 68W30 PDFBibTeX XMLCite \textit{A. Pandey} et al., Appl. Algebra Eng. Commun. Comput. 34, No. 4, 619--628 (2023; Zbl 1518.94084) Full Text: DOI
Shi, Minjia; Qian, Liqin; Helleseth, Tor; Solé, Patrick Five-weight codes from three-valued correlation of M-sequences. (English) Zbl 1528.94114 Adv. Math. Commun. 17, No. 4, 799-814 (2023). Reviewer: Matteo Bonini (Aalborg) MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{M. Shi} et al., Adv. Math. Commun. 17, No. 4, 799--814 (2023; Zbl 1528.94114) Full Text: DOI
Kaboli, Reza; Khazaei, Shahram; Parviz, Maghsoud On ideal and weakly-ideal access structures. (English) Zbl 1517.94199 Adv. Math. Commun. 17, No. 3, 697-713 (2023). MSC: 94A62 94A60 05B35 05B15 PDFBibTeX XMLCite \textit{R. Kaboli} et al., Adv. Math. Commun. 17, No. 3, 697--713 (2023; Zbl 1517.94199) Full Text: DOI
Debnath, Sumit Kumar; Choudhury, Tanmay; Stănică, Pantelimon; Dey, Kunal; Kundu, Nibedita Delegating signing rights in a multivariate proxy signature scheme. (English) Zbl 1517.94188 Adv. Math. Commun. 17, No. 3, 681-696 (2023). MSC: 94A62 94A60 68M12 68P30 81P94 PDFBibTeX XMLCite \textit{S. K. Debnath} et al., Adv. Math. Commun. 17, No. 3, 681--696 (2023; Zbl 1517.94188) Full Text: DOI
Civino, Roberto; Longo, Riccardo Formal security proof for a scheme on a topological network. (English) Zbl 1517.94084 Adv. Math. Commun. 17, No. 3, 562-571 (2023). MSC: 94A60 94A62 94C15 68P25 14H52 11G07 PDFBibTeX XMLCite \textit{R. Civino} and \textit{R. Longo}, Adv. Math. Commun. 17, No. 3, 562--571 (2023; Zbl 1517.94084) Full Text: DOI
Bartoli, Daniele; Denaux, Lins Minimal codewords arising from the incidence of points and hyperplanes in projective spaces. (English) Zbl 1525.94061 Adv. Math. Commun. 17, No. 1, 56-77 (2023). Reviewer: Luca Giuzzi (Brescia) MSC: 94B05 05B25 94A62 51E20 PDFBibTeX XMLCite \textit{D. Bartoli} and \textit{L. Denaux}, Adv. Math. Commun. 17, No. 1, 56--77 (2023; Zbl 1525.94061) Full Text: DOI arXiv
Libert, Benoît; Ling, San; Khoa Nguyen; Wang, Huaxiong Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. (English) Zbl 1517.94123 J. Cryptology 36, No. 3, Paper No. 23, 42 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B. Libert} et al., J. Cryptology 36, No. 3, Paper No. 23, 42 p. (2023; Zbl 1517.94123) Full Text: DOI
Koti, Nishat; Patil, Shravani; Patra, Arpita; Suresh, Ajith MPClan: protocol suite for privacy-conscious computations. (English) Zbl 1517.94120 J. Cryptology 36, No. 3, Paper No. 22, 60 p. (2023). MSC: 94A60 94A62 68P25 68M12 68M14 PDFBibTeX XMLCite \textit{N. Koti} et al., J. Cryptology 36, No. 3, Paper No. 22, 60 p. (2023; Zbl 1517.94120) Full Text: DOI arXiv
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or High-throughput secure three-party computation with an honest majority. (English) Zbl 07707563 J. Cryptology 36, No. 3, Paper No. 21, 68 p. (2023). MSC: 68P25 68M14 94A60 94A62 PDFBibTeX XMLCite \textit{J. Furukawa} et al., J. Cryptology 36, No. 3, Paper No. 21, 68 p. (2023; Zbl 07707563) Full Text: DOI
Boyle, Elette; Cohen, Ran; Data, Deepesh; Hubáček, Pavel Must the communication graph of MPC protocols be an expander? (English) Zbl 1517.94072 J. Cryptology 36, No. 3, Paper No. 20, 75 p. (2023). MSC: 94A60 94A62 05C48 68P25 68M14 90B18 PDFBibTeX XMLCite \textit{E. Boyle} et al., J. Cryptology 36, No. 3, Paper No. 20, 75 p. (2023; Zbl 1517.94072) Full Text: DOI arXiv
Saha, Sayandeep; Alam, Manaar; Bag, Arnab; Mukhopadhyay, Debdeep; Dasgupta, Pallab Learn from your faults: leakage assessment in fault attacks using deep learning. (English) Zbl 1517.94150 J. Cryptology 36, No. 3, Paper No. 19, 51 p. (2023). MSC: 94A60 94A62 68T07 68P25 PDFBibTeX XMLCite \textit{S. Saha} et al., J. Cryptology 36, No. 3, Paper No. 19, 51 p. (2023; Zbl 1517.94150) Full Text: DOI
Coutinho, Murilo; Passos, Iago; Grados Vásquez, Juan C.; Sarkar, Santanu; de Mendonça, Fábio L. L.; de Sousa, Rafael T. jun.; Borges, Fábio Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. (English) Zbl 1517.94087 J. Cryptology 36, No. 3, Paper No. 18, 57 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Coutinho} et al., J. Cryptology 36, No. 3, Paper No. 18, 57 p. (2023; Zbl 1517.94087) Full Text: DOI
Bouvier, Cyril; Castagnos, Guilhem; Imbert, Laurent; Laguillaumie, Fabien I want to ride my BICYCL : BICYCL implements cryptography in class groups. (English) Zbl 1517.94070 J. Cryptology 36, No. 3, Paper No. 17, 31 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Bouvier} et al., J. Cryptology 36, No. 3, Paper No. 17, 31 p. (2023; Zbl 1517.94070) Full Text: DOI
Appan, Ananya; Chandramouli, Anirudh; Choudhury, Ashish Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries. (English) Zbl 1517.94053 J. Cryptology 36, No. 3, Paper No. 16, 94 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Appan} et al., J. Cryptology 36, No. 3, Paper No. 16, 94 p. (2023; Zbl 1517.94053) Full Text: DOI
Chida, Koji; Hamada, Koki; Ikarashi, Dai; Kikuchi, Ryo; Genkin, Daniel; Lindell, Yehuda; Nof, Ariel Fast large-scale honest-majority MPC for malicious adversaries. (English) Zbl 1517.94080 J. Cryptology 36, No. 3, Paper No. 15, 50 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Chida} et al., J. Cryptology 36, No. 3, Paper No. 15, 50 p. (2023; Zbl 1517.94080) Full Text: DOI
Kitagawa, Fuyuki; Matsuda, Takahiro; Yamakawa, Takashi NIZK from SNARGs. (English) Zbl 1517.94117 J. Cryptology 36, No. 2, Paper No. 14, 39 p. (2023). MSC: 94A60 94A62 68P25 68N20 PDFBibTeX XMLCite \textit{F. Kitagawa} et al., J. Cryptology 36, No. 2, Paper No. 14, 39 p. (2023; Zbl 1517.94117) Full Text: DOI
Zhao, Xingqiang; Chen, Tianlong A novel semi-quantum co-signature scheme based on GHZ states and four-particle cluster states. (English) Zbl 1526.81019 Int. J. Theor. Phys. 62, No. 4, Paper No. 78, 19 p. (2023). MSC: 81P70 94A62 30D40 81R15 81P40 70F10 68M25 81Q20 PDFBibTeX XMLCite \textit{X. Zhao} and \textit{T. Chen}, Int. J. Theor. Phys. 62, No. 4, Paper No. 78, 19 p. (2023; Zbl 1526.81019) Full Text: DOI
Yamni, Mohamed; Daoui, Achraf; Karmouni, Hicham; Elmalih, Sarah; Ben-fares, Anass; Sayyouri, Mhamed; Qjidaa, Hassan; Maaroufi, Mustapha; Alami, Badreeddine; Jamil, Mohammed Ouazzani Copyright protection of multiple CT images using octonion Krawtchouk moments and grey wolf optimizer. (English) Zbl 1516.94061 J. Franklin Inst. 360, No. 7, 4719-4752 (2023). MSC: 94A62 92C55 90C59 PDFBibTeX XMLCite \textit{M. Yamni} et al., J. Franklin Inst. 360, No. 7, 4719--4752 (2023; Zbl 1516.94061) Full Text: DOI
Xia, Zhiqiu; Wang, Chunpeng; Li, Yongwei; Yu, Baosheng; Zhan, Yibing; Li, Qi; Wang, Xingyuan; Ma, Bin Geometrical attacks resilient statistical watermark decoder using polar harmonic Fourier moments. (English) Zbl 1516.94060 J. Franklin Inst. 360, No. 7, 4493-4518 (2023). MSC: 94A62 94A60 94A08 PDFBibTeX XMLCite \textit{Z. Xia} et al., J. Franklin Inst. 360, No. 7, 4493--4518 (2023; Zbl 1516.94060) Full Text: DOI
Kobayashi, Hirokazu; Watanabe, Yohei; Minematsu, Kazuhiko; Shikata, Junji Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication. (English) Zbl 07698624 Des. Codes Cryptography 91, No. 7, 2523-2562 (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Kobayashi} et al., Des. Codes Cryptography 91, No. 7, 2523--2562 (2023; Zbl 07698624) Full Text: DOI
Ding, Jian; Lin, Changlu; Lin, Fuchun; Wang, Huaxiong Full threshold change range of threshold changeable secret sharing. (English) Zbl 1516.94059 Des. Codes Cryptography 91, No. 7, 2421-2447 (2023). MSC: 94A62 94A60 94A05 PDFBibTeX XMLCite \textit{J. Ding} et al., Des. Codes Cryptography 91, No. 7, 2421--2447 (2023; Zbl 1516.94059) Full Text: DOI
Yang, Chun-Wei; Lin, Jason; Wang, Kai-Lin; Tsai, Chia-Wei Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state. (English) Zbl 07691202 Quantum Inf. Process. 22, No. 5, Paper No. 196, 24 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{C.-W. Yang} et al., Quantum Inf. Process. 22, No. 5, Paper No. 196, 24 p. (2023; Zbl 07691202) Full Text: DOI
Beullens, Ward; Dobson, Samuel; Katsumata, Shuichi; Lai, Yi-Fu; Pintore, Federico Group signatures and more from isogenies and lattices: generic, simple, and efficient. (English) Zbl 07690066 Des. Codes Cryptography 91, No. 6, 2141-2200 (2023). Reviewer: Jaak Henno (Tallinn) MSC: 94A62 94A60 14K02 14H52 81P94 PDFBibTeX XMLCite \textit{W. Beullens} et al., Des. Codes Cryptography 91, No. 6, 2141--2200 (2023; Zbl 07690066) Full Text: DOI
Martí-Farré, Jaume; de Mier, Anna Approximation and decomposition in lattices of clutters. (English) Zbl 1515.94103 Discrete Math. 346, No. 8, Article ID 113445, 22 p. (2023). MSC: 94A62 94A60 05C99 05B35 PDFBibTeX XMLCite \textit{J. Martí-Farré} and \textit{A. de Mier}, Discrete Math. 346, No. 8, Article ID 113445, 22 p. (2023; Zbl 1515.94103) Full Text: DOI
Jamal, Nurul Amiera Sakinah Abdul; Ariffin, Muhammad Rezal Kamel; Abdullah, Kamilah Novel Forgery Mechanisms in Multivariate Signature Schemes. (English) Zbl 1524.94083 Int. J. Math. Comput. Sci. 18, No. 3, 451-461 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{N. A. S. A. Jamal} et al., Int. J. Math. Comput. Sci. 18, No. 3, 451--461 (2023; Zbl 1524.94083) Full Text: Link