×

Journal of Cryptology

The Journal of the International Association for Cryptologic Research

Short Title: J. Cryptology
Publisher: Springer US, New York, NY
ISSN: 0933-2790; 1432-1378/e
Online: https://link.springer.com/journal/145/volumes-and-issues
Comments: Journal; Indexed cover-to-cover
Documents Indexed: 768 Publications (since 1988)
References Indexed: 591 Publications with 22,773 References.
all top 5

Latest Issues

37, No. 2 (2024)
37, No. 1 (2024)
36, No. 4 (2023)
36, No. 3 (2023)
36, No. 2 (2023)
36, No. 1 (2023)
35, No. 4 (2022)
35, No. 3 (2022)
35, No. 2 (2022)
35, No. 1 (2022)
34, No. 4 (2021)
34, No. 3 (2021)
34, No. 2 (2021)
34, No. 1 (2021)
33, No. 4 (2020)
33, No. 3 (2020)
33, No. 2 (2020)
33, No. 1 (2020)
32, No. 4 (2019)
32, No. 3 (2019)
32, No. 2 (2019)
32, No. 1 (2019)
31, No. 4 (2018)
31, No. 3 (2018)
31, No. 2 (2018)
31, No. 1 (2018)
30, No. 4 (2017)
30, No. 3 (2017)
30, No. 2 (2017)
30, No. 1 (2017)
29, No. 4 (2016)
29, No. 3 (2016)
29, No. 2 (2016)
29, No. 1 (2016)
28, No. 4 (2015)
28, No. 3 (2015)
28, No. 2 (2015)
28, No. 1 (2015)
27, No. 4 (2014)
27, No. 3 (2014)
27, No. 2 (2014)
27, No. 1 (2014)
26, No. 4 (2013)
26, No. 3 (2013)
26, No. 2 (2013)
26, No. 1 (2013)
25, No. 4 (2012)
25, No. 3 (2012)
25, No. 2 (2012)
25, No. 1 (2012)
24, No. 4 (2011)
24, No. 3 (2011)
24, No. 2 (2011)
24, No. 1 (2011)
23, No. 4 (2010)
23, No. 3 (2010)
23, No. 2 (2010)
23, No. 1 (2010)
22, No. 4 (2009)
22, No. 3 (2009)
22, No. 2 (2009)
22, No. 1 (2009)
21, No. 4 (2008)
21, No. 3 (2008)
21, No. 2 (2008)
21, No. 1 (2008)
20, No. 4 (2007)
20, No. 3 (2007)
20, No. 2 (2007)
20, No. 1 (2007)
19, No. 4 (2006)
19, No. 3 (2006)
19, No. 2 (2006)
19, No. 1 (2006)
18, No. 4 (2005)
18, No. 3 (2005)
18, No. 2 (2005)
18, No. 1 (2005)
17, No. 4 (2004)
17, No. 3 (2004)
17, No. 2 (2004)
17, No. 1 (2004)
16, No. 4 (2003)
16, No. 3 (2003)
16, No. 2 (2003)
16, No. 1 (2003)
15, No. 4 (2002)
15, No. 3 (2002)
15, No. 2 (2002)
15, No. 1 (2001)
14, No. 4 (2001)
14, No. 3 (2001)
14, No. 2 (2001)
14, No. 1 (2001)
13, No. 4 (2000)
13, No. 3 (2000)
13, No. 2 (2000)
13, No. 1 (2000)
12, No. 4 (1999)
12, No. 3 (1999)
...and 39 more Volumes
all top 5

Authors

32 Lindell, Yehuda
20 Hazay, Carmit
17 Shamir, Adi
15 Biham, Eli
15 Segev, Gil
14 Ishai, Yuval
14 Katz, Jonathan N.
13 Hofheinz, Dennis
12 Bellare, Mihir
12 Canetti, Ran
12 Cohen, Ran
12 Dunkelman, Orr
12 Goldreich, Oded
12 Keller, Nathan
12 Knudsen, Lars Ramkilde
11 Applebaum, Benny
11 Kiltz, Eike
11 Maurer, Ueli M.
11 Naor, Moni
11 Ostrovsky, Rafail
11 Smart, Nigel Paul
10 Asharov, Gilad
10 Gennaro, Rosario
10 Stinson, Douglas Robert
9 Damgård, Ivan Bjerre
9 Pinkas, Benny
9 Rogaway, Phillip
9 Shoup, Victor
8 Haitner, Iftach
8 Komargodski, Ilan
8 Omri, Eran
8 Rosen, Alon
7 Abdalla, Michel
7 Beimel, Amos
7 Coppersmith, Don
7 De Santis, Alfredo
7 Halevi, Shai
7 Jager, Tibor
7 Kushilevitz, Eyal
7 Venkitasubramaniam, Muthuramakrishnan
6 Abe, Masayuki
6 Bitansky, Nir
6 Boyar, Joan F.
6 Brakerski, Zvika
6 Catalano, Dario
6 Dinur, Itai
6 Garay, Juan A.
6 Groth, Jens
6 Malkin, Tal G.
6 Naya-Plasencia, María
6 Nishimaki, Ryo
6 Pass, Rafael
6 Patra, Arpita
6 Pointcheval, David
6 Rabin, Tal
6 Stern, Jacques
6 Tibouchi, Mehdi
6 Unruh, Dominique
6 Vaudenay, Serge
6 Wichs, Daniel
6 Yung, Moti
5 Benhamouda, Fabrice
5 Blundo, Carlo
5 Bogdanov, Andrej
5 Boneh, Dan
5 Brassard, Gilles
5 Coron, Jean-Sébastien
5 Dachman-Soled, Dana
5 Faust, Sebastian
5 Fischlin, Marc
5 Golić, Jovan Dj.
5 Joux, Antoine
5 Kiyoshima, Susumu
5 Leander, Gregor
5 Meier, Willi
5 Reingold, Omer
5 Reyzin, Leonid
5 Schröder, Dominique
5 Vanstone, Scott Alexander
5 Venturi, Daniele
5 Waters, Brent
4 Boyle, Elette
4 Desmedt, Yvo G.
4 Fiat, Amos
4 Fouque, Pierre-Alain
4 Galbraith, Steven D.
4 Gaudry, Pierrick
4 Johansson, Thomas
4 Kitagawa, Fuyuki
4 Klapper, Andrew M.
4 Koblitz, Neal I.
4 Kurosawa, Kaoru
4 Libert, Benoît
4 Magliveras, Spyros S.
4 Malone-Lee, John
4 Micali, Silvio
4 Moran, Tal
4 Murphy, Sean
4 Namprempre, Chanathip
4 Neven, Gregory
...and 991 more Authors

Publications by Year

Citations contained in zbMATH Open

625 Publications have been cited 8,731 times in 5,537 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
359
1991
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P.
234
1991
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques
210
2000
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
169
2000
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don
143
1997
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni
128
1991
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David
117
1988
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn
114
2010
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J.
113
1999
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
113
2004
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John
110
1992
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z.
98
2009
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair
94
1994
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
92
1988
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S.
91
2004
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
82
2009
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar
78
1989
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal
77
1989
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
77
2008
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M.
77
1991
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel
77
1996
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay
72
1997
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo
70
1993
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki
66
2013
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M.
62
2005
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
60
2003
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer
57
1999
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
57
1994
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark
53
1997
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P.
51
2001
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın
50
2008
The size of a share must be large. Zbl 0897.94012
Csirmaz, László
49
1997
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo
48
1995
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio
48
1996
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather
47
1988
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal
47
2007
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni
45
1996
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli
44
2000
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin
44
2011
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine
44
2004
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R.
43
1992
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir
42
2007
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David
40
2011
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde
40
1995
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
40
2012
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R.
40
2001
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R.
40
1990
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
40
2020
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
40
2012
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P.
38
1999
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
38
2017
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan
37
2012
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran
37
2002
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
36
2008
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge
36
2003
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
36
2005
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal
35
1998
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao
35
1993
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M.
34
1992
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
33
2002
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques
32
1998
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R.
31
2008
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
31
2001
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E.
31
2002
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
31
2020
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San
30
2011
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge
30
2017
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P.
29
2008
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.
29
1999
Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016
Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti
29
1998
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M.
29
2000
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
29
2002
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
29
2019
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Phillip
28
2001
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P.
28
2004
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo
28
1992
Logic minimization techniques with applications to cryptology. Zbl 1279.94056
Boyar, Joan; Matthews, Philip; Peralta, René
28
2013
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
27
2008
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris
27
1990
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
27
2003
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael
26
2011
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor
26
2000
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
26
2011
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
26
2006
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim
26
2003
Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431
Bender, Adam; Katz, Jonathan; Morselli, Ruggero
25
2009
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011
Verheul, Eric R.
25
2004
An implementation for a fast public-key cryptosystem. Zbl 0725.94002
Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A.
25
1991
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
25
2021
A key distribution system equivalent to factoring. Zbl 0659.94003
McCurley, Kevin S.
24
1988
A key-exchange system based on imaginary quadratic fields. Zbl 0659.94004
Buchmann, Johannes; Williams, H. C.
24
1988
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D.
24
1992
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan
24
2007
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud
24
2018
Another look at “provable security”. Zbl 1115.68078
Koblitz, Neal; Menezes, Alfred J.
23
2007
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M.
23
1992
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
23
2017
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
23
2013
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
22
2007
Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0997.94016
Shoup, Victor; Gennaro, Rosario
21
2002
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. Zbl 1511.94084
Datta, Pratish; Komargodski, Ilan; Waters, Brent
6
2023
High-throughput secure three-party computation with an honest majority. Zbl 07707563
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
3
2023
Fiat-Shamir transformation of multi-round interactive proofs (Extended version). Zbl 1519.94040
Attema, Thomas; Fehr, Serge; Klooß, Michael
2
2023
Rinocchio: SNARKs for ring arithmetic. Zbl 1527.94039
Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo
1
2023
Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries. Zbl 1517.94053
Appan, Ananya; Chandramouli, Anirudh; Choudhury, Ashish
1
2023
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. Zbl 1517.94087
Coutinho, Murilo; Passos, Iago; Grados Vásquez, Juan C.; Sarkar, Santanu; de Mendonça, Fábio L. L.; de Sousa, Rafael T. jun.; Borges, Fábio
1
2023
Parameter optimization and larger precision for (T)FHE. Zbl 1518.94045
Bergerat, Loris; Boudi, Anas; Bourgerie, Quentin; Chillotti, Ilaria; Ligier, Damien; Orfila, Jean-Baptiste; Tap, Samuel
1
2023
Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic. Zbl 07730739
Belorgey, Mariya Georgieva; Carpov, Sergiu; Deforth, Kevin; Jetchev, Dimitar; Sae-Tang, Abson; Vuille, Marius; Gama, Nicolas; Katz, Jon; Leontiadis, Iraklis; Mohammadi, Mohsen
1
2023
On the hardness of module learning with errors with short distributions. Zbl 1509.94069
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang
1
2023
Oblivious RAM with worst-case logarithmic overhead. Zbl 1511.94045
Asharov, Gilad; Komargodski, Ilan; Lin, Wei-Kai; Shi, Elaine
1
2023
Semi-quantum money. Zbl 1491.81016
Radian, Roy; Sattath, Or
7
2022
Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina
4
2022
Actively secure setup for SPDZ. Zbl 1481.94122
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim
4
2022
From fairness to full security in multiparty computation. Zbl 1486.94091
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
2
2022
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices. Zbl 1489.94119
Damgård, Ivan; Orlandi, Claudio; Takahashi, Akira; Tibouchi, Mehdi
2
2022
The inverse of \(\chi\) and its applications to Rasta-like ciphers. Zbl 1498.94071
Liu, Fukang; Sarkar, Santanu; Meier, Willi; Isobe, Takanori
1
2022
Efficient perfectly secure computation with optimal resilience. Zbl 1499.94033
Abraham, Ittai; Asharov, Gilad; Yanai, Avishay
1
2022
On the round complexity of randomized Byzantine agreement. Zbl 1489.94092
Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex
1
2022
Non-malleable functions and their applications. Zbl 1486.94086
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M.
1
2022
ZK-PCPs from leakage-resilient secret sharing. Zbl 1494.94046
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Weiss, Mor
1
2022
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
25
2021
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082
Diemert, Denis; Jager, Tibor
15
2021
Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin
10
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
7
2021
The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081
Kaspers, Christian; Zhou, Yue
6
2021
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
6
2021
Fine-grained cryptography revisited. Zbl 1469.94094
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke
6
2021
Bootstrapping for helib. Zbl 1460.94046
Halevi, Shai; Shoup, Victor
5
2021
The Deoxys AEAD family. Zbl 1470.94091
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick
5
2021
On subversion-resistant SNARKs. Zbl 1467.94021
Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał
5
2021
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114
Zhandry, Mark
4
2021
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111
Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph
4
2021
Modeling for three-subset division property without unknown subset. Zbl 1470.94087
Hao, Yonglin; Leander, Gregor; Meier, Willi; Todo, Yosuke; Wang, Qingju
4
2021
The design and evolution of OCB. Zbl 1472.94056
Krovetz, Ted; Rogaway, Phillip
4
2021
Round-optimal secure multi-party computation. Zbl 1469.94101
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
3
2021
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. Zbl 1469.94088
Aviram, Nimrod; Gellert, Kai; Jager, Tibor
3
2021
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina
3
2021
Tight tradeoffs in searchable symmetric encryption. Zbl 1460.94035
Asharov, Gilad; Segev, Gil; Shahaf, Ido
2
2021
Reusable fuzzy extractors for low-entropy distributions. Zbl 1466.94021
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
2
2021
Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026
Applebaum, Benny; Vasudevan, Prashant Nalini
2
2021
Round-preserving parallel composition of probabilistic-termination cryptographic protocols. Zbl 1515.68139
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis
2
2021
Simple and generic constructions of succinct functional encryption. Zbl 1469.94103
Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke
2
2021
Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 1518.68088
Kim, Sam; Wu, David J.
2
2021
Translating the discrete logarithm problem on Jacobians of genus 3 hyperelliptic curves with \((\ell ,\ell ,\ell)\)-isogenies. Zbl 1467.14107
Tian, Song
2
2021
Match me if you can: matchmaking encryption and its applications. Zbl 1467.94027
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele
2
2021
Is there an oblivious RAM lower bound for online reads? Zbl 1518.68091
Weiss, Mor; Wichs, Daniel
2
2021
Compact designated verifier NIZKs from the CDH assumption without pairings. Zbl 1479.94198
Katsumata, Shuichi; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi
1
2021
Fast secure two-party ECDSA signing. Zbl 1479.94332
Lindell, Yehuda
1
2021
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on Gimli. Zbl 1479.94171
Flórez-Gutiérrez, Antonio; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Schrottenloher, André; Sibleyras, Ferdinand
1
2021
Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073
Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi
1
2021
Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1460.94064
Rosen, Alon; Segev, Gil; Shahaf, Ido
1
2021
Learning strikes again: the case of the DRS signature scheme. Zbl 1466.94045
Ducas, Léo; Yu, Yang
1
2021
Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025
Applebaum, Benny; Brakerski, Zvika
1
2021
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
40
2020
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
31
2020
Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155
Galbraith, Steven D.; Petit, Christophe; Silva, Javier
17
2020
Efficient verifiable delay functions. Zbl 1453.94125
Wesolowski, Benjamin
10
2020
The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
8
2020
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
8
2020
Tight security of cascaded LRW2. Zbl 1457.94141
Jha, Ashwin; Nandi, Mridul
8
2020
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
6
2020
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
6
2020
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel
5
2020
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza
5
2020
Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099
Beyne, Tim
5
2020
Efficient and scalable universal circuits. Zbl 1462.94027
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
5
2020
Blockcipher-based authenticated encryption: how small can we go? Zbl 1457.94107
Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul
4
2020
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. Zbl 1457.94153
Kowalczyk, Lucas; Wee, Hoeteck
4
2020
Tightly secure hierarchical identity-based encryption. Zbl 1453.94095
Langrehr, Roman; Pan, Jiaxin
3
2020
Foundations of fully dynamic group signatures. Zbl 1453.94063
Bootle, Jonathan; Cerulli, Andrea; Chaidos, Pyrros; Ghadafi, Essam; Groth, Jens
3
2020
Cryptanalysis of OCB2: attacks on authenticity and confidentiality. Zbl 1453.94089
Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram
3
2020
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
2
2020
Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo
2
2020
Kummer for genus one over prime-order fields. Zbl 1455.94169
Karati, Sabyasachi; Sarkar, Palash
2
2020
Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127
Bitansky, Nir
2
2020
Revisiting the wrong-key-randomization hypothesis. Zbl 1455.94113
Ashur, Tomer; Beyne, Tim; Rijmen, Vincent
2
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
2
2020
The communication complexity of private simultaneous messages, revisited. Zbl 1457.94003
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer
2
2020
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail
2
2020
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds. Zbl 1453.94131
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan
1
2020
Topology-hiding computation on all graphs. Zbl 1455.94103
Akavia, Adi; LaVigne, Rio; Moran, Tal
1
2020
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng
1
2020
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2020
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi
1
2020
Multilinear maps from obfuscation. Zbl 1457.94090
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G.
1
2020
Spin me right round rotational symmetry for FPGA-specific AES: extended version. Zbl 1457.94192
Wegener, Felix; De Meyer, Lauren; Moradi, Amir
1
2020
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
29
2019
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel
20
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
10
2019
Probabilistic termination and composability of cryptographic protocols. Zbl 1466.94022
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis
8
2019
On tight security proofs for Schnorr signatures. Zbl 1434.94065
Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique
7
2019
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. Zbl 1435.94145
Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier
5
2019
Small CRT-exponent RSA revisited. Zbl 1435.94140
Takayasu, Atsushi; Lu, Yao; Peng, Liqiang
5
2019
Multidimensional linear cryptanalysis. Zbl 1435.94132
Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa
4
2019
Efficient RSA key generation and threshold Paillier in the two-party setting. Zbl 1434.94068
Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino
4
2019
Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2019
Improved combinatorial algorithms for the inhomogeneous short integer solution problem. Zbl 1435.11144
Bai, Shi; Galbraith, Steven D.; Li, Liangze; Sheffield, Daniel
3
2019
Koblitz curves over quadratic fields. Zbl 1466.94034
Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco
3
2019
White-box cryptography: don’t forget about grey-box attacks. Zbl 1435.94121
Alpirez Bock, Estuardo; Bos, Joppe W.; Brzuska, Chris; Hubain, Charles; Michiels, Wil; Mune, Cristofaro; Sanfelix Gonzalez, Eloi; Teuwen, Philippe; Treff, Alexander
2
2019
Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138
Okamoto, Tatsuaki; Takashima, Katsuyuki
2
2019
...and 525 more Documents
all top 5

Cited by 6,617 Authors

55 Susilo, Willy
42 Ishai, Yuval
39 Shparlinski, Igor E.
37 Hazay, Carmit
36 Ostrovsky, Rafail
33 Mu, Yi
31 Dunkelman, Orr
31 Galbraith, Steven D.
31 Pass, Rafael
30 De Santis, Alfredo
30 Kiltz, Eike
29 Lindell, Yehuda
28 Hofheinz, Dennis
28 Hu, Lei
28 Stinson, Douglas Robert
28 Wang, Huaxiong
27 Applebaum, Benny
27 Bellare, Mihir
27 Lin, Dongdai
26 Sarkar, Palash
26 Waters, Brent
25 Cao, Zhenfu
25 Libert, Benoît
25 Qi, Wenfeng
24 Damgård, Ivan Bjerre
24 Komargodski, Ilan
24 Rijmen, Vincent
24 Segev, Gil
24 Venkitasubramaniam, Muthuramakrishnan
23 Carlet, Claude
23 Keller, Nathan
23 Maurer, Ueli M.
23 Patra, Arpita
23 Petit, Christophe
23 Smart, Nigel Paul
23 Tessaro, Stefano
23 Zhang, Fangguo
22 Jager, Tibor
22 Katz, Jonathan N.
22 Nandi, Mridul
22 Nishimaki, Ryo
22 Sarkar, Santanu
22 Vaudenay, Serge
22 Yung, Moti
21 Bitansky, Nir
21 Calderini, Marco
21 Haitner, Iftach
21 Menezes, Alfred J.
21 Padró, Carles
21 Shamir, Adi
21 Venturi, Daniele
20 Fischlin, Marc
20 Maitra, Subhamoy
20 Nitaj, Abderrahmane
20 Pan, Jiaxin
20 Seurin, Yannick
20 Standaert, Francois-Xavier
20 Vaikuntanathan, Vinod
20 Wang, Meiqin
20 Wu, Wenling
19 Emura, Keita
19 Goyal, Vipul
19 Sahai, Amit
19 Vergnaud, Damien
19 Wichs, Daniel
18 Canetti, Ran
18 Cohen, Ran
18 Dinur, Itai
18 Kurosawa, Kaoru
18 Nielsen, Jesper Buus
18 Pointcheval, David
18 Sala, Massimiliano
18 Yang, Guomin
17 Blundo, Carlo
17 Fuchsbauer, Georg
17 Guo, Chun
17 Leander, Gregor
17 Leurent, Gaëtan
17 Mesnager, Sihem
17 Pietrzak, Krzysztof
17 Takayasu, Atsushi
17 Tan, Chik How
17 Zhandry, Mark
16 Boyle, Elette
16 Couteau, Geoffroy
16 Garg, Sanjam
16 Guo, Fuchun
16 Herranz, Javier
16 Jain, Abhishek
16 Joye, Marc
16 Khurana, Dakshita
16 Knudsen, Lars Ramkilde
16 Naor, Moni
16 Preneel, Bart
16 Tibouchi, Mehdi
16 Vercauteren, Frederik
15 Asharov, Gilad
15 Beimel, Amos
15 Biham, Eli
15 Choudhary, Ashish
...and 6,517 more Authors
all top 5

Cited in 313 Journals

379 Journal of Cryptology
377 Designs, Codes and Cryptography
177 Theoretical Computer Science
131 Information Sciences
125 Information Processing Letters
116 Quantum Information Processing
111 Cryptography and Communications
95 Journal of Mathematical Cryptology
91 Finite Fields and their Applications
69 Discrete Applied Mathematics
60 Mathematics of Computation
54 Advances in Mathematics of Communications
48 Applicable Algebra in Engineering, Communication and Computing
45 International Journal of Theoretical Physics
45 Journal of Discrete Mathematical Sciences & Cryptography
43 Matematicheskie Voprosy Kriptografii
36 Information and Computation
35 SIAM Journal on Computing
31 Applied Mathematics and Computation
31 Journal of Computer and System Sciences
26 Discrete Mathematics
26 International Journal of Foundations of Computer Science
26 Prikladnaya Diskretnaya Matematika
25 Science China. Information Sciences
22 Journal of Number Theory
21 International Journal of Computer Mathematics
19 Computers & Mathematics with Applications
18 Journal of Symbolic Computation
18 International Journal of Quantum Information
17 Algorithmica
17 Mathematical Problems in Engineering
16 LMS Journal of Computation and Mathematics
15 Mathematical and Computer Modelling
15 Groups, Complexity, Cryptology
14 Journal of Complexity
14 Distributed Computing
14 Wuhan University Journal of Natural Sciences (WUJNS)
12 Soft Computing
12 Journal of Systems Science and Complexity
11 Cybernetics and Systems Analysis
11 Computational Complexity
10 New Journal of Physics
10 Journal of Modern Optics
10 Science in China. Series F
9 Discrete Mathematics and Applications
9 Experimental Mathematics
9 Journal of Applied Mathematics
8 Chaos, Solitons and Fractals
8 Journal of Computer Science and Technology
8 Discrete Mathematics, Algorithms and Applications
7 Computing
7 Journal of Computational and Applied Mathematics
7 Journal of Automated Reasoning
7 Journal of Mathematical Sciences (New York)
7 Nonlinear Dynamics
7 Physical Review Letters
6 Bulletin of the Australian Mathematical Society
6 Journal of Algebra
6 Acta Applicandae Mathematicae
6 SIAM Journal on Discrete Mathematics
6 Formal Aspects of Computing
6 MSCS. Mathematical Structures in Computer Science
6 Linear Algebra and its Applications
6 Theory of Computing Systems
6 The Journal of Logic and Algebraic Programming
6 Journal of Algebra and its Applications
6 JSIAM Letters
6 Computer Science Review
5 Physics Letters. A
5 Journal of Combinatorial Theory. Series A
5 Automation and Remote Control
5 Pattern Recognition
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Tatra Mountains Mathematical Publications
5 Journal of Applied Mathematics and Computing
5 Journal of Shanghai Jiaotong University (Science)
5 Science China. Mathematics
5 Symmetry
5 Arabian Journal for Science and Engineering
4 Communications in Algebra
4 Journal of Statistical Planning and Inference
4 European Journal of Combinatorics
4 Japan Journal of Industrial and Applied Mathematics
4 Games and Economic Behavior
4 Applied Mathematics. Series B (English Edition)
4 Computational and Applied Mathematics
4 Journal of Combinatorial Optimization
4 Acta Mathematica Sinica. English Series
4 Electronic Commerce Research
4 Mathematical Biosciences and Engineering
4 International Journal of Number Theory
4 Mathematics in Computer Science
4 Logical Methods in Computer Science
3 Periodica Mathematica Hungarica
3 Problems of Information Transmission
3 Annali di Matematica Pura ed Applicata. Serie Quarta
3 Archiv der Mathematik
3 International Journal of Game Theory
3 Journal of Pure and Applied Algebra
3 Proceedings of the Japan Academy. Series A
...and 213 more Journals
all top 5

Cited in 53 Fields

4,739 Information and communication theory, circuits (94-XX)
1,495 Computer science (68-XX)
863 Number theory (11-XX)
492 Quantum theory (81-XX)
391 Algebraic geometry (14-XX)
216 Combinatorics (05-XX)
95 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
89 Group theory and generalizations (20-XX)
64 Order, lattices, ordered algebraic structures (06-XX)
55 Field theory and polynomials (12-XX)
50 Numerical analysis (65-XX)
47 Statistics (62-XX)
45 Probability theory and stochastic processes (60-XX)
41 Operations research, mathematical programming (90-XX)
37 Mathematical logic and foundations (03-XX)
27 Dynamical systems and ergodic theory (37-XX)
22 Commutative algebra (13-XX)
22 Linear and multilinear algebra; matrix theory (15-XX)
21 Geometry (51-XX)
20 Associative rings and algebras (16-XX)
9 Convex and discrete geometry (52-XX)
8 Systems theory; control (93-XX)
7 Mechanics of particles and systems (70-XX)
5 General and overarching topics; collections (00-XX)
5 Optics, electromagnetic theory (78-XX)
5 Statistical mechanics, structure of matter (82-XX)
4 History and biography (01-XX)
4 General algebraic systems (08-XX)
4 Partial differential equations (35-XX)
4 Difference and functional equations (39-XX)
4 Geophysics (86-XX)
4 Biology and other natural sciences (92-XX)
3 Ordinary differential equations (34-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Abstract harmonic analysis (43-XX)
2 Special functions (33-XX)
2 Approximations and expansions (41-XX)
2 Global analysis, analysis on manifolds (58-XX)
2 Fluid mechanics (76-XX)
1 Nonassociative rings and algebras (17-XX)
1 Category theory; homological algebra (18-XX)
1 Topological groups, Lie groups (22-XX)
1 Real functions (26-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Sequences, series, summability (40-XX)
1 Functional analysis (46-XX)
1 Operator theory (47-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 General topology (54-XX)
1 Manifolds and cell complexes (57-XX)
1 Relativity and gravitational theory (83-XX)
1 Mathematics education (97-XX)

Citations by Year