Journal of CryptologyThe Journal of the International Association for Cryptologic Research Short Title: J. Cryptology Publisher: Springer US, New York, NY ISSN: 0933-2790; 1432-1378/e Online: https://link.springer.com/journal/145/volumes-and-issues Comments: Journal; Indexed cover-to-cover Documents Indexed: 768 Publications (since 1988) References Indexed: 591 Publications with 22,773 References. all top 5 Latest Issues 37, No. 2 (2024) 37, No. 1 (2024) 36, No. 4 (2023) 36, No. 3 (2023) 36, No. 2 (2023) 36, No. 1 (2023) 35, No. 4 (2022) 35, No. 3 (2022) 35, No. 2 (2022) 35, No. 1 (2022) 34, No. 4 (2021) 34, No. 3 (2021) 34, No. 2 (2021) 34, No. 1 (2021) 33, No. 4 (2020) 33, No. 3 (2020) 33, No. 2 (2020) 33, No. 1 (2020) 32, No. 4 (2019) 32, No. 3 (2019) 32, No. 2 (2019) 32, No. 1 (2019) 31, No. 4 (2018) 31, No. 3 (2018) 31, No. 2 (2018) 31, No. 1 (2018) 30, No. 4 (2017) 30, No. 3 (2017) 30, No. 2 (2017) 30, No. 1 (2017) 29, No. 4 (2016) 29, No. 3 (2016) 29, No. 2 (2016) 29, No. 1 (2016) 28, No. 4 (2015) 28, No. 3 (2015) 28, No. 2 (2015) 28, No. 1 (2015) 27, No. 4 (2014) 27, No. 3 (2014) 27, No. 2 (2014) 27, No. 1 (2014) 26, No. 4 (2013) 26, No. 3 (2013) 26, No. 2 (2013) 26, No. 1 (2013) 25, No. 4 (2012) 25, No. 3 (2012) 25, No. 2 (2012) 25, No. 1 (2012) 24, No. 4 (2011) 24, No. 3 (2011) 24, No. 2 (2011) 24, No. 1 (2011) 23, No. 4 (2010) 23, No. 3 (2010) 23, No. 2 (2010) 23, No. 1 (2010) 22, No. 4 (2009) 22, No. 3 (2009) 22, No. 2 (2009) 22, No. 1 (2009) 21, No. 4 (2008) 21, No. 3 (2008) 21, No. 2 (2008) 21, No. 1 (2008) 20, No. 4 (2007) 20, No. 3 (2007) 20, No. 2 (2007) 20, No. 1 (2007) 19, No. 4 (2006) 19, No. 3 (2006) 19, No. 2 (2006) 19, No. 1 (2006) 18, No. 4 (2005) 18, No. 3 (2005) 18, No. 2 (2005) 18, No. 1 (2005) 17, No. 4 (2004) 17, No. 3 (2004) 17, No. 2 (2004) 17, No. 1 (2004) 16, No. 4 (2003) 16, No. 3 (2003) 16, No. 2 (2003) 16, No. 1 (2003) 15, No. 4 (2002) 15, No. 3 (2002) 15, No. 2 (2002) 15, No. 1 (2001) 14, No. 4 (2001) 14, No. 3 (2001) 14, No. 2 (2001) 14, No. 1 (2001) 13, No. 4 (2000) 13, No. 3 (2000) 13, No. 2 (2000) 13, No. 1 (2000) 12, No. 4 (1999) 12, No. 3 (1999) ...and 39 more Volumes all top 5 Authors 32 Lindell, Yehuda 20 Hazay, Carmit 17 Shamir, Adi 15 Biham, Eli 15 Segev, Gil 14 Ishai, Yuval 14 Katz, Jonathan N. 13 Hofheinz, Dennis 12 Bellare, Mihir 12 Canetti, Ran 12 Cohen, Ran 12 Dunkelman, Orr 12 Goldreich, Oded 12 Keller, Nathan 12 Knudsen, Lars Ramkilde 11 Applebaum, Benny 11 Kiltz, Eike 11 Maurer, Ueli M. 11 Naor, Moni 11 Ostrovsky, Rafail 11 Smart, Nigel Paul 10 Asharov, Gilad 10 Gennaro, Rosario 10 Stinson, Douglas Robert 9 Damgård, Ivan Bjerre 9 Pinkas, Benny 9 Rogaway, Phillip 9 Shoup, Victor 8 Haitner, Iftach 8 Komargodski, Ilan 8 Omri, Eran 8 Rosen, Alon 7 Abdalla, Michel 7 Beimel, Amos 7 Coppersmith, Don 7 De Santis, Alfredo 7 Halevi, Shai 7 Jager, Tibor 7 Kushilevitz, Eyal 7 Venkitasubramaniam, Muthuramakrishnan 6 Abe, Masayuki 6 Bitansky, Nir 6 Boyar, Joan F. 6 Brakerski, Zvika 6 Catalano, Dario 6 Dinur, Itai 6 Garay, Juan A. 6 Groth, Jens 6 Malkin, Tal G. 6 Naya-Plasencia, María 6 Nishimaki, Ryo 6 Pass, Rafael 6 Patra, Arpita 6 Pointcheval, David 6 Rabin, Tal 6 Stern, Jacques 6 Tibouchi, Mehdi 6 Unruh, Dominique 6 Vaudenay, Serge 6 Wichs, Daniel 6 Yung, Moti 5 Benhamouda, Fabrice 5 Blundo, Carlo 5 Bogdanov, Andrej 5 Boneh, Dan 5 Brassard, Gilles 5 Coron, Jean-Sébastien 5 Dachman-Soled, Dana 5 Faust, Sebastian 5 Fischlin, Marc 5 Golić, Jovan Dj. 5 Joux, Antoine 5 Kiyoshima, Susumu 5 Leander, Gregor 5 Meier, Willi 5 Reingold, Omer 5 Reyzin, Leonid 5 Schröder, Dominique 5 Vanstone, Scott Alexander 5 Venturi, Daniele 5 Waters, Brent 4 Boyle, Elette 4 Desmedt, Yvo G. 4 Fiat, Amos 4 Fouque, Pierre-Alain 4 Galbraith, Steven D. 4 Gaudry, Pierrick 4 Johansson, Thomas 4 Kitagawa, Fuyuki 4 Klapper, Andrew M. 4 Koblitz, Neal I. 4 Kurosawa, Kaoru 4 Libert, Benoît 4 Magliveras, Spyros S. 4 Malone-Lee, John 4 Micali, Silvio 4 Moran, Tal 4 Murphy, Sean 4 Namprempre, Chanathip 4 Neven, Gregory ...and 991 more Authors all top 5 Fields 727 Information and communication theory, circuits (94-XX) 246 Computer science (68-XX) 61 Number theory (11-XX) 41 Algebraic geometry (14-XX) 17 Combinatorics (05-XX) 17 Quantum theory (81-XX) 15 Numerical analysis (65-XX) 7 Group theory and generalizations (20-XX) 6 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 5 Probability theory and stochastic processes (60-XX) 4 General and overarching topics; collections (00-XX) 4 Order, lattices, ordered algebraic structures (06-XX) 3 Field theory and polynomials (12-XX) 3 Statistics (62-XX) 2 Approximations and expansions (41-XX) 2 Operations research, mathematical programming (90-XX) 1 Mathematical logic and foundations (03-XX) 1 Geometry (51-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 625 Publications have been cited 8,731 times in 5,537 Documents Cited by ▼ Year ▼ Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017 Biham, Eli; Shamir, Adi 359 1991 Efficient signature generation by smart cards. Zbl 0743.68058 Schnorr, C. P. 234 1991 Security arguments for digital signatures and blind signatures. Zbl 1025.94015 Pointcheval, David; Stern, Jacques 210 2000 Security and composition of multiparty cryptographic protocols. Zbl 0957.68040 Canetti, Ran 169 2000 Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056 Coppersmith, Don 143 1997 Bit commitment using pseudorandomness. Zbl 0731.68033 Naor, Moni 128 1991 The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012 Chaum, David 117 1988 A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094 Freeman, David; Scott, Michael; Teske, Edlyn 114 2010 Parallel collision search with cryptanalytic applications. Zbl 0992.94028 van Oorschot, Paul C.; Wiener, Michael J. 113 1999 Short signatures from the Weil pairing. Zbl 1070.94010 Boneh, Dan; Lynn, Ben; Shacham, Hovav 113 2004 Experimental quantum cryptography. Zbl 1114.94005 Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John 110 1992 Cryptographic hash functions from expander graphs. Zbl 1166.94006 Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z. 98 2009 Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010 Goldreich, Oded; Oren, Yair 94 1994 Zero-knowledge proofs of identity. Zbl 0659.94006 Feige, Uriel; Fiat, Amos; Shamir, Adi 92 1988 The Weil pairing, and its efficient calculation. Zbl 1078.14043 Miller, Victor S. 91 2004 A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364 Lindell, Yehuda; Pinkas, Benny 82 2009 Fast correlation attacks on certain stream ciphers. Zbl 0673.94010 Meier, Willi; Staffelbach, Othmar 78 1989 Hyperelliptic cryptosystems. Zbl 0674.94010 Koblitz, Neal 77 1989 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373 Boneh, Dan; Boyen, Xavier 77 2008 On the classification of ideal secret sharing schemes. Zbl 0747.94010 Brickell, Ernest F.; Davenport, Daniel M. 77 1991 How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085 Goldreich, Oded; Kahan, Ariel 77 1996 A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552 Even, Shimon; Mansour, Yishay 72 1997 On the size of shares for secret sharing schemes. Zbl 0786.68030 Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo 70 1993 Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085 Fujisaki, Eiichiro; Okamoto, Tatsuaki 66 2013 Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047 Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M. 62 2005 The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012 Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M. 60 2003 On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010 Naor, Moni; Reingold, Omer 57 1999 New types of cryptanalytic attacks using related keys. Zbl 0812.94012 Biham, Eli 57 1994 Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029 Klapper, Andrew; Goresky, Mark 53 1997 Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036 Gaudry, P.; Hess, F.; Smart, N. P. 51 2001 On probability of success in linear and differential cryptanalysis. Zbl 1147.68510 Selçuk, Ali Aydın 50 2008 The size of a share must be large. Zbl 0897.94012 Csirmaz, László 49 1997 Graph decompositions and secret sharing schemes. Zbl 0816.94013 Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo 48 1995 On-line/off-line digital signatures. Zbl 0844.94011 Even, Shimon; Goldreich, Oded; Micali, Silvio 48 1996 How to share a secret with cheaters. Zbl 0659.94008 Tompa, Martin; Woll, Heather 47 1988 Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075 Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal 47 2007 Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015 Impagliazzo, Russell; Naor, Moni 45 1996 Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019 Hirt, Martin; Maurer, Ueli 44 2000 Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060 Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin 44 2011 A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007 Joux, Antoine 44 2004 Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008 Brickell, E. F.; Stinson, D. R. 43 1992 Hierarchical threshold secret sharing. Zbl 1113.68048 Tassa, Tamir 42 2007 Tweakable block ciphers. Zbl 1258.94040 Liskov, Moses; Rivest, Ronald L.; Wagner, David 40 2011 Provable security against a differential attack. Zbl 0817.94016 Nyberg, Kaisa; Knudsen, Lars Ramkilde 40 1995 Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033 Halevi, Shai; Kalai, Yael Tauman 40 2012 Selecting cryptographic key sizes. Zbl 1006.94020 Lenstra, Arjen K.; Verheul, Eric R. 40 2001 The combinatorics of authentication and secrecy codes. Zbl 0701.94006 Stinson, D. R. 40 1990 TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141 Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika 40 2020 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017 Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 40 2012 The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068 Smart, N. P. 38 1999 The hunting of the SNARK. Zbl 1386.94066 Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran 38 2017 Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016 Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan 37 2012 New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010 Magliveras, S. S.; Stinson, D. R.; van Trung, Tran 37 2002 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378 Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 36 2008 Decorrelation: a theory for block cipher security. Zbl 1070.94009 Vaudenay, Serge 36 2003 Secure multi-party computation without agreement. Zbl 1102.68472 Goldwasser, Shafi; Lindell, Yehuda 36 2005 The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038 Balasubramanian, R.; Koblitz, Neal 35 1998 Multiple assignment scheme for sharing secret. Zbl 0795.68070 Ito, Mitsuru; Saito, Akira; Nishizeki, Takao 35 1993 Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013 Maurer, Ueli M. 34 1992 Privacy preserving data mining. Zbl 1010.94008 Lindell, Yehuda; Pinkas, Benny 33 2002 Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011 Joux, Antoine; Stern, Jacques 32 1998 Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009 Overbeck, R. 31 2008 On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014 Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. 31 2001 The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011 Nguyen, Phong Q.; Shparlinski, Igor E. 31 2002 A formal security analysis of the Signal messaging protocol. Zbl 1453.94133 Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas 31 2020 Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063 Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San 30 2011 An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510 Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 30 2017 Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340 Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P. 29 2008 On the contrast in visual cryptography schemes. Zbl 0944.94010 Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R. 29 1999 Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016 Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti 29 1998 Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057 Pollard, J. M. 29 2000 Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066 Abadi, Martín; Rogaway, Phillip 29 2002 Updating key size estimations for pairings. Zbl 1435.94122 Barbulescu, Razvan; Duquesne, Sylvain 29 2019 How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531 Kilian, Joe; Rogaway, Phillip 28 2001 Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016 Vadhan, Salil P. 28 2004 Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007 Dai, Zong-Duo 28 1992 Logic minimization techniques with applications to cryptology. Zbl 1279.94056 Boyar, Joan; Matthews, Philip; Peralta, René 28 2013 Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435 Bellare, Mihir; Namprempre, Chanathip 27 2008 Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010 Mitchell, Chris 27 1990 Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011 Lindell, Yehuda 27 2003 Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036 Galbraith, Steven D.; Lin, Xibin; Scott, Michael 26 2011 On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007 Coppersmith, Don; Shparlinski, Igor 26 2000 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022 Boneh, Dan; Boyen, Xavier 26 2011 A proof of the security of quantum key distribution. Zbl 1109.68045 Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani 26 2006 Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309 Joux, Antoine; Nguyen, Kim 26 2003 Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431 Bender, Adam; Katz, Jonathan; Morselli, Ruggero 25 2009 Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011 Verheul, Eric R. 25 2004 An implementation for a fast public-key cryptosystem. Zbl 0725.94002 Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A. 25 1991 A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049 Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas 25 2021 A key distribution system equivalent to factoring. Zbl 0659.94003 McCurley, Kevin S. 24 1988 A key-exchange system based on imaginary quadratic fields. Zbl 0659.94004 Buchmann, Johannes; Williams, H. C. 24 1988 Algebraic properties of cryptosystem PGM. Zbl 0763.94014 Magliveras, Spyros S.; Memon, Nasir D. 24 1992 Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027 Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan 24 2007 Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132 Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud 24 2018 Another look at “provable security”. Zbl 1115.68078 Koblitz, Neal; Menezes, Alfred J. 23 2007 A universal statistical test for random bit generators. Zbl 0790.94014 Maurer, Ueli M. 23 1992 A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480 Asharov, Gilad; Lindell, Yehuda 23 2017 Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091 Katz, Jonathan; Sahai, Amit; Waters, Brent 23 2013 A forward-secure public-key encryption scheme. Zbl 1121.68044 Canetti, Ran; Halevi, Shai; Katz, Jonathan 22 2007 Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0997.94016 Shoup, Victor; Gennaro, Rosario 21 2002 Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. Zbl 1511.94084 Datta, Pratish; Komargodski, Ilan; Waters, Brent 6 2023 High-throughput secure three-party computation with an honest majority. Zbl 07707563 Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or 3 2023 Fiat-Shamir transformation of multi-round interactive proofs (Extended version). Zbl 1519.94040 Attema, Thomas; Fehr, Serge; Klooß, Michael 2 2023 Rinocchio: SNARKs for ring arithmetic. Zbl 1527.94039 Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo 1 2023 Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries. Zbl 1517.94053 Appan, Ananya; Chandramouli, Anirudh; Choudhury, Ashish 1 2023 Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. Zbl 1517.94087 Coutinho, Murilo; Passos, Iago; Grados Vásquez, Juan C.; Sarkar, Santanu; de Mendonça, Fábio L. L.; de Sousa, Rafael T. jun.; Borges, Fábio 1 2023 Parameter optimization and larger precision for (T)FHE. Zbl 1518.94045 Bergerat, Loris; Boudi, Anas; Bourgerie, Quentin; Chillotti, Ilaria; Ligier, Damien; Orfila, Jean-Baptiste; Tap, Samuel 1 2023 Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic. Zbl 07730739 Belorgey, Mariya Georgieva; Carpov, Sergiu; Deforth, Kevin; Jetchev, Dimitar; Sae-Tang, Abson; Vuille, Marius; Gama, Nicolas; Katz, Jon; Leontiadis, Iraklis; Mohammadi, Mohsen 1 2023 On the hardness of module learning with errors with short distributions. Zbl 1509.94069 Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang 1 2023 Oblivious RAM with worst-case logarithmic overhead. Zbl 1511.94045 Asharov, Gilad; Komargodski, Ilan; Lin, Wei-Kai; Shi, Elaine 1 2023 Semi-quantum money. Zbl 1491.81016 Radian, Roy; Sattath, Or 7 2022 Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183 Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina 4 2022 Actively secure setup for SPDZ. Zbl 1481.94122 Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim 4 2022 From fairness to full security in multiparty computation. Zbl 1486.94091 Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior 2 2022 Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices. Zbl 1489.94119 Damgård, Ivan; Orlandi, Claudio; Takahashi, Akira; Tibouchi, Mehdi 2 2022 The inverse of \(\chi\) and its applications to Rasta-like ciphers. Zbl 1498.94071 Liu, Fukang; Sarkar, Santanu; Meier, Willi; Isobe, Takanori 1 2022 Efficient perfectly secure computation with optimal resilience. Zbl 1499.94033 Abraham, Ittai; Asharov, Gilad; Yanai, Avishay 1 2022 On the round complexity of randomized Byzantine agreement. Zbl 1489.94092 Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex 1 2022 Non-malleable functions and their applications. Zbl 1486.94086 Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M. 1 2022 ZK-PCPs from leakage-resilient secret sharing. Zbl 1494.94046 Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Weiss, Mor 1 2022 A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049 Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas 25 2021 On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082 Diemert, Denis; Jager, Tibor 15 2021 Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084 Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin 10 2021 High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080 Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. 7 2021 The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081 Kaspers, Christian; Zhou, Yue 6 2021 On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030 Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal 6 2021 Fine-grained cryptography revisited. Zbl 1469.94094 Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke 6 2021 Bootstrapping for helib. Zbl 1460.94046 Halevi, Shai; Shoup, Victor 5 2021 The Deoxys AEAD family. Zbl 1470.94091 Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick 5 2021 On subversion-resistant SNARKs. Zbl 1467.94021 Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał 5 2021 Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114 Zhandry, Mark 4 2021 Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111 Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph 4 2021 Modeling for three-subset division property without unknown subset. Zbl 1470.94087 Hao, Yonglin; Leander, Gregor; Meier, Willi; Todo, Yosuke; Wang, Qingju 4 2021 The design and evolution of OCB. Zbl 1472.94056 Krovetz, Ted; Rogaway, Phillip 4 2021 Round-optimal secure multi-party computation. Zbl 1469.94101 Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan 3 2021 Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. Zbl 1469.94088 Aviram, Nimrod; Gellert, Kai; Jager, Tibor 3 2021 Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090 Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina 3 2021 Tight tradeoffs in searchable symmetric encryption. Zbl 1460.94035 Asharov, Gilad; Segev, Gil; Shahaf, Ido 2 2021 Reusable fuzzy extractors for low-entropy distributions. Zbl 1466.94021 Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam 2 2021 Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026 Applebaum, Benny; Vasudevan, Prashant Nalini 2 2021 Round-preserving parallel composition of probabilistic-termination cryptographic protocols. Zbl 1515.68139 Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis 2 2021 Simple and generic constructions of succinct functional encryption. Zbl 1469.94103 Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke 2 2021 Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 1518.68088 Kim, Sam; Wu, David J. 2 2021 Translating the discrete logarithm problem on Jacobians of genus 3 hyperelliptic curves with \((\ell ,\ell ,\ell)\)-isogenies. Zbl 1467.14107 Tian, Song 2 2021 Match me if you can: matchmaking encryption and its applications. Zbl 1467.94027 Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele 2 2021 Is there an oblivious RAM lower bound for online reads? Zbl 1518.68091 Weiss, Mor; Wichs, Daniel 2 2021 Compact designated verifier NIZKs from the CDH assumption without pairings. Zbl 1479.94198 Katsumata, Shuichi; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi 1 2021 Fast secure two-party ECDSA signing. Zbl 1479.94332 Lindell, Yehuda 1 2021 Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on Gimli. Zbl 1479.94171 Flórez-Gutiérrez, Antonio; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Schrottenloher, André; Sibleyras, Ferdinand 1 2021 Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073 Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi 1 2021 Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1460.94064 Rosen, Alon; Segev, Gil; Shahaf, Ido 1 2021 Learning strikes again: the case of the DRS signature scheme. Zbl 1466.94045 Ducas, Léo; Yu, Yang 1 2021 Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025 Applebaum, Benny; Brakerski, Zvika 1 2021 TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141 Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika 40 2020 A formal security analysis of the Signal messaging protocol. Zbl 1453.94133 Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas 31 2020 Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155 Galbraith, Steven D.; Petit, Christophe; Silva, Javier 17 2020 Efficient verifiable delay functions. Zbl 1453.94125 Wesolowski, Benjamin 10 2020 The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094 Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel 8 2020 Solving LPN using covering codes. Zbl 1455.94161 Guo, Qian; Johansson, Thomas; Löndahl, Carl 8 2020 Tight security of cascaded LRW2. Zbl 1457.94141 Jha, Ashwin; Nandi, Mridul 8 2020 Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160 Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling 6 2020 From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175 Komargodski, Ilan; Segev, Gil 6 2020 From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123 Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel 5 2020 CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121 Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza 5 2020 Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099 Beyne, Tim 5 2020 Efficient and scalable universal circuits. Zbl 1462.94027 Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas 5 2020 Blockcipher-based authenticated encryption: how small can we go? Zbl 1457.94107 Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul 4 2020 Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. Zbl 1457.94153 Kowalczyk, Lucas; Wee, Hoeteck 4 2020 Tightly secure hierarchical identity-based encryption. Zbl 1453.94095 Langrehr, Roman; Pan, Jiaxin 3 2020 Foundations of fully dynamic group signatures. Zbl 1453.94063 Bootle, Jonathan; Cerulli, Andrea; Chaidos, Pyrros; Ghadafi, Essam; Groth, Jens 3 2020 Cryptanalysis of OCB2: attacks on authenticity and confidentiality. Zbl 1453.94089 Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram 3 2020 Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094 Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel 2 2020 Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085 Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo 2 2020 Kummer for genus one over prime-order fields. Zbl 1455.94169 Karati, Sabyasachi; Sarkar, Palash 2 2020 Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127 Bitansky, Nir 2 2020 Revisiting the wrong-key-randomization hypothesis. Zbl 1455.94113 Ashur, Tomer; Beyne, Tim; Rijmen, Vincent 2 2020 A practical forgery attack on Lilliput-AE. Zbl 1457.94126 Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu 2 2020 The communication complexity of private simultaneous messages, revisited. Zbl 1457.94003 Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer 2 2020 Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104 Bunn, Paul; Ostrovsky, Rafail 2 2020 \(1/p\)-secure multiparty computation without an honest majority and the best of both worlds. Zbl 1453.94131 Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan 1 2020 Topology-hiding computation on all graphs. Zbl 1455.94103 Akavia, Adi; LaVigne, Rio; Moran, Tal 1 2020 Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067 Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng 1 2020 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097 Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2020 Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145 Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi 1 2020 Multilinear maps from obfuscation. Zbl 1457.94090 Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. 1 2020 Spin me right round rotational symmetry for FPGA-specific AES: extended version. Zbl 1457.94192 Wegener, Felix; De Meyer, Lauren; Moradi, Amir 1 2020 Updating key size estimations for pairings. Zbl 1435.94122 Barbulescu, Razvan; Duquesne, Sylvain 29 2019 Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066 Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel 20 2019 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141 Todo, Yosuke; Leander, Gregor; Sasaki, Yu 10 2019 Probabilistic termination and composability of cryptographic protocols. Zbl 1466.94022 Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis 8 2019 On tight security proofs for Schnorr signatures. Zbl 1434.94065 Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique 7 2019 Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. Zbl 1435.94145 Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier 5 2019 Small CRT-exponent RSA revisited. Zbl 1435.94140 Takayasu, Atsushi; Lu, Yao; Peng, Liqiang 5 2019 Multidimensional linear cryptanalysis. Zbl 1435.94132 Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa 4 2019 Efficient RSA key generation and threshold Paillier in the two-party setting. Zbl 1434.94068 Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino 4 2019 Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2019 Improved combinatorial algorithms for the inhomogeneous short integer solution problem. Zbl 1435.11144 Bai, Shi; Galbraith, Steven D.; Li, Liangze; Sheffield, Daniel 3 2019 Koblitz curves over quadratic fields. Zbl 1466.94034 Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco 3 2019 White-box cryptography: don’t forget about grey-box attacks. Zbl 1435.94121 Alpirez Bock, Estuardo; Bos, Joppe W.; Brzuska, Chris; Hubain, Charles; Michiels, Wil; Mune, Cristofaro; Sanfelix Gonzalez, Eloi; Teuwen, Philippe; Treff, Alexander 2 2019 Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138 Okamoto, Tatsuaki; Takashima, Katsuyuki 2 2019 ...and 525 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 6,617 Authors 55 Susilo, Willy 42 Ishai, Yuval 39 Shparlinski, Igor E. 37 Hazay, Carmit 36 Ostrovsky, Rafail 33 Mu, Yi 31 Dunkelman, Orr 31 Galbraith, Steven D. 31 Pass, Rafael 30 De Santis, Alfredo 30 Kiltz, Eike 29 Lindell, Yehuda 28 Hofheinz, Dennis 28 Hu, Lei 28 Stinson, Douglas Robert 28 Wang, Huaxiong 27 Applebaum, Benny 27 Bellare, Mihir 27 Lin, Dongdai 26 Sarkar, Palash 26 Waters, Brent 25 Cao, Zhenfu 25 Libert, Benoît 25 Qi, Wenfeng 24 Damgård, Ivan Bjerre 24 Komargodski, Ilan 24 Rijmen, Vincent 24 Segev, Gil 24 Venkitasubramaniam, Muthuramakrishnan 23 Carlet, Claude 23 Keller, Nathan 23 Maurer, Ueli M. 23 Patra, Arpita 23 Petit, Christophe 23 Smart, Nigel Paul 23 Tessaro, Stefano 23 Zhang, Fangguo 22 Jager, Tibor 22 Katz, Jonathan N. 22 Nandi, Mridul 22 Nishimaki, Ryo 22 Sarkar, Santanu 22 Vaudenay, Serge 22 Yung, Moti 21 Bitansky, Nir 21 Calderini, Marco 21 Haitner, Iftach 21 Menezes, Alfred J. 21 Padró, Carles 21 Shamir, Adi 21 Venturi, Daniele 20 Fischlin, Marc 20 Maitra, Subhamoy 20 Nitaj, Abderrahmane 20 Pan, Jiaxin 20 Seurin, Yannick 20 Standaert, Francois-Xavier 20 Vaikuntanathan, Vinod 20 Wang, Meiqin 20 Wu, Wenling 19 Emura, Keita 19 Goyal, Vipul 19 Sahai, Amit 19 Vergnaud, Damien 19 Wichs, Daniel 18 Canetti, Ran 18 Cohen, Ran 18 Dinur, Itai 18 Kurosawa, Kaoru 18 Nielsen, Jesper Buus 18 Pointcheval, David 18 Sala, Massimiliano 18 Yang, Guomin 17 Blundo, Carlo 17 Fuchsbauer, Georg 17 Guo, Chun 17 Leander, Gregor 17 Leurent, Gaëtan 17 Mesnager, Sihem 17 Pietrzak, Krzysztof 17 Takayasu, Atsushi 17 Tan, Chik How 17 Zhandry, Mark 16 Boyle, Elette 16 Couteau, Geoffroy 16 Garg, Sanjam 16 Guo, Fuchun 16 Herranz, Javier 16 Jain, Abhishek 16 Joye, Marc 16 Khurana, Dakshita 16 Knudsen, Lars Ramkilde 16 Naor, Moni 16 Preneel, Bart 16 Tibouchi, Mehdi 16 Vercauteren, Frederik 15 Asharov, Gilad 15 Beimel, Amos 15 Biham, Eli 15 Choudhary, Ashish ...and 6,517 more Authors all top 5 Cited in 313 Journals 379 Journal of Cryptology 377 Designs, Codes and Cryptography 177 Theoretical Computer Science 131 Information Sciences 125 Information Processing Letters 116 Quantum Information Processing 111 Cryptography and Communications 95 Journal of Mathematical Cryptology 91 Finite Fields and their Applications 69 Discrete Applied Mathematics 60 Mathematics of Computation 54 Advances in Mathematics of Communications 48 Applicable Algebra in Engineering, Communication and Computing 45 International Journal of Theoretical Physics 45 Journal of Discrete Mathematical Sciences & Cryptography 43 Matematicheskie Voprosy Kriptografii 36 Information and Computation 35 SIAM Journal on Computing 31 Applied Mathematics and Computation 31 Journal of Computer and System Sciences 26 Discrete Mathematics 26 International Journal of Foundations of Computer Science 26 Prikladnaya Diskretnaya Matematika 25 Science China. Information Sciences 22 Journal of Number Theory 21 International Journal of Computer Mathematics 19 Computers & Mathematics with Applications 18 Journal of Symbolic Computation 18 International Journal of Quantum Information 17 Algorithmica 17 Mathematical Problems in Engineering 16 LMS Journal of Computation and Mathematics 15 Mathematical and Computer Modelling 15 Groups, Complexity, Cryptology 14 Journal of Complexity 14 Distributed Computing 14 Wuhan University Journal of Natural Sciences (WUJNS) 12 Soft Computing 12 Journal of Systems Science and Complexity 11 Cybernetics and Systems Analysis 11 Computational Complexity 10 New Journal of Physics 10 Journal of Modern Optics 10 Science in China. Series F 9 Discrete Mathematics and Applications 9 Experimental Mathematics 9 Journal of Applied Mathematics 8 Chaos, Solitons and Fractals 8 Journal of Computer Science and Technology 8 Discrete Mathematics, Algorithms and Applications 7 Computing 7 Journal of Computational and Applied Mathematics 7 Journal of Automated Reasoning 7 Journal of Mathematical Sciences (New York) 7 Nonlinear Dynamics 7 Physical Review Letters 6 Bulletin of the Australian Mathematical Society 6 Journal of Algebra 6 Acta Applicandae Mathematicae 6 SIAM Journal on Discrete Mathematics 6 Formal Aspects of Computing 6 MSCS. Mathematical Structures in Computer Science 6 Linear Algebra and its Applications 6 Theory of Computing Systems 6 The Journal of Logic and Algebraic Programming 6 Journal of Algebra and its Applications 6 JSIAM Letters 6 Computer Science Review 5 Physics Letters. A 5 Journal of Combinatorial Theory. Series A 5 Automation and Remote Control 5 Pattern Recognition 5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 5 Tatra Mountains Mathematical Publications 5 Journal of Applied Mathematics and Computing 5 Journal of Shanghai Jiaotong University (Science) 5 Science China. Mathematics 5 Symmetry 5 Arabian Journal for Science and Engineering 4 Communications in Algebra 4 Journal of Statistical Planning and Inference 4 European Journal of Combinatorics 4 Japan Journal of Industrial and Applied Mathematics 4 Games and Economic Behavior 4 Applied Mathematics. Series B (English Edition) 4 Computational and Applied Mathematics 4 Journal of Combinatorial Optimization 4 Acta Mathematica Sinica. English Series 4 Electronic Commerce Research 4 Mathematical Biosciences and Engineering 4 International Journal of Number Theory 4 Mathematics in Computer Science 4 Logical Methods in Computer Science 3 Periodica Mathematica Hungarica 3 Problems of Information Transmission 3 Annali di Matematica Pura ed Applicata. Serie Quarta 3 Archiv der Mathematik 3 International Journal of Game Theory 3 Journal of Pure and Applied Algebra 3 Proceedings of the Japan Academy. Series A ...and 213 more Journals all top 5 Cited in 53 Fields 4,739 Information and communication theory, circuits (94-XX) 1,495 Computer science (68-XX) 863 Number theory (11-XX) 492 Quantum theory (81-XX) 391 Algebraic geometry (14-XX) 216 Combinatorics (05-XX) 95 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 89 Group theory and generalizations (20-XX) 64 Order, lattices, ordered algebraic structures (06-XX) 55 Field theory and polynomials (12-XX) 50 Numerical analysis (65-XX) 47 Statistics (62-XX) 45 Probability theory and stochastic processes (60-XX) 41 Operations research, mathematical programming (90-XX) 37 Mathematical logic and foundations (03-XX) 27 Dynamical systems and ergodic theory (37-XX) 22 Commutative algebra (13-XX) 22 Linear and multilinear algebra; matrix theory (15-XX) 21 Geometry (51-XX) 20 Associative rings and algebras (16-XX) 9 Convex and discrete geometry (52-XX) 8 Systems theory; control (93-XX) 7 Mechanics of particles and systems (70-XX) 5 General and overarching topics; collections (00-XX) 5 Optics, electromagnetic theory (78-XX) 5 Statistical mechanics, structure of matter (82-XX) 4 History and biography (01-XX) 4 General algebraic systems (08-XX) 4 Partial differential equations (35-XX) 4 Difference and functional equations (39-XX) 4 Geophysics (86-XX) 4 Biology and other natural sciences (92-XX) 3 Ordinary differential equations (34-XX) 3 Harmonic analysis on Euclidean spaces (42-XX) 3 Abstract harmonic analysis (43-XX) 2 Special functions (33-XX) 2 Approximations and expansions (41-XX) 2 Global analysis, analysis on manifolds (58-XX) 2 Fluid mechanics (76-XX) 1 Nonassociative rings and algebras (17-XX) 1 Category theory; homological algebra (18-XX) 1 Topological groups, Lie groups (22-XX) 1 Real functions (26-XX) 1 Measure and integration (28-XX) 1 Functions of a complex variable (30-XX) 1 Sequences, series, summability (40-XX) 1 Functional analysis (46-XX) 1 Operator theory (47-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 General topology (54-XX) 1 Manifolds and cell complexes (57-XX) 1 Relativity and gravitational theory (83-XX) 1 Mathematics education (97-XX) Citations by Year