×

zbMATH — the first resource for mathematics

Journal of Mathematical Cryptology

Short Title: J. Math. Cryptol.
Publisher: De Gruyter, Berlin
ISSN: 1862-2976; 1862-2984/e
Online: http://www.degruyter.com/view/j/jmc
Comments: Indexed cover-to-cover
Documents Indexed: 265 Publications (since 2007)
References Indexed: 192 Publications with 3,960 References.
all top 5

Authors

12 Stinson, Douglas Robert
7 Nandi, Mridul
7 Shparlinski, Igor E.
7 Ushakov, Alexander S.
6 Paterson, Maura Beth
5 Blackburn, Simon R.
5 Cusick, Thomas W.
5 Yao, David D. W.
5 Yasuda, Masaya
4 Koblitz, Neal I.
4 Lauter, Kristin Estella
4 Menezes, Alfred J.
4 Pieprzyk, Josef P.
4 Tibouchi, Mehdi
4 Yokoyama, Kazuhiro
3 Bartlett, Harry
3 Biasse, Jean-François
3 Castryck, Wouter
3 Cheon, Jung Hee
3 Dawson, Edward
3 Galbraith, Steven D.
3 Guilley, Sylvain
3 Hadian Dehkordi, Massoud
3 Hinek, M. Jason
3 Joye, Marc
3 Kogure, Jun
3 Kotov, Matvei
3 Li, Yuan
3 Moody, Dustin
3 Mullan, Ciaran
3 Murphy, Sean
3 Naccache, David
3 Persichetti, Edoardo
3 Preneel, Bart
3 Tsaban, Boaz
3 Upadhyay, Jalaj
3 Wong, Kenneth Koon-Ho
2 Alawatugoda, Janaka
2 Asghar, Hassan Jameel
2 Banegas, Gustavo
2 Barreto, Paulo S. L. M.
2 Blake, Ian F.
2 Bootland, Carl
2 Carlet, Claude
2 Childs, Andrew M.
2 Cid, Carlos Frederico
2 Colbourn, Charles J.
2 Csirmaz, László
2 Dachman-Soled, Dana
2 Duquesne, Sylvain
2 Faugère, Jean-Charles
2 Ferradi, Houda
2 Fouotsa, Emmanuel
2 Gong, Huijing
2 Grošek, Otokar
2 Gupta, Indivar
2 Jetchev, Dimitar P.
2 Joux, Antoine
2 Justus, Benjamin
2 Kahrobaei, Delaram
2 Karabina, Koray
2 Karmakar, Sudhangshu B.
2 Kolesnikov, Vladimir
2 Koshiba, Takeshi
2 Kulkarni, Mukul
2 Lam, Charles C. Y.
2 LeGrow, Jason T.
2 Ligeti, Péter
2 Pandit, Tapas
2 Plantard, Thomas
2 Player, Rachel
2 Pomykała, Jacek M.
2 Pring, Benjamin
2 Rijmen, Vincent
2 Safavi-Naini, Reihaneh
2 Samajder, Subhabrata
2 Sarkar, Palash
2 Sarkar, Santanu
2 Schindler, Werner
2 Shahverdi, Aria
2 Shimoyama, Takeshi
2 Sica, Francesco
2 Simpson, Leonie Ruth
2 Soukharev, Vladimir
2 Stănică, Pantelimon
2 Steinfeld, Ron
2 Susilo, Willy
2 Takahashi, Yasushi
2 Trung, Tran Van
2 Vercauteren, Frederik
2 von zur Gathen, Joachim
2 Winterhof, Arne
2 Wu, Jiang
2 Zajac, Pavol
2 Zhang, Liang Feng
2 Zhou, Yu
1 Accardi, Luigi
1 Adeyeye, John Ola-Oluwa
1 Al-Kuwari, Saif
1 Al Mashrafi, Mufeed
...and 369 more Authors

Publications by Year

Citations contained in zbMATH Open

113 Publications have been cited 498 times in 441 Documents Cited by Year
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
31
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
25
2014
Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048
Gaudry, P.
22
2007
Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117
Nguyen, Phong Q.; Vidick, Thomas
21
2008
Perfect hash families: constructions and existence. Zbl 1128.05012
Walker, Robert A. II; Colbourn, Charles J.
19
2007
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
18
2010
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
17
2015
Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028
Daemen, Joan; Rijmen, Vincent
14
2007
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
13
2009
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
12
2010
Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067
Myasnikov, Alexei G.; Ushakov, Alexander
12
2008
Distribution of some sequences of points on elliptic curves. Zbl 1129.14040
Lange, Tanja; Shparlinski, Igor E.
10
2007
Minimal weight expansions in Pisot bases. Zbl 1170.11003
Frougny, Christiane; Steiner, Wolfgang
8
2008
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
8
2009
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
8
2011
On the security of multi-prime RSA. Zbl 1146.94008
Hinek, M. Jason
7
2008
A summary of McEliece-type cryptosystems and their security. Zbl 1278.94047
Engelbert, D.; Overbeck, R.; Schmidt, Arthur
7
2007
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
6
2009
On the \(k\)-error linear complexity of cyclotomic sequences. Zbl 1147.11065
Aly, Hassan; Meidl, Wilfried; Winterhof, Arne
6
2007
Another look at HMQV. Zbl 1211.94032
Menezes, Alfred
6
2007
Strict avalanche criterion over finite fields. Zbl 1145.11082
Li, Yuan; Cusick, T. W.
6
2007
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032
Avanzi, R.; Thériault, N.; Wang, Z.
6
2008
Polylogarithmic two-round argument systems. Zbl 1158.94003
Mie, Thilo
6
2008
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
6
2012
On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022
Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon
5
2009
On hashing into elliptic curves. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
5
2009
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
5
2012
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
5
2010
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
Distortion maps for supersingular genus two curves. Zbl 1232.11075
Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin
5
2009
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359
Nandi, Mridul
4
2009
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Improved security analysis of PMAC. Zbl 1146.94009
Nandi, Mridul; Mandal, Avradip
4
2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006
Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam
4
2008
Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357
Koblitz, Neal; Menezes, Alfred
4
2008
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
4
2012
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
4
2013
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
4
2013
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
4
2016
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
4
2018
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
3
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
3
2015
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
3
2020
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
3
2015
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
A recursive construction for perfect hash families. Zbl 1190.05029
Colbourn, Charles J.; Ling, Alan C. H.
3
2009
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
3
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
3
2013
Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317
Longrigg, Jonathan; Ushakov, Alexander
3
2008
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113
Schindler, Werner
3
2008
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
3
2010
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
3
2010
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
3
2014
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
3
2016
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
2
2020
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
2
2015
An efficient and secure two-flow zero-knowledge identification protocol. Zbl 1211.94039
Stinson, D. R.; Wu, J.
2
2007
Simplified pairing computation and security implications. Zbl 1145.11047
Galbraith, Steven D.; Ó hÉigeartaigh, Colm; Sheedy, Caroline
2
2007
The combinatorics of generalised cumulative arrays. Zbl 1203.68118
Martin, Keith; Ng, Siaw-Lynn
2
2007
Minimal weight and colexicographically minimal integer representations. Zbl 1161.11002
Heuberger, Clemens; Muir, James A.
2
2007
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
2
2010
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
\(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041
Brandstätter, Nina; Winterhof, Arne
2
2009
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092
Mosina, Natalia; Ushakov, Alexander
2
2010
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2013
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
2
2018
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
2
2016
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. Zbl 1251.94020
Attrapadung, Nuttapong; Libert, Benoît
2
2011
Cryptanalysis of three matrix-based key establishment protocols. Zbl 1248.94059
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
2
2011
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030
Yoon, Kisoon
1
2015
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067
Justus, Benjamin
1
2014
Infinite secret sharing – examples. Zbl 1330.94055
Dibert, Alexander; Csirmaz, László
1
2014
Isolated elliptic curves and the MOV attack. Zbl 1432.11066
Scholl, Travis
1
2017
A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096
Hameed, Ali; Slinko, Arkadii
1
2015
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
1
2019
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
1
2020
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
1
2015
The complexity of the connected graph access structure on seven participants. Zbl 1405.68247
Hadian Dehkordi, Massoud; Safi, Ali
1
2017
Subset sum pseudorandom numbers: fast generation and distribution. Zbl 1236.11067
von zur Gathen, Joachim; Shparlinski, Igor E.
1
2009
Common modulus attacks on small private exponent RSA and some fast variants (in practice). Zbl 1194.94186
Hinek, M. Jason; Lam, Charles C. Y.
1
2010
Self-pairings on hyperelliptic curves. Zbl 1273.14051
Galbraith, Steven D.; Zhao, Chang-An
1
2013
Statistical distribution and collisions of VSH. Zbl 1143.11045
Blake, Ian F.; Shparlinski, Igor E.
1
2007
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. Zbl 1211.94026
Choi, Su-Jeong; Blackburn, Simon R.; Wild, Peter R.
1
2007
Another look at automated theorem-proving. Zbl 1132.68681
Koblitz, Neal
1
2007
Counting hyperelliptic curves that admit a Koblitz model. Zbl 1152.14021
Demirkiran, Cevahir; Nart, Enric
1
2008
Some remarks on FCSRs and implications for stream ciphers. Zbl 1234.94022
Fischer, Simon; Meier, Willi; Stegemann, Dirk
1
2009
Numerical solvers and cryptanalysis. Zbl 1234.94055
Lamberger, Mario; Nad, Tomislav; Rijmen, Vincent
1
2009
On the density of some special primes. Zbl 1246.11154
Friedlander, John B.; Shparlinski, Igor E.
1
2009
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
1
2012
On the \(\rho \)-values of complete families of pairing-friendly elliptic curves. Zbl 1279.94110
Okano, Keiji
1
2012
On the asymptotic effectiveness of Weil descent attacks. Zbl 1252.94080
Karabina, Koray; Menezes, Alfred; Pomerance, Carl; Shparlinski, Igor E.
1
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
1
2010
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem. Zbl 1450.94036
Huang, Ming-Deh; Kosters, Michiel; Petit, Christophe; Yeo, Sze Ling; Yun, Yang
3
2020
Self-dual DeepBKZ for finding short lattice vectors. Zbl 1448.94235
Yasuda, Masaya
2
2020
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
1
2020
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. Zbl 1415.94466
Wunderer, Thomas
1
2019
Exact information ratios for secret sharing on small graphs with girth at least 5. Zbl 1443.94092
Harsányi, Károly; Ligeti, Péter
1
2019
DAGS: key encapsulation using dyadic GS codes. Zbl 1420.94102
Banegas, Gustavo; Barreto, Paulo S. L. M.; Boidje, Brice Odilon; Cayrel, Pierre-Louis; Dione, Gilbert Ndollane; Gaj, Kris; Gueye, Cheikh Thiécoumba; Haeussler, Richard; Klamti, Jean Belo; N’diaye, Ousmane; Nguyen, Duc Tri; Persichetti, Edoardo; Ricardini, Jefferson E.
4
2018
Analysis of a key exchange protocol based on tropical matrix algebra. Zbl 1397.94082
Kotov, Matvei; Ushakov, Alexander
2
2018
Algebraic generalization of Diffie-Hellman key exchange. Zbl 1391.94787
Partala, Juha
1
2018
Multi-prover proof of retrievability. Zbl 1420.94089
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
1
2018
Rigorous upper bounds on data complexities of block cipher cryptanalysis. Zbl 1372.94439
Samajder, Subhabrata; Sarkar, Palash
4
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. Zbl 1391.65099
Yasuda, Masaya; Yokoyama, Kazuhiro; Shimoyama, Takeshi; Kogure, Jun; Koshiba, Takeshi
3
2017
Isolated elliptic curves and the MOV attack. Zbl 1432.11066
Scholl, Travis
1
2017
The complexity of the connected graph access structure on seven participants. Zbl 1405.68247
Hadian Dehkordi, Massoud; Safi, Ali
1
2017
Another look at normal approximations in cryptanalysis. Zbl 1408.94962
Samajder, Subhabrata; Sarkar, Palash
4
2016
Affine equivalence of monomial rotation symmetric Boolean functions: a Pólya’s theorem approach. Zbl 1384.94050
Cusick, Thomas W.; Lakshmy, K. V.; Sethumadhavan, M.
3
2016
Cryptographic properties of monotone Boolean functions. Zbl 1338.94070
Carlet, Claude; Joyner, David; Stănică, Pantelimon; Tang, Deng
2
2016
New lattice attacks on DSA schemes. Zbl 1408.94960
Poulakis, Dimitrios
1
2016
On the concrete hardness of learning with errors. Zbl 1352.94023
Albrecht, Martin R.; Player, Rachel; Scott, Sam
17
2015
The round functions of KASUMI generate the alternating group. Zbl 1307.94099
Sparr, Rüdiger; Wernsdorf, Ralph
3
2015
Length-based attacks in polycyclic groups. Zbl 1323.94112
Garber, David; Kahrobaei, Delaram; Lam, Ha T.
3
2015
Time-memory trade-offs for index calculus in genus 3. Zbl 1370.94522
Laine, Kim; Lauter, Kristin
3
2015
Analysis of a certain polycyclic-group-based cryptosystem. Zbl 1352.94044
Kotov, Matvei; Ushakov, Alexander
2
2015
A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves. Zbl 1310.14030
Yoon, Kisoon
1
2015
A characterisation of ideal weighted secret sharing schemes. Zbl 1403.94096
Hameed, Ali; Slinko, Arkadii
1
2015
Towards efficient private distributed computation on unbounded input streams. Zbl 1330.94039
Dolev, Shlomi; Garay, Juan; Gilboa, Niv; Kolesnikov, Vladimir; Yuditsky, Yelena
1
2015
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Zbl 1372.94419
De Feo, Luca; Jao, David; Plût, Jérôme
31
2014
Constructing elliptic curve isogenies in quantum subexponential time. Zbl 1283.81046
Childs, Andrew; Jao, David; Soukharev, Vladimir
25
2014
Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414
Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem
3
2014
Efficient computation of pairings on Jacobi quartic elliptic curves. Zbl 1311.14032
Duquesne, Sylvain; El Mrabet, Nadia; Fouotsa, Emmanuel
3
2014
Quantum computation of discrete logarithms in semigroups. Zbl 1304.68050
Childs, Andrew M.; Ivanyos, Gábor
3
2014
The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. Zbl 1343.94067
Justus, Benjamin
1
2014
Infinite secret sharing – examples. Zbl 1330.94055
Dibert, Alexander; Csirmaz, László
1
2014
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves. Zbl 1353.11111
Sha, Min
1
2014
A new method to solve MRHS equation systems and its connection to group factorization. Zbl 1290.94141
Zajac, Pavol
5
2013
Perfect secret sharing schemes for graph access structures on six participants. Zbl 1305.94090
Gharahi, Motahhareh; Hadian Dehkordi, Massoud
4
2013
Another look at HMAC. Zbl 1327.94085
Koblitz, Neal; Menezes, Alfred
4
2013
Oblivious evaluation of multivariate polynomials. Zbl 1316.94092
Tassa, Tamir; Jarrous, Ayman; Ben-Ya’akov, Yonatan
3
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms. Zbl 1316.94136
Flori, Jean-Pierre; Mesnager, Sihem
3
2013
Coprime solutions to \(ax\equiv b \pmod n\). Zbl 1327.11004
Grošek, Otokar; Porubský, Štefan
3
2013
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Zbl 1283.94079
Paterson, Maura B.; Stinson, Douglas R.; Upadhyay, Jalaj
2
2013
Self-pairings on hyperelliptic curves. Zbl 1273.14051
Galbraith, Steven D.; Zhao, Chang-An
1
2013
Strongly aperiodic logarithmic signatures. Zbl 1305.94078
Staszewski, Reiner; van Trung, Tran
1
2013
Compact McEliece keys based on quasi-dyadic Srivastava codes. Zbl 1277.94037
Persichetti, Edoardo
6
2012
Recursive weights for some Boolean functions. Zbl 1277.94016
Brown, Alyssa; Cusick, Thomas W.
5
2012
The effectiveness of the linear hull effect. Zbl 1279.94105
Murphy, Sean
4
2012
Heuristics on pairing-friendly elliptic curves. Zbl 1277.94014
Boxall, John
3
2012
The discrete logarithm problem in Bergman’s non-representable ring. Zbl 1264.94093
Banin, Matan; Tsaban, Boaz
1
2012
On the \(\rho \)-values of complete families of pairing-friendly elliptic curves. Zbl 1279.94110
Okano, Keiji
1
2012
Aperiodic logarithmic signatures. Zbl 1276.94023
Baumeister, Barbara; de Wiljes, Jan-Hendrik
1
2012
Computing endomorphism rings of elliptic curves under the GRH. Zbl 1250.11106
Bisson, Gaetan
8
2011
Families of elliptic curves with rational 3-torsion. Zbl 1253.11068
Moody, Dustin; Wu, Hongfeng
3
2011
An exploration of affine group laws for elliptic curves. Zbl 1248.94070
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed
2
2011
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. Zbl 1251.94020
Attrapadung, Nuttapong; Libert, Benoît
2
2011
Cryptanalysis of three matrix-based key establishment protocols. Zbl 1248.94059
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
2
2011
Security of blind signatures under aborts and applications to adaptive oblivious transfer. Zbl 1251.94029
Fischlin, Marc; Schröder, Dominique
1
2011
A family of weak keys in HFE and the corresponding practical key-recovery. Zbl 1251.94023
Bouillaguet, Charles; Fouque, Pierre-Alain; Joux, Antoine; Treger, Joana
1
2011
On secret sharing schemes, matroids and polymatroids. Zbl 1201.94111
Martí-Farré, Jaume; Padró, Carles
18
2010
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs. Zbl 1231.05173
Shokrieh, Farbod
12
2010
Public key cryptosystem MST\(_{3}\): cryptanalysis and realization. Zbl 1203.94125
Svaba, Pavol; van Trung, Tran
5
2010
Factor-4 and 6 compression of cyclotomic subgroups of \(\mathbb F^*_{2^{4m}}\) and \(\mathbb F^*_{3^{6m}}\). Zbl 1194.94187
Karabina, Koray
4
2010
Cryptanalysing variants of Stickel’s key agreement scheme. Zbl 1211.94033
Mullan, Ciaran
3
2010
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems. Zbl 1211.14029
Wolf, Christopher; Preneel, Bart
3
2010
The power of primes: security of authentication based on a universal hash-function family. Zbl 1246.94018
Alomair, Basel; Clark, Andrew; Poovendran, Radha
3
2010
Poly-dragon: an efficient multivariate public key cryptosystem. Zbl 1235.94051
Singh, Rajesh P.; Saikia, A.; Sarma, B. K.
2
2010
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. Zbl 1201.94092
Mosina, Natalia; Ushakov, Alexander
2
2010
Common modulus attacks on small private exponent RSA and some fast variants (in practice). Zbl 1194.94186
Hinek, M. Jason; Lam, Charles C. Y.
1
2010
On the asymptotic effectiveness of Weil descent attacks. Zbl 1252.94080
Karabina, Koray; Menezes, Alfred; Pomerance, Carl; Shparlinski, Igor E.
1
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
1
2010
Multicollision attacks and generalized iterated hash functions. Zbl 1203.94110
Kortelainen, Juha; Halunen, Kimmo; Kortelainen, Tuomas
1
2010
Hybrid approach for solving multivariate systems over finite fields. Zbl 1183.94021
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic
13
2009
Hash function requirements for Schnorr signatures. Zbl 1165.94323
Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan
8
2009
Cryptanalysis of the \(MST_{3}\) public key cryptosystem. Zbl 1185.94046
Blackburn, Simon R.; Cid, Carlos; Mullan, Ciaran
6
2009
On a conjecture for balanced symmetric Boolean functions. Zbl 1187.94022
Cusick, Thomas W.; Li, Yuan; Stănică, Pantelimon
5
2009
On hashing into elliptic curves. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
5
2009
Distortion maps for supersingular genus two curves. Zbl 1232.11075
Galbraith, Steven D.; Pujolàs, Jordi; Ritzenthaler, Christophe; Smith, Benjamin
5
2009
Improved security analysis for OMAC as a pseudorandom function. Zbl 1171.94359
Nandi, Mridul
4
2009
A recursive construction for perfect hash families. Zbl 1190.05029
Colbourn, Charles J.; Ling, Alan C. H.
3
2009
\(k\)-error linear complexity over \(\mathbb F_p\) of subsequences of Sidelnikov sequences of period \((p^{r} - 1)/3\). Zbl 1185.94041
Brandstätter, Nina; Winterhof, Arne
2
2009
Subset sum pseudorandom numbers: fast generation and distribution. Zbl 1236.11067
von zur Gathen, Joachim; Shparlinski, Igor E.
1
2009
Some remarks on FCSRs and implications for stream ciphers. Zbl 1234.94022
Fischer, Simon; Meier, Willi; Stegemann, Dirk
1
2009
Numerical solvers and cryptanalysis. Zbl 1234.94055
Lamberger, Mario; Nad, Tomislav; Rijmen, Vincent
1
2009
On the density of some special primes. Zbl 1246.11154
Friedlander, John B.; Shparlinski, Igor E.
1
2009
Families of genus 2 curves with small embedding degree. Zbl 1165.94007
Hitt, Laura
1
2009
Sieve algorithms for the shortest vector problem are practical. Zbl 1193.11117
Nguyen, Phong Q.; Vidick, Thomas
21
2008
Random subgroups and analysis of the length-based and quotient attacks. Zbl 1195.94067
Myasnikov, Alexei G.; Ushakov, Alexander
12
2008
Minimal weight expansions in Pisot bases. Zbl 1170.11003
Frougny, Christiane; Steiner, Wolfgang
8
2008
On the security of multi-prime RSA. Zbl 1146.94008
Hinek, M. Jason
7
2008
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: Interplay of field arithmetic and explicit formulæ. Zbl 1146.14032
Avanzi, R.; Thériault, N.; Wang, Z.
6
2008
Polylogarithmic two-round argument systems. Zbl 1158.94003
Mie, Thilo
6
2008
Improved security analysis of PMAC. Zbl 1146.94009
Nandi, Mridul; Mandal, Avradip
4
2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm. Zbl 1146.94006
Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam
4
2008
Another look at non-standard discrete log and Diffie-Hellman problems. Zbl 1156.94357
Koblitz, Neal; Menezes, Alfred
4
2008
Cryptanalysis of the shifted conjugacy authentication protocol. Zbl 1147.94317
Longrigg, Jonathan; Ushakov, Alexander
3
2008
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. Zbl 1274.94113
Schindler, Werner
3
2008
Counting hyperelliptic curves that admit a Koblitz model. Zbl 1152.14021
Demirkiran, Cevahir; Nart, Enric
1
2008
An attack on disguised elliptic curves. Zbl 1140.94011
Morales, David J. Mireles
1
2008
A geometric view of cryptographic equation solving. Zbl 1146.68072
Murphy, S.; Paterson, M. B.
1
2008
Fast genus 2 arithmetic based on theta functions. Zbl 1145.11048
Gaudry, P.
22
2007
Perfect hash families: constructions and existence. Zbl 1128.05012
Walker, Robert A. II; Colbourn, Charles J.
19
2007
Probability distributions of correlation and differentials in block ciphers. Zbl 1211.94028
Daemen, Joan; Rijmen, Vincent
14
2007
...and 13 more Documents
all top 5

Cited by 789 Authors

11 Farràs, Oriol
10 Colbourn, Charles J.
9 Padró, Carles
8 Medina, Luis A.
7 Castro, Francis Noel
7 Lauter, Kristin Estella
7 Yao, David D. W.
6 Costello, Craig
6 Cusick, Thomas W.
6 Galbraith, Steven D.
6 Sarkar, Palash
6 Shparlinski, Igor E.
5 Farashahi, Reza Rezaeian
5 Faugère, Jean-Charles
5 Laarhoven, Thijs
5 Paul, Goutam
5 Robert, Damien
5 Trung, Tran Van
5 Yasuda, Masaya
4 Biasse, Jean-François
4 Gama, Nicolas
4 Gaudry, Pierrick
4 Kunihiro, Noboru
4 Lubicz, David
4 Maitra, Subhamoy
4 Martí-Farré, Jaume
4 Menezes, Alfred J.
4 Nandi, Mridul
4 Nyberg, Kaisa
4 Samajder, Subhabrata
4 Stinson, Douglas Robert
4 Takashima, Katsuyuki
4 Takayasu, Atsushi
4 Ushakov, Alexander S.
4 Zajac, Pavol
3 Aragona, Riccardo
3 Bernstein, Daniel Julius
3 Blondeau, Celine
3 Carlet, Claude
3 Georgieva, Mariya
3 González, Oscar E.
3 Guilley, Sylvain
3 Herold, Gottfried
3 Heuberger, Clemens
3 Izabachène, Malika
3 Jacobson, Michael John jun.
3 Joux, Antoine
3 Kirshanova, Elena
3 Koblitz, Neal I.
3 Lange, Tanja
3 Li, Chao
3 Moody, Dustin
3 Otmani, Ayoub
3 Perret, Ludovic
3 Persichetti, Edoardo
3 Qu, Longjiang
3 Rijmen, Vincent
3 Roman’kov, Vitaly Anatol’evich
3 Sarkar, Santanu
3 Sepúlveda, L. Brehsner
3 Standaert, Francois-Xavier
3 Stehlé, Damien
3 Svaba, Pavol
3 Takagi, Tsuyoshi
3 Tibouchi, Mehdi
3 Tischhauser, Elmar
3 Vázquez, Leonor
3 Vercauteren, Frederik
3 Vitse, Vanessa
2 Agievich, Sergey Valer’evich
2 Ahmadi, Omran
2 Akiyama, Shigeki
2 Andreeva, Elena Anatol’evna
2 Ashur, Tomer
2 Au, Man Ho
2 Avanzi, Roberto Maria
2 Azarderakhsh, Reza
2 Backman, Spencer
2 Banegas, Gustavo
2 Barreto, Paulo S. L. M.
2 Bazrafshan, Marjan
2 Beimel, Amos
2 Bibak, Khodakhast
2 Bisson, Gaetan
2 Bitansky, Nir
2 Bogdanov, Andrey
2 Boneh, Dan
2 Bos, Joppe W.
2 Buchmann, Johannes A.
2 Canetti, Ran
2 Castryck, Wouter
2 Cayrel, Pierre-Louis
2 Chen, Zhixiong
2 Chiesa, Alessandro
2 Chillotti, Ilaria
2 Civino, Roberto
2 Clancy, Julien
2 Cosset, Romain
2 Daghigh, Hassan
2 Deng, Yingpu
...and 689 more Authors
all top 5

Cited in 101 Journals

66 Designs, Codes and Cryptography
42 Journal of Mathematical Cryptology
18 Journal of Cryptology
14 Finite Fields and their Applications
12 Cryptography and Communications
10 Theoretical Computer Science
10 Advances in Mathematics of Communications
9 Groups, Complexity, Cryptology
8 Journal of Number Theory
8 LMS Journal of Computation and Mathematics
7 Discrete Applied Mathematics
7 Mathematics of Computation
6 Applicable Algebra in Engineering, Communication and Computing
5 Information Processing Letters
5 Matematicheskie Voprosy Kriptografii
4 Journal of Symbolic Computation
4 Mathematics in Computer Science
4 JSIAM Letters
3 Communications in Algebra
3 Discrete Mathematics
3 Information Sciences
3 Facta Universitatis. Series Mathematics and Informatics
3 SIAM Journal on Discrete Mathematics
3 Cybernetics and Systems Analysis
3 Tatra Mountains Mathematical Publications
3 Journal of Combinatorial Optimization
3 Annals of Combinatorics
3 Journal of Applied Mathematics and Computing
2 Journal of Combinatorial Theory. Series A
2 Journal of Computational and Applied Mathematics
2 Journal of Pure and Applied Algebra
2 International Journal of Computer Mathematics
2 Journal of Algebraic Combinatorics
2 Journal of Statistical Theory and Practice
2 Prikladnaya Diskretnaya Matematika
1 Journal d’Analyse Mathématique
1 Mathematische Semesterberichte
1 Advances in Mathematics
1 Annali di Matematica Pura ed Applicata. Serie Quarta
1 Applied Mathematics and Computation
1 Automatica
1 Canadian Journal of Mathematics
1 Compositio Mathematica
1 Computing
1 Functiones et Approximatio. Commentarii Mathematici
1 Illinois Journal of Mathematics
1 Inventiones Mathematicae
1 Journal of Geometry
1 Journal of Statistical Planning and Inference
1 Mathematische Zeitschrift
1 Mathematika
1 Michigan Mathematical Journal
1 SIAM Journal on Computing
1 Transactions of the American Mathematical Society
1 Ergodic Theory and Dynamical Systems
1 Combinatorica
1 Acta Mathematica Hungarica
1 Algorithmica
1 Journal of the American Mathematical Society
1 Mathematical and Computer Modelling
1 Forum Mathematicum
1 Annals of Operations Research
1 International Journal of Algebra and Computation
1 International Journal of Foundations of Computer Science
1 IMRN. International Mathematics Research Notices
1 Linear Algebra and its Applications
1 Journal of Knot Theory and its Ramifications
1 Computational Complexity
1 Experimental Mathematics
1 Journal of Mathematical Sciences (New York)
1 The Electronic Journal of Combinatorics
1 Complexity
1 Arab Journal of Mathematical Sciences
1 Séminaire Lotharingien de Combinatoire
1 The Ramanujan Journal
1 Theory of Computing Systems
1 Soft Computing
1 Journal of Integer Sequences
1 Acta Mathematica Sinica. English Series
1 Computational Geosciences
1 Integers
1 Journal of Systems Science and Complexity
1 Journal of Applied Mathematics
1 Central European Journal of Mathematics
1 Quantum Information Processing
1 Journal of Algebra and its Applications
1 Mediterranean Journal of Mathematics
1 Mathematical Biosciences and Engineering
1 Discrete Optimization
1 International Journal of Number Theory
1 SIGMA. Symmetry, Integrability and Geometry: Methods and Applications
1 Proyecciones
1 Groups, Geometry, and Dynamics
1 Involve
1 Science China. Mathematics
1 Science China. Information Sciences
1 Theory of Computing
1 Forum of Mathematics, Sigma
1 Open Mathematics
1 Journal of Algebra, Combinatorics, Discrete Structures and Applications
...and 1 more Journals
all top 5

Cited in 37 Fields

319 Information and communication theory, circuits (94-XX)
146 Number theory (11-XX)
94 Algebraic geometry (14-XX)
90 Computer science (68-XX)
58 Combinatorics (05-XX)
31 Group theory and generalizations (20-XX)
24 Quantum theory (81-XX)
15 Order, lattices, ordered algebraic structures (06-XX)
10 Operations research, mathematical programming (90-XX)
8 Linear and multilinear algebra; matrix theory (15-XX)
8 Convex and discrete geometry (52-XX)
8 Statistics (62-XX)
7 Commutative algebra (13-XX)
5 Numerical analysis (65-XX)
4 Probability theory and stochastic processes (60-XX)
3 Geometry (51-XX)
3 Manifolds and cell complexes (57-XX)
2 Mathematical logic and foundations (03-XX)
2 Field theory and polynomials (12-XX)
2 Associative rings and algebras (16-XX)
2 Measure and integration (28-XX)
2 Dynamical systems and ergodic theory (37-XX)
2 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
1 History and biography (01-XX)
1 General algebraic systems (08-XX)
1 Nonassociative rings and algebras (17-XX)
1 Topological groups, Lie groups (22-XX)
1 Several complex variables and analytic spaces (32-XX)
1 Special functions (33-XX)
1 Harmonic analysis on Euclidean spaces (42-XX)
1 Abstract harmonic analysis (43-XX)
1 Differential geometry (53-XX)
1 Algebraic topology (55-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Fluid mechanics (76-XX)
1 Systems theory; control (93-XX)
1 Mathematics education (97-XX)

Citations by Year