


default search action
Journal of Mathematical Cryptology, Volume 10
Volume 10, Number 1, March 2016
- Claude Carlet, David Joyner, Pantelimon Stanica, Deng Tang:

Cryptographic properties of monotone Boolean functions. 1-14 - Giulia Bianco, Elisa Gorla:

Compression for trace zero points on twisted Edwards curves. 15-34 - Colleen M. Swanson, Douglas R. Stinson:

Unconditionally secure signature schemes revisited. 35-67
Volume 10, Number 2, June 2016
- Subhabrata Samajder

, Palash Sarkar:
Another look at normal approximations in cryptanalysis. 69-99 - Dustin Moody

, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier. 101-133 - Dimitrios Poulakis:

New lattice attacks on DSA schemes. 135-144
Volume 10, Numbers 3-4, December 2016
- Thomas W. Cusick, K. V. Lakshmy

, Madathil Sethumadhavan
:
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach. 145-156 - Ashwin Jha

, Mridul Nandi
:
Revisiting structure graphs: Applications to CBC-MAC and EMAC. 157-180 - Mridul Nandi

, Tapas Pandit
:
On the security of joint signature and encryption revisited. 181-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














