Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Mathematical Cryptology, Volume 10
Volume 10, Number 1, March 2016
- Claude Carlet, David Joyner, Pantelimon Stanica, Deng Tang:
Cryptographic properties of monotone Boolean functions. 1-14 - Giulia Bianco, Elisa Gorla:
Compression for trace zero points on twisted Edwards curves. 15-34 - Colleen M. Swanson, Douglas R. Stinson:
Unconditionally secure signature schemes revisited. 35-67
Volume 10, Number 2, June 2016
- Subhabrata Samajder, Palash Sarkar:
Another look at normal approximations in cryptanalysis. 69-99 - Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier. 101-133 - Dimitrios Poulakis:
New lattice attacks on DSA schemes. 135-144
Volume 10, Numbers 3-4, December 2016
- Thomas W. Cusick, K. V. Lakshmy, Madathil Sethumadhavan:
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach. 145-156 - Ashwin Jha, Mridul Nandi:
Revisiting structure graphs: Applications to CBC-MAC and EMAC. 157-180 - Mridul Nandi, Tapas Pandit:
On the security of joint signature and encryption revisited. 181-221
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.