default search action
Journal of Mathematical Cryptology, Volume 15
Volume 15, Number 1, 2021
- Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:
Editor's Preface for the Second Annual MathCrypt Proceedings Volume. 1-3 - Jean-François Biasse, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans:
A trade-off between classical and quantum circuit size for an attack against CSIDH. 4-17 - Oleg Taraskin, Vladimir Soukharev, David Jao, Jason T. LeGrow:
Towards Isogeny-Based Password-Authenticated Key Establishment. 18-30 - Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama:
Algebraic approaches for solving isogeny problems of prime power degrees. 31-44 - Sean Murphy, Rachel Player:
Discretisation and Product Distributions in Ring-LWE. 45-59 - Thijs Laarhoven:
Approximate Voronoi cells for lattices, revisited. 60-71 - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
(In)Security of Ring-LWE Under Partial Key Exposure. 72-86 - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
Towards a Ring Analogue of the Leftover Hash Lemma. 87-110 - Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache:
The Eleventh Power Residue Symbol. 111-122 - Francesco Sica:
Factoring with Hints. 123-130 - Mehdi Tibouchi, Alexandre Wallet:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. 131-142 - Jean-François Biasse, Benjamin Pring:
A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE. 143-156 - László Csirmaz:
Secret sharing and duality. 157-173 - Antonio J. Di Scala, Carlo Sanna, Edoardo Signorini:
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial. 174-178 - Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. 179-196 - Mikhail Anokhin:
Pseudo-free families of computational universal algebras. 197-222 - Gary McGuire, Oisín Robinson:
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic. 223-236 - Matvei Kotov, Anton Menshov, Alexander Ushakov:
Attack on Kayawood protocol: uncloaking private keys. 237-249 - Filipe Araújo, Samuel Neves:
The circulant hash revisited. 250-257 - Yu Zhou, Daoguang Mu, Xinfeng Dong:
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes. 258-265 - Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh:
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings. 266-279 - Dylan Rudy, Chris Monico:
Remarks on a Tropical Key Exchange System. 280-283 - Ignacio Cascudo, Reto Schnyder:
A note on secure multiparty computation via higher residue symbols. 284-297 - Elizabeth M. Reid:
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions. 298-304 - Arghya Bhattacharjee, Cuauhtemoc Mancillas López, Eik List, Mridul Nandi:
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes. 305-344 - Fouazou Lontouo Perez Broon, Thinh Dang, Emmanuel Fouotsa, Dustin Moody:
Isogenies on twisted Hessian curves. 345-358 - Martin Ekerå:
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. 359-407 - Margaux Dugardin, Werner Schindler, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. 408-433 - Jing Zhang, Yuan Li, John O. Adeyeye:
Sensitivities and block sensitivities of elementary symmetric Boolean functions. 434-453 - Guanju Xiao, Lixia Luo, Yingpu Deng:
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves. 454-464 - Fucai Luo, Saif M. Al-Kuwari:
Revocable attribute-based proxy re-encryption. 465-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.