


default search action
Journal of Mathematical Cryptology, Volume 5
Volume 5, Number 1, June 2011
- Hüseyin Hisil

, Kenneth Koon-Ho Wong
, Gary Carter, Ed Dawson
:
An exploration of affine group laws for elliptic curves. 1-50 - Sylvain Duquesne:

RNS arithmetic in pk and application to fast pairing computation. 51-88 - Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica

:
Compact elliptic curve representations. 89-100
Volume 5, Number 2, April 2012
- Gaetan Bisson

:
Computing endomorphism rings of elliptic curves under the GRH. 101-114 - Nuttapong Attrapadung, Benoît Libert:

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation. 115-158 - Simon R. Blackburn, Carlos Cid, Ciaran Mullan:

Cryptanalysis of three matrix-based key establishment protocols. 159-168 - Marc Fischlin, Dominique Schröder

:
Security of blind signatures under aborts and applications to adaptive oblivious transfer. 169-204
Volume 5, Number 3-4, February 2012
- Neal Koblitz:

Another look at automated theorem-proving II. 205-224 - Dustin Moody

, Hongfeng Wu
:
Families of elliptic curves with rational 3-torsion. 225-246 - Charles Bouillaguet

, Pierre-Alain Fouque
, Antoine Joux, Joana Treger:
A family of weak keys in HFE and the corresponding practical key-recovery. 247-275 - Yeow Meng Chee

, Huaxiong Wang, Liang Feng Zhang:
On the Bringer-Chabanne EPIR protocol for polynomial evaluation. 277-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














