@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{\em #1}} \fi" #
"\ifx \undefined \k \let \k = \c \fi" #
"\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}} \fi" #
"\ifx \undefined \mathbf \def \mathbf #1{{\bf #1}} \fi" #
"\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}} \fi" #
"\ifx \undefined \mathscr \def \mathscr #1{{\cal #1}} \fi" #
"\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-J-MATH-CRYPTOL = "Journal of Mathematical Cryptology"}
@Article{Lange:2007:DSS,
author = "Tanja Lange and Igor E. Shparlinski",
title = "Distribution of some sequences of points on elliptic
curves",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "1--11",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11G20 (11T23 11T71 14G15 14G50 94A60)",
MRnumber = "2314616",
MRreviewer = "Edward F. Schaefer",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Martin:2007:CGC,
author = "Keith Martin and Siaw-Lynn Ng",
title = "The combinatorics of generalised cumulative arrays",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "13--32",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68R05 (94A60 94A62)",
MRnumber = "2314617",
MRreviewer = "Simon R. Blackburn",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Stinson:2007:SRQ,
author = "D. R. Stinson and R. Wei",
title = "Some results on query processes and reconstruction
functions for unconditionally secure $2$-server
$1$-round binary private information retrieval
protocols",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "33--46",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "2314618",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Menezes:2007:ALH,
author = "Alfred Menezes",
title = "Another look at {HMQV}",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "47--64",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 68P25)",
MRnumber = "2314619",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Li:2007:SAC,
author = "Yuan Li and T. W. Cusick",
title = "Strict avalanche criterion over finite fields",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "65--78",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11T06 (06E30 94A60)",
MRnumber = "2314620",
MRreviewer = "S. I. Gendler",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Harayama:2007:WSB,
author = "Tomohiro Harayama and Donald K. Friesen",
title = "{Weil} sum for birthday attack in multivariate
quadratic cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "1",
pages = "79--104",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T24 11T71)",
MRnumber = "2314621",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Silverman:2007:OPS,
author = "Robert D. Silverman",
title = "Optimal parameterization of {SNFS}",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "2",
pages = "105--124",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11Y05 (11Y16 65K10 68W15 68W40)",
MRnumber = "2345112",
MRreviewer = "Qi Cheng",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Walker:2007:PHF,
author = "Robert A. {Walker II} and Charles J. Colbourn",
title = "{Perfect Hash} families: constructions and existence",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "2",
pages = "125--150",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (05B15)",
MRnumber = "2345113",
MRreviewer = "Pascal Junod",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Engelbert:2007:SMT,
author = "D. Engelbert and R. Overbeck and A. Schmidt",
title = "A summary of {McEliece}-type cryptosystems and their
security",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "2",
pages = "151--199",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 68P25 94B05)",
MRnumber = "2345114",
MRreviewer = "Zlatko G. Varbanov",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Stinson:2007:EST,
author = "D. R. Stinson and J. Wu",
title = "An efficient and secure two-flow zero-knowledge
identification protocol",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "3",
pages = "201--220",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (94A62)",
MRnumber = "2372153",
MRreviewer = "Mario A. Forcinito",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Daemen:2007:PDC,
author = "Joan Daemen and Vincent Rijmen",
title = "Probability distributions of correlation and
differentials in block ciphers",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "3",
pages = "221--242",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "2372154",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gaudry:2007:FGA,
author = "P. Gaudry",
title = "Fast genus $2$ arithmetic based on theta functions",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "3",
pages = "243--265",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11T71 (14K25 94A60)",
MRnumber = "2372155",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Galbraith:2007:SPC,
author = "Steven D. Galbraith and Colm {{\'O} h{\'E}igeartaigh}
and Caroline Sheedy",
title = "Simplified pairing computation and security
implications",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "3",
pages = "267--281",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 14Q05)",
MRnumber = "2372156",
MRreviewer = "Vincent Rijmen",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Aly:2007:ELC,
author = "Hassan Aly and Wilfried Meidl and Arne Winterhof",
title = "On the $k$-error linear complexity of cyclotomic
sequences",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "3",
pages = "283--296",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2007.014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A55 (11T71)",
MRnumber = "2372157",
MRreviewer = "Nicolae S. Constantinescu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Heuberger:2007:MWC,
author = "Clemens Heuberger and James A. Muir",
title = "Minimal weight and colexicographically minimal integer
representations",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "297--328",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11A63 (68W40 94A60)",
MRnumber = "2441062",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blake:2007:SDC,
author = "Ian F. Blake and Igor E. Shparlinski",
title = "Statistical distribution and collisions of {VSH}",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "329--349",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11N69 (11T71 11Y16)",
MRnumber = "2441063",
MRreviewer = "Serge{\u\i} V. Konyagin",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Choi:2007:CHP,
author = "Su-Jeong Choi and Simon R. Blackburn and Peter R.
Wild",
title = "Cryptanalysis of a homomorphic public-key cryptosystem
over a finite group",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "351--358",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2441064",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Ruinskiy:2007:LBC,
author = "Dima Ruinskiy and Adi Shamir and Boaz Tsaban",
title = "Length-based cryptanalysis: the case of {Thompson}'s
group",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "359--372",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20F10)",
MRnumber = "2441065",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Aravamuthan:2007:ATO,
author = "Sarang Aravamuthan and Sachin Lodha",
title = "The average transmission overhead for broadcast
encryption",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "373--384",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68P25 (94A17)",
MRnumber = "2441066",
MRreviewer = "Yannis C. Stamatiou",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Koblitz:2007:ALA,
author = "Neal Koblitz",
title = "Another look at automated theorem-proving",
journal = j-J-MATH-CRYPTOL,
volume = "1",
number = "4",
pages = "385--403",
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2007.020",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68T15 (03B35 11T71 94A60)",
MRnumber = "2441067",
MRreviewer = "Guy Jumarie",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Morales:2008:ADE,
author = "David J. Mireles Morales",
title = "An attack on disguised elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "1",
pages = "1--8",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11G20 14H52)",
MRnumber = "2451656",
MRreviewer = "Horacio Tapia-Recillas",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Fuji-Hara:2008:TCM,
author = "Ryoh Fuji-Hara and Xiyang Li and Ying Miao and Dianhua
Wu",
title = "A {TWOOA} construction for multi-receiver
multi-message authentication codes",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "1",
pages = "9--28",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (05B15)",
MRnumber = "2451657",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Myasnikov:2008:RSA,
author = "Alexei G. Myasnikov and Alexander Ushakov",
title = "Random subgroups and analysis of the length-based and
quotient attacks",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "1",
pages = "29--61",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20F36 68W30)",
MRnumber = "2451658",
MRreviewer = "J{\"u}rgen M{\"u}ller",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Murphy:2008:GVC,
author = "S. Murphy and M. B. Paterson",
title = "A geometric view of cryptographic equation solving",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "1",
pages = "63--107",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68W30 (14N05 94A20 94A60)",
MRnumber = "2451659",
MRreviewer = "Jos{\'e} Ignacio Farr{\'a}n",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Longrigg:2008:CSC,
author = "Jonathan Longrigg and Alexander Ushakov",
title = "Cryptanalysis of the shifted conjugacy authentication
protocol",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "2",
pages = "109--116",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20F36 68W30)",
MRnumber = "2433247",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hinek:2008:SMP,
author = "M. Jason Hinek",
title = "On the security of multi-prime {RSA}",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "2",
pages = "117--147",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "2433248",
MRreviewer = "Abderrahmane Nitaj",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Nandi:2008:ISA,
author = "Mridul Nandi and Avradip Mandal",
title = "Improved security analysis of {PMAC}",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "2",
pages = "149--162",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "2433249",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Demirkiran:2008:CHC,
author = "Cevahir Demirkiran and Enric Nart",
title = "Counting hyperelliptic curves that admit a {Koblitz}
model",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "2",
pages = "163--179",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G15 (11G20 14H25 94A60)",
MRnumber = "2433250",
MRreviewer = "Yves Aubry",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Nguyen:2008:SAS,
author = "Phong Q. Nguyen and Thomas Vidick",
title = "Sieve algorithms for the shortest vector problem are
practical",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "2",
pages = "181--207",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11Y16 (11H06)",
MRnumber = "2433251",
MRreviewer = "Michael E. Pohst",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Fancsali:2008:SAF,
author = "Sz. L. Fancsali and P. Ligeti",
title = "Some applications of finite geometry for secure
network coding",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "3",
pages = "209--225",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (51E21)",
MRnumber = "2573352",
MRreviewer = "Giorgio Faina",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Avanzi:2008:RLG,
author = "R. Avanzi and N. Th{\'e}riault and Z. Wang",
title = "Rethinking low genus hyperelliptic {Jacobian}
arithmetic over binary fields: interplay of field
arithmetic and explicit formul{\ae}",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "3",
pages = "227--255",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (11G20 14H45 94A60)",
MRnumber = "2573353",
MRreviewer = "Michael J. Jacobson, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Basu:2008:CCE,
author = "Riddhipratim Basu and Shirshendu Ganguly and Subhamoy
Maitra and Goutam Paul",
title = "A complete characterization of the evolution of {RC4}
pseudo random generation algorithm",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "3",
pages = "257--289",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2573354",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Schindler:2008:ASM,
author = "Werner Schindler",
title = "Advanced stochastic methods in side channel analysis
on block ciphers in the presence of masking",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "3",
pages = "291--310",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (62H99)",
MRnumber = "2573355",
MRreviewer = "Francesco Sica",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Koblitz:2008:ALN,
author = "Neal Koblitz and Alfred Menezes",
title = "Another look at non-standard discrete log and
{Diffie--Hellman} problems",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "4",
pages = "311--326",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 14G50 68P25)",
MRnumber = "2549460",
MRreviewer = "Herv{\'e} P. J. Chabanne",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hartung:2008:ISB,
author = "Rupert J. Hartung and Claus-Peter Schnorr",
title = "Identification and signatures based on {NP}-hard
problems of indefinite quadratic forms",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "4",
pages = "327--341",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11E20 11H71 68Q17)",
MRnumber = "2549461",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Mie:2008:PTR,
author = "Thilo Mie",
title = "Polylogarithmic two-round argument systems",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "4",
pages = "343--363",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68Q15)",
MRnumber = "2549462",
MRreviewer = "Rog{\'e}rio V. Reis",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Frougny:2008:MWE,
author = "Christiane Frougny and Wolfgang Steiner",
title = "Minimal weight expansions in {Pisot} bases",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "4",
pages = "365--392",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11A63 (11B39 11R06 68Q45 94A60)",
MRnumber = "2549463",
MRreviewer = "Jamie Simpson",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Paterson:2008:TAS,
author = "M. B. Paterson and D. R. Stinson",
title = "Two attacks on a sensor network key distribution
scheme of {Cheng} and {Agrawal}",
journal = j-J-MATH-CRYPTOL,
volume = "2",
number = "4",
pages = "393--403",
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2008.018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68M10)",
MRnumber = "2549464",
MRreviewer = "Michael J. Jacobson, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Galbraith:2009:DMS,
author = "Steven D. Galbraith and Jordi Pujol{\`a}s and
Christophe Ritzenthaler and Benjamin Smith",
title = "Distortion maps for supersingular genus two curves",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "1",
pages = "1--18",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11G20 (11G15 11T71 14G50)",
MRnumber = "2524252",
MRreviewer = "Annegret Weng",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hitt:2009:FGC,
author = "Laura Hitt",
title = "Families of genus $2$ curves with small embedding
degree",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "1",
pages = "19--36",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11G20 11T71 14G50)",
MRnumber = "2524253",
MRreviewer = "Simon N. Litsyn",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blake:2009:ORS,
author = "Ian F. Blake and Vladimir Kolesnikov",
title = "One-round secure comparison of integers",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "1",
pages = "37--68",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2524254",
MRreviewer = "Maura Beth Paterson",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Neven:2009:HFR,
author = "Gregory Neven and Nigel P. Smart and Bogdan
Warinschi",
title = "Hash function requirements for {Schnorr} signatures",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "1",
pages = "69--87",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2524255",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Saxena:2009:CPB,
author = "Amitabh Saxena and Ben Soh",
title = "A cryptographic primitive based on hidden-order
groups",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "2",
pages = "89--132",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (68P25)",
MRnumber = "2590259",
MRreviewer = "Lu{\'{\i}}s Antunes",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Nandi:2009:ISA,
author = "Mridul Nandi",
title = "Improved security analysis for {OMAC} as a
pseudorandom function",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "2",
pages = "133--148",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2590260",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{vonzurGathen:2009:SSP,
author = "Joachim von zur Gathen and Igor E. Shparlinski",
title = "Subset sum pseudorandom numbers: fast generation and
distribution",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "2",
pages = "149--163",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11K45 (68P25 94A60)",
MRnumber = "2590261",
MRreviewer = "Samuel S. Wagstaff, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hinek:2009:ALS,
author = "M. Jason Hinek and Charles C. Y. Lam",
title = "Another look at some fast modular arithmetic methods",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "2",
pages = "165--174",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68W40 (94A60)",
MRnumber = "2590262",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/fparith.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gutierrez:2009:FSW,
author = "Jaime Gutierrez",
title = "Foreword: {Second Workshop on Mathematical
Cryptology}",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "175--176",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.008a",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94-06",
MRnumber = "2604684",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
note = "Held in Santander, October 23--25, 2008",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bettale:2009:HAS,
author = "Luk Bettale and Jean-Charles Faug{\`e}re and Ludovic
Perret",
title = "Hybrid approach for solving multivariate systems over
finite fields",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "177--197",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "13P15 (13P10 68W30 94A60)",
MRnumber = "2604685",
MRreviewer = "Jos{\'e} Ignacio Farr{\'a}n",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blackburn:2009:CCG,
author = "Simon R. Blackburn",
title = "Cryptanalysing the critical group: efficiently solving
{Biggs}'s discrete logarithm problem",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "199--203",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (05C50)",
MRnumber = "2604686",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bourgeois:2009:AAN,
author = "G{\'e}rald Bourgeois and Jean-Charles Faug{\`e}re",
title = "Algebraic attack on {NTRU} using {Witt} vectors and
{Gr{\"o}bner} bases",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "205--214",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 13F35 13P10)",
MRnumber = "2604687",
MRreviewer = "Nicolae S. Constantinescu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Brandstatter:2009:ELC,
author = "Nina Brandst{\"a}tter and Arne Winterhof",
title = "$k$-error linear complexity over {$ \mathbb {F_p}$} of
subsequences of {Sidelnikov} sequences of period $ (p^r
- 1) / 3$",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "215--225",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A55 (11T22 11T71)",
MRnumber = "2604688",
MRreviewer = "Wensong Chu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Fischer:2009:SRF,
author = "Simon Fischer and Willi Meier and Dirk Stegemann",
title = "Some remarks on {FCSRs} and implications for stream
ciphers",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "227--236",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A55 (11B37 11T71)",
MRnumber = "2604689",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gaal:2009:SNE,
author = "Istv{\'a}n Ga{\'a}l and Michael E. Pohst",
title = "On solving norm equations in global function fields",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "237--248",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11D57 (11T71 11Y50 94A60)",
MRnumber = "2604690",
MRreviewer = "Volker Ziegler",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Lamberger:2009:NSC,
author = "Mario Lamberger and Tomislav Nad and Vincent Rijmen",
title = "Numerical solvers and cryptanalysis",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "249--263",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 65H99)",
MRnumber = "2604691",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Friedlander:2009:DSS,
author = "John B. Friedlander and Igor E. Shparlinski",
title = "On the density of some special primes",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "3",
pages = "265--271",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11K45 (11N05)",
MRnumber = "2604692",
MRreviewer = "R. C. Baker",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cusick:2009:CBS,
author = "Thomas W. Cusick and Yuan Li and Pantelimon
St{\u{a}}nic{\u{a}}",
title = "On a conjecture for balanced symmetric {Boolean}
functions",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "273--290",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "06E30 (05A10 11B65 11T06 94C10)",
MRnumber = "2608596",
MRreviewer = "Jeffrey O. Shallit",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Colbourn:2009:RCP,
author = "Charles J. Colbourn and Alan C. H. Ling",
title = "A recursive construction for perfect hash families",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "291--306",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (05B15 68P25)",
MRnumber = "2608597",
MRreviewer = "Siaw-Lynn Ng",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bockle:2009:MRT,
author = "Gebhard B{\"o}ckle",
title = "The {Miller--Rabin} test with randomized exponents",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "307--319",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11Y11 (94A60)",
MRnumber = "2608598",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blackburn:2009:CPK,
author = "Simon R. Blackburn and Carlos Cid and Ciaran Mullan",
title = "Cryptanalysis of the {$ {\rm MST}_3 $} public key
cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "321--338",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.020",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20D99 68P25)",
MRnumber = "2608599",
MRreviewer = "Luis Hern{\'a}ndez Encinas",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Wu:2009:EIP,
author = "J. Wu and D. R. Stinson",
title = "An efficient identification protocol secure against
concurrent-reset attacks",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "339--352",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.021",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2608600",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Farashahi:2009:HEC,
author = "Reza R. Farashahi and Igor E. Shparlinski and Jos{\'e}
Felipe Voloch",
title = "On hashing into elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "3",
number = "4",
pages = "353--360",
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2009.022",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11G20 (11T71 14G50)",
MRnumber = "2608601",
MRreviewer = "David Y. Jao",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Karabina:2010:FCC,
author = "Koray Karabina",
title = "Factor-$4$ and $6$ compression of cyclotomic subgroups
of {$ \mathbb {F^*_{2^{4m}}} $} and {$ \mathbb
{F^*_{3^{6m}}} $}",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "1",
pages = "1--42",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2660332",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Shokrieh:2010:MPD,
author = "Farbod Shokrieh",
title = "The monodromy pairing and discrete logarithm on the
{Jacobian} of finite graphs",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "1",
pages = "43--56",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "05C50 (14H40 94A60)",
MRnumber = "2660333",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hinek:2010:CMA,
author = "M. Jason Hinek and Charles C. Y. Lam",
title = "Common modulus attacks on small private exponent {RSA}
and some fast variants (in practice)",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "1",
pages = "57--93",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "2660334",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Marti-Farre:2010:SSS,
author = "Jaume Mart{\'{\i}}-Farr{\'e} and Carles Padr{\'o}",
title = "On secret sharing schemes, matroids and polymatroids",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "2",
pages = "95--120",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (05B35 62B10)",
MRnumber = "2729351",
MRreviewer = "Franti{\v{s}}ek Mat{\'u}{\v{s}}",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Alomair:2010:PPS,
author = "Basel Alomair and Andrew Clark and Radha Poovendran",
title = "The power of primes: security of authentication based
on a universal hash-function family",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "2",
pages = "121--148",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (94A62)",
MRnumber = "2729352",
MRreviewer = "Czes{\l}aw Ko{\'s}cielny",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Mosina:2010:MSA,
author = "Natalia Mosina and Alexander Ushakov",
title = "Mean-set attack: cryptanalysis of {Sibert et al.}
authentication protocol",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "2",
pages = "149--174",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20F36 60B15 68W30)",
MRnumber = "2729353",
MRreviewer = "Adrian C. Atanasiu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Karabina:2010:AEW,
author = "Koray Karabina and Alfred Menezes and Carl Pomerance
and Igor E. Shparlinski",
title = "On the asymptotic effectiveness of {Weil} descent
attacks",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "2",
pages = "175--191",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "2729354",
MRreviewer = "Neal Koblitz",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blackburn:2010:DLP,
author = "Simon R. Blackburn",
title = "The discrete logarithm problem modulo one:
cryptanalysing the {Ariffin--Abu} cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "2",
pages = "193--198",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "2729355",
MRreviewer = "Sebasti{\`a} Mart{\'{\i}}n Mollev{\'{\i}}",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hakuta:2010:EAS,
author = "Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi
Takagi",
title = "Efficient arithmetic on subfield elliptic curves over
small finite fields of odd characteristic",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "3",
pages = "199--238",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68P25 (11T71)",
MRnumber = "2746413",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kortelainen:2010:MAG,
author = "Juha Kortelainen and Kimmo Halunen and Tuomas
Kortelainen",
title = "Multicollision attacks and generalized iterated hash
functions",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "3",
pages = "239--270",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "2746414",
MRreviewer = "Simon R. Blackburn",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Svaba:2010:PKC,
author = "Pavol Svaba and Tran van Trung",
title = "Public key cryptosystem {$ \rm M S T_3 $}:
cryptanalysis and realization",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "3",
pages = "271--315",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2010.011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2746415",
MRreviewer = "Reginaldo Palazzo, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Tischhauser:2011:NCA,
author = "Elmar Tischhauser",
title = "Nonsmooth cryptanalysis, with an application to the
stream cipher {MICKEY}",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "4",
pages = "317--348",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (90C09 90C56 90C90)",
MRnumber = "2787334",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Singh:2011:PDE,
author = "Rajesh P. Singh and A. Saikia and B. K. Sarma",
title = "Poly-dragon: an efficient multivariate public key
cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "4",
pages = "349--364",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T06 11T71)",
MRnumber = "2787335",
MRreviewer = "Francesco Sica",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Mullan:2011:CVS,
author = "Ciaran Mullan",
title = "Cryptanalysing variants of {Stickel}'s key agreement
scheme",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "4",
pages = "365--373",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2787336",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Wolf:2011:EKU,
author = "Christopher Wolf and Bart Preneel",
title = "Equivalent keys in {$ \mathscr {M} $ultivariate} {$
\mathscr {Q} $uadratic} public key systems",
journal = j-J-MATH-CRYPTOL,
volume = "4",
number = "4",
pages = "375--415",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2011.004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (11T71 14G15 94A60)",
MRnumber = "2787337",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hisil:2011:EAG,
author = "Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter
and Ed Dawson",
title = "An exploration of affine group laws for elliptic
curves",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "1",
pages = "1--50",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14H52 (14G50 68P25 94A60)",
MRnumber = "2804942",
MRreviewer = "A. Peth{\H{o}}",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Duquesne:2011:RAA,
author = "Sylvain Duquesne",
title = "{RNS} arithmetic in {$ \mathbb {F_{p^k}} $} and
application to fast pairing computation",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "1",
pages = "51--88",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11T55 (11T71 14G50 94A60)",
MRnumber = "2804943",
MRreviewer = "Pantelimon St{\u{a}}nic{\u{a}}",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Ciet:2011:CEC,
author = "Mathieu Ciet and Jean-Jacques Quisquater and Francesco
Sica",
title = "Compact elliptic curve representations",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "1",
pages = "89--100",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G15 (11G20 14G50 14H52 94A60)",
MRnumber = "2804944",
MRreviewer = "Michael J. Jacobson, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bisson:2011:CER,
author = "Gaetan Bisson",
title = "Computing endomorphism rings of elliptic curves under
the {GRH}",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "2",
pages = "101--113",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11Y40 (11G20 14G50 94A60)",
MRnumber = "2838371",
MRreviewer = "Michael J. Jacobson, Jr.",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Attrapadung:2011:FEP,
author = "Nuttapong Attrapadung and Beno{\^{\i}}t Libert",
title = "Functional encryption for public-attribute inner
products: achieving constant-size ciphertexts with
adaptive security or support for negation",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "2",
pages = "115--158",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2838372",
MRreviewer = "Luis Hern{\'a}ndez Encinas",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Blackburn:2011:CTM,
author = "Simon R. Blackburn and Carlos Cid and Ciaran Mullan",
title = "Cryptanalysis of three matrix-based key establishment
protocols",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "2",
pages = "159--168",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2838373",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Fischlin:2011:SBS,
author = "Marc Fischlin and Dominique Schr{\"o}der",
title = "Security of blind signatures under aborts and
applications to adaptive oblivious transfer",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "2",
pages = "169--203",
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1515/JMC.2011.011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (94A60)",
MRnumber = "2838374",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Koblitz:2012:ALA,
author = "Neal Koblitz",
title = "Another look at automated theorem-proving {II}",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "3--4",
pages = "205--224",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (03B35 11T71 68T15)",
MRnumber = "2876200",
MRreviewer = "Julio Rubio",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Moody:2012:FEC,
author = "Dustin Moody and Hongfeng Wu",
title = "Families of elliptic curves with rational
$3$-torsion",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "3--4",
pages = "225--246",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11G20 (14G50 14H52 14K02)",
MRnumber = "2876201",
MRreviewer = "Steven D. Galbraith",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bouillaguet:2012:FWK,
author = "Charles Bouillaguet and Pierre-Alain Fouque and
Antoine Joux and Joana Treger",
title = "A family of weak keys in {HFE} and the corresponding
practical key-recovery",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "3--4",
pages = "247--275",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc.2011.012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (12Y05)",
MRnumber = "2876202",
MRreviewer = "Koray Karabina",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chee:2012:BCE,
author = "Yeow Meng Chee and Huaxiong Wang and Liang Feng
Zhang",
title = "On the {Bringer--Chabanne} {EPIR} protocol for
polynomial evaluation",
journal = j-J-MATH-CRYPTOL,
volume = "5",
number = "3--4",
pages = "277--301",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68M12)",
MRnumber = "2876203",
MRreviewer = "Qiong Huang",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gallant:2012:FDL,
author = "Robert P. Gallant",
title = "Finding discrete logarithms with a set orbit
distinguisher",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "1",
pages = "1--20",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11T71 (11Y16 94B65)",
MRnumber = "2929692",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Baumeister:2012:ALS,
author = "Barbara Baumeister and Jan-Hendrik de Wiljes",
title = "Aperiodic logarithmic signatures",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "1",
pages = "21--37",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "2929693",
MRreviewer = "Simon R. Blackburn",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Wei:2012:FMP,
author = "Tzer-jen Wei and Lih-Chung Wang",
title = "A fast mental poker protocol",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "1",
pages = "39--68",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68M12)",
MRnumber = "2929694",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Maze:2012:AKD,
author = "G{\'e}rard Maze",
title = "Analysis of a key distribution scheme in secure
multicasting",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "1",
pages = "69--80",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T55 68P30)",
MRnumber = "2929695",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Boxall:2012:HPF,
author = "John Boxall",
title = "Heuristics on pairing-friendly elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "2",
pages = "81--104",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11N56 (11N25 14G15 14H52 94A60)",
MRnumber = "2988897",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0004/jmc-2011-0004.xml?format=INT",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Brown:2012:RWS,
author = "Alyssa Brown and Thomas W. Cusick",
title = "Recursive weights for some {Boolean} functions",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "2",
pages = "105--135",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0020",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94C10 (94A60)",
MRnumber = "2988898",
MRreviewer = "Pantelimon St{\u{a}}nic{\u{a}}",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0020/jmc-2011-0020.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Murphy:2012:ELH,
author = "Sean Murphy",
title = "The effectiveness of the linear hull effect",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "2",
pages = "137--147",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0025",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2988899",
MRreviewer = "Xiubin Fan",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0025/jmc-2011-0025.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Persichetti:2012:CMK,
author = "Edoardo Persichetti",
title = "Compact {McEliece} keys based on quasi-dyadic
{Srivastava} codes",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "2",
pages = "149--169",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0099",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "2988900",
MRreviewer = "San Ling",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0099/jmc-2011-0099.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Banin:2012:DLP,
author = "Matan Banin and Boaz Tsaban",
title = "The discrete logarithm problem in {Bergman}'s
non-representable ring",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "2",
pages = "171--182",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "2988901",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2012-0014/jmc-2012-0014.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Sepahi:2012:NSN,
author = "Reza Sepahi and Josef Pieprzyk and Siamak F.
Shahandashti and Berry Schoenmakers",
title = "New security notions and relations for public-key
encryption",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "3--4",
pages = "183--227",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2010-0099",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3004097",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Mouha:2012:CIR,
author = "Nicky Mouha and Gautham Sekar and Bart Preneel",
title = "Challenging the increased resistance of regular hash
functions against birthday attacks",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "3--4",
pages = "229--248",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2011-0010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3004098",
MRreviewer = "Rhouma Rhouma",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-3-4/jmc-2011-0010/jmc-2011-0010.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Okano:2012:VCF,
author = "Keiji Okano",
title = "On the {$ \rho $}-values of complete families of
pairing-friendly elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "6",
number = "3--4",
pages = "249--268",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 14G50)",
MRnumber = "3004099",
MRreviewer = "Steven Joel Miller",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2012.6.issue-3-4/jmc-2012-0011/jmc-2012-0011.xml?format=INT",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Tassa:2013:OEM,
author = "Tamir Tassa and Ayman Jarrous and Yonatan
Ben-Ya'akov",
title = "Oblivious evaluation of multivariate polynomials",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "1",
pages = "1--29",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25)",
MRnumber = "3101013",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Galbraith:2013:SPH,
author = "Steven D. Galbraith and Chang-An Zhao",
title = "Self-pairings on hyperelliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "1",
pages = "31--42",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (11T71 14H45 94A60)",
MRnumber = "3101014",
MRreviewer = "Horacio Tapia-Recillas",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
note = "See erratum \cite{Galbraith:2014:ESP}.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Flori:2013:ECF,
author = "Jean-Pierre Flori and Sihem Mesnager",
title = "An efficient characterization of a family of
hyper-bent functions with multiple trace terms",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "1",
pages = "43--68",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94C10 (11T71 14G50)",
MRnumber = "3101015",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Wang:2013:MCN,
author = "Tianze Wang and Dongdai Lin",
title = "A method for counting the number of polynomial
equivalence classes",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "1",
pages = "69--95",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T06 11T71 68P25)",
MRnumber = "3101016",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Field:2013:UCT,
author = "Rebecca E. Field and Brant C. Jones",
title = "Using carry-truncated addition to analyze
add-rotate-xor hash algorithms",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "2",
pages = "97--110",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25 68R05)",
MRnumber = "3101017",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chen:2013:SCM,
author = "Yanling Chen and Danilo Gligoroski and Svein J.
Knapskog",
title = "On a special class of multivariate quadratic
quasigroups ({MQQs})",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "2",
pages = "111--141",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "20N05 (94A60 94D05)",
MRnumber = "3101018",
MRreviewer = "Tuval S. Foguel",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gharahi:2013:PSS,
author = "Motahhareh Gharahi and Massoud Hadian Dehkordi",
title = "Perfect secret sharing schemes for graph access
structures on six participants",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "2",
pages = "143--146",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0026",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62",
MRnumber = "3101019",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Staszewski:2013:SAL,
author = "Reiner Staszewski and Tran van Trung",
title = "Strongly aperiodic logarithmic signatures",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "2",
pages = "147--179",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5000",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3101020",
MRreviewer = "Koji Nuida",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2013.7.issue-2/jmc-2013-5000/jmc-2013-5000.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2013:M,
author = "Anonymous",
title = "Masthead",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "i--i",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-masthead3",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2013.7.issue-3/jmc-2013-masthead3/jmc-2013-masthead3.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Magliveras:2013:F,
author = "Spyros S. Magliveras",
title = "Foreword",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "181--182",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2013.7.issue-3/jmc-2013-5001/jmc-2013-5001.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Paterson:2013:CTF,
author = "Maura B. Paterson and Douglas R. Stinson and Jalaj
Upadhyay",
title = "A coding theory foundation for the analysis of general
unconditionally secure proof-of-retrievability schemes
for cloud storage",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "183--216",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3107360",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Grosek:2013:CS,
author = "Otokar Gro{\v{s}}ek and {\v{S}}tefan Porubsk{\'y}",
title = "Coprime solutions to {$ a x \equiv b \pmod n $}",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "217--224",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11A07 (11D04 11D45 94A60)",
MRnumber = "3107361",
MRreviewer = "Gabriel Mincu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Koblitz:2013:ALH,
author = "Neal Koblitz and Alfred Menezes",
title = "Another look at {HMAC}",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "225--251",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "3107362",
MRreviewer = "Li-Ting Zhang",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{AlMashrafi:2013:IMI,
author = "Mufeed {Al Mashrafi} and Harry Bartlett and Ed Dawson
and Leonie Simpson and Kenneth Koon-Ho Wong",
title = "Indirect message injection for {MAC} generation",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "3",
pages = "253--277",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (94A60)",
MRnumber = "3107363",
MRreviewer = "Li-Ting Zhang",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Jhanwar:2013:USI,
author = "Mahabir P. Jhanwar and Reihaneh Safavi-Naini",
title = "Unconditionally-secure ideal robust secret sharing
schemes for threshold and multilevel access structure",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "4",
pages = "279--296",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (94A60)",
MRnumber = "3139305",
MRreviewer = "Constantin Popescu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kurosawa:2013:NLR,
author = "Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong",
title = "New leakage-resilient {CCA}-secure public key
encryption",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "4",
pages = "297--312",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5007",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3139306",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Orumiehchiha:2013:SAL,
author = "Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron
Steinfeld and Harry Bartlett",
title = "Security analysis of linearly filtered {NLFSRs}",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "4",
pages = "313--332",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3139307",
MRreviewer = "Takeshi Koshiba",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{vonzurGathen:2013:GSP,
author = "Joachim von zur Gathen and Igor E. Shparlinski",
title = "Generating safe primes",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "4",
pages = "333--365",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5011",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "3139308",
MRreviewer = "Volker Ziegler",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Zajac:2013:NMS,
author = "Pavol Zajac",
title = "A new method to solve {MRHS} equation systems and its
connection to group factorization",
journal = j-J-MATH-CRYPTOL,
volume = "7",
number = "4",
pages = "367--381",
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 14G50)",
MRnumber = "3139309",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Childs:2014:CEC,
author = "Andrew Childs and David Jao and Vladimir Soukharev",
title = "Constructing elliptic curve isogenies in quantum
subexponential time",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "1",
pages = "1--29",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "81P94 (11Y40)",
MRnumber = "3163097",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Jiang:2014:PAP,
author = "Shaoquan Jiang",
title = "Persistent asymmetric password-based key exchange",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "1",
pages = "31--70",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3163098",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bos:2014:CBA,
author = "Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev",
title = "Collision bounds for the additive {Pollard} rho
algorithm for solving discrete logarithms",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "1",
pages = "71--92",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0032",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "05C81 (11T71 20K01 94A60)",
MRnumber = "3163099",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Galbraith:2014:ESP,
author = "Steven D. Galbraith and Chang-An Zhao",
title = "Erratum: {Self-pairings on hyperelliptic curves [J.
Math.\ Cryptol.\ {\bf 7} (2013), 31--42] [MR3101014]}",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "1",
pages = "93--93",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-5010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (11T71 94A60)",
MRnumber = "3163100",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
note = "See \cite{Galbraith:2013:SPH}.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Myasnikov:2014:CMC,
author = "Alex D. Myasnikov and Alexander Ushakov",
title = "Cryptanalysis of matrix conjugation schemes",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "2",
pages = "95--114",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0033",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68M12)",
MRnumber = "3213577",
MRreviewer = "Anand D. Sarwate",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Justus:2014:DQR,
author = "Benjamin Justus",
title = "The distribution of quadratic residues and
non-residues in the {Goldwasser--Micali} type of
cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "2",
pages = "115--140",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0001",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11A15 (94A60)",
MRnumber = "3213578",
MRreviewer = "Luis Hern{\'a}ndez Encinas",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dibert:2014:ISS,
author = "Alexander Dibert and L{\'a}szl{\'o} Csirmaz",
title = "Infinite secret sharing --- examples",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "2",
pages = "141--168",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0005",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (62B10)",
MRnumber = "3213579",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Omar:2014:FHF,
author = "Sami Omar and Houssem Sabri",
title = "Fast hash functions and convolution product",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "2",
pages = "169--187",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "3213580",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Stinson:2014:EDS,
author = "Douglas R. Stinson and Jalaj Upadhyay",
title = "Is extracting data the same as possessing data?",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "2",
pages = "189--207",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0034",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P20 68P25)",
MRnumber = "3213581",
MRreviewer = "Anand D. Sarwate",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{DeFeo:2014:TQR,
author = "Luca {De Feo} and David Jao and J{\'e}r{\^o}me
Pl{\^u}t",
title = "Towards quantum-resistant cryptosystems from
supersingular elliptic curve isogenies",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "3",
pages = "209--247",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "81P94",
MRnumber = "3259113",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Carlet:2014:LSO,
author = "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
and Houssem Maghrebi",
title = "Leakage squeezing: optimal implementation and security
evaluation",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "3",
pages = "249--295",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2012-0018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3259114",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Haridas:2014:SAM,
author = "Deepthi Haridas and Sarma Venkataraman and Geeta
Varadan",
title = "Security analysis of modified {Rivest} scheme",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "3",
pages = "297--303",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3259115",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Yasuda:2014:EDR,
author = "Masaya Yasuda and Kazuhiro Yokoyama and Takeshi
Shimoyama and Jun Kogure and Takeshi Koshiba",
title = "On the exact decryption range for {Gentry--Halevi}'s
implementation of fully homomorphic encryption",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "3",
pages = "305--329",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0024",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3259116",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Duquesne:2014:ECP,
author = "Sylvain Duquesne and Nadia {El Mrabet} and Emmanuel
Fouotsa",
title = "Efficient computation of pairings on {Jacobi} quartic
elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "4",
pages = "331--362",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0033",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14H52 (11G20 94A60)",
MRnumber = "3281661",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Asghar:2014:SCG,
author = "Hassan Jameel Asghar and Yvo Desmedt and Josef
Pieprzyk and Ron Steinfeld",
title = "A subexponential construction of graph coloring for
multiparty computation",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "4",
pages = "363--403",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0035",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (05C10 05C15 05C25)",
MRnumber = "3281662",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Childs:2014:QCD,
author = "Andrew M. Childs and G{\'a}bor Ivanyos",
title = "Quantum computation of discrete logarithms in
semigroups",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "4",
pages = "405--416",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0038",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "81P68 (68Q12 68Q17 68W30 94A60)",
MRnumber = "3281663",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Sha:2014:NIC,
author = "Min Sha",
title = "On the non-idealness of cyclotomic families of
pairing-friendly elliptic curves",
journal = j-J-MATH-CRYPTOL,
volume = "8",
number = "4",
pages = "417--440",
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0042",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "11T71 (11T22 14H52)",
MRnumber = "3281664",
MRreviewer = "Cunsheng Ding",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Yoon:2015:NMC,
author = "Kisoon Yoon",
title = "A new method of choosing primitive elements for
{Brezing--Weng} families of pairing-friendly elliptic
curves",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "1",
pages = "1--9",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11G20 11T71 14H52)",
MRnumber = "3318543",
MRreviewer = "Juan Tena",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Alam:2015:CWD,
author = "Bilal Alam and Ferruh {\"O}zbudak and O{\u{g}}uz
Yayla",
title = "Classes of weak {Dembowski--Ostrom} polynomials for
multivariate quadratic cryptosystems",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "1",
pages = "11--22",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (14G50)",
MRnumber = "3318544",
MRreviewer = "J{\'a}nos Foll{\'a}th",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Sparr:2015:RFK,
author = "R{\"u}diger Sparr and Ralph Wernsdorf",
title = "The round functions of {KASUMI} generate the
alternating group",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "1",
pages = "23--32",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0028",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (20B35)",
MRnumber = "3318545",
MRreviewer = "Sugata Gangopadhyay",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Garber:2015:LBA,
author = "David Garber and Delaram Kahrobaei and Ha T. Lam",
title = "Length-based attacks in polycyclic groups",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "1",
pages = "33--43",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3318546",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cusick:2015:TRS,
author = "Thomas W. Cusick and Younhwan Cheon",
title = "Theory of $3$-rotation symmetric cubic {Boolean}
functions",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "1",
pages = "45--62",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94C10 (06E30 94A15)",
MRnumber = "3318547",
MRreviewer = "Yuan Li",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chen:2015:SSK,
author = "Jiageng Chen and Keita Emura and Atsuko Miyaji",
title = "{SKENO}: {Secret} key encryption with non-interactive
opening",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "2",
pages = "63--74",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3353605",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Tsaban:2015:CMS,
author = "Boaz Tsaban and Noam Lifshitz",
title = "Cryptanalysis of the {MORE} symmetric key fully
homomorphic encryption scheme",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "2",
pages = "75--78",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3353606",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dolev:2015:TEP,
author = "Shlomi Dolev and Juan Garay and Niv Gilboa and
Vladimir Kolesnikov and Yelena Yuditsky",
title = "Towards efficient private distributed computation on
unbounded input streams",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "2",
pages = "79--94",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0039",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68M14 94A62)",
MRnumber = "3353607",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Laine:2015:TMT,
author = "Kim Laine and Kristin Lauter",
title = "Time-memory trade-offs for index calculus in genus
$3$",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "2",
pages = "95--114",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0033",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 11Y16)",
MRnumber = "3353608",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Justus:2015:DQR,
author = "Benjamin Justus",
title = "The distribution of quadratic residues and
non-residues in the {Goldwasser--Micali} type of
cryptosystem. {II}",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "2",
pages = "115--137",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11N64 60G50)",
MRnumber = "3353609",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Luykx:2015:TPB,
author = "Atul Luykx and Bart Mennink and Bart Preneel and Laura
Winnen",
title = "Two-permutation-based hashing with binary mixing",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "3",
pages = "139--150",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3403496",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Accardi:2015:CSA,
author = "Luigi Accardi and Massimo Regoli",
title = "On a class of strongly asymmetric {PKA} algorithms",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "3",
pages = "151--159",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3403497",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kotov:2015:ACP,
author = "Matvei Kotov and Alexander Ushakov",
title = "Analysis of a certain polycyclic-group-based
cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "3",
pages = "161--167",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68W30)",
MRnumber = "3403498",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Albrecht:2015:CHL,
author = "Martin R. Albrecht and Rachel Player and Sam Scott",
title = "On the concrete hardness of learning with errors",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "3",
pages = "169--203",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "3403499",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dowden:2015:SMT,
author = "Chris Dowden",
title = "Secure message transmission in the presence of a fully
generalised adversary",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "4",
pages = "205--214",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2013-0046",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (68P30)",
MRnumber = "3430924",
MRreviewer = "Miaomiao Tian",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Paterson:2015:OCI,
author = "Maura B. Paterson and Douglas R. Stinson",
title = "Optimal constructions for {ID}-based one-way-function
key predistribution schemes realizing specified
communication graphs",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "4",
pages = "215--225",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0031",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3430925",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hameed:2015:CIW,
author = "Ali Hameed and Arkadii Slinko",
title = "A characterisation of ideal weighted secret sharing
schemes",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "4",
pages = "227--244",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A62 (91A12 91A80)",
MRnumber = "3430926",
MRreviewer = "Edgar Mart{\'{\i}}nez-Moro",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Henry:2015:LAR,
author = "Kevin J. Henry and Douglas R. Stinson",
title = "Linear approaches to resilient aggregation in sensor
networks",
journal = j-J-MATH-CRYPTOL,
volume = "9",
number = "4",
pages = "245--272",
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0042",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (94A12)",
MRnumber = "3430927",
MRreviewer = "Jiankun Hu",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Carlet:2016:CPM,
author = "Claude Carlet and David Joyner and Pantelimon
St{\u{a}}nic{\u{a}} and Deng Tang",
title = "Cryptographic properties of monotone {Boolean}
functions",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "1",
pages = "1--14",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0030",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (94A60)",
MRnumber = "3483645",
MRreviewer = "Victor Gayoso Mart{\'{\i}}nez",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bianco:2016:CTZ,
author = "Giulia Bianco and Elisa Gorla",
title = "Compression for trace zero points on twisted {Edwards}
curves",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "1",
pages = "15--34",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0039",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "14G50 (94A60)",
MRnumber = "3483645",
MRreviewer = "Victor Gayoso Mart{\'{\i}}nez",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Swanson:2016:USS,
author = "Colleen M. Swanson and Douglas R. Stinson",
title = "Unconditionally secure signature schemes revisited",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "1",
pages = "35--67",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3483646",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Samajder:2016:ALN,
author = "Subhabrata Samajder and Palash Sarkar",
title = "Another look at normal approximations in
cryptanalysis",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "2",
pages = "69--99",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 62P99 68P25)",
MRnumber = "3507958",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Moody:2016:ISF,
author = "Dustin Moody and Souradyuti Paul and Daniel
Smith-Tone",
title = "Indifferentiability security of the fast wide pipe
hash: breaking the birthday barrier",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "2",
pages = "101--133",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0044",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3507959",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Poulakis:2016:NLA,
author = "Dimitrios Poulakis",
title = "New lattice attacks on {DSA} schemes",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "2",
pages = "135--144",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2014-0027",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 11Y16)",
MRnumber = "3507960",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cusick:2016:AEM,
author = "Thomas W. Cusick and K. V. Lakshmy and M.
Sethumadhavan",
title = "Affine equivalence of monomial rotation symmetric
{Boolean} functions: a {P{\'o}lya}'s theorem approach",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "3--4",
pages = "145--156",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0042",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94C10 (05A05 05A15 06E30 94A60)",
MRnumber = "3574918",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Jha:2016:RSG,
author = "Ashwin Jha and Mridul Nandi",
title = "Revisiting structure graphs: applications to
{CBC--MAC} and {EMAC}",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "3--4",
pages = "157--180",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0030",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68Q87 68R05 68R10)",
MRnumber = "3574919",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Nandi:2016:SJS,
author = "Mridul Nandi and Tapas Pandit",
title = "On the security of joint signature and encryption
revisited",
journal = j-J-MATH-CRYPTOL,
volume = "10",
number = "3--4",
pages = "181--221",
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0060",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (94A62)",
MRnumber = "3574920",
bibdate = "Fri Mar 17 08:36:49 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Yasuda:2017:ADS,
author = "Masaya Yasuda and Kazuhiro Yokoyama and Takeshi
Shimoyama and Jun Kogure and Takeshi Koshiba",
title = "Analysis of decreasing squared-sum of {Gram--Schmidt}
lengths for short lattice vectors",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "1",
pages = "1--24",
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68R01 (06B99) 65F20 (68R01 94A60)",
MRnumber = "3619138",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dehkordi:2017:CCG,
author = "Massoud Hadian Dehkordi and Ali Safi",
title = "The complexity of the connected graph access structure
on seven participants",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "1",
pages = "25--35",
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68R10 (94A62) 94A62 (68R10)",
MRnumber = "3619139",
MRreviewer = "Prakash Veeraraghavan",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Popov:2017:DTP,
author = "Serguei Popov",
title = "On a decentralized trustless pseudo-random number
generation algorithm",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "1",
pages = "37--43",
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0019",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "68W15 (65C05 65C10 90B18 94A62)",
MRnumber = "3619140",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Antal:2017:MCP,
author = "Eugen Antal and Otokar Gro{\v{s}}ek and Peter Horak",
title = "On a mnemonic construction of permutations",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "1",
pages = "45--53",
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0058",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "05C99 94A60 (05A05)",
MRnumber = "3619141",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2017:F,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "2",
pages = "i--iv",
month = jun,
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2017-frontmatter2",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Thu Jun 22 10:34:34 MDT 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2017-frontmatter2/jmc-2017-frontmatter2.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dehkordi:2017:MDZ,
author = "Massoud Hadian Dehkordi and Roghayeh Taghizadeh",
title = "Multiple differential-zero correlation linear
cryptanalysis of reduced-round {CAST-256}",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "2",
pages = "55--62",
month = jun,
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0054",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3657931",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0054/jmc-2016-0054.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Saraswat:2017:SAP,
author = "Vishal Saraswat and Rajeev Anand Sahu and Amit K.
Awasthi",
title = "A secure anonymous proxy signcryption scheme",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "2",
pages = "63--84",
month = jun,
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2015-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68P25 94A62)",
MRnumber = "3657932",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2015-0014/jmc-2015-0014.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Gupta:2017:ADT,
author = "Kishan Chand Gupta and Sumit Kumar Pandey and Indranil
Ghosh Ray",
title = "Applications of design theory for the constructions of
{MDS} matrices for lightweight cryptography",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "2",
pages = "85--116",
month = jun,
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94B05 (68R05 94B99)",
MRnumber = "3657933",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0013/jmc-2016-0013.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Lu:2017:CRV,
author = "Yao Lu and Liqiang Peng and Santanu Sarkar",
title = "Cryptanalysis of an {RSA} variant with moduli {$ N =
p^r q^l $}",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "2",
pages = "117--130",
month = jun,
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0025",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3657934",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0025/jmc-2016-0025.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Scholl:2017:IEC,
author = "Travis Scholl",
title = "Isolated elliptic curves and the {MOV} attack",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "3",
pages = "131--146",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0053",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11G20 14H52 14K02)",
MRnumber = "3717104",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Samajder:2017:RUB,
author = "Subhabrata Samajder and Palash Sarkar",
title = "Rigorous upper bounds on data complexities of block
cipher cryptanalysis",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "3",
pages = "147--175",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0026",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71 62P99 68P25)",
MRnumber = "3717105",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Asghar:2017:WIP,
author = "Hassan Jameel Asghar and Mohamed Ali Kaafar",
title = "When are identification protocols with sparse
challenges safe? {The} case of the {Coskun} and
{Herley} attack",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "3",
pages = "177--194",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2015-0059",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (62B10 94A62)",
MRnumber = "3717106",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Mohammed:2017:RNF,
author = "Ahmed Mohammed and Abdulrahman Alkhelaifi",
title = "{RSA}: {A} number of formulas to improve the search
for {$ p + q $}",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "4",
pages = "195--203",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0046",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60",
MRnumber = "3731375",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Reichl:2017:TLS,
author = "Dominik Reichl",
title = "Tame logarithmic signatures of abelian groups",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "4",
pages = "205--214",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0065",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (68R01)",
MRnumber = "3731376",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Alawatugoda:2017:LRK,
author = "Janaka Alawatugoda",
title = "On the leakage-resilient key exchange",
journal = j-J-MATH-CRYPTOL,
volume = "11",
number = "4",
pages = "215--269",
year = "2017",
DOI = "https://doi.org/10.1515/jmc-2016-0003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
MRclass = "94A60 (11T71)",
MRnumber = "3731377",
bibdate = "Sat Jan 13 12:10:46 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2018:Fa,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "i--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2018-frontmatter1/jmc-2018-frontmatter1.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Partala:2018:AGD,
author = "Juha Partala",
title = "Algebraic generalization of {Diffie--Hellman} key
exchange",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "1--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2017-0015/jmc-2017-0015.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{vanTrung:2018:CSA,
author = "Tran van Trung",
title = "Construction of strongly aperiodic logarithmic
signatures",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "23--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2017-0048/jmc-2017-0048.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{AlMahri:2018:FFA,
author = "Hassan Qahur {Al Mahri} and Leonie Simpson and Harry
Bartlett and Ed Dawson and Kenneth Koon-Ho Wong",
title = "A fundamental flaw in the {++AE} authenticated
encryption mode",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "37--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2016-0037/jmc-2016-0037.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dey:2018:GRB,
author = "Sabyasachi Dey and Santanu Sarkar",
title = "Generalization of {Roos} bias in {RC4} and some
results on key--keystream relations",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "43--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2016-0061/jmc-2016-0061.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Laing:2018:SRR,
author = "Thalia M. Laing and Douglas R. Stinson",
title = "A survey and refinement of repairable threshold
schemes",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "1",
pages = "57--??",
month = mar,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-1/jmc-2017-0058/jmc-2017-0058.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2018:Fb,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "2",
pages = "i--iv",
month = jun,
year = "2018",
DOI = "https://doi.org/10.1515/jmc-2018-frontmatter2",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:15:14 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Fotiadis:2018:GPF,
author = "Georgios Fotiadis and Elisavet Konstantinou",
title = "Generating pairing-friendly elliptic curve parameters
using sparse families",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "2",
pages = "83--99",
month = jun,
year = "2018",
DOI = "https://doi.org/10.1515/jmc-2017-0024",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:15:14 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kushwaha:2018:ILB,
author = "Prabhat Kushwaha",
title = "Improved lower bound for {Diffie--Hellman} problem
using multiplicative group of a finite field as
auxiliary group",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "2",
pages = "101--118",
month = jun,
year = "2018",
DOI = "https://doi.org/10.1515/jmc-2017-0053",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:15:14 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2018:Fc,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "3",
pages = "i--??",
month = sep,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-3/jmc-2018-frontmatter3/jmc-2018-frontmatter3.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Jirakitpuwapat:2018:NMC,
author = "Wachirapong Jirakitpuwapat and Parin Chaipunya and
Poom Kumam and Sompong Dhompongsa and Phatiphat
Thounthong",
title = "New methods of construction of {Cartesian}
authentication codes from geometries over finite
commutative rings",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "3",
pages = "119--??",
month = sep,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-3/jmc-2017-0057/jmc-2017-0057.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kotov:2018:AKE,
author = "Matvei Kotov and Alexander Ushakov",
title = "Analysis of a key exchange protocol based on tropical
matrix algebra",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "3",
pages = "137--??",
month = sep,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-3/jmc-2016-0064/jmc-2016-0064.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Raddum:2018:MSB,
author = "H{\aa}vard Raddum and Pavol Zajac",
title = "{MRHS} solver based on linear algebra and exhaustive
search",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "3",
pages = "143--??",
month = sep,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-3/jmc-2017-0005/jmc-2017-0005.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chatterjee:2018:CPB,
author = "Sanjit Chatterjee and M. Prem Laxman Das and R.
Kabaleeshwaran",
title = "Converting pairing-based cryptosystems from composite
to prime order setting --- a comparative analysis",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "3",
pages = "159--??",
month = sep,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Mon Mar 25 12:08:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-3/jmc-2017-0042/jmc-2017-0042.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2018:F,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "4",
pages = "i--??",
month = dec,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:41:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-4/jmc-2018-frontmatter4/jmc-2018-frontmatter4.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Pinto:2018:BPF,
author = "Eduardo Carvalho Pinto and Christophe Petit",
title = "Better path-finding algorithms in {LPS} {Ramanujan}
graphs",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "4",
pages = "191--??",
month = dec,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:41:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-4/jmc-2017-0051/jmc-2017-0051.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Paterson:2018:MPP,
author = "Maura B. Paterson and Douglas R. Stinson and Jalaj
Upadhyay",
title = "Multi-prover proof of retrievability",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "4",
pages = "203--??",
month = dec,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:41:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-4/jmc-2018-0012/jmc-2018-0012.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Banegas:2018:DKE,
author = "Gustavo Banegas and Paulo S. L. M. Barreto and Brice
Odilon Boidje and Pierre-Louis Cayrel and Gilbert
Ndollane Dione and Kris Gaj and Cheikh Thi{\'e}coumba
Gueye and Richard Haeussler and Jean Belo Klamti and
Ousmane N'diaye and Duc Tri Nguyen and Edoardo
Persichetti and Jefferson E. Ricardini",
title = "{DAGS}: Key encapsulation using dyadic {GS} codes",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "4",
pages = "221--??",
month = dec,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:41:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-4/jmc-2018-0027/jmc-2018-0027.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chakraborti:2018:ONL,
author = "Avik Chakraborti and Nilanjan Datta and Mridul Nandi",
title = "On the optimality of non-linear computations for
symmetric key primitives",
journal = j-J-MATH-CRYPTOL,
volume = "12",
number = "4",
pages = "241--??",
month = dec,
year = "2018",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:41:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2018.12.issue-4/jmc-2017-0011/jmc-2017-0011.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2019:Fa,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "1",
pages = "i--??",
month = mar,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2019.13.issue-1/jmc-2019-frontmatter1/jmc-2019-frontmatter1.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Wunderer:2019:DAH,
author = "Thomas Wunderer",
title = "A detailed analysis of the hybrid lattice-reduction
and meet-in-the-middle attack",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "1",
pages = "1--??",
month = mar,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2019.13.issue-1/jmc-2016-0044/jmc-2016-0044.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Azizi:2019:CIC,
author = "Abdelmalek Azizi and Idriss Jerrari and Abdelkader
Zekhnini and Mohammed Talbi",
title = "Capitulation of the $2$-ideal classes of type $ (2, 2,
2)$ of some quartic cyclic number fields",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "1",
pages = "27--??",
month = mar,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2019.13.issue-1/jmc-2017-0037/jmc-2017-0037.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bindel:2019:EHL,
author = "Nina Bindel and Johannes Buchmann and Florian
G{\"o}pfert and Markus Schmidt",
title = "Estimation of the hardness of the learning with errors
problem with a restricted number of samples",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "1",
pages = "47--??",
month = mar,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/view/j/jmc.2019.13.issue-1/jmc-2017-0040/jmc-2017-0040.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2019:Fb,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "2",
pages = "i--??",
month = jun,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-2/jmc-2019-frontmatter2/jmc-2019-frontmatter2.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kaji:2019:PEP,
author = "Shizuo Kaji and Toshiaki Maeno and Koji Nuida and
Yasuhide Numata",
title = "Polynomial expressions of $p$-ary auction functions",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "2",
pages = "69--??",
month = jun,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-2/jmc-2018-0016/jmc-2018-0016.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Lavauzelle:2019:GCP,
author = "Julien Lavauzelle and Fran{\c{c}}oise Levy-dit-Vehel",
title = "Generic constructions of {PoRs} from codes and
instantiations",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "2",
pages = "81--??",
month = jun,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-2/jmc-2018-0018/jmc-2018-0018.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Harsanyi:2019:EIR,
author = "K{\'a}roly Hars{\'a}nyi and P{\'e}ter Ligeti",
title = "Exact information ratios for secret sharing on small
graphs with girth at least $5$",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "2",
pages = "107--??",
month = jun,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-2/jmc-2018-0024/jmc-2018-0024.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bansal:2019:SSI,
author = "Tarun Kumar Bansal and Xavier Boyen and Josef
Pieprzyk",
title = "Signcryption schemes with insider security in an ideal
permutation model",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "2",
pages = "117--150",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2018-0006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:42:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-2/jmc-2018-0006/jmc-2018-0006.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anonymous:2019:F,
author = "Anonymous",
title = "Frontmatter",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "3--4",
pages = "i--??",
month = sep,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:56:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-3-4/jmc-2019-frontmatter3-4/jmc-2019-frontmatter3-4.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Biasse:2019:QAA,
author = "Jean-Fran{\c{c}}ois Biasse and Fang Song",
title = "On the quantum attacks against schemes relying on the
hardness of finding a short generator of an ideal in {$
\mathbb {Q}(\zeta 2 s) $}",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "3--4",
pages = "151--??",
month = sep,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:56:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-3-4/jmc-2015-0046/jmc-2015-0046.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Sipasseuth:2019:EGG,
author = "Arnaud Sipasseuth and Thomas Plantard and Willy
Susilo",
title = "Enhancing {Goldreich}, {Goldwasser} and {Halevi}'s
scheme with intersecting lattices",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "3--4",
pages = "169--??",
month = sep,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:56:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-3-4/jmc-2016-0066/jmc-2016-0066.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Nandi:2019:PSP,
author = "Mridul Nandi and Tapas Pandit",
title = "Predicate signatures from pair encodings via dual
system proof technique",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "3--4",
pages = "197--??",
month = sep,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:56:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-3-4/jmc-2017-0007/jmc-2017-0007.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kousidis:2019:FFD,
author = "Stavros Kousidis and Andreas Wiemers",
title = "On the first fall degree of summation polynomials",
journal = j-J-MATH-CRYPTOL,
volume = "13",
number = "3--4",
pages = "229--??",
month = sep,
year = "2019",
CODEN = "????",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Wed Oct 9 07:56:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "http://www.degruyter.com/view/j/jmc.2019.13.issue-3-4/jmc-2017-0022/jmc-2017-0022.xml",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cheon:2020:PFA,
author = "Jung Hee Cheon and Kristin Lauter and Donggeon Yhee",
title = "Preface to the {First Annual MathCrypt Proceedings}
Volume",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "1--4",
day = "19",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0060",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0060/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Boneh:2020:MNI,
author = "Dan Boneh and Darren Glass and Daniel Krashen and
Kristin Lauter and Shahed Sharif and Alice Silverberg
and Mehdi Tibouchi and Mark Zhandry",
title = "Multiparty Non-Interactive Key Exchange and More From
Isogenies on Elliptic Curves",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "5--14",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0047",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0047/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Ferradi:2020:RSP,
author = "Houda Ferradi and R{\'e}mi G{\'e}raud and Sylvain
Guilley and David Naccache and Mehdi Tibouchi",
title = "Recovering Secrets From Prefix-Dependent Leakage",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "15--24",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0048",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0048/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Huang:2020:QSP,
author = "Ming-Deh Huang and Michiel Kosters and Christophe
Petit and Sze Ling Yeo and Yang Yun",
title = "Quasi-subfield Polynomials and the Elliptic Curve
Discrete Logarithm Problem",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "25--38",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0049",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0049/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Hoffstein:2020:SSF,
author = "Jeffrey Hoffstein and Joseph H. Silverman and William
Whyte and Zhenfei Zhang",
title = "A signature scheme from the finite field isomorphism
problem",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "39--54",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0050",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0050/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bootland:2020:EPC,
author = "Carl Bootland and Wouter Castryck and Ilia Iliashenko
and Frederik Vercauteren",
title = "Efficiently Processing Complex-Valued Data in
Homomorphic Encryption",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "55--65",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0051",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0051/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Doroz:2020:FNE,
author = "Yarkin Dor{\"o}z and Berk Sunar",
title = "Flattening {NTRU} for Evaluation Key Free Homomorphic
Encryption",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "66--83",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0052",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0052/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Yasuda:2020:SDD,
author = "Masaya Yasuda",
title = "Self-dual {DeepBKZ} for finding short lattice
vectors",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "84--94",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0053",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0053/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Banegas:2020:DED,
author = "Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo
Persichetti and Paolo Santini",
title = "Designing Efficient Dyadic Operations for
Cryptographic Applications",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "95--109",
day = "19",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0054",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0054/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{DeMicheli:2020:CON,
author = "Gabrielle {De Micheli} and Nadia Heninger and Barak
Shani",
title = "Characterizing overstretched {NTRU} attacks",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "110--119",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0055",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0055/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Urbanik:2020:NTS,
author = "David Urbanik and David Jao",
title = "New Techniques for {SIDH}-based {NIKE}",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "120--128",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0056",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0056/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Jao:2020:STP,
author = "David Jao and Jason LeGrow and Christopher Leonardi
and Luis Ruiz-Lopez",
title = "A subexponential-time, polynomial quantum space
algorithm for inverting the {CM} group action",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "129--138",
day = "14",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2015-0057",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2015-0057/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Joux:2020:PNT,
author = "Antoine Joux and Jacek Pomyka{\l}a",
title = "Preface for the {Number-Theoretic Methods in
Cryptology} conferences",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "393--396",
day = "13",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0111",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0111/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bootland:2020:FCP,
author = "Carl Bootland and Wouter Castryck and Alan Szepieniec
and Frederik Vercauteren",
title = "A framework for cryptographic problems from linear
algebra",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "202--217",
day = "21",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0032",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0032/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Coron:2020:ICA,
author = "Jean-S{\'e}bastien Coron and Agnese Gini",
title = "Improved cryptanalysis of the {AJPS} {Mersenne} based
cryptosystem",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "218--223",
day = "21",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0027",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0027/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Brier:2020:NNT,
author = "{\'E}ric Brier and Houda Ferradi and Marc Joye and
David Naccache",
title = "New number-theoretic cryptographic primitives",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "224--235",
day = "1",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0035",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0035/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Tomkins:2020:NZT,
author = "Hayley Tomkins and Monica Nevins and Hadi Salmasian",
title = "New {Z{\'e}mor--Tillich} Type Hash Functions Over {$
{\rm GL}_2 (\mathbb {F}_{p^n}) $}",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "236--253",
day = "1",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0033",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0033/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Joye:2020:PEA,
author = "Marc Joye",
title = "Protecting {ECC} Against Fault Attacks: The Ring
Extension Method Revisited",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "254--267",
day = "1",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0030",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0030/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Castryck:2020:HFS,
author = "Wouter Castryck and Thomas Decru and Benjamin Smith",
title = "Hash functions from superspecial genus-2 curves using
{Richelot} isogenies",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "268--292",
day = "7",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0021",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0021/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Delaplace:2020:CWB,
author = "Claire Delaplace and Alexander May",
title = "Can we Beat the Square Root Bound for {ECDLP} over {$
\mathbb {F}_{p^2} $} via Representation?",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "293--306",
day = "18",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0025",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0025/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Grzeskowiak:2020:VLS,
author = "Maciej Grze{\'s}kowiak",
title = "A variant of the large sieve inequality with explicit
constants",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "307--315",
day = "7",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0022",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0022/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Boura:2020:CCR,
author = "Christina Boura and Nicolas Gama and Mariya Georgieva
and Dimitar Jetchev",
title = "{CHIMERA}: Combining {Ring-LWE}-based Fully
Homomorphic Encryption Schemes",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "316--338",
day = "7",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0026",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0026/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kim:2020:EAC,
author = "Taechan Kim and Mehdi Tibouchi",
title = "Equidistribution Among Cosets of Elliptic Curve Points
in Intervals",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "339--345",
day = "7",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0020",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0020/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Pomykala:2020:IFC,
author = "Jacek Pomyka{\l}a and Maciej Radziejewski",
title = "Integer factoring and compositeness witnesses",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "346--358",
day = "20",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0023",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0023/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Lesavourey:2020:SPI,
author = "Andrea Lesavourey and Thomas Plantard and Willy
Susilo",
title = "Short Principal Ideal Problem in multicubic fields",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "359--392",
day = "20",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0028",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0028/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cheon:2020:ACV,
author = "Jung Hee Cheon and Wonhee Cho and Minki Hhan and
Jiseung Kim and Changmin Lee",
title = "Algorithms for {CRT}-variant of Approximate Greatest
Common Divisor Problem",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "397--413",
day = "20",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0031",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0031/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Colo:2020:OSI,
author = "Leonardo Col{\`o} and David Kohel",
title = "Orienting supersingular isogeny graphs",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "414--437",
day = "23",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0034",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0034/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{DiCrescenzo:2020:DPG,
author = "Giovanni {Di Crescenzo} and Matluba Khodjaeva and
Delaram Kahrobaei and Vladimir Shpilrain",
title = "Delegating a Product of Group Exponentiations with
Application to Signature Schemes (Submission to Special
{NutMiC 2019} Issue of {JMC})",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "438--459",
day = "30",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0036",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0036/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Yokoyama:2020:CBS,
author = "Kazuhiro Yokoyama and Masaya Yasuda and Yasushi
Takahashi and Jun Kogure",
title = "Complexity bounds on {Semaev}'s naive index calculus
method for {ECDLP}",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "460--485",
day = "30",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0029",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0029/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Karmakar:2020:EPF,
author = "Sudhangshu B. Karmakar",
title = "An elementary proof of {Fermat's Last Theorem} for all
even exponents",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "139--142",
day = "3",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
note = "See retraction \cite{Karmakar:2020:REP}.",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2016-0018/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Karmakar:2020:REP,
author = "Sudhangshu B. Karmakar",
title = "Retraction of: {An elementary proof of Fermat's Last
Theorem for all even exponents}",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "143--143",
day = "3",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2017-2000",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
note = "See \cite{Karmakar:2020:EPF}.",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2017-2000/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Goel:2020:SSA,
author = "Neha Goel and Indivar Gupta and B. K. Dass",
title = "Survey on {SAP} and its application in public-key
cryptography",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "144--152",
day = "3",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2016-0004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2016-0004/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Zhang:2020:PPV,
author = "Liang Feng Zhang and Reihaneh Safavi-Naini",
title = "Privacy-preserving verifiable delegation of polynomial
and matrix functions",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "153--171",
day = "3",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2018-0039",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2018-0039/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Chakraborty:2020:NAP,
author = "Suvradip Chakraborty and Janaka Alawatugoda and
Chandrasekaran Pandu Rangan",
title = "New approach to practical leakage-resilient public-key
cryptography",
journal = j-J-MATH-CRYPTOL,
volume = "14",
number = "1",
pages = "172--201",
day = "11",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:11 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/14/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0014/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cheon:2020:EPS,
author = "Jung Hee Cheon and Kristin Lauter and Yongsoo Song",
title = "{Editor}'s Preface for the {Second Annual MathCrypt
Proceedings} Volume",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "1--3",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0170",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0170/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Biasse:2020:TBC,
author = "Jean-Fran{\c{c}}ois Biasse and Xavier Bonnetain and
Benjamin Pring and Andr{\'e} Schrottenloher and William
Youmans",
title = "A trade-off between classical and quantum circuit size
for an attack against {CSIDH}",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "4--17",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0070",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0070/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Taraskin:2020:TIB,
author = "Oleg Taraskin and Vladimir Soukharev and David Jao and
Jason T. LeGrow",
title = "Towards Isogeny-Based Password-Authenticated Key
Establishment",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "18--30",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0071",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0071/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Takahashi:2020:AAS,
author = "Yasushi Takahashi and Momonari Kudo and Ryoya Fukasaku
and Yasuhiko Ikematsu and Masaya Yasuda and Kazuhiro
Yokoyama",
title = "Algebraic approaches for solving isogeny problems of
prime power degrees",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "31--44",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0072",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0072/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Murphy:2020:DPD,
author = "Sean Murphy and Rachel Player",
title = "Discretisation and Product Distributions in
{Ring-LWE}",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "45--59",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0073",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0073/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Laarhoven:2020:AVC,
author = "Thijs Laarhoven",
title = "Approximate {Voronoi} cells for lattices, revisited",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "60--71",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0074",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0074/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dachman-Soled:2020:SRL,
author = "Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni
and Aria Shahverdi",
title = "{(In)Security} of {Ring-LWE} Under Partial Key
Exposure",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "72--86",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0075",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0075/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dachman-Soled:2020:TRA,
author = "Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni
and Aria Shahverdi",
title = "Towards a Ring Analogue of the Leftover Hash Lemma",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "87--110",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0076",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0076/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Joye:2020:EPR,
author = "Marc Joye and Oleksandra Lapiha and Ky Nguyen and
David Naccache",
title = "The Eleventh Power Residue Symbol",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "111--122",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0077",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0077/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Sica:2020:FH,
author = "Francesco Sica",
title = "Factoring with Hints",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "123--130",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0078",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0078/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Tibouchi:2020:OBA,
author = "Mehdi Tibouchi and Alexandre Wallet",
title = "One Bit is All It Takes: A Devastating Timing Attack
on {BLISS}'s Non-Constant Time Sign Flips",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "131--142",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0079",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0079/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Biasse:2020:FRO,
author = "Jean-Fran{\c{c}}ois Biasse and Benjamin Pring",
title = "A framework for reducing the overhead of the quantum
oracle for use with {Grover}'s algorithm with
applications to cryptanalysis of {SIKE}",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "143--156",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0080",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0080/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Csirmaz:2020:SSD,
author = "Laszlo Csirmaz",
title = "Secret sharing and duality",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "157--173",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0045",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0045/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{DiScala:2020:CNV,
author = "Antonio J. {Di Scala} and Carlo Sanna and Edoardo
Signorini",
title = "On the condition number of the {Vandermonde} matrix of
the $n$ th cyclotomic polynomial",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "174--178",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0009",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0009/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Paterson:2020:EAC,
author = "Maura B. Paterson and Douglas R. Stinson",
title = "On the equivalence of authentication codes and robust
$ (2, 2)$-threshold schemes",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "179--196",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0048",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0048/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Anokhin:2020:PFF,
author = "Mikhail Anokhin",
title = "Pseudo-free families of computational universal
algebras",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "197--222",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0014",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0014/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{McGuire:2020:LST,
author = "Gary McGuire and Ois{\'\i}n Robinson",
title = "Lattice Sieving in Three Dimensions for Discrete Log
in Medium Characteristic",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "223--236",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0008",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0008/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Kotov:2020:AKP,
author = "Matvei Kotov and Anton Menshov and Alexander Ushakov",
title = "Attack on Kayawood protocol: uncloaking private keys",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "237--249",
day = "1",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0015",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0015/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Araujo:2020:CHR,
author = "Filipe Araujo and Samuel Neves",
title = "The circulant hash revisited",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "250--257",
day = "3",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2018-0054",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2018-0054/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Zhou:2020:CPB,
author = "Yu Zhou and Daoguang Mu and Xinfeng Dong",
title = "On cryptographic properties of $ (n + 1)$-bit
{$S$}-boxes constructed by known $n$-bit {$S$}-boxes",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "258--265",
day = "8",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0004",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0004/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Pandey:2020:ICE,
author = "Atul Pandey and Indivar Gupta and Dhiraj Kumar Singh",
title = "Improved cryptanalysis of a {ElGamal} Cryptosystem
Based on Matrices Over Group Rings",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "266--279",
day = "20",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0054",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0054/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Rudy:2020:RTK,
author = "Dylan Rudy and Chris Monico",
title = "Remarks on a Tropical Key Exchange System",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "280--283",
day = "20",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2019-0061",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2019-0061/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Cascudo:2021:NSM,
author = "Ignacio Cascudo and Reto Schnyder",
title = "A note on secure multiparty computation via higher
residue symbols",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "284--297",
day = "29",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0013",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0013/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Reid:2021:UIE,
author = "Elizabeth M. Reid",
title = "Using Inclusion\slash Exclusion to find Bent and
Balanced Monomial Rotation Symmetric Functions",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "298--304",
day = "29",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0021",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0021/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Bhattacharjee:2021:OVF,
author = "Arghya Bhattacharjee and Cuauhtemoc Mancillas
L{\'o}pez and Eik List and Mridul Nandi",
title = "The {Oribatida v1.3} Family of Lightweight
Authenticated Encryption Schemes",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "305--344",
day = "29",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0018/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Broon:2021:ITH,
author = "Fouazou Lontouo Perez Broon and Thinh Dang and
Emmanuel Fouotsa and Dustin Moody",
title = "Isogenies on twisted {Hessian} curves",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "345--358",
day = "16",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0037",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0037/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Ekeraa:2021:QAC,
author = "Martin Eker{\aa}",
title = "Quantum algorithms for computing general discrete
logarithms and orders with tradeoffs",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "359--407",
day = "22",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0006",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0006/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Dugardin:2021:SMD,
author = "Margaux Dugardin and Werner Schindler and Sylvain
Guilley",
title = "Stochastic methods defeat regular {RSA} exponentiation
algorithms with combined blinding methods",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "408--433",
day = "20",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0010/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Zhang:2021:SBS,
author = "Jing Zhang and Yuan Li and John O. Adeyeye",
title = "Sensitivities and block sensitivities of elementary
symmetric {Boolean} functions",
journal = j-J-MATH-CRYPTOL,
volume = "15",
number = "1",
pages = "434--453",
day = "22",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0042",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri May 7 07:27:12 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
https://www.degruyter.com/journal/key/JMC/15/1/html",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0042/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "http://www.degruyter.com/view/j/jmc",
}
@Article{Zhou:2022:CCB,
author = "Yu Zhou and Jianyong Hu and Xudong Miao and Yu Han and
Fuzhong Zhang",
title = "On the confusion coefficient of {Boolean} functions",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "1--13",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2021-0012",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2021-0012/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Basso:2022:SGA,
author = "Andrea Basso and Fabien Pazuki",
title = "On the supersingular {GPST} attack",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "14--19",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2021-0020",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2021-0020/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Santini:2022:RFC,
author = "Paolo Santini and Edoardo Persichetti and Marco
Baldi",
title = "Reproducible families of codes and cryptographic
applications",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "20--48",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0003",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0003/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Craven:2022:EGT,
author = "Matthew J. Craven and John R. Woodward",
title = "Evolution of group-theoretic cryptology attacks using
hyper-heuristics",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "49--63",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2021-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2021-0017/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Rahman:2022:MMA,
author = "Nael Rahman and Vladimir Shpilrain",
title = "{MAKE}: a matrix action key exchange",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "64--72",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0053",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
note = "See successful attack \cite{Brown:2022:CM}.",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0053/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Chakraborty:2022:MMA,
author = "Bishwajit Chakraborty and Mridul Nandi",
title = "The {mF} mode of authenticated encryption with
associated data",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "73--97",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2020-0054",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2020-0054/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Brown:2022:CM,
author = "Daniel R. L. Brown and Neal Koblitz and Jason T.
LeGrow",
title = "Cryptanalysis of ``{MAKE}''",
journal = j-J-MATH-CRYPTOL,
volume = "16",
number = "1",
pages = "98--102",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2021-0016",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Tue Apr 5 11:53:41 MDT 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
note = "See \cite{Rahman:2022:MMA}.",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2021-0016/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Brown:2023:PKA,
author = "Daniel R. L. Brown",
title = "Plactic key agreement (insecure?)",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0010",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0010/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Romankov:2023:AQA,
author = "Vitaly Roman'kov and Alexander Ushakov and Vladimir
Shpilrain",
title = "Algebraic and quantum attacks on two digital signature
schemes",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0023",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0023/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Isobe:2023:CEP,
author = "Shuji Isobe and Eisuke Koizumi",
title = "A construction of encryption protocols over some
semidirect products",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0018",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0018/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Klamti:2023:CBH,
author = "Jean Belo Klamti and M. Anwarul Hasan",
title = "A code-based hybrid signcryption scheme",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0002",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0002/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Moch:2023:PSA,
author = "Alexander Moch",
title = "Provable security against generic attacks on stream
ciphers",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0033",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0033/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Kawa:2023:ASD,
author = "Renata Kawa and Mieczys{\l}aw Kula",
title = "Access structures determined by uniform polymatroids",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0017",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0017/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Liu:2023:FRR,
author = "Zhenyu Liu and Zepeng Zhuo",
title = "Further research results on confusion coefficient of
{Boolean} functions",
journal = j-J-MATH-CRYPTOL,
volume = "17",
number = "1",
pages = "??--??",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2021-0039",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2021-0039/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Chen:2024:DHS,
author = "Imin Chen and David Sun",
title = "The dihedral hidden subgroup problem",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2022-0029",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2022-0029/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Erdelyi:2024:LCR,
author = "M{\'a}rton Erd{\'e}lyi and P{\'a}l Heged{\"u}s and
S{\'a}ndor Z. Kiss and G{\'a}bor P. Nagy",
title = "On linear codes with random multiplier vectors and the
maximum trace dimension property",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0022",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0022/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Sala:2024:GSE,
author = "Massimiliano Sala and Daniele Taufer",
title = "Group structure of elliptic curves over {$ \mathbb {Z}
/ \mathbb {NZ} $}",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0025",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0025/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Cianfriglia:2024:MLC,
author = "Marco Cianfriglia and Elia Onofri and Marco Pedicini",
title = "{mR$_{\rm LWE}$-CP-ABE}: A revocable {CP-ABE} for
post-quantum cryptography",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0026",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0026/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Yamashita:2024:BBI,
author = "Kyosuke Yamashita and Keisuke Hara",
title = "On the black-box impossibility of multi-designated
verifiers signature schemes from ring signature
schemes",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0028",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0028/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Calderini:2024:SER,
author = "Marco Calderini and Riccardo Longo and Massimiliano
Sala and Irene Villa",
title = "Searchable encryption with randomized ciphertext and
randomized keyword search",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0029",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0029/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Calderini:2024:DEU,
author = "Marco Calderini and Roberto Civino and Riccardo
Invernizzi",
title = "Differential experiments using parallel alternative
operations",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0030",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0030/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Timpanella:2024:GDL,
author = "Marco Timpanella",
title = "On a generalization of the {Deligne--Lusztig} curve of
{Suzuki} type and application to {AG} codes",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0024",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0024/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Rouquette:2024:ABA,
author = "Lo{\"\i}c Rouquette and Marine Minier and Christine
Solnon",
title = "Automatic boomerang attacks search on {Rijndael}",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0027",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0027/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Ghantous:2024:ESB,
author = "Wissam Ghantous and Federico Pintore and Mattia
Veroni",
title = "Efficiency of {SIDH}-based signatures (yes, {SIDH})",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0023",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0023/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}
@Article{Eskeland:2024:CPP,
author = "Sigurd Eskeland",
title = "Cryptanalysis of a privacy-preserving authentication
scheme based on private set intersection",
journal = j-J-MATH-CRYPTOL,
volume = "18",
number = "1",
pages = "??--??",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1515/jmc-2023-0032",
ISSN = "1862-2976 (print), 1862-2984 (electronic)",
ISSN-L = "1862-2976",
bibdate = "Fri Apr 19 09:18:56 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
URL = "https://www.degruyter.com/document/doi/10.1515/jmc-2023-0032/html",
acknowledgement = ack-nhfb,
fjournal = "Journal of Mathematical Cryptology",
journal-URL = "https://www.degruyter.com/view/j/jmc",
}