Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Mathematical Cryptology, Volume 2
Volume 2, Number 1, April 2008
- David J. Mireles Morales:
An attack on disguised elliptic curves. 1-8 - Ryoh Fuji-Hara, Xiyang Li, Ying Miao, Dianhua Wu:
A TWOOA construction for multi-receiver multi-message authentication codes. 9-28 - Alexei G. Myasnikov, Alexander Ushakov:
Random subgroups and analysis of the length-based and quotient attacks. 29-61 - Sean Murphy, Maura B. Paterson:
A geometric view of cryptographic equation solving. 63-107
Volume 2, Number 2, July 2008
- Jonathan Longrigg, Alexander Ushakov:
Cryptanalysis of the shifted conjugacy authentication protocol. 109-116 - M. Jason Hinek:
On the security of multi-prime RSA. 117-147 - Mridul Nandi, Avradip Mandal:
Improved security analysis of PMAC. 149-162 - Cevahir Demirkiran, Enric Nart:
Counting hyperelliptic curves that admit a Koblitz model. 163-179 - Phong Q. Nguyen, Thomas Vidick:
Sieve algorithms for the shortest vector problem are practical. 181-207
Volume 2, Number 3, October 2008
- Szabolcs L. Fancsali, Péter Ligeti:
Some applications of finite geometry for secure network coding. 209-225 - Roberto Avanzi, Nicolas Thériault, Zheng Wang:
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formulæ. 227-255 - Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul:
A complete characterization of the evolution of RC4 pseudo random generation algorithm. 257-289 - Werner Schindler:
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. 291-310
Volume 2, Number 4, December 2008
- Neal Koblitz, Alfred Menezes:
Another look at non-standard discrete log and Diffie-Hellman problems. 311-326 - Rupert J. Hartung, Claus-Peter Schnorr:
Identification and signatures based on NP-hard problems of indefinite quadratic forms. 327-341 - Thilo Mie:
Polylogarithmic two-round argument systems. 343-363 - Christiane Frougny, Wolfgang Steiner:
Minimal weight expansions in Pisot bases. 365-392 - Maura B. Paterson, Douglas R. Stinson:
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. 393-403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.