Search dblp for Publications

export results for "toc:db/journals/jmc/jmc11.bht:"

 download as .bib file

@article{DBLP:journals/jmc/Alawatugoda17,
  author       = {Janaka Alawatugoda},
  title        = {On the leakage-resilient key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {215--269},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0003},
  doi          = {10.1515/JMC-2016-0003},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Alawatugoda17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AntalGH17,
  author       = {Eugen Antal and
                  Otokar Grosek and
                  Peter Hor{\'{a}}k},
  title        = {On a mnemonic construction of permutations},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {45--53},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0058},
  doi          = {10.1515/JMC-2016-0058},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AntalGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AsgharK17,
  author       = {Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {When are identification protocols with sparse challenges safe? The
                  case of the Coskun and Herley attack},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {177--194},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2015-0059},
  doi          = {10.1515/JMC-2015-0059},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AsgharK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DehkordiS17,
  author       = {Massoud Hadian Dehkordi and
                  Ali Safi},
  title        = {The complexity of the connected graph access structure on seven participants},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {25--35},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0017},
  doi          = {10.1515/JMC-2016-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DehkordiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DehkordiT17,
  author       = {Massoud Hadian Dehkordi and
                  Roghayeh Taghizadeh},
  title        = {Multiple differential-zero correlation linear cryptanalysis of reduced-round
                  {CAST-256}},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {55},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0054},
  doi          = {10.1515/JMC-2016-0054},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DehkordiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GuptaPR17,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray},
  title        = {Applications of design theory for the constructions of {MDS} matrices
                  for lightweight cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {85},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0013},
  doi          = {10.1515/JMC-2016-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuPS17,
  author       = {Yao Lu and
                  Liqiang Peng and
                  Santanu Sarkar},
  title        = {Cryptanalysis of an {RSA} variant with moduli N=prql},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {117},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0025},
  doi          = {10.1515/JMC-2016-0025},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LuPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MohammedA17,
  author       = {Ahmed Mohammed and
                  Abdulrahman Alkhelaifi},
  title        = {{RSA:} {A} number of formulas to improve the search for p + q p+q},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {195--203},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0046},
  doi          = {10.1515/JMC-2016-0046},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MohammedA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Popov17,
  author       = {Serguei Popov},
  title        = {On a decentralized trustless pseudo-random number generation algorithm},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {37--43},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0019},
  doi          = {10.1515/JMC-2016-0019},
  timestamp    = {Sat, 26 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Popov17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Reichl17,
  author       = {Dominik Reichl},
  title        = {Tame logarithmic signatures of abelian groups},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {205--214},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0065},
  doi          = {10.1515/JMC-2016-0065},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Reichl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SamajderS17,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Rigorous upper bounds on data complexities of block cipher cryptanalysis},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {147--175},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0026},
  doi          = {10.1515/JMC-2016-0026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SamajderS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SaraswatSA17,
  author       = {Vishal Saraswat and
                  Rajeev Anand Sahu and
                  Amit K. Awasthi},
  title        = {A secure anonymous proxy signcryption scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {63},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2015-0014},
  doi          = {10.1515/JMC-2015-0014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SaraswatSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Scholl17,
  author       = {Travis Scholl},
  title        = {Isolated elliptic curves and the {MOV} attack},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {131--146},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0053},
  doi          = {10.1515/JMC-2016-0053},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Scholl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YasudaYSKK17,
  author       = {Masaya Yasuda and
                  Kazuhiro Yokoyama and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Takeshi Koshiba},
  title        = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short
                  lattice vectors},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {1--24},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0008},
  doi          = {10.1515/JMC-2016-0008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics