Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jmc/jmc11.bht:"
@article{DBLP:journals/jmc/Alawatugoda17, author = {Janaka Alawatugoda}, title = {On the leakage-resilient key exchange}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {215--269}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0003}, doi = {10.1515/JMC-2016-0003}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Alawatugoda17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AntalGH17, author = {Eugen Antal and Otokar Grosek and Peter Hor{\'{a}}k}, title = {On a mnemonic construction of permutations}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {45--53}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0058}, doi = {10.1515/JMC-2016-0058}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AntalGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AsgharK17, author = {Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {177--194}, year = {2017}, url = {https://doi.org/10.1515/jmc-2015-0059}, doi = {10.1515/JMC-2015-0059}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AsgharK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DehkordiS17, author = {Massoud Hadian Dehkordi and Ali Safi}, title = {The complexity of the connected graph access structure on seven participants}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {25--35}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0017}, doi = {10.1515/JMC-2016-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DehkordiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DehkordiT17, author = {Massoud Hadian Dehkordi and Roghayeh Taghizadeh}, title = {Multiple differential-zero correlation linear cryptanalysis of reduced-round {CAST-256}}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {55}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0054}, doi = {10.1515/JMC-2016-0054}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DehkordiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GuptaPR17, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray}, title = {Applications of design theory for the constructions of {MDS} matrices for lightweight cryptography}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {85}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0013}, doi = {10.1515/JMC-2016-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LuPS17, author = {Yao Lu and Liqiang Peng and Santanu Sarkar}, title = {Cryptanalysis of an {RSA} variant with moduli N=prql}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {117}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0025}, doi = {10.1515/JMC-2016-0025}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LuPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MohammedA17, author = {Ahmed Mohammed and Abdulrahman Alkhelaifi}, title = {{RSA:} {A} number of formulas to improve the search for p + q p+q}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {195--203}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0046}, doi = {10.1515/JMC-2016-0046}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MohammedA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Popov17, author = {Serguei Popov}, title = {On a decentralized trustless pseudo-random number generation algorithm}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {37--43}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0019}, doi = {10.1515/JMC-2016-0019}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Popov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Reichl17, author = {Dominik Reichl}, title = {Tame logarithmic signatures of abelian groups}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {205--214}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0065}, doi = {10.1515/JMC-2016-0065}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Reichl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SamajderS17, author = {Subhabrata Samajder and Palash Sarkar}, title = {Rigorous upper bounds on data complexities of block cipher cryptanalysis}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {147--175}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0026}, doi = {10.1515/JMC-2016-0026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SamajderS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SaraswatSA17, author = {Vishal Saraswat and Rajeev Anand Sahu and Amit K. Awasthi}, title = {A secure anonymous proxy signcryption scheme}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {63}, year = {2017}, url = {https://doi.org/10.1515/jmc-2015-0014}, doi = {10.1515/JMC-2015-0014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SaraswatSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Scholl17, author = {Travis Scholl}, title = {Isolated elliptic curves and the {MOV} attack}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {131--146}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0053}, doi = {10.1515/JMC-2016-0053}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Scholl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YasudaYSKK17, author = {Masaya Yasuda and Kazuhiro Yokoyama and Takeshi Shimoyama and Jun Kogure and Takeshi Koshiba}, title = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {1--24}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0008}, doi = {10.1515/JMC-2016-0008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.