Facet browsing currently unavailable
Page 2 of 353 results
Sort by: relevance publication year
Frontmatter JOURNAL ARTICLE published 1 February 2014 in Journal of Mathematical Cryptology |
Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms JOURNAL ARTICLE published 1 February 2014 in Journal of Mathematical Cryptology Research funded by Swiss National Science Foundation (200020-132160) |
Frontmatter JOURNAL ARTICLE published 1 June 2019 in Journal of Mathematical Cryptology |
Secure message transmission in the presence of a fully generalised adversary JOURNAL ARTICLE published 1 December 2015 in Journal of Mathematical Cryptology |
On the exact decryption range for Gentry–Halevi's implementation of fully homomorphic encryption JOURNAL ARTICLE published 1 September 2014 in Journal of Mathematical Cryptology |
Frontmatter JOURNAL ARTICLE published 1 June 2015 in Journal of Mathematical Cryptology |
Foreword JOURNAL ARTICLE published 1 January 2013 in Journal of Mathematical Cryptology |
The average transmission overhead for broadcast encryption JOURNAL ARTICLE published January 2007 in Journal of Mathematical Cryptology |
Preface for the Number-Theoretic Methods in Cryptology conferences JOURNAL ARTICLE published 13 October 2020 in Journal of Mathematical Cryptology |
Better path-finding algorithms in LPS Ramanujan graphs JOURNAL ARTICLE published 1 December 2018 in Journal of Mathematical Cryptology |
Simplified pairing computation and security implications JOURNAL ARTICLE published 21 January 2007 in Journal of Mathematical Cryptology |
Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols JOURNAL ARTICLE published 1 January 2007 in Mathematical Cryptology |
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠 ) JOURNAL ARTICLE published 1 September 2019 in Journal of Mathematical Cryptology Research funded by National Science Foundation (1839805,1846166) | National Institute of Standards and Technology (60NANB17D184) |
Group structure of elliptic curves over ℤ/Nℤ JOURNAL ARTICLE published 14 February 2024 in Journal of Mathematical Cryptology |
On linear codes with random multiplier vectors and the maximum trace dimension property JOURNAL ARTICLE published 14 February 2024 in Journal of Mathematical Cryptology |
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs JOURNAL ARTICLE published 1 December 2015 in Journal of Mathematical Cryptology Research funded by NSERC (discovery grant 203114-11) |
The circulant hash revisited JOURNAL ARTICLE published 3 December 2020 in Journal of Mathematical Cryptology |
Pseudo-free families and cryptographic primitives JOURNAL ARTICLE published 13 June 2022 in Journal of Mathematical Cryptology |
On the leakage-resilient key exchange JOURNAL ARTICLE published 1 December 2017 in Journal of Mathematical Cryptology |
Estimation of the hardness of the learning with errors problem with a restricted number of samples JOURNAL ARTICLE published 1 March 2019 in Journal of Mathematical Cryptology Research funded by Deutsche Forschungsgemeinschaft (CRC 1119 CROSSING) |