Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 353 results
Sort by: relevance publication year

On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial

JOURNAL ARTICLE published 25 November 2020 in Journal of Mathematical Cryptology

Authors: Antonio J. Di Scala | Carlo Sanna | Edoardo Signorini

Self-dual DeepBKZ for finding short lattice vectors

JOURNAL ARTICLE published 14 June 2020 in Journal of Mathematical Cryptology

Authors: Masaya Yasuda

On linear codes with random multiplier vectors and the maximum trace dimension property

JOURNAL ARTICLE published 14 February 2024 in Journal of Mathematical Cryptology

Authors: Márton Erdélyi | Pál Hegedüs | Sándor Z. Kiss | Gábor P. Nagy

Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY

JOURNAL ARTICLE published January 2011 in Journal of Mathematical Cryptology

Authors: Elmar Tischhauser

On a generalization of the Deligne–Lusztig curve of Suzuki type and application to AG codes

JOURNAL ARTICLE published 15 February 2024 in Journal of Mathematical Cryptology

Authors: Marco Timpanella

Group structure of elliptic curves over /Nℤ

JOURNAL ARTICLE published 14 February 2024 in Journal of Mathematical Cryptology

Authors: Massimiliano Sala | Daniele Taufer

Cryptographic properties of monotone Boolean functions

JOURNAL ARTICLE published 1 March 2016 in Journal of Mathematical Cryptology

Authors: Claude Carlet | David Joyner | Pantelimon Stănică | Deng Tang

Estimation of the hardness of the learning with errors problem with a restricted number of samples

JOURNAL ARTICLE published 1 March 2019 in Journal of Mathematical Cryptology

Research funded by Deutsche Forschungsgemeinschaft (CRC 1119 CROSSING)

Authors: Nina Bindel | Johannes Buchmann | Florian Göpfert | Markus Schmidt

Better path-finding algorithms in LPS Ramanujan graphs

JOURNAL ARTICLE published 1 December 2018 in Journal of Mathematical Cryptology

Authors: Eduardo Carvalho Pinto | Christophe Petit

Towards Isogeny-Based Password-Authenticated Key Establishment

JOURNAL ARTICLE published 17 November 2020 in Journal of Mathematical Cryptology

Authors: Oleg Taraskin | Vladimir Soukharev | David Jao | Jason T. LeGrow

Compact McEliece keys based on quasi-dyadic Srivastava codes

JOURNAL ARTICLE published 1 January 2012 in Journal of Mathematical Cryptology

Authors: Edoardo Persichetti

Polylogarithmic two-round argument systems

JOURNAL ARTICLE published January 2008 in Journal of Mathematical Cryptology

Authors: Thilo Mie

Sieve algorithms for the shortest vector problem are practical

JOURNAL ARTICLE published January 2008 in Journal of Mathematical Cryptology

Authors: Phong Q. Nguyen | Thomas Vidick

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

JOURNAL ARTICLE published 1 December 2015 in Journal of Mathematical Cryptology

Research funded by NSERC (discovery grant 203114-11)

Authors: Maura B. Paterson | Douglas R. Stinson

Remarks on a Tropical Key Exchange System

JOURNAL ARTICLE published 20 December 2020 in Journal of Mathematical Cryptology

Authors: Dylan Rudy | Chris Monico

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

JOURNAL ARTICLE published 7 August 2020 in Journal of Mathematical Cryptology

Authors: Christina Boura | Nicolas Gama | Mariya Georgieva | Dimitar Jetchev

Analysis of a key exchange protocol based on tropical matrix algebra

JOURNAL ARTICLE published 1 September 2018 in Journal of Mathematical Cryptology

Research funded by Russian Foundation for Basic Research (14-01-00068) | National Science Foundation (DMS-1318716)

Authors: Matvei Kotov | Alexander Ushakov

Cryptanalysis of an RSA variant with moduli N=prql

JOURNAL ARTICLE published 1 June 2017 in Journal of Mathematical Cryptology

Research funded by National Natural Science Foundation of China (61472417)

Authors: Yao Lu | Liqiang Peng | Santanu Sarkar

Identification and signatures based on NP-hard problems of indefinite quadratic forms

JOURNAL ARTICLE published January 2008 in Journal of Mathematical Cryptology

Authors: Rupert J. Hartung | Claus-Peter Schnorr

Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach

JOURNAL ARTICLE published 1 January 2016 in Journal of Mathematical Cryptology

Authors: Thomas W. Cusick | K. V. Lakshmy | M. Sethumadhavan