


default search action
Journal of Mathematical Cryptology, Volume 1
Volume 1, Number 1, January 2007
- Tanja Lange, Igor E. Shparlinski

:
Distribution of some sequences of points on elliptic curves. 1-11 - Keith M. Martin, Siaw-Lynn Ng:

The combinatorics of generalised cumulative arrays. 13-32 - Douglas R. Stinson, Ruizhong Wei:

Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols. 33-46 - Alfred Menezes:

Another look at HMQV. 47-64 - Yuan Li, Thomas W. Cusick:

Strict avalanche criterion over finite fields. 65-78 - Tomohiro Harayama, Donald K. Friesen:

Weil sum for birthday attack in multivariate quadratic cryptosystem. 79-104
Volume 1, Number 2, April 2007
- Robert D. Silverman:

Optimal Parameterization of SNFS. 105-124 - Robert A. Walker, Charles J. Colbourn:

Perfect Hash Families: Constructions and Existence. 125-150 - Daniela Engelbert, Raphael Overbeck, Arthur Schmidt:

A Summary of McEliece-Type Cryptosystems and their Security. 151-199
Volume 1, Number 3, August 2007
- Douglas R. Stinson, Jiang Wu:

An efficient and secure two-flow zero-knowledge identification protocol. 201-220 - Joan Daemen, Vincent Rijmen

:
Probability distributions of correlation and differentials in block ciphers. 221-242 - Pierrick Gaudry:

Fast genus 2 arithmetic based on Theta functions. 243-265 - Steven D. Galbraith

, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. 267-281 - Hassan Aly

, Wilfried Meidl, Arne Winterhof
:
On the k-error linear complexity of cyclotomic sequences. 283-296
Volume 1, Number 4, December 2007
- Clemens Heuberger, James A. Muir:

Minimal weight and colexicographically minimal integer representations. 297-328 - Ian F. Blake, Igor E. Shparlinski:

Statistical distribution and collisions of VSH. 329-349 - Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:

Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. 351-358 - Dima Ruinskiy, Adi Shamir, Boaz Tsaban:

Length-based cryptanalysis: the case of Thompson's group. 359-372 - Sarang Aravamuthan, Sachin Lodha:

The average transmission overhead for broadcast encryption. 373 - Neal Koblitz:

Another look at automated theorem-proving. 385-403

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














