default search action
Journal of Mathematical Cryptology, Volume 5
Volume 5, Number 1, June 2011
- Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An exploration of affine group laws for elliptic curves. 1-50 - Sylvain Duquesne:
RNS arithmetic in pk and application to fast pairing computation. 51-88 - Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
Compact elliptic curve representations. 89-100
Volume 5, Number 2, April 2012
- Gaetan Bisson:
Computing endomorphism rings of elliptic curves under the GRH. 101-114 - Nuttapong Attrapadung, Benoît Libert:
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation. 115-158 - Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. 159-168 - Marc Fischlin, Dominique Schröder:
Security of blind signatures under aborts and applications to adaptive oblivious transfer. 169-204
Volume 5, Number 3-4, February 2012
- Neal Koblitz:
Another look at automated theorem-proving II. 205-224 - Dustin Moody, Hongfeng Wu:
Families of elliptic curves with rational 3-torsion. 225-246 - Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger:
A family of weak keys in HFE and the corresponding practical key-recovery. 247-275 - Yeow Meng Chee, Huaxiong Wang, Liang Feng Zhang:
On the Bringer-Chabanne EPIR protocol for polynomial evaluation. 277-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.