Jump to content

Search results

  • ISBN 978-3-540-28114-6. Menezes, Alfred J. (2007), "Another look at HMQV", Journal of Mathematical Cryptology, 1: 47–64, doi:10.1515/JMC.2007.004, S2CID 15540513 Bellare...
    18 KB (2,208 words) - 09:23, 30 November 2024
  • 1007/978-3-319-61273-7_3 "Another look at HMAC" (with N. Koblitz), Journal of Mathematical Cryptology, 7 (2013), 225–251. doi:10.1515/jmc-2013-5004 "Elliptic curve...
    9 KB (814 words) - 12:32, 3 December 2024
  • Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips.] Journal of Mathematical Cryptology 15(1) (2020): 131-142 Thomas Espitau, Pierre-Alain Fouque...
    4 KB (461 words) - 00:40, 15 October 2024
  • cryptosystems from supersingular elliptic curve isogenies" (PDF), Journal of Mathematical Cryptology, 8 (3): 209–247, doi:10.1515/jmc-2012-0015, MR 3259113, S2CID 10873244...
    6 KB (655 words) - 03:48, 30 November 2024
  • Thumbnail for Delaram Kahrobaei
    Mathematics Associate Editor: Journal of Mathematical Cryptology, De Gruyter Associate Editor: La Matematica Official Journal of the Association for Women...
    16 KB (1,404 words) - 15:11, 24 November 2024
  • Silverman, Robert D. (2007), "Optimal Parameterization of SNFS", Journal of Mathematical Cryptology, 1 (2): 105–124, CiteSeerX 10.1.1.12.2975, doi:10.1515/JMC...
    9 KB (1,427 words) - 20:31, 10 March 2024
  • currently an Associate Editor of IET Information Security and Journal of Mathematical Cryptology. In 2023 she was elected a fellow of the International Association...
    7 KB (422 words) - 11:41, 11 November 2024
  • summary of McEliece-type cryptosystems and their security." Journal of Mathematical Cryptology 1, 151–199. MR2345114. Previous version: http://eprint.iacr...
    6 KB (1,154 words) - 03:36, 28 November 2024
  • attacks, Journal of Mathematical Cryptology, 2 (2008), 29–61. A. Miasnikov and A. Rybalov, Generic complexity of undecidable problems, Journal of Symbolic...
    18 KB (2,706 words) - 15:11, 31 May 2024
  • the Evolution of RC4 Pseudo Random Generation Algorithm". Journal of Mathematical Cryptology. 2 (3): 257–289. doi:10.1515/JMC.2008.012. S2CID 9613837....
    44 KB (5,062 words) - 12:34, 25 October 2024
  • elliptic curve isogenies in quantum subexponential time". Journal of Mathematical Cryptology. 8: 1–29. arXiv:1012.4019. doi:10.1515/jmc-2012-0016. S2CID 1902409...
    25 KB (3,699 words) - 00:30, 30 December 2023