When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack.Published in:Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 177, doi. 10.1515/jmc-2015-0059By:Asghar, Hassan Jameel;Kaafar, Mohamed AliPublication type:Article
Isolated elliptic curves and the MOV attack.Published in:Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 131, doi. 10.1515/jmc-2016-0053By:Scholl, TravisPublication type:Article
Rigorous upper bounds on data complexities of block cipher cryptanalysis.Published in:Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 147, doi. 10.1515/jmc-2016-0026By:Samajder, Subhabrata;Sarkar, PalashPublication type:Article