Works matching IS 18622976 AND DT 2020 AND VI 14 AND IP 1
Results: 12
Preface to the First Annual MathCrypt Proceedings Volume.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 1, doi. 10.1515/jmc-2020-0060
- By:
- Publication type:
- Article
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 129, doi. 10.1515/jmc-2015-0057
- By:
- Publication type:
- Article
New Techniques for SIDH-based NIKE.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 120, doi. 10.1515/jmc-2015-0056
- By:
- Publication type:
- Article
Characterizing overstretched NTRU attacks.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 110, doi. 10.1515/jmc-2015-0055
- By:
- Publication type:
- Article
Designing Efficient Dyadic Operations for Cryptographic Applications.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 95, doi. 10.1515/jmc-2015-0054
- By:
- Publication type:
- Article
Self-dual DeepBKZ for finding short lattice vectors.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 84, doi. 10.1515/jmc-2015-0053
- By:
- Publication type:
- Article
Flattening NTRU for Evaluation Key Free Homomorphic Encryption.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 66, doi. 10.1515/jmc-2015-0052
- By:
- Publication type:
- Article
Efficiently Processing Complex-Valued Data in Homomorphic Encryption.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 55, doi. 10.1515/jmc-2015-0051
- By:
- Publication type:
- Article
A signature scheme from the finite field isomorphism problem.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 39, doi. 10.1515/jmc-2015-0050
- By:
- Publication type:
- Article
Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 25, doi. 10.1515/jmc-2015-0049
- By:
- Publication type:
- Article
Recovering Secrets From Prefix-Dependent Leakage.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 15, doi. 10.1515/jmc-2015-0048
- By:
- Publication type:
- Article
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
- Published in:
- Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 5, doi. 10.1515/jmc-2015-0047
- By:
- Publication type:
- Article