Journal: J. Mathematical Cryptology

Volume 5, Issue 2

101 -- 114Gaetan Bisson. Computing endomorphism rings of elliptic curves under the GRH
115 -- 158Nuttapong Attrapadung, Benoît Libert. Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
159 -- 168Simon R. Blackburn, Carlos Cid, Ciaran Mullan. Cryptanalysis of three matrix-based key establishment protocols
169 -- 204Marc Fischlin, Dominique Schröder. Security of blind signatures under aborts and applications to adaptive oblivious transfer