Journal: J. Mathematical Cryptology

Volume 8, Issue 1

1 -- 29Andrew M. Childs, David Jao, Vladimir Soukharev. Constructing elliptic curve isogenies in quantum subexponential time
31 -- 70Shaoquan Jiang. Persistent asymmetric password-based key exchange
71 -- 92Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev. Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms
93 -- 0Steven D. Galbraith, Chang-An Zhao. Erratum Self-pairings on hyperelliptic curves [J. Math. Cryptol. 7(2013), 31-42]