Journal: J. Mathematical Cryptology

Volume 12, Issue 4

191 -- 202Eduardo Carvalho Pinto, Christophe Petit. Better path-finding algorithms in LPS Ramanujan graphs
203 -- 220Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay. Multi-prover proof of retrievability
221 -- 239Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini. DAGS: Key encapsulation using dyadic GS codes
241 -- 259Avik Chakraborti, Nilanjan Datta, Mridul Nandi. On the optimality of non-linear computations for symmetric key primitives

Volume 12, Issue 3

119 -- 136Wachirapong Jirakitpuwapat, Parin Chaipunya, Poom Kumam, Sompong Dhompongsa, Phatiphat Thounthong. New methods of construction of cartesian authentication codes from geometries over finite commutative rings
137 -- 141Matvei Kotov, Alexander Ushakov. Analysis of a key exchange protocol based on tropical matrix algebra
143 -- 157Håvard Raddum, Pavol Zajac. MRHS solver based on linear algebra and exhaustive search
159 -- 190Sanjit Chatterjee, M. Prem Laxman Das, R. Kabaleeshwaran. Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis

Volume 12, Issue 2

83 -- 99Georgios Fotiadis, Elisavet Konstantinou. Generating pairing-friendly elliptic curve parameters using sparse families
101 -- 118Prabhat Kushwaha. Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group

Volume 12, Issue 1

1 -- 21Juha Partala. Algebraic generalization of Diffie-Hellman key exchange
23 -- 35Tran van Trung. Construction of strongly aperiodic logarithmic signatures
37 -- 42Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. A fundamental flaw in the ++AE authenticated encryption mode
43 -- 56Sabyasachi Dey, Santanu Sarkar 0001. Generalization of Roos bias in RC4 and some results on key-keystream relations
57 -- 81Thalia M. Laing, Douglas R. Stinson. A survey and refinement of repairable threshold schemes