researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Mathematical Cryptology
Home
Index
Info
Volume
Volume
5
, Issue
3-4
205
--
224
Neal Koblitz
.
Another look at automated theorem-proving II
225
--
246
Dustin Moody
,
Hongfeng Wu
.
Families of elliptic curves with rational 3-torsion
247
--
275
Charles Bouillaguet
,
Pierre-Alain Fouque
,
Antoine Joux
,
Joana Treger
.
A family of weak keys in HFE and the corresponding practical key-recovery
277
--
301
Yeow Meng Chee
,
Huaxiong Wang
,
Liang Feng Zhang
.
On the Bringer-Chabanne EPIR protocol for polynomial evaluation
Volume
5
, Issue
2
101
--
114
Gaetan Bisson
.
Computing endomorphism rings of elliptic curves under the GRH
115
--
158
Nuttapong Attrapadung
,
Benoît Libert
.
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
159
--
168
Simon R. Blackburn
,
Carlos Cid
,
Ciaran Mullan
.
Cryptanalysis of three matrix-based key establishment protocols
169
--
204
Marc Fischlin
,
Dominique Schröder
.
Security of blind signatures under aborts and applications to adaptive oblivious transfer
Volume
5
, Issue
1
1
--
50
Hüseyin Hisil
,
Kenneth Koon-Ho Wong
,
Gary Carter
,
Ed Dawson
.
An exploration of affine group laws for elliptic curves
51
--
88
Sylvain Duquesne
.
RNS arithmetic in pk and application to fast pairing computation
89
--
100
Mathieu Ciet
,
Jean-Jacques Quisquater
,
Francesco Sica
.
Compact elliptic curve representations