Loading…
On the concrete hardness of Learning with Errors
Albrecht, Martin R., Player, Rachel, Scott, Sam
Published in Journal of mathematical cryptology (01.10.2015)
Published in Journal of mathematical cryptology (01.10.2015)
Get full text
Journal Article
Loading…
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Boura, Christina, Gama, Nicolas, Georgieva, Mariya, Jetchev, Dimitar
Published in Journal of mathematical cryptology (01.01.2020)
Published in Journal of mathematical cryptology (01.01.2020)
Get full text
Journal Article
Loading…
Loading…
Constructing elliptic curve isogenies in quantum subexponential time
Childs, Andrew, Jao, David, Soukharev, Vladimir
Published in Journal of mathematical cryptology (01.02.2014)
Published in Journal of mathematical cryptology (01.02.2014)
Get full text
Journal Article
Loading…
Loading…
Loading…
BTLE: Atomic swaps with time-lock puzzles
Barbara, Fadi, Guglielmino, Enrico, Murru, Nadir, Schifanella, Claudio
Published in Journal of mathematical cryptology (15.04.2025)
Published in Journal of mathematical cryptology (15.04.2025)
Get full text
Journal Article
Loading…
Security analysis of ZKPoK based on MQ problem in the multi-instance setting
Kahrobaei, Delaram, Perret, Ludovic, Vigorito, Martina
Published in Journal of mathematical cryptology (15.04.2025)
Published in Journal of mathematical cryptology (15.04.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Dynamic-FROST: Schnorr threshold signatures with a flexible committee
Cimatti, Annalisa, De Sclavis, Francesco, Galano, Giuseppe, Giammusso, Sara, Iezzi, Michela, Muci, Antonio, Nardelli, Matteo, Pedicini, Marco
Published in Journal of mathematical cryptology (14.04.2025)
Published in Journal of mathematical cryptology (14.04.2025)
Get full text
Journal Article
Loading…
Modern techniques in somewhat homomorphic encryption
Giulietti, Massimo, Martinelli, Paolo, Timpanella, Marco
Published in Journal of mathematical cryptology (14.04.2025)
Published in Journal of mathematical cryptology (14.04.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
A small serving of mash: (Quantum) algorithms for SPDH-Sign with small parameters
Mendelsohn, Andrew, Dable-Heath, Edmund, Ling, Cong
Published in Journal of mathematical cryptology (04.03.2025)
Published in Journal of mathematical cryptology (04.03.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Hash functions from superspecial genus-2 curves using Richelot isogenies
Castryck, Wouter, Decru, Thomas, Smith, Benjamin
Published in Journal of mathematical cryptology (07.08.2020)
Published in Journal of mathematical cryptology (07.08.2020)
Get full text
Journal Article