Factoring with Hints (English)
Free access
- New search for: Sica, Francesco
- New search for: Sica, Francesco
In:
Journal of Mathematical Cryptology
;
15
, 1
;
123-130
;
2020
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Factoring with Hints
-
Contributors:Sica, Francesco ( author )
-
Published in:Journal of Mathematical Cryptology ; 15, 1 ; 123-130
-
Publisher:
- New search for: De Gruyter
-
Publication date:2020-11-17
-
Size:8 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Licence:
-
Source:
Table of contents – Volume 15, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Editor’s Preface for the Second Annual MathCrypt Proceedings VolumeCheon, Jung Hee / Lauter, Kristin / Song, Yongsoo et al. | 2020
- 4
-
A trade-off between classical and quantum circuit size for an attack against CSIDHBiasse, Jean-François / Bonnetain, Xavier / Pring, Benjamin / Schrottenloher, André / Youmans, William et al. | 2020
- 18
-
Towards Isogeny-Based Password-Authenticated Key EstablishmentTaraskin, Oleg / Soukharev, Vladimir / Jao, David / LeGrow, Jason T. et al. | 2020
- 31
-
Algebraic approaches for solving isogeny problems of prime power degreesTakahashi, Yasushi / Kudo, Momonari / Fukasaku, Ryoya / Ikematsu, Yasuhiko / Yasuda, Masaya / Yokoyama, Kazuhiro et al. | 2020
- 45
-
Discretisation and Product Distributions in Ring-LWEMurphy, Sean / Player, Rachel et al. | 2020
- 60
-
Approximate Voronoi cells for lattices, revisitedLaarhoven, Thijs et al. | 2020
- 72
-
(In)Security of Ring-LWE Under Partial Key ExposureDachman-Soled, Dana / Gong, Huijing / Kulkarni, Mukul / Shahverdi, Aria et al. | 2020
- 87
-
Towards a Ring Analogue of the Leftover Hash LemmaDachman-Soled, Dana / Gong, Huijing / Kulkarni, Mukul / Shahverdi, Aria et al. | 2020
- 111
-
The Eleventh Power Residue SymbolJoye, Marc / Lapiha, Oleksandra / Nguyen, Ky / Naccache, David et al. | 2020
- 123
-
Factoring with HintsSica, Francesco et al. | 2020
- 131
-
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign FlipsTibouchi, Mehdi / Wallet, Alexandre et al. | 2020
- 143
-
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKEBiasse, Jean-François / Pring, Benjamin et al. | 2020
- 157
-
Secret sharing and dualityCsirmaz, Laszlo et al. | 2020
- 174
-
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomialScala, Antonio J. Di / Sanna, Carlo / Signorini, Edoardo et al. | 2020
- 179
-
On the equivalence of authentication codes and robust (2, 2)-threshold schemesPaterson, Maura B. / Stinson, Douglas R. et al. | 2020
- 197
-
Pseudo-free families of computational universal algebrasAnokhin, Mikhail et al. | 2020
- 223
-
Lattice Sieving in Three Dimensions for Discrete Log in Medium CharacteristicMcGuire, Gary / Robinson, Oisín et al. | 2020
- 237
-
Attack on Kayawood protocol: uncloaking private keysKotov, Matvei / Menshov, Anton / Ushakov, Alexander et al. | 2020
- 250
-
The circulant hash revisitedAraujo, Filipe / Neves, Samuel et al. | 2020
- 258
-
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxesZhou, Yu / Mu, Daoguang / Dong, Xinfeng et al. | 2020
- 266
-
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group RingsPandey, Atul / Gupta, Indivar / Kumar Singh, Dhiraj et al. | 2020
- 280
-
Remarks on a Tropical Key Exchange SystemRudy, Dylan / Monico, Chris et al. | 2020
- 284
-
A note on secure multiparty computation via higher residue symbolsCascudo, Ignacio / Schnyder, Reto et al. | 2021
- 298
-
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric FunctionsReid, Elizabeth M. et al. | 2021
- 305
-
The Oribatida v1.3 Family of Lightweight Authenticated Encryption SchemesBhattacharjee, Arghya / López, Cuauhtemoc Mancillas / List, Eik / Nandi, Mridul et al. | 2021
- 345
-
Isogenies on twisted Hessian curvesPerez Broon, Fouazou Lontouo / Dang, Thinh / Fouotsa, Emmanuel / Moody, Dustin et al. | 2021
- 359
-
Quantum algorithms for computing general discrete logarithms and orders with tradeoffsEkerå, Martin et al. | 2021
- 408
-
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methodsDugardin, Margaux / Schindler, Werner / Guilley, Sylvain et al. | 2021
- 434
-
Sensitivities and block sensitivities of elementary symmetric Boolean functionsZhang, Jing / Li, Yuan / Adeyeye, John O. et al. | 2021
- 454
-
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic CurvesXiao, Guanju / Luo, Lixia / Deng, Yingpu et al. | 2021
- 465
-
Revocable attribute-based proxy re-encryptionLuo, Fucai / Al-Kuwari, Saif et al. | 2021