Coordinating Editors:
Massimiliano Sala, Department of Mathematics, University of Trento, Trento, Italy
Robert Coulter, Department of Mathematical Sciences, University of Delaware, Delaware, United States
Aims and scope of the special issue
This Special Issue has been published in cooperation with “De Componendis Cifris Associazione di Promozione Sociale” (De Cifris) – the organizers of the CIFRIS23 conference. The event was held in Rome, Italy on 14–15 December 2023. It aimed to bring together researchers in the field of cryptography, practitioners, developers, and users to foster cooperation and exchange techniques, tools, experience, and ideas. As a result of the cooperation, ten articles have been published in Volume 18 (2024) of the Journal of Mathematical Cryptology.
Table of contents
[1] Erdélyi, Márton, Hegedüs, Pál, Kiss, Sándor Z. and Nagy, Gábor P. “On linear codes with random multiplier vectors and the maximum trace dimension property.” J Math Cryptol. 2024;18(1):20230022. https://doi.org/10.1515/jmc-2023-0022.
[2] Sala, Massimiliano and Taufer, Daniele. “Group structure of elliptic curves over ℤ/Nℤ.” J Math Cryptol. 2024;18(1):20230025. https://doi.org/10.1515/jmc-2023-0025.
[3] Cianfriglia, Marco, Onofri, Elia and Pedicini, Marco. “mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.” J Math Cryptol. 2024;18(1):20230026. https://doi.org/10.1515/jmc-2023-0026.
[4] Yamashita, Kyosuke and Hara, Keisuke. “On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes.” J Math Cryptol. 2024;18(1):20230028. https://doi.org/10.1515/jmc-2023-0028.
[5] Calderini, Marco, Longo, Riccardo, Sala, Massimiliano and Villa, Irene. “Searchable encryption with randomized ciphertext and randomized keyword search.” J Math Cryptol. 2024;18(1):20230029. https://doi.org/10.1515/jmc-2023-0029.
[6] Calderini, Marco, Civino, Roberto and Invernizzi, Riccardo. “Differential experiments using parallel alternative operations.” J Math Cryptol. 2024;18(1):20230030. https://doi.org/10.1515/jmc-2023-0030.
[7] Timpanella, Marco. “On a generalization of the Deligne–Lusztig curve of Suzuki type and application to AG codes.” J Math Cryptol. 2024;18(1):20230024. https://doi.org/10.1515/jmc-2023-0024.
[8] Rouquette, Loïc, Minier, Marine and Solnon, Christine. “Automatic boomerang attacks search on Rijndael.” J Math Cryptol. 2024;18(1):20230027. https://doi.org/10.1515/jmc-2023-0027.
[9] Ghantous, Wissam, Pintore, Federico and Veroni, Mattia. “Efficiency of SIDH-based signatures (yes, SIDH).” J Math Cryptol. 2024;18(1):20230023. https://doi.org/10.1515/jmc-2023-0023.
[10] Eskeland, Sigurd. “Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection.” J Math Cryptol. 2024;18(1):20230032. https://doi.org/10.1515/jmc-2023-0032.
© 2024 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Regular Article
- The dihedral hidden subgroup problem
- Characterizing the upper bound on the transparency order of (n, m)-functions
- Tropical cryptography III: Digital signatures
- A security analysis of two classes of RSA-like cryptosystems
- On the quantum security of high-dimensional RSA protocol
- On implementation of Stickel's key exchange protocol over max-min and max-T semirings
- Revocable policy-based chameleon hash using lattices
- Revisiting linearly extended discrete functions
- Special Issue based on CIFRIS23
- Special issue based on the CIFRIS 2023 conference
- On linear codes with random multiplier vectors and the maximum trace dimension property
- Group structure of elliptic curves over ℤ/Nℤ
- mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
- On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes
- Searchable encryption with randomized ciphertext and randomized keyword search
- Differential experiments using parallel alternative operations
- On a generalization of the Deligne–Lusztig curve of Suzuki type and application to AG codes
- Automatic boomerang attacks search on Rijndael
- Efficiency of SIDH-based signatures (yes, SIDH)
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Artikel in diesem Heft
- Regular Article
- The dihedral hidden subgroup problem
- Characterizing the upper bound on the transparency order of (n, m)-functions
- Tropical cryptography III: Digital signatures
- A security analysis of two classes of RSA-like cryptosystems
- On the quantum security of high-dimensional RSA protocol
- On implementation of Stickel's key exchange protocol over max-min and max-T semirings
- Revocable policy-based chameleon hash using lattices
- Revisiting linearly extended discrete functions
- Special Issue based on CIFRIS23
- Special issue based on the CIFRIS 2023 conference
- On linear codes with random multiplier vectors and the maximum trace dimension property
- Group structure of elliptic curves over ℤ/Nℤ
- mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
- On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes
- Searchable encryption with randomized ciphertext and randomized keyword search
- Differential experiments using parallel alternative operations
- On a generalization of the Deligne–Lusztig curve of Suzuki type and application to AG codes
- Automatic boomerang attacks search on Rijndael
- Efficiency of SIDH-based signatures (yes, SIDH)
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection