Startseite Mathematik Special issue based on the CIFRIS 2023 conference
Artikel Open Access

Special issue based on the CIFRIS 2023 conference

  • Massimiliano Sala EMAIL logo
Veröffentlicht/Copyright: 31. Dezember 2024

Coordinating Editors:

Massimiliano Sala, Department of Mathematics, University of Trento, Trento, Italy

Robert Coulter, Department of​ Mathematical Sciences, University of Delaware, Delaware, United States

Aims and scope of the special issue

This Special Issue has been published in cooperation with “De Componendis Cifris Associazione di Promozione Sociale” (De Cifris) – the organizers of the CIFRIS23 conference. The event was held in Rome, Italy on 14–15 December 2023. It aimed to bring together researchers in the field of cryptography, practitioners, developers, and users to foster cooperation and exchange techniques, tools, experience, and ideas. As a result of the cooperation, ten articles have been published in Volume 18 (2024) of the Journal of Mathematical Cryptology.

Table of contents

[1] Erdélyi, Márton, Hegedüs, Pál, Kiss, Sándor Z. and Nagy, Gábor P. “On linear codes with random multiplier vectors and the maximum trace dimension property.” J Math Cryptol. 2024;18(1):20230022. https://doi.org/10.1515/jmc-2023-0022.

[2] Sala, Massimiliano and Taufer, Daniele. “Group structure of elliptic curves over ℤ/Nℤ.” J Math Cryptol. 2024;18(1):20230025. https://doi.org/10.1515/jmc-2023-0025.

[3] Cianfriglia, Marco, Onofri, Elia and Pedicini, Marco. “mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.” J Math Cryptol. 2024;18(1):20230026. https://doi.org/10.1515/jmc-2023-0026.

[4] Yamashita, Kyosuke and Hara, Keisuke. “On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes.” J Math Cryptol. 2024;18(1):20230028. https://doi.org/10.1515/jmc-2023-0028.

[5] Calderini, Marco, Longo, Riccardo, Sala, Massimiliano and Villa, Irene. “Searchable encryption with randomized ciphertext and randomized keyword search.” J Math Cryptol. 2024;18(1):20230029. https://doi.org/10.1515/jmc-2023-0029.

[6] Calderini, Marco, Civino, Roberto and Invernizzi, Riccardo. “Differential experiments using parallel alternative operations.” J Math Cryptol. 2024;18(1):20230030. https://doi.org/10.1515/jmc-2023-0030.

[7] Timpanella, Marco. “On a generalization of the Deligne–Lusztig curve of Suzuki type and application to AG codes.” J Math Cryptol. 2024;18(1):20230024. https://doi.org/10.1515/jmc-2023-0024.

[8] Rouquette, Loïc, Minier, Marine and Solnon, Christine. “Automatic boomerang attacks search on Rijndael.” J Math Cryptol. 2024;18(1):20230027. https://doi.org/10.1515/jmc-2023-0027.

[9] Ghantous, Wissam, Pintore, Federico and Veroni, Mattia. “Efficiency of SIDH-based signatures (yes, SIDH).” J Math Cryptol. 2024;18(1):20230023. https://doi.org/10.1515/jmc-2023-0023.

[10] Eskeland, Sigurd. “Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection.” J Math Cryptol. 2024;18(1):20230032. https://doi.org/10.1515/jmc-2023-0032.

Published Online: 2024-12-31

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Heruntergeladen am 29.12.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jmc-2024-1000/html
Button zum nach oben scrollen