×

Journal of Cryptology

The Journal of the International Association for Cryptologic Research

Short Title: J. Cryptology
Publisher: Springer US, New York, NY
ISSN: 0933-2790; 1432-1378/e
Online: https://link.springer.com/journal/145/volumes-and-issues
Comments: Journal; Indexed cover-to-cover
Documents Indexed: 790 Publications (since 1988)
References Indexed: 613 Publications with 23,688 References.
all top 5

Latest Issues

37, No. 4 (2024)
37, No. 3 (2024)
37, No. 2 (2024)
37, No. 1 (2024)
36, No. 4 (2023)
36, No. 3 (2023)
36, No. 2 (2023)
36, No. 1 (2023)
35, No. 4 (2022)
35, No. 3 (2022)
35, No. 2 (2022)
35, No. 1 (2022)
34, No. 4 (2021)
34, No. 3 (2021)
34, No. 2 (2021)
34, No. 1 (2021)
33, No. 4 (2020)
33, No. 3 (2020)
33, No. 2 (2020)
33, No. 1 (2020)
32, No. 4 (2019)
32, No. 3 (2019)
32, No. 2 (2019)
32, No. 1 (2019)
31, No. 4 (2018)
31, No. 3 (2018)
31, No. 2 (2018)
31, No. 1 (2018)
30, No. 4 (2017)
30, No. 3 (2017)
30, No. 2 (2017)
30, No. 1 (2017)
29, No. 4 (2016)
29, No. 3 (2016)
29, No. 2 (2016)
29, No. 1 (2016)
28, No. 4 (2015)
28, No. 3 (2015)
28, No. 2 (2015)
28, No. 1 (2015)
27, No. 4 (2014)
27, No. 3 (2014)
27, No. 2 (2014)
27, No. 1 (2014)
26, No. 4 (2013)
26, No. 3 (2013)
26, No. 2 (2013)
26, No. 1 (2013)
25, No. 4 (2012)
25, No. 3 (2012)
25, No. 2 (2012)
25, No. 1 (2012)
24, No. 4 (2011)
24, No. 3 (2011)
24, No. 2 (2011)
24, No. 1 (2011)
23, No. 4 (2010)
23, No. 3 (2010)
23, No. 2 (2010)
23, No. 1 (2010)
22, No. 4 (2009)
22, No. 3 (2009)
22, No. 2 (2009)
22, No. 1 (2009)
21, No. 4 (2008)
21, No. 3 (2008)
21, No. 2 (2008)
21, No. 1 (2008)
20, No. 4 (2007)
20, No. 3 (2007)
20, No. 2 (2007)
20, No. 1 (2007)
19, No. 4 (2006)
19, No. 3 (2006)
19, No. 2 (2006)
19, No. 1 (2006)
18, No. 4 (2005)
18, No. 3 (2005)
18, No. 2 (2005)
18, No. 1 (2005)
17, No. 4 (2004)
17, No. 3 (2004)
17, No. 2 (2004)
17, No. 1 (2004)
16, No. 4 (2003)
16, No. 3 (2003)
16, No. 2 (2003)
16, No. 1 (2003)
15, No. 4 (2002)
15, No. 3 (2002)
15, No. 2 (2002)
15, No. 1 (2001)
14, No. 4 (2001)
14, No. 3 (2001)
14, No. 2 (2001)
14, No. 1 (2001)
13, No. 4 (2000)
13, No. 3 (2000)
13, No. 2 (2000)
13, No. 1 (2000)
...and 41 more Volumes
all top 5

Authors

32 Lindell, Yehuda
21 Hazay, Carmit
18 Shamir, Adi
16 Segev, Gil
15 Biham, Eli
14 Ishai, Yuval
14 Katz, Jonathan N.
13 Bellare, Mihir
13 Dunkelman, Orr
13 Hofheinz, Dennis
13 Keller, Nathan
12 Canetti, Ran
12 Cohen, Ran
12 Goldreich, Oded
12 Knudsen, Lars Ramkilde
12 Maurer, Ueli M.
12 Smart, Nigel Paul
11 Applebaum, Benny
11 Kiltz, Eike
11 Naor, Moni
11 Ostrovsky, Rafail
10 Asharov, Gilad
10 Gennaro, Rosario
10 Shoup, Victor
10 Stinson, Douglas Robert
9 Damgård, Ivan Bjerre
9 Pinkas, Benny
9 Rogaway, Phillip
8 Haitner, Iftach
8 Komargodski, Ilan
8 Nishimaki, Ryo
8 Omri, Eran
8 Rosen, Alon
8 Venkitasubramaniam, Muthuramakrishnan
7 Abdalla, Michel
7 Beimel, Amos
7 Coppersmith, Don
7 De Santis, Alfredo
7 Halevi, Shai
7 Jager, Tibor
7 Kushilevitz, Eyal
6 Abe, Masayuki
6 Bitansky, Nir
6 Boyar, Joan F.
6 Brakerski, Zvika
6 Catalano, Dario
6 Dinur, Itai
6 Garay, Juan A.
6 Groth, Jens
6 Malkin, Tal G.
6 Naya-Plasencia, María
6 Pass, Rafael
6 Patra, Arpita
6 Pointcheval, David
6 Rabin, Tal
6 Stern, Jacques
6 Tibouchi, Mehdi
6 Unruh, Dominique
6 Vaudenay, Serge
6 Venturi, Daniele
6 Wichs, Daniel
6 Yung, Moti
5 Benhamouda, Fabrice
5 Blundo, Carlo
5 Bogdanov, Andrej
5 Boneh, Dan
5 Brassard, Gilles
5 Coron, Jean-Sébastien
5 Dachman-Soled, Dana
5 Faust, Sebastian
5 Fischlin, Marc
5 Golić, Jovan Dj.
5 Joux, Antoine
5 Kitagawa, Fuyuki
5 Kiyoshima, Susumu
5 Leander, Gregor
5 Meier, Willi
5 Reingold, Omer
5 Reyzin, Leonid
5 Rotem, Lior
5 Schröder, Dominique
5 Vanstone, Scott Alexander
5 Waters, Brent
5 Yamakawa, Takashi
4 Boyle, Elette
4 Desmedt, Yvo G.
4 Fiat, Amos
4 Fouque, Pierre-Alain
4 Galbraith, Steven D.
4 Gaudry, Pierrick
4 Johansson, Thomas
4 Katsumata, Shuichi
4 Klapper, Andrew M.
4 Koblitz, Neal I.
4 Kurosawa, Kaoru
4 Libert, Benoît
4 Magliveras, Spyros S.
4 Malone-Lee, John
4 Micali, Silvio
4 Moran, Tal
...and 1,022 more Authors

Publications by Year

Citations contained in zbMATH Open

647 Publications have been cited 10,309 times in 6,545 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
396
1991
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P.
267
1991
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques
240
2000
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
230
2000
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni
175
1991
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don
160
1997
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John
132
1992
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David
130
1988
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
130
2004
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair
129
1994
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J.
126
1999
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z.
122
2009
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn
120
2010
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
106
2009
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S.
101
2004
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel
100
1996
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
97
1988
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
92
2008
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay
87
1997
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar
83
1989
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki
81
2013
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M.
80
1991
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal
79
1989
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo
75
1993
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M.
68
2005
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
68
1994
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
68
2003
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın
63
2008
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer
61
1999
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark
58
1997
The size of a share must be large. Zbl 0897.94012
Csirmaz, László
58
1997
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli
58
2000
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal
56
2007
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P.
55
2001
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
54
2012
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio
53
1996
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather
52
1988
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine
52
2004
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
51
2020
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin
51
2011
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
51
2012
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni
50
1996
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David
49
2011
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo
48
1995
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
47
2017
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R.
44
1992
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R.
44
2008
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M.
44
1992
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao
43
1993
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir
43
2007
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R.
43
2001
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
42
2005
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde
42
1995
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P.
41
1999
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge
41
2017
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
40
2008
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R.
40
1990
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran
40
2002
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
39
2008
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan
39
2012
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
39
2001
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Zbl 1097.68559
Cachin, Christian; Kursawe, Klaus; Shoup, Victor
38
2005
Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016
Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti
38
1998
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques
37
1998
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge
37
2003
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E.
35
2002
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal
35
1998
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P.
35
2004
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
34
2002
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
34
2020
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San
33
2011
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M.
33
2000
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
33
2002
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
32
2006
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
32
2003
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
32
2017
Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431
Bender, Adam; Katz, Jonathan; Morselli, Ruggero
31
2009
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
31
2011
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
31
2007
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P.
31
2008
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud
30
2018
A key-exchange system based on imaginary quadratic fields. Zbl 0659.94004
Buchmann, Johannes; Williams, H. C.
30
1988
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
30
2019
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
29
2021
Logic minimization techniques with applications to cryptology. Zbl 1279.94056
Boyar, Joan; Matthews, Philip; Peralta, René
29
2013
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael
29
2011
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo
29
1992
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Phillip
29
2001
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan
29
2007
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation. Zbl 0861.94013
Bellare, Mihir; Yung, Moti
29
1996
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.
29
1999
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
27
2013
A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069
Goldreich, Oded
27
1993
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris
27
1990
Secure communication in minimal connectivity models. Zbl 0957.68042
Franklin, Matthew; Wright, Rebecca N.
27
2000
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel
26
2019
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim
26
2003
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor
26
2000
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M.
25
1992
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D.
25
1992
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. Zbl 1511.94084
Datta, Pratish; Komargodski, Ilan; Waters, Brent
6
2023
On the hardness of module learning with errors with short distributions. Zbl 1509.94069
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang
5
2023
Fiat-Shamir transformation of multi-round interactive proofs (Extended version). Zbl 1519.94040
Attema, Thomas; Fehr, Serge; Klooß, Michael
5
2023
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience. Zbl 1511.94078
Choudhury, Ashish; Patra, Arpita
4
2023
High-throughput secure three-party computation with an honest majority. Zbl 07707563
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
3
2023
Bootstrapping for BGV and BFV revisited. Zbl 1511.94102
Geelen, Robin; Vercauteren, Frederik
2
2023
Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries. Zbl 1517.94053
Appan, Ananya; Chandramouli, Anirudh; Choudhury, Ashish
2
2023
Oblivious RAM with worst-case logarithmic overhead. Zbl 1511.94045
Asharov, Gilad; Komargodski, Ilan; Lin, Wei-Kai; Shi, Elaine
1
2023
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. Zbl 1517.94087
Coutinho, Murilo; Passos, Iago; Grados Vásquez, Juan C.; Sarkar, Santanu; de Mendonça, Fábio L. L.; de Sousa, Rafael T. jun.; Borges, Fábio
1
2023
Learn from your faults: leakage assessment in fault attacks using deep learning. Zbl 1517.94150
Saha, Sayandeep; Alam, Manaar; Bag, Arnab; Mukhopadhyay, Debdeep; Dasgupta, Pallab
1
2023
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. Zbl 1517.94123
Libert, Benoît; Ling, San; Khoa Nguyen; Wang, Huaxiong
1
2023
Rinocchio: SNARKs for ring arithmetic. Zbl 1527.94039
Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo
1
2023
Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic. Zbl 07730739
Belorgey, Mariya Georgieva; Carpov, Sergiu; Deforth, Kevin; Jetchev, Dimitar; Sae-Tang, Abson; Vuille, Marius; Gama, Nicolas; Katz, Jon; Leontiadis, Iraklis; Mohammadi, Mohsen
1
2023
Cover attacks for elliptic curves over cubic extension fields. Zbl 1519.94189
Tian, Song
1
2023
Unbounded predicate inner product functional encryption from pairings. Zbl 1518.94056
Dowerah, Uddipana; Dutta, Subhranil; Mitrokotsa, Aikaterini; Mukherjee, Sayantan; Pal, Tapas
1
2023
Actively secure garbled circuits with constant communication overhead in the plain model. Zbl 1518.94066
Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan
1
2023
Parameter optimization and larger precision for (T)FHE. Zbl 1518.94045
Bergerat, Loris; Boudi, Anas; Bourgerie, Quentin; Chillotti, Ilaria; Ligier, Damien; Orfila, Jean-Baptiste; Tap, Samuel
1
2023
Semi-quantum money. Zbl 1491.81016
Radian, Roy; Sattath, Or
11
2022
Actively secure setup for SPDZ. Zbl 1481.94122
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim
6
2022
Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina
4
2022
Non-commutative ring learning with errors from cyclic algebras. Zbl 1497.94096
Grover, Charles; Mendelsohn, Andrew; Ling, Cong; Vehkalahti, Roope
3
2022
The inverse of \(\chi\) and its applications to Rasta-like ciphers. Zbl 1498.94071
Liu, Fukang; Sarkar, Santanu; Meier, Willi; Isobe, Takanori
3
2022
Improved differential-linear attacks with applications to ARX ciphers. Zbl 1504.94103
Beierle, Christof; Broll, Marek; Canale, Federico; David, Nicolas; Flórez-Gutiérrez, Antonio; Leander, Gregor; Naya-Plasencia, María; Todo, Yosuke
3
2022
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices. Zbl 1489.94119
Damgård, Ivan; Orlandi, Claudio; Takahashi, Akira; Tibouchi, Mehdi
2
2022
On the round complexity of randomized Byzantine agreement. Zbl 1489.94092
Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex
2
2022
From fairness to full security in multiparty computation. Zbl 1486.94091
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
2
2022
CCA security and trapdoor functions via key-dependent-message security. Zbl 1486.94119
Kitagawa, Fuyuki; Matsuda, Takahiro; Tanaka, Keisuke
1
2022
Non-malleable functions and their applications. Zbl 1486.94086
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M.
1
2022
Everlasting UC commitments from fully malicious PUFs. Zbl 1492.94146
Magri, Bernardo; Malavolta, Giulio; Schröder, Dominique; Unruh, Dominique
1
2022
ZK-PCPs from leakage-resilient secret sharing. Zbl 1494.94046
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Weiss, Mor
1
2022
Signed (group) Diffie-Hellman key exchange with tight security. Zbl 1498.94079
Pan, Jiaxin; Qian, Chen; Ringerud, Magnus
1
2022
Efficient perfectly secure computation with optimal resilience. Zbl 1499.94033
Abraham, Ittai; Asharov, Gilad; Yanai, Avishay
1
2022
On the (in)security of ROS. Zbl 1497.94076
Benhamouda, Fabrice; Lepoint, Tancrède; Loss, Julian; Orrù, Michele; Raykova, Mariana
1
2022
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
29
2021
Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin
16
2021
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082
Diemert, Denis; Jager, Tibor
15
2021
Bootstrapping for helib. Zbl 1460.94046
Halevi, Shai; Shoup, Victor
9
2021
The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081
Kaspers, Christian; Zhou, Yue
8
2021
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114
Zhandry, Mark
8
2021
On subversion-resistant SNARKs. Zbl 1467.94021
Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał
7
2021
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
7
2021
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111
Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph
7
2021
Fine-grained cryptography revisited. Zbl 1469.94094
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke
7
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
7
2021
Modeling for three-subset division property without unknown subset. Zbl 1470.94087
Hao, Yonglin; Leander, Gregor; Meier, Willi; Todo, Yosuke; Wang, Qingju
6
2021
The Deoxys AEAD family. Zbl 1470.94091
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick
5
2021
Match me if you can: matchmaking encryption and its applications. Zbl 1467.94027
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele
4
2021
Round-optimal secure multi-party computation. Zbl 1469.94101
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
4
2021
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. Zbl 1469.94088
Aviram, Nimrod; Gellert, Kai; Jager, Tibor
4
2021
The design and evolution of OCB. Zbl 1472.94056
Krovetz, Ted; Rogaway, Phillip
4
2021
Tight tradeoffs in searchable symmetric encryption. Zbl 1460.94035
Asharov, Gilad; Segev, Gil; Shahaf, Ido
4
2021
Reusable fuzzy extractors for low-entropy distributions. Zbl 1466.94021
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
3
2021
Round-preserving parallel composition of probabilistic-termination cryptographic protocols. Zbl 1515.68139
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis
3
2021
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina
3
2021
Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 1518.68088
Kim, Sam; Wu, David J.
3
2021
Translating the discrete logarithm problem on Jacobians of genus 3 hyperelliptic curves with \((\ell ,\ell ,\ell)\)-isogenies. Zbl 1467.14107
Tian, Song
3
2021
Is there an oblivious RAM lower bound for online reads? Zbl 1518.68091
Weiss, Mor; Wichs, Daniel
2
2021
Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026
Applebaum, Benny; Vasudevan, Prashant Nalini
2
2021
Simple and generic constructions of succinct functional encryption. Zbl 1469.94103
Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke
2
2021
Compact designated verifier NIZKs from the CDH assumption without pairings. Zbl 1479.94198
Katsumata, Shuichi; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi
2
2021
Fast secure two-party ECDSA signing. Zbl 1479.94332
Lindell, Yehuda
2
2021
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on Gimli. Zbl 1479.94171
Flórez-Gutiérrez, Antonio; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Schrottenloher, André; Sibleyras, Ferdinand
2
2021
Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1460.94064
Rosen, Alon; Segev, Gil; Shahaf, Ido
2
2021
Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025
Applebaum, Benny; Brakerski, Zvika
1
2021
Learning strikes again: the case of the DRS signature scheme. Zbl 1466.94045
Ducas, Léo; Yu, Yang
1
2021
Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073
Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi
1
2021
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
51
2020
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
34
2020
Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155
Galbraith, Steven D.; Petit, Christophe; Silva, Javier
18
2020
Efficient verifiable delay functions. Zbl 1453.94125
Wesolowski, Benjamin
14
2020
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
9
2020
The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
9
2020
Efficient and scalable universal circuits. Zbl 1462.94027
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
8
2020
Tight security of cascaded LRW2. Zbl 1457.94141
Jha, Ashwin; Nandi, Mridul
8
2020
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
7
2020
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
6
2020
Blockcipher-based authenticated encryption: how small can we go? Zbl 1457.94107
Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul
5
2020
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. Zbl 1457.94153
Kowalczyk, Lucas; Wee, Hoeteck
5
2020
Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099
Beyne, Tim
5
2020
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel
5
2020
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza
5
2020
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
4
2020
Foundations of fully dynamic group signatures. Zbl 1453.94063
Bootle, Jonathan; Cerulli, Andrea; Chaidos, Pyrros; Ghadafi, Essam; Groth, Jens
4
2020
Kummer for genus one over prime-order fields. Zbl 1455.94169
Karati, Sabyasachi; Sarkar, Palash
3
2020
Topology-hiding computation on all graphs. Zbl 1455.94103
Akavia, Adi; LaVigne, Rio; Moran, Tal
3
2020
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng
3
2020
The communication complexity of private simultaneous messages, revisited. Zbl 1457.94003
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer
3
2020
Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127
Bitansky, Nir
3
2020
Tightly secure hierarchical identity-based encryption. Zbl 1453.94095
Langrehr, Roman; Pan, Jiaxin
3
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
2
2020
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail
2
2020
Revisiting the wrong-key-randomization hypothesis. Zbl 1455.94113
Ashur, Tomer; Beyne, Tim; Rijmen, Vincent
2
2020
Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo
2
2020
Cryptanalysis of OCB2: attacks on authenticity and confidentiality. Zbl 1453.94089
Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram
2
2020
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
2
2020
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds. Zbl 1453.94131
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan
2
2020
Generic attacks on hash combiners. Zbl 1457.94095
Bao, Zhenzhen; Dinur, Itai; Guo, Jian; Leurent, Gaëtan; Wang, Lei
1
2020
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi
1
2020
Multilinear maps from obfuscation. Zbl 1457.94090
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G.
1
2020
Spin me right round rotational symmetry for FPGA-specific AES: extended version. Zbl 1457.94192
Wegener, Felix; De Meyer, Lauren; Moradi, Amir
1
2020
...and 547 more Documents
all top 5

Cited by 7,374 Authors

63 Susilo, Willy
53 Ishai, Yuval
48 Ostrovsky, Rafail
42 Hazay, Carmit
41 Lindell, Yehuda
41 Pass, Rafael
40 Shparlinski, Igor E.
36 Mu, Yi
35 Dunkelman, Orr
35 Hu, Lei
35 Kiltz, Eike
35 Wang, Huaxiong
33 Applebaum, Benny
33 Hofheinz, Dennis
33 Nishimaki, Ryo
32 Galbraith, Steven D.
31 De Santis, Alfredo
31 Katz, Jonathan N.
31 Komargodski, Ilan
31 Libert, Benoît
31 Segev, Gil
30 Bellare, Mihir
30 Damgård, Ivan Bjerre
30 Lin, Dongdai
30 Petit, Christophe
30 Qi, Wenfeng
30 Yung, Moti
29 Goyal, Vipul
29 Patra, Arpita
29 Smart, Nigel Paul
29 Stinson, Douglas Robert
29 Waters, Brent
28 Bitansky, Nir
28 Maurer, Ueli M.
28 Sahai, Amit
28 Tessaro, Stefano
28 Venkitasubramaniam, Muthuramakrishnan
27 Canetti, Ran
27 Haitner, Iftach
27 Sarkar, Palash
27 Vaudenay, Serge
27 Wang, Meiqin
27 Wichs, Daniel
26 Cao, Zhenfu
26 Pan, Jiaxin
26 Venturi, Daniele
25 Garg, Sanjam
25 Keller, Nathan
25 Nandi, Mridul
24 Cohen, Ran
24 Khurana, Dakshita
24 Kiayias, Aggelos
24 Rijmen, Vincent
24 Vaikuntanathan, Vinod
24 Yamakawa, Takashi
24 Zhang, Fangguo
23 Beimel, Amos
23 Carlet, Claude
23 Fischlin, Marc
23 Jager, Tibor
23 Jain, Abhishek
23 Nitaj, Abderrahmane
23 Rothblum, Ron D.
23 Sarkar, Santanu
22 Guo, Chun
22 Katsumata, Shuichi
22 Omri, Eran
22 Padró, Carles
22 Pointcheval, David
22 Sasaki, Yu
22 Seurin, Yannick
22 Shamir, Adi
22 Standaert, Francois-Xavier
22 Zhandry, Mark
21 Boyle, Elette
21 Calderini, Marco
21 Choudhary, Ashish
21 Dodis, Yevgeniy
21 Maitra, Subhamoy
21 Malavolta, Giulio
21 Menezes, Alfred J.
21 Naor, Moni
21 Rosen, Alon
21 Vergnaud, Damien
21 Wu, Wenling
21 Yang, Guomin
20 Leander, Gregor
20 Nielsen, Jesper Buus
20 Slamanig, Daniel
19 Asharov, Gilad
19 Boneh, Dan
19 Couteau, Geoffroy
19 Emura, Keita
19 Kurosawa, Kaoru
19 Kushilevitz, Eyal
19 Leurent, Gaëtan
19 Lipmaa, Helger
19 Loss, Julian
19 Mesnager, Sihem
19 Pietrzak, Krzysztof
...and 7,274 more Authors
all top 5

Cited in 323 Journals

397 Designs, Codes and Cryptography
394 Journal of Cryptology
198 Theoretical Computer Science
144 Information Sciences
128 Information Processing Letters
124 Quantum Information Processing
113 Cryptography and Communications
96 Finite Fields and their Applications
95 Journal of Mathematical Cryptology
70 Discrete Applied Mathematics
64 Advances in Mathematics of Communications
60 Mathematics of Computation
49 Applicable Algebra in Engineering, Communication and Computing
47 Matematicheskie Voprosy Kriptografii
46 International Journal of Theoretical Physics
45 Journal of Discrete Mathematical Sciences & Cryptography
38 SIAM Journal on Computing
38 Information and Computation
33 Journal of Computer and System Sciences
31 Applied Mathematics and Computation
29 Discrete Mathematics
28 Prikladnaya Diskretnaya Matematika
27 International Journal of Foundations of Computer Science
25 International Journal of Quantum Information
25 Science China. Information Sciences
24 Journal of Number Theory
22 Physics Letters. A
21 International Journal of Computer Mathematics
20 Journal of Symbolic Computation
19 Computers & Mathematics with Applications
18 Distributed Computing
17 Algorithmica
17 Mathematical Problems in Engineering
16 LMS Journal of Computation and Mathematics
15 Mathematical and Computer Modelling
15 Journal of Systems Science and Complexity
15 Groups, Complexity, Cryptology
14 Journal of Complexity
14 Wuhan University Journal of Natural Sciences (WUJNS)
12 Cybernetics and Systems Analysis
12 Soft Computing
11 Computational Complexity
11 New Journal of Physics
10 Discrete Mathematics and Applications
10 Journal of Modern Optics
10 Science in China. Series F
9 Experimental Mathematics
9 Journal of Applied Mathematics
8 Chaos, Solitons and Fractals
8 Journal of Computer Science and Technology
8 Journal of Mathematical Sciences (New York)
8 Discrete Mathematics, Algorithms and Applications
7 Computing
7 Journal of Computational and Applied Mathematics
7 Journal of Automated Reasoning
7 Nonlinear Dynamics
7 Physical Review Letters
7 Journal of Algebra and its Applications
6 Bulletin of the Australian Mathematical Society
6 Journal of Algebra
6 Acta Applicandae Mathematicae
6 SIAM Journal on Discrete Mathematics
6 Formal Aspects of Computing
6 Mathematical Structures in Computer Science
6 Linear Algebra and its Applications
6 Theory of Computing Systems
6 Journal of the ACM
6 The Journal of Logic and Algebraic Programming
6 Journal of Applied Mathematics and Computing
6 JSIAM Letters
5 Communications in Algebra
5 Journal of Combinatorial Theory. Series A
5 Automation and Remote Control
5 Pattern Recognition
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Tatra Mountains Mathematical Publications
5 Journal of Shanghai Jiaotong University (Science)
5 Science China. Mathematics
5 Symmetry
5 Arabian Journal for Science and Engineering
4 Problems of Information Transmission
4 Journal of Statistical Planning and Inference
4 European Journal of Combinatorics
4 Japan Journal of Industrial and Applied Mathematics
4 Games and Economic Behavior
4 Applied Mathematics. Series B (English Edition)
4 Computational and Applied Mathematics
4 Journal of Combinatorial Optimization
4 Acta Mathematica Sinica. English Series
4 Electronic Commerce Research
4 International Journal of Number Theory
4 Mathematics in Computer Science
4 Logical Methods in Computer Science
4 RAIRO. Theoretical Informatics and Applications
4 Computer Science Review
3 Computer Physics Communications
3 Periodica Mathematica Hungarica
3 Physica A
3 ACM Transactions on Mathematical Software
3 Annali di Matematica Pura ed Applicata. Serie Quarta
...and 223 more Journals
all top 5

Cited in 53 Fields

5,632 Information and communication theory, circuits (94-XX)
1,865 Computer science (68-XX)
928 Number theory (11-XX)
625 Quantum theory (81-XX)
430 Algebraic geometry (14-XX)
235 Combinatorics (05-XX)
122 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
96 Group theory and generalizations (20-XX)
65 Order, lattices, ordered algebraic structures (06-XX)
65 Field theory and polynomials (12-XX)
62 Numerical analysis (65-XX)
53 Statistics (62-XX)
52 Probability theory and stochastic processes (60-XX)
52 Operations research, mathematical programming (90-XX)
36 Mathematical logic and foundations (03-XX)
30 Dynamical systems and ergodic theory (37-XX)
26 Linear and multilinear algebra; matrix theory (15-XX)
22 Commutative algebra (13-XX)
22 Geometry (51-XX)
21 Associative rings and algebras (16-XX)
11 Convex and discrete geometry (52-XX)
10 Systems theory; control (93-XX)
9 Mechanics of particles and systems (70-XX)
8 Optics, electromagnetic theory (78-XX)
7 Statistical mechanics, structure of matter (82-XX)
6 Biology and other natural sciences (92-XX)
5 General and overarching topics; collections (00-XX)
5 General algebraic systems (08-XX)
4 History and biography (01-XX)
4 Category theory; homological algebra (18-XX)
4 Partial differential equations (35-XX)
4 Difference and functional equations (39-XX)
4 Geophysics (86-XX)
3 Ordinary differential equations (34-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Abstract harmonic analysis (43-XX)
3 Fluid mechanics (76-XX)
3 Relativity and gravitational theory (83-XX)
2 Nonassociative rings and algebras (17-XX)
2 Topological groups, Lie groups (22-XX)
2 Special functions (33-XX)
2 Approximations and expansions (41-XX)
2 Operator theory (47-XX)
2 General topology (54-XX)
2 Global analysis, analysis on manifolds (58-XX)
1 Real functions (26-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Sequences, series, summability (40-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Manifolds and cell complexes (57-XX)
1 Mathematics education (97-XX)

Citations by Year