Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.01",
%%%     date            = "22 June 2017",
%%%     time            = "10:42:57 MDT",
%%%     filename        = "jmathcryptol.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "62756 3978 14730 152517",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Journal of Mathematical
%%%                        Cryptology",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Mathematical Cryptology (CODEN
%%%                        none, ISSN 1862-2976 (print), 1862-2984
%%%                        (electronic)), published by De Gruyter.
%%%                        Publication began with volume 1, number 1,
%%%                        in January 2007, and there are four issues
%%%                        per annual volume.
%%%
%%%                        The journal has a Web site at
%%%
%%%                            http://www.degruyter.com/view/j/jmc
%%%
%%%                        At version 1.01, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2007 (  20)    2011 (  11)    2015 (  18)
%%%                             2008 (  18)    2012 (  16)    2016 (   9)
%%%                             2009 (  23)    2013 (  19)    2017 (   9)
%%%                             2010 (  11)    2014 (  17)
%%%
%%%                             Article:        171
%%%
%%%                             Total entries:  171
%%%
%%%                        Data for this bibliography have been collected
%%%                        primarily from the journal's Web site, with
%%%                        contributions from the BibNet Project and
%%%                        TeX User Group bibliography archives, and
%%%                        the MathSciNet database.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{\em #1}}       \fi" #
    "\ifx \undefined \k         \let \k = \c                       \fi" #
    "\ifx \undefined \mathbb    \def \mathbb    #1{{\bf #1}}       \fi" #
    "\ifx \undefined \mathbf    \def \mathbf    #1{{\bf #1}}       \fi" #
    "\ifx \undefined \mathrm    \def \mathrm    #1{{\rm #1}}       \fi" #
    "\ifx \undefined \mathscr   \def \mathscr   #1{{\cal #1}}      \fi" #
    "\ifx \undefined \ocirc     \def \ocirc     #1{{\accent'27#1}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-MATH-CRYPTOL        = "Journal of Mathematical Cryptology"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Lange:2007:DSS,
  author =       "Tanja Lange and Igor E. Shparlinski",
  title =        "Distribution of some sequences of points on elliptic
                 curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "1--11",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11G20 (11T23 11T71 14G15 14G50 94A60)",
  MRnumber =     "2314616",
  MRreviewer =   "Edward F. Schaefer",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Martin:2007:CGC,
  author =       "Keith Martin and Siaw-Lynn Ng",
  title =        "The combinatorics of generalised cumulative arrays",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "13--32",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68R05 (94A60 94A62)",
  MRnumber =     "2314617",
  MRreviewer =   "Simon R. Blackburn",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Stinson:2007:SRQ,
  author =       "D. R. Stinson and R. Wei",
  title =        "Some results on query processes and reconstruction
                 functions for unconditionally secure $2$-server
                 $1$-round binary private information retrieval
                 protocols",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "33--46",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2314618",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Menezes:2007:ALH,
  author =       "Alfred Menezes",
  title =        "Another look at {HMQV}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "47--64",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "2314619",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Li:2007:SAC,
  author =       "Yuan Li and T. W. Cusick",
  title =        "Strict avalanche criterion over finite fields",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "65--78",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11T06 (06E30 94A60)",
  MRnumber =     "2314620",
  MRreviewer =   "S. I. Gendler",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Harayama:2007:WSB,
  author =       "Tomohiro Harayama and Donald K. Friesen",
  title =        "{Weil} sum for birthday attack in multivariate
                 quadratic cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "1",
  pages =        "79--104",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T24 11T71)",
  MRnumber =     "2314621",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Silverman:2007:OPS,
  author =       "Robert D. Silverman",
  title =        "Optimal parameterization of {SNFS}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "2",
  pages =        "105--124",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11Y05 (11Y16 65K10 68W15 68W40)",
  MRnumber =     "2345112",
  MRreviewer =   "Qi Cheng",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Walker:2007:PHF,
  author =       "Robert A. {Walker, II} and Charles J. Colbourn",
  title =        "{Perfect Hash} families: constructions and existence",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "2",
  pages =        "125--150",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (05B15)",
  MRnumber =     "2345113",
  MRreviewer =   "Pascal Junod",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Engelbert:2007:SMT,
  author =       "D. Engelbert and R. Overbeck and A. Schmidt",
  title =        "A summary of {McEliece}-type cryptosystems and their
                 security",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "2",
  pages =        "151--199",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 68P25 94B05)",
  MRnumber =     "2345114",
  MRreviewer =   "Zlatko G. Varbanov",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Stinson:2007:EST,
  author =       "D. R. Stinson and J. Wu",
  title =        "An efficient and secure two-flow zero-knowledge
                 identification protocol",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "3",
  pages =        "201--220",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "2372153",
  MRreviewer =   "Mario A. Forcinito",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Daemen:2007:PDC,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "Probability distributions of correlation and
                 differentials in block ciphers",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "3",
  pages =        "221--242",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2372154",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gaudry:2007:FGA,
  author =       "P. Gaudry",
  title =        "Fast genus $2$ arithmetic based on theta functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "3",
  pages =        "243--265",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.012",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11T71 (14K25 94A60)",
  MRnumber =     "2372155",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Galbraith:2007:SPC,
  author =       "Steven D. Galbraith and Colm {{\'O} h{\'E}igeartaigh}
                 and Caroline Sheedy",
  title =        "Simplified pairing computation and security
                 implications",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "3",
  pages =        "267--281",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 14Q05)",
  MRnumber =     "2372156",
  MRreviewer =   "Vincent Rijmen",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Aly:2007:ELC,
  author =       "Hassan Aly and Wilfried Meidl and Arne Winterhof",
  title =        "On the $k$-error linear complexity of cyclotomic
                 sequences",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "3",
  pages =        "283--296",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2007.014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A55 (11T71)",
  MRnumber =     "2372157",
  MRreviewer =   "Nicolae S. Constantinescu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Heuberger:2007:MWC,
  author =       "Clemens Heuberger and James A. Muir",
  title =        "Minimal weight and colexicographically minimal integer
                 representations",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "297--328",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.015",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11A63 (68W40 94A60)",
  MRnumber =     "2441062",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blake:2007:SDC,
  author =       "Ian F. Blake and Igor E. Shparlinski",
  title =        "Statistical distribution and collisions of {VSH}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "329--349",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.016",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11N69 (11T71 11Y16)",
  MRnumber =     "2441063",
  MRreviewer =   "Serge{\u\i} V. Konyagin",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Choi:2007:CHP,
  author =       "Su-Jeong Choi and Simon R. Blackburn and Peter R.
                 Wild",
  title =        "Cryptanalysis of a homomorphic public-key cryptosystem
                 over a finite group",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "351--358",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2441064",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Ruinskiy:2007:LBC,
  author =       "Dima Ruinskiy and Adi Shamir and Boaz Tsaban",
  title =        "Length-based cryptanalysis: the case of {Thompson}'s
                 group",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "359--372",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.018",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20F10)",
  MRnumber =     "2441065",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Aravamuthan:2007:ATO,
  author =       "Sarang Aravamuthan and Sachin Lodha",
  title =        "The average transmission overhead for broadcast
                 encryption",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "373--384",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68P25 (94A17)",
  MRnumber =     "2441066",
  MRreviewer =   "Yannis C. Stamatiou",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Koblitz:2007:ALA,
  author =       "Neal Koblitz",
  title =        "Another look at automated theorem-proving",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "1",
  number =       "4",
  pages =        "385--403",
  year =         "2007",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2007.020",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68T15 (03B35 11T71 94A60)",
  MRnumber =     "2441067",
  MRreviewer =   "Guy Jumarie",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Morales:2008:ADE,
  author =       "David J. Mireles Morales",
  title =        "An attack on disguised elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "1",
  pages =        "1--8",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11G20 14H52)",
  MRnumber =     "2451656",
  MRreviewer =   "Horacio Tapia-Recillas",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Fuji-Hara:2008:TCM,
  author =       "Ryoh Fuji-Hara and Xiyang Li and Ying Miao and Dianhua
                 Wu",
  title =        "A {TWOOA} construction for multi-receiver
                 multi-message authentication codes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "1",
  pages =        "9--28",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (05B15)",
  MRnumber =     "2451657",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Myasnikov:2008:RSA,
  author =       "Alexei G. Myasnikov and Alexander Ushakov",
  title =        "Random subgroups and analysis of the length-based and
                 quotient attacks",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "1",
  pages =        "29--61",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20F36 68W30)",
  MRnumber =     "2451658",
  MRreviewer =   "J{\"u}rgen M{\"u}ller",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Murphy:2008:GVC,
  author =       "S. Murphy and M. B. Paterson",
  title =        "A geometric view of cryptographic equation solving",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "1",
  pages =        "63--107",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68W30 (14N05 94A20 94A60)",
  MRnumber =     "2451659",
  MRreviewer =   "Jos{\'e} Ignacio Farr{\'a}n",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Longrigg:2008:CSC,
  author =       "Jonathan Longrigg and Alexander Ushakov",
  title =        "Cryptanalysis of the shifted conjugacy authentication
                 protocol",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "2",
  pages =        "109--116",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20F36 68W30)",
  MRnumber =     "2433247",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hinek:2008:SMP,
  author =       "M. Jason Hinek",
  title =        "On the security of multi-prime {RSA}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "2",
  pages =        "117--147",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2433248",
  MRreviewer =   "Abderrahmane Nitaj",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Nandi:2008:ISA,
  author =       "Mridul Nandi and Avradip Mandal",
  title =        "Improved security analysis of {PMAC}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "2",
  pages =        "149--162",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2433249",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Demirkiran:2008:CHC,
  author =       "Cevahir Demirkiran and Enric Nart",
  title =        "Counting hyperelliptic curves that admit a {Koblitz}
                 model",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "2",
  pages =        "163--179",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G15 (11G20 14H25 94A60)",
  MRnumber =     "2433250",
  MRreviewer =   "Yves Aubry",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Nguyen:2008:SAS,
  author =       "Phong Q. Nguyen and Thomas Vidick",
  title =        "Sieve algorithms for the shortest vector problem are
                 practical",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "2",
  pages =        "181--207",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11Y16 (11H06)",
  MRnumber =     "2433251",
  MRreviewer =   "Michael E. Pohst",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Fancsali:2008:SAF,
  author =       "Sz. L. Fancsali and P. Ligeti",
  title =        "Some applications of finite geometry for secure
                 network coding",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "3",
  pages =        "209--225",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (51E21)",
  MRnumber =     "2573352",
  MRreviewer =   "Giorgio Faina",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Avanzi:2008:RLG,
  author =       "R. Avanzi and N. Th{\'e}riault and Z. Wang",
  title =        "Rethinking low genus hyperelliptic {Jacobian}
                 arithmetic over binary fields: interplay of field
                 arithmetic and explicit formul{\ae}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "3",
  pages =        "227--255",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (11G20 14H45 94A60)",
  MRnumber =     "2573353",
  MRreviewer =   "Michael J. Jacobson, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Basu:2008:CCE,
  author =       "Riddhipratim Basu and Shirshendu Ganguly and Subhamoy
                 Maitra and Goutam Paul",
  title =        "A complete characterization of the evolution of {RC4}
                 pseudo random generation algorithm",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "3",
  pages =        "257--289",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.012",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2573354",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Schindler:2008:ASM,
  author =       "Werner Schindler",
  title =        "Advanced stochastic methods in side channel analysis
                 on block ciphers in the presence of masking",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "3",
  pages =        "291--310",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (62H99)",
  MRnumber =     "2573355",
  MRreviewer =   "Francesco Sica",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Koblitz:2008:ALN,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "Another look at non-standard discrete log and
                 {Diffie--Hellman} problems",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "4",
  pages =        "311--326",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 14G50 68P25)",
  MRnumber =     "2549460",
  MRreviewer =   "Herv{\'e} P. J. Chabanne",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hartung:2008:ISB,
  author =       "Rupert J. Hartung and Claus-Peter Schnorr",
  title =        "Identification and signatures based on {NP}-hard
                 problems of indefinite quadratic forms",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "4",
  pages =        "327--341",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.015",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11E20 11H71 68Q17)",
  MRnumber =     "2549461",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Mie:2008:PTR,
  author =       "Thilo Mie",
  title =        "Polylogarithmic two-round argument systems",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "4",
  pages =        "343--363",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.016",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68Q15)",
  MRnumber =     "2549462",
  MRreviewer =   "Rog{\'e}rio V. Reis",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Frougny:2008:MWE,
  author =       "Christiane Frougny and Wolfgang Steiner",
  title =        "Minimal weight expansions in {Pisot} bases",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "4",
  pages =        "365--392",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11A63 (11B39 11R06 68Q45 94A60)",
  MRnumber =     "2549463",
  MRreviewer =   "Jamie Simpson",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Paterson:2008:TAS,
  author =       "M. B. Paterson and D. R. Stinson",
  title =        "Two attacks on a sensor network key distribution
                 scheme of {Cheng} and {Agrawal}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "2",
  number =       "4",
  pages =        "393--403",
  year =         "2008",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2008.018",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68M10)",
  MRnumber =     "2549464",
  MRreviewer =   "Michael J. Jacobson, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Galbraith:2009:DMS,
  author =       "Steven D. Galbraith and Jordi Pujol{\`a}s and
                 Christophe Ritzenthaler and Benjamin Smith",
  title =        "Distortion maps for supersingular genus two curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "1",
  pages =        "1--18",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11G20 (11G15 11T71 14G50)",
  MRnumber =     "2524252",
  MRreviewer =   "Annegret Weng",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hitt:2009:FGC,
  author =       "Laura Hitt",
  title =        "Families of genus $2$ curves with small embedding
                 degree",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "1",
  pages =        "19--36",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11G20 11T71 14G50)",
  MRnumber =     "2524253",
  MRreviewer =   "Simon N. Litsyn",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blake:2009:ORS,
  author =       "Ian F. Blake and Vladimir Kolesnikov",
  title =        "One-round secure comparison of integers",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "1",
  pages =        "37--68",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2524254",
  MRreviewer =   "Maura Beth Paterson",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Neven:2009:HFR,
  author =       "Gregory Neven and Nigel P. Smart and Bogdan
                 Warinschi",
  title =        "Hash function requirements for {Schnorr} signatures",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "1",
  pages =        "69--87",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2524255",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Saxena:2009:CPB,
  author =       "Amitabh Saxena and Ben Soh",
  title =        "A cryptographic primitive based on hidden-order
                 groups",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "2",
  pages =        "89--132",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (68P25)",
  MRnumber =     "2590259",
  MRreviewer =   "Lu{\'{\i}}s Antunes",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Nandi:2009:ISA,
  author =       "Mridul Nandi",
  title =        "Improved security analysis for {OMAC} as a
                 pseudorandom function",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "2",
  pages =        "133--148",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2590260",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{vonzurGathen:2009:SSP,
  author =       "Joachim von zur Gathen and Igor E. Shparlinski",
  title =        "Subset sum pseudorandom numbers: fast generation and
                 distribution",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "2",
  pages =        "149--163",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11K45 (68P25 94A60)",
  MRnumber =     "2590261",
  MRreviewer =   "Samuel S. Wagstaff, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hinek:2009:ALS,
  author =       "M. Jason Hinek and Charles C. Y. Lam",
  title =        "Another look at some fast modular arithmetic methods",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "2",
  pages =        "165--174",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68W40 (94A60)",
  MRnumber =     "2590262",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gutierrez:2009:FSW,
  author =       "Jaime Gutierrez",
  title =        "Foreword: {Second Workshop on Mathematical
                 Cryptology}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "175--176",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.008a",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94-06",
  MRnumber =     "2604684",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  note =         "Held in Santander, October 23--25, 2008",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bettale:2009:HAS,
  author =       "Luk Bettale and Jean-Charles Faug{\`e}re and Ludovic
                 Perret",
  title =        "Hybrid approach for solving multivariate systems over
                 finite fields",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "177--197",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "13P15 (13P10 68W30 94A60)",
  MRnumber =     "2604685",
  MRreviewer =   "Jos{\'e} Ignacio Farr{\'a}n",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blackburn:2009:CCG,
  author =       "Simon R. Blackburn",
  title =        "Cryptanalysing the critical group: efficiently solving
                 {Biggs}'s discrete logarithm problem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "199--203",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (05C50)",
  MRnumber =     "2604686",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bourgeois:2009:AAN,
  author =       "G{\'e}rald Bourgeois and Jean-Charles Faug{\`e}re",
  title =        "Algebraic attack on {NTRU} using {Witt} vectors and
                 {Gr{\"o}bner} bases",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "205--214",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 13F35 13P10)",
  MRnumber =     "2604687",
  MRreviewer =   "Nicolae S. Constantinescu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Brandstatter:2009:ELC,
  author =       "Nina Brandst{\"a}tter and Arne Winterhof",
  title =        "$k$-error linear complexity over {$ \mathbb {F_p}$} of
                 subsequences of {Sidelnikov} sequences of period $ (p^r
                 - 1) / 3$",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "215--225",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.012",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A55 (11T22 11T71)",
  MRnumber =     "2604688",
  MRreviewer =   "Wensong Chu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Fischer:2009:SRF,
  author =       "Simon Fischer and Willi Meier and Dirk Stegemann",
  title =        "Some remarks on {FCSRs} and implications for stream
                 ciphers",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "227--236",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A55 (11B37 11T71)",
  MRnumber =     "2604689",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gaal:2009:SNE,
  author =       "Istv{\'a}n Ga{\'a}l and Michael E. Pohst",
  title =        "On solving norm equations in global function fields",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "237--248",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11D57 (11T71 11Y50 94A60)",
  MRnumber =     "2604690",
  MRreviewer =   "Volker Ziegler",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Lamberger:2009:NSC,
  author =       "Mario Lamberger and Tomislav Nad and Vincent Rijmen",
  title =        "Numerical solvers and cryptanalysis",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "249--263",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.015",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 65H99)",
  MRnumber =     "2604691",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Friedlander:2009:DSS,
  author =       "John B. Friedlander and Igor E. Shparlinski",
  title =        "On the density of some special primes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "3",
  pages =        "265--271",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.016",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11K45 (11N05)",
  MRnumber =     "2604692",
  MRreviewer =   "R. C. Baker",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Cusick:2009:CBS,
  author =       "Thomas W. Cusick and Yuan Li and Pantelimon
                 St{\u{a}}nic{\u{a}}",
  title =        "On a conjecture for balanced symmetric {Boolean}
                 functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "273--290",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "06E30 (05A10 11B65 11T06 94C10)",
  MRnumber =     "2608596",
  MRreviewer =   "Jeffrey O. Shallit",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Colbourn:2009:RCP,
  author =       "Charles J. Colbourn and Alan C. H. Ling",
  title =        "A recursive construction for perfect hash families",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "291--306",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.018",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (05B15 68P25)",
  MRnumber =     "2608597",
  MRreviewer =   "Siaw-Lynn Ng",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bockle:2009:MRT,
  author =       "Gebhard B{\"o}ckle",
  title =        "The {Miller--Rabin} test with randomized exponents",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "307--319",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11Y11 (94A60)",
  MRnumber =     "2608598",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blackburn:2009:CPK,
  author =       "Simon R. Blackburn and Carlos Cid and Ciaran Mullan",
  title =        "Cryptanalysis of the {$ {\rm MST}_3 $} public key
                 cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "321--338",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.020",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20D99 68P25)",
  MRnumber =     "2608599",
  MRreviewer =   "Luis Hern{\'a}ndez Encinas",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Wu:2009:EIP,
  author =       "J. Wu and D. R. Stinson",
  title =        "An efficient identification protocol secure against
                 concurrent-reset attacks",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "339--352",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.021",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2608600",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Farashahi:2009:HEC,
  author =       "Reza R. Farashahi and Igor E. Shparlinski and Jos{\'e}
                 Felipe Voloch",
  title =        "On hashing into elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "3",
  number =       "4",
  pages =        "353--360",
  year =         "2009",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2009.022",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11G20 (11T71 14G50)",
  MRnumber =     "2608601",
  MRreviewer =   "David Y. Jao",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Karabina:2010:FCC,
  author =       "Koray Karabina",
  title =        "Factor-$4$ and $6$ compression of cyclotomic subgroups
                 of {$ \mathbb {F^*_{2^{4m}}} $} and {$ \mathbb
                 {F^*_{3^{6m}}} $}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "1",
  pages =        "1--42",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2660332",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Shokrieh:2010:MPD,
  author =       "Farbod Shokrieh",
  title =        "The monodromy pairing and discrete logarithm on the
                 {Jacobian} of finite graphs",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "1",
  pages =        "43--56",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "05C50 (14H40 94A60)",
  MRnumber =     "2660333",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hinek:2010:CMA,
  author =       "M. Jason Hinek and Charles C. Y. Lam",
  title =        "Common modulus attacks on small private exponent {RSA}
                 and some fast variants (in practice)",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "1",
  pages =        "57--93",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2660334",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Marti-Farre:2010:SSS,
  author =       "Jaume Mart{\'{\i}}-Farr{\'e} and Carles Padr{\'o}",
  title =        "On secret sharing schemes, matroids and polymatroids",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "2",
  pages =        "95--120",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (05B35 62B10)",
  MRnumber =     "2729351",
  MRreviewer =   "Franti{\v{s}}ek Mat{\'u}{\v{s}}",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Alomair:2010:PPS,
  author =       "Basel Alomair and Andrew Clark and Radha Poovendran",
  title =        "The power of primes: security of authentication based
                 on a universal hash-function family",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "2",
  pages =        "121--148",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "2729352",
  MRreviewer =   "Czes{\l}aw Ko{\'s}cielny",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Mosina:2010:MSA,
  author =       "Natalia Mosina and Alexander Ushakov",
  title =        "Mean-set attack: cryptanalysis of {Sibert et al.}
                 authentication protocol",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "2",
  pages =        "149--174",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20F36 60B15 68W30)",
  MRnumber =     "2729353",
  MRreviewer =   "Adrian C. Atanasiu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Karabina:2010:AEW,
  author =       "Koray Karabina and Alfred Menezes and Carl Pomerance
                 and Igor E. Shparlinski",
  title =        "On the asymptotic effectiveness of {Weil} descent
                 attacks",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "2",
  pages =        "175--191",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2729354",
  MRreviewer =   "Neal Koblitz",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blackburn:2010:DLP,
  author =       "Simon R. Blackburn",
  title =        "The discrete logarithm problem modulo one:
                 cryptanalysing the {Ariffin--Abu} cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "2",
  pages =        "193--198",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2729355",
  MRreviewer =   "Sebasti{\`a} Mart{\'{\i}}n Mollev{\'{\i}}",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hakuta:2010:EAS,
  author =       "Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi
                 Takagi",
  title =        "Efficient arithmetic on subfield elliptic curves over
                 small finite fields of odd characteristic",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "3",
  pages =        "199--238",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68P25 (11T71)",
  MRnumber =     "2746413",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Kortelainen:2010:MAG,
  author =       "Juha Kortelainen and Kimmo Halunen and Tuomas
                 Kortelainen",
  title =        "Multicollision attacks and generalized iterated hash
                 functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "3",
  pages =        "239--270",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2746414",
  MRreviewer =   "Simon R. Blackburn",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Svaba:2010:PKC,
  author =       "Pavol Svaba and Tran van Trung",
  title =        "Public key cryptosystem {$ \rm M S T_3 $}:
                 cryptanalysis and realization",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "3",
  pages =        "271--315",
  year =         "2010",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2010.011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2746415",
  MRreviewer =   "Reginaldo Palazzo, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Tischhauser:2011:NCA,
  author =       "Elmar Tischhauser",
  title =        "Nonsmooth cryptanalysis, with an application to the
                 stream cipher {MICKEY}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "4",
  pages =        "317--348",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (90C09 90C56 90C90)",
  MRnumber =     "2787334",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Singh:2011:PDE,
  author =       "Rajesh P. Singh and A. Saikia and B. K. Sarma",
  title =        "Poly-dragon: an efficient multivariate public key
                 cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "4",
  pages =        "349--364",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T06 11T71)",
  MRnumber =     "2787335",
  MRreviewer =   "Francesco Sica",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Mullan:2011:CVS,
  author =       "Ciaran Mullan",
  title =        "Cryptanalysing variants of {Stickel}'s key agreement
                 scheme",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "4",
  pages =        "365--373",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2787336",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Wolf:2011:EKU,
  author =       "Christopher Wolf and Bart Preneel",
  title =        "Equivalent keys in {$ \mathscr {M} $ultivariate} {$
                 \mathscr {Q} $uadratic} public key systems",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "4",
  number =       "4",
  pages =        "375--415",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2011.004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (11T71 14G15 94A60)",
  MRnumber =     "2787337",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hisil:2011:EAG,
  author =       "Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter
                 and Ed Dawson",
  title =        "An exploration of affine group laws for elliptic
                 curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "1",
  pages =        "1--50",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14H52 (14G50 68P25 94A60)",
  MRnumber =     "2804942",
  MRreviewer =   "A. Peth{\H{o}}",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Duquesne:2011:RAA,
  author =       "Sylvain Duquesne",
  title =        "{RNS} arithmetic in {$ \mathbb {F_{p^k}} $} and
                 application to fast pairing computation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "1",
  pages =        "51--88",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11T55 (11T71 14G50 94A60)",
  MRnumber =     "2804943",
  MRreviewer =   "Pantelimon St{\u{a}}nic{\u{a}}",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Ciet:2011:CEC,
  author =       "Mathieu Ciet and Jean-Jacques Quisquater and Francesco
                 Sica",
  title =        "Compact elliptic curve representations",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "1",
  pages =        "89--100",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G15 (11G20 14G50 14H52 94A60)",
  MRnumber =     "2804944",
  MRreviewer =   "Michael J. Jacobson, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bisson:2011:CER,
  author =       "Gaetan Bisson",
  title =        "Computing endomorphism rings of elliptic curves under
                 the {GRH}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "2",
  pages =        "101--113",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11Y40 (11G20 14G50 94A60)",
  MRnumber =     "2838371",
  MRreviewer =   "Michael J. Jacobson, Jr.",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Attrapadung:2011:FEP,
  author =       "Nuttapong Attrapadung and Beno{\^{\i}}t Libert",
  title =        "Functional encryption for public-attribute inner
                 products: achieving constant-size ciphertexts with
                 adaptive security or support for negation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "2",
  pages =        "115--158",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2838372",
  MRreviewer =   "Luis Hern{\'a}ndez Encinas",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Blackburn:2011:CTM,
  author =       "Simon R. Blackburn and Carlos Cid and Ciaran Mullan",
  title =        "Cryptanalysis of three matrix-based key establishment
                 protocols",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "2",
  pages =        "159--168",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2838373",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Fischlin:2011:SBS,
  author =       "Marc Fischlin and Dominique Schr{\"o}der",
  title =        "Security of blind signatures under aborts and
                 applications to adaptive oblivious transfer",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "2",
  pages =        "169--203",
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/JMC.2011.011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "2838374",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Koblitz:2012:ALA,
  author =       "Neal Koblitz",
  title =        "Another look at automated theorem-proving {II}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "3--4",
  pages =        "205--224",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (03B35 11T71 68T15)",
  MRnumber =     "2876200",
  MRreviewer =   "Julio Rubio",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Moody:2012:FEC,
  author =       "Dustin Moody and Hongfeng Wu",
  title =        "Families of elliptic curves with rational
                 $3$-torsion",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "3--4",
  pages =        "225--246",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11G20 (14G50 14H52 14K02)",
  MRnumber =     "2876201",
  MRreviewer =   "Steven D. Galbraith",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bouillaguet:2012:FWK,
  author =       "Charles Bouillaguet and Pierre-Alain Fouque and
                 Antoine Joux and Joana Treger",
  title =        "A family of weak keys in {HFE} and the corresponding
                 practical key-recovery",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "3--4",
  pages =        "247--275",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc.2011.012",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (12Y05)",
  MRnumber =     "2876202",
  MRreviewer =   "Koray Karabina",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Chee:2012:BCE,
  author =       "Yeow Meng Chee and Huaxiong Wang and Liang Feng
                 Zhang",
  title =        "On the {Bringer--Chabanne} {EPIR} protocol for
                 polynomial evaluation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "5",
  number =       "3--4",
  pages =        "277--301",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68M12)",
  MRnumber =     "2876203",
  MRreviewer =   "Qiong Huang",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gallant:2012:FDL,
  author =       "Robert P. Gallant",
  title =        "Finding discrete logarithms with a set orbit
                 distinguisher",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "1",
  pages =        "1--20",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11T71 (11Y16 94B65)",
  MRnumber =     "2929692",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Baumeister:2012:ALS,
  author =       "Barbara Baumeister and Jan-Hendrik de Wiljes",
  title =        "Aperiodic logarithmic signatures",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "1",
  pages =        "21--37",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2929693",
  MRreviewer =   "Simon R. Blackburn",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Wei:2012:FMP,
  author =       "Tzer-jen Wei and Lih-Chung Wang",
  title =        "A fast mental poker protocol",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "1",
  pages =        "39--68",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68M12)",
  MRnumber =     "2929694",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Maze:2012:AKD,
  author =       "G{\'e}rard Maze",
  title =        "Analysis of a key distribution scheme in secure
                 multicasting",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "1",
  pages =        "69--80",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T55 68P30)",
  MRnumber =     "2929695",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Boxall:2012:HPF,
  author =       "John Boxall",
  title =        "Heuristics on pairing-friendly elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "2",
  pages =        "81--104",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11N56 (11N25 14G15 14H52 94A60)",
  MRnumber =     "2988897",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0004/jmc-2011-0004.xml?format=INT",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Brown:2012:RWS,
  author =       "Alyssa Brown and Thomas W. Cusick",
  title =        "Recursive weights for some {Boolean} functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "2",
  pages =        "105--135",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0020",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94C10 (94A60)",
  MRnumber =     "2988898",
  MRreviewer =   "Pantelimon St{\u{a}}nic{\u{a}}",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "http://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0020/jmc-2011-0020.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Murphy:2012:ELH,
  author =       "Sean Murphy",
  title =        "The effectiveness of the linear hull effect",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "2",
  pages =        "137--147",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0025",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2988899",
  MRreviewer =   "Xiubin Fan",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0025/jmc-2011-0025.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Persichetti:2012:CMK,
  author =       "Edoardo Persichetti",
  title =        "Compact {McEliece} keys based on quasi-dyadic
                 {Srivastava} codes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "2",
  pages =        "149--169",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0099",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "2988900",
  MRreviewer =   "San Ling",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2011-0099/jmc-2011-0099.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Banin:2012:DLP,
  author =       "Matan Banin and Boaz Tsaban",
  title =        "The discrete logarithm problem in {Bergman}'s
                 non-representable ring",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "2",
  pages =        "171--182",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2988901",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-2/jmc-2012-0014/jmc-2012-0014.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Sepahi:2012:NSN,
  author =       "Reza Sepahi and Josef Pieprzyk and Siamak F.
                 Shahandashti and Berry Schoenmakers",
  title =        "New security notions and relations for public-key
                 encryption",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "3--4",
  pages =        "183--227",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2010-0099",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3004097",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Mouha:2012:CIR,
  author =       "Nicky Mouha and Gautham Sekar and Bart Preneel",
  title =        "Challenging the increased resistance of regular hash
                 functions against birthday attacks",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "3--4",
  pages =        "229--248",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2011-0010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3004098",
  MRreviewer =   "Rhouma Rhouma",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-3-4/jmc-2011-0010/jmc-2011-0010.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Okano:2012:VCF,
  author =       "Keiji Okano",
  title =        "On the {$ \rho $}-values of complete families of
                 pairing-friendly elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "6",
  number =       "3--4",
  pages =        "249--268",
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 14G50)",
  MRnumber =     "3004099",
  MRreviewer =   "Steven Joel Miller",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2012.6.issue-3-4/jmc-2012-0011/jmc-2012-0011.xml?format=INT",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Tassa:2013:OEM,
  author =       "Tamir Tassa and Ayman Jarrous and Yonatan
                 Ben-Ya'akov",
  title =        "Oblivious evaluation of multivariate polynomials",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "1",
  pages =        "1--29",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "3101013",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Galbraith:2013:SPH,
  author =       "Steven D. Galbraith and Chang-An Zhao",
  title =        "Self-pairings on hyperelliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "1",
  pages =        "31--42",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (11T71 14H45 94A60)",
  MRnumber =     "3101014",
  MRreviewer =   "Horacio Tapia-Recillas",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  note =         "See erratum \cite{Galbraith:2014:ESP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Flori:2013:ECF,
  author =       "Jean-Pierre Flori and Sihem Mesnager",
  title =        "An efficient characterization of a family of
                 hyper-bent functions with multiple trace terms",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "1",
  pages =        "43--68",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94C10 (11T71 14G50)",
  MRnumber =     "3101015",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Wang:2013:MCN,
  author =       "Tianze Wang and Dongdai Lin",
  title =        "A method for counting the number of polynomial
                 equivalence classes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "1",
  pages =        "69--95",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T06 11T71 68P25)",
  MRnumber =     "3101016",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Field:2013:UCT,
  author =       "Rebecca E. Field and Brant C. Jones",
  title =        "Using carry-truncated addition to analyze
                 add-rotate-xor hash algorithms",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "2",
  pages =        "97--110",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P25 68R05)",
  MRnumber =     "3101017",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Chen:2013:SCM,
  author =       "Yanling Chen and Danilo Gligoroski and Svein J.
                 Knapskog",
  title =        "On a special class of multivariate quadratic
                 quasigroups ({MQQs})",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "2",
  pages =        "111--141",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "20N05 (94A60 94D05)",
  MRnumber =     "3101018",
  MRreviewer =   "Tuval S. Foguel",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gharahi:2013:PSS,
  author =       "Motahhareh Gharahi and Massoud Hadian Dehkordi",
  title =        "Perfect secret sharing schemes for graph access
                 structures on six participants",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "2",
  pages =        "143--146",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0026",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62",
  MRnumber =     "3101019",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Staszewski:2013:SAL,
  author =       "Reiner Staszewski and Tran van Trung",
  title =        "Strongly aperiodic logarithmic signatures",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "2",
  pages =        "147--179",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5000",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3101020",
  MRreviewer =   "Koji Nuida",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2013.7.issue-2/jmc-2013-5000/jmc-2013-5000.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Anonymous:2013:M,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "i--i",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-masthead3",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2013.7.issue-3/jmc-2013-masthead3/jmc-2013-masthead3.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Magliveras:2013:F,
  author =       "Spyros S. Magliveras",
  title =        "Foreword",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "181--182",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2013.7.issue-3/jmc-2013-5001/jmc-2013-5001.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Paterson:2013:CTF,
  author =       "Maura B. Paterson and Douglas R. Stinson and Jalaj
                 Upadhyay",
  title =        "A coding theory foundation for the analysis of general
                 unconditionally secure proof-of-retrievability schemes
                 for cloud storage",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "183--216",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3107360",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Grosek:2013:CS,
  author =       "Otokar Gro{\v{s}}ek and {\v{S}}tefan Porubsk{\'y}",
  title =        "Coprime solutions to {$ a x \equiv b \pmod n $}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "217--224",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11A07 (11D04 11D45 94A60)",
  MRnumber =     "3107361",
  MRreviewer =   "Gabriel Mincu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Koblitz:2013:ALH,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "Another look at {HMAC}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "225--251",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "3107362",
  MRreviewer =   "Li-Ting Zhang",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{AlMashrafi:2013:IMI,
  author =       "Mufeed {Al Mashrafi} and Harry Bartlett and Ed Dawson
                 and Leonie Simpson and Kenneth Koon-Ho Wong",
  title =        "Indirect message injection for {MAC} generation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "3",
  pages =        "253--277",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "3107363",
  MRreviewer =   "Li-Ting Zhang",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Jhanwar:2013:USI,
  author =       "Mahabir P. Jhanwar and Reihaneh Safavi-Naini",
  title =        "Unconditionally-secure ideal robust secret sharing
                 schemes for threshold and multilevel access structure",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "4",
  pages =        "279--296",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "3139305",
  MRreviewer =   "Constantin Popescu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Kurosawa:2013:NLR,
  author =       "Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong",
  title =        "New leakage-resilient {CCA}-secure public key
                 encryption",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "4",
  pages =        "297--312",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5007",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3139306",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Orumiehchiha:2013:SAL,
  author =       "Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron
                 Steinfeld and Harry Bartlett",
  title =        "Security analysis of linearly filtered {NLFSRs}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "4",
  pages =        "313--332",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5009",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3139307",
  MRreviewer =   "Takeshi Koshiba",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{vonzurGathen:2013:GSP,
  author =       "Joachim von zur Gathen and Igor E. Shparlinski",
  title =        "Generating safe primes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "4",
  pages =        "333--365",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5011",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "3139308",
  MRreviewer =   "Volker Ziegler",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Zajac:2013:NMS,
  author =       "Pavol Zajac",
  title =        "A new method to solve {MRHS} equation systems and its
                 connection to group factorization",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "7",
  number =       "4",
  pages =        "367--381",
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5012",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 14G50)",
  MRnumber =     "3139309",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Childs:2014:CEC,
  author =       "Andrew Childs and David Jao and Vladimir Soukharev",
  title =        "Constructing elliptic curve isogenies in quantum
                 subexponential time",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "1",
  pages =        "1--29",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0016",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "81P94 (11Y40)",
  MRnumber =     "3163097",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Jiang:2014:PAP,
  author =       "Shaoquan Jiang",
  title =        "Persistent asymmetric password-based key exchange",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "1",
  pages =        "31--70",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3163098",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bos:2014:CBA,
  author =       "Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev",
  title =        "Collision bounds for the additive {Pollard} rho
                 algorithm for solving discrete logarithms",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "1",
  pages =        "71--92",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0032",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "05C81 (11T71 20K01 94A60)",
  MRnumber =     "3163099",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Galbraith:2014:ESP,
  author =       "Steven D. Galbraith and Chang-An Zhao",
  title =        "Erratum: {Self-pairings on hyperelliptic curves [J.
                 Math.\ Cryptol.\ {\bf 7} (2013), 31--42] [MR3101014]}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "1",
  pages =        "93--93",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-5010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (11T71 94A60)",
  MRnumber =     "3163100",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  note =         "See \cite{Galbraith:2013:SPH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Myasnikov:2014:CMC,
  author =       "Alex D. Myasnikov and Alexander Ushakov",
  title =        "Cryptanalysis of matrix conjugation schemes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "2",
  pages =        "95--114",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0033",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68M12)",
  MRnumber =     "3213577",
  MRreviewer =   "Anand D. Sarwate",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Justus:2014:DQR,
  author =       "Benjamin Justus",
  title =        "The distribution of quadratic residues and
                 non-residues in the {Goldwasser--Micali} type of
                 cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "2",
  pages =        "115--140",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0001",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11A15 (94A60)",
  MRnumber =     "3213578",
  MRreviewer =   "Luis Hern{\'a}ndez Encinas",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Dibert:2014:ISS,
  author =       "Alexander Dibert and L{\'a}szl{\'o} Csirmaz",
  title =        "Infinite secret sharing --- examples",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "2",
  pages =        "141--168",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0005",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (62B10)",
  MRnumber =     "3213579",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Omar:2014:FHF,
  author =       "Sami Omar and Houssem Sabri",
  title =        "Fast hash functions and convolution product",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "2",
  pages =        "169--187",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "3213580",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Stinson:2014:EDS,
  author =       "Douglas R. Stinson and Jalaj Upadhyay",
  title =        "Is extracting data the same as possessing data?",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "2",
  pages =        "189--207",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0034",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68P20 68P25)",
  MRnumber =     "3213581",
  MRreviewer =   "Anand D. Sarwate",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{DeFeo:2014:TQR,
  author =       "Luca {De Feo} and David Jao and J{\'e}r{\^o}me
                 Pl{\^u}t",
  title =        "Towards quantum-resistant cryptosystems from
                 supersingular elliptic curve isogenies",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "3",
  pages =        "209--247",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0015",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "81P94",
  MRnumber =     "3259113",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Carlet:2014:LSO,
  author =       "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
                 and Houssem Maghrebi",
  title =        "Leakage squeezing: optimal implementation and security
                 evaluation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "3",
  pages =        "249--295",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2012-0018",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3259114",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Haridas:2014:SAM,
  author =       "Deepthi Haridas and Sarma Venkataraman and Geeta
                 Varadan",
  title =        "Security analysis of modified {Rivest} scheme",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "3",
  pages =        "297--303",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0018",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3259115",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Yasuda:2014:EDR,
  author =       "Masaya Yasuda and Kazuhiro Yokoyama and Takeshi
                 Shimoyama and Jun Kogure and Takeshi Koshiba",
  title =        "On the exact decryption range for {Gentry--Halevi}'s
                 implementation of fully homomorphic encryption",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "3",
  pages =        "305--329",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0024",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3259116",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Duquesne:2014:ECP,
  author =       "Sylvain Duquesne and Nadia {El Mrabet} and Emmanuel
                 Fouotsa",
  title =        "Efficient computation of pairings on {Jacobi} quartic
                 elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "4",
  pages =        "331--362",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0033",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14H52 (11G20 94A60)",
  MRnumber =     "3281661",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Asghar:2014:SCG,
  author =       "Hassan Jameel Asghar and Yvo Desmedt and Josef
                 Pieprzyk and Ron Steinfeld",
  title =        "A subexponential construction of graph coloring for
                 multiparty computation",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "4",
  pages =        "363--403",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0035",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (05C10 05C15 05C25)",
  MRnumber =     "3281662",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Childs:2014:QCD,
  author =       "Andrew M. Childs and G{\'a}bor Ivanyos",
  title =        "Quantum computation of discrete logarithms in
                 semigroups",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "4",
  pages =        "405--416",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0038",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "81P68 (68Q12 68Q17 68W30 94A60)",
  MRnumber =     "3281663",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Sha:2014:NIC,
  author =       "Min Sha",
  title =        "On the non-idealness of cyclotomic families of
                 pairing-friendly elliptic curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "8",
  number =       "4",
  pages =        "417--440",
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0042",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "11T71 (11T22 14H52)",
  MRnumber =     "3281664",
  MRreviewer =   "Cunsheng Ding",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Yoon:2015:NMC,
  author =       "Kisoon Yoon",
  title =        "A new method of choosing primitive elements for
                 {Brezing--Weng} families of pairing-friendly elliptic
                 curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "1",
  pages =        "1--9",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11G20 11T71 14H52)",
  MRnumber =     "3318543",
  MRreviewer =   "Juan Tena",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Alam:2015:CWD,
  author =       "Bilal Alam and Ferruh {\"O}zbudak and O{\u{g}}uz
                 Yayla",
  title =        "Classes of weak {Dembowski--Ostrom} polynomials for
                 multivariate quadratic cryptosystems",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "1",
  pages =        "11--22",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (14G50)",
  MRnumber =     "3318544",
  MRreviewer =   "J{\'a}nos Foll{\'a}th",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Sparr:2015:RFK,
  author =       "R{\"u}diger Sparr and Ralph Wernsdorf",
  title =        "The round functions of {KASUMI} generate the
                 alternating group",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "1",
  pages =        "23--32",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0028",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (20B35)",
  MRnumber =     "3318545",
  MRreviewer =   "Sugata Gangopadhyay",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Garber:2015:LBA,
  author =       "David Garber and Delaram Kahrobaei and Ha T. Lam",
  title =        "Length-based attacks in polycyclic groups",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "1",
  pages =        "33--43",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0003",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3318546",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Cusick:2015:TRS,
  author =       "Thomas W. Cusick and Younhwan Cheon",
  title =        "Theory of $3$-rotation symmetric cubic {Boolean}
                 functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "1",
  pages =        "45--62",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94C10 (06E30 94A15)",
  MRnumber =     "3318547",
  MRreviewer =   "Yuan Li",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Chen:2015:SSK,
  author =       "Jiageng Chen and Keita Emura and Atsuko Miyaji",
  title =        "{SKENO}: {Secret} key encryption with non-interactive
                 opening",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "2",
  pages =        "63--74",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0010",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3353605",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Tsaban:2015:CMS,
  author =       "Boaz Tsaban and Noam Lifshitz",
  title =        "Cryptanalysis of the {MORE} symmetric key fully
                 homomorphic encryption scheme",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "2",
  pages =        "75--78",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3353606",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Dolev:2015:TEP,
  author =       "Shlomi Dolev and Juan Garay and Niv Gilboa and
                 Vladimir Kolesnikov and Yelena Yuditsky",
  title =        "Towards efficient private distributed computation on
                 unbounded input streams",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "2",
  pages =        "79--94",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0039",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68M14 94A62)",
  MRnumber =     "3353607",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Laine:2015:TMT,
  author =       "Kim Laine and Kristin Lauter",
  title =        "Time-memory trade-offs for index calculus in genus
                 $3$",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "2",
  pages =        "95--114",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0033",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 11Y16)",
  MRnumber =     "3353608",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Justus:2015:DQR,
  author =       "Benjamin Justus",
  title =        "The distribution of quadratic residues and
                 non-residues in the {Goldwasser--Micali} type of
                 cryptosystem. {II}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "2",
  pages =        "115--137",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0004",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11N64 60G50)",
  MRnumber =     "3353609",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Luykx:2015:TPB,
  author =       "Atul Luykx and Bart Mennink and Bart Preneel and Laura
                 Winnen",
  title =        "Two-permutation-based hashing with binary mixing",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "3",
  pages =        "139--150",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0015",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3403496",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Accardi:2015:CSA,
  author =       "Luigi Accardi and Massimo Regoli",
  title =        "On a class of strongly asymmetric {PKA} algorithms",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "3",
  pages =        "151--159",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3403497",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Kotov:2015:ACP,
  author =       "Matvei Kotov and Alexander Ushakov",
  title =        "Analysis of a certain polycyclic-group-based
                 cryptosystem",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "3",
  pages =        "161--167",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68W30)",
  MRnumber =     "3403498",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Albrecht:2015:CHL,
  author =       "Martin R. Albrecht and Rachel Player and Sam Scott",
  title =        "On the concrete hardness of learning with errors",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "3",
  pages =        "169--203",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0016",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "3403499",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Dowden:2015:SMT,
  author =       "Chris Dowden",
  title =        "Secure message transmission in the presence of a fully
                 generalised adversary",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "4",
  pages =        "205--214",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2013-0046",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (68P30)",
  MRnumber =     "3430924",
  MRreviewer =   "Miaomiao Tian",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Paterson:2015:OCI,
  author =       "Maura B. Paterson and Douglas R. Stinson",
  title =        "Optimal constructions for {ID}-based one-way-function
                 key predistribution schemes realizing specified
                 communication graphs",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "4",
  pages =        "215--225",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0031",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3430925",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Hameed:2015:CIW,
  author =       "Ali Hameed and Arkadii Slinko",
  title =        "A characterisation of ideal weighted secret sharing
                 schemes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "4",
  pages =        "227--244",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A62 (91A12 91A80)",
  MRnumber =     "3430926",
  MRreviewer =   "Edgar Mart{\'{\i}}nez-Moro",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Henry:2015:LAR,
  author =       "Kevin J. Henry and Douglas R. Stinson",
  title =        "Linear approaches to resilient aggregation in sensor
                 networks",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "9",
  number =       "4",
  pages =        "245--272",
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0042",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (94A12)",
  MRnumber =     "3430927",
  MRreviewer =   "Jiankun Hu",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Carlet:2016:CPM,
  author =       "Claude Carlet and David Joyner and Pantelimon
                 St{\u{a}}nic{\u{a}} and Deng Tang",
  title =        "Cryptographic properties of monotone {Boolean}
                 functions",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "1",
  pages =        "1--14",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0030",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (94A60)",
  MRnumber =     "3483645",
  MRreviewer =   "Victor Gayoso Mart{\'{\i}}nez",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Bianco:2016:CTZ,
  author =       "Giulia Bianco and Elisa Gorla",
  title =        "Compression for trace zero points on twisted {Edwards}
                 curves",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "1",
  pages =        "15--34",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0039",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "14G50 (94A60)",
  MRnumber =     "3483645",
  MRreviewer =   "Victor Gayoso Mart{\'{\i}}nez",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Swanson:2016:USS,
  author =       "Colleen M. Swanson and Douglas R. Stinson",
  title =        "Unconditionally secure signature schemes revisited",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "1",
  pages =        "35--67",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0002",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3483646",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Samajder:2016:ALN,
  author =       "Subhabrata Samajder and Palash Sarkar",
  title =        "Another look at normal approximations in
                 cryptanalysis",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "2",
  pages =        "69--99",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0006",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 62P99 68P25)",
  MRnumber =     "3507958",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Moody:2016:ISF,
  author =       "Dustin Moody and Souradyuti Paul and Daniel
                 Smith-Tone",
  title =        "Indifferentiability security of the fast wide pipe
                 hash: breaking the birthday barrier",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "2",
  pages =        "101--133",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0044",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60",
  MRnumber =     "3507959",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Poulakis:2016:NLA,
  author =       "Dimitrios Poulakis",
  title =        "New lattice attacks on {DSA} schemes",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "2",
  pages =        "135--144",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2014-0027",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (11T71 11Y16)",
  MRnumber =     "3507960",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Cusick:2016:AEM,
  author =       "Thomas W. Cusick and K. V. Lakshmy and M.
                 Sethumadhavan",
  title =        "Affine equivalence of monomial rotation symmetric
                 {Boolean} functions: a {P{\'o}lya}'s theorem approach",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "3--4",
  pages =        "145--156",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0042",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94C10 (05A05 05A15 06E30 94A60)",
  MRnumber =     "3574918",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Jha:2016:RSG,
  author =       "Ashwin Jha and Mridul Nandi",
  title =        "Revisiting structure graphs: applications to
                 {CBC--MAC} and {EMAC}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "3--4",
  pages =        "157--180",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0030",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (68Q87 68R05 68R10)",
  MRnumber =     "3574919",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Nandi:2016:SJS,
  author =       "Mridul Nandi and Tapas Pandit",
  title =        "On the security of joint signature and encryption
                 revisited",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "10",
  number =       "3--4",
  pages =        "181--221",
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2015-0060",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "3574920",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Yasuda:2017:ADS,
  author =       "Masaya Yasuda and Kazuhiro Yokoyama and Takeshi
                 Shimoyama and Jun Kogure and Takeshi Koshiba",
  title =        "Analysis of decreasing squared-sum of {Gram--Schmidt}
                 lengths for short lattice vectors",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "1",
  pages =        "1--24",
  year =         "2017",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0008",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68R01 (06B99)",
  MRnumber =     "3619138",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Dehkordi:2017:CCG,
  author =       "Massoud Hadian Dehkordi and Ali Safi",
  title =        "The complexity of the connected graph access structure
                 on seven participants",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "1",
  pages =        "25--35",
  year =         "2017",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0017",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68R10 (94A62)",
  MRnumber =     "3619139",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Popov:2017:DTP,
  author =       "Serguei Popov",
  title =        "On a decentralized trustless pseudo-random number
                 generation algorithm",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "1",
  pages =        "37--43",
  year =         "2017",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0019",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "68W15 (65C05 65C10 90B18)",
  MRnumber =     "3619140",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Antal:2017:MCP,
  author =       "Eugen Antal and Otokar Gro{\v{s}}ek and Peter Horak",
  title =        "On a mnemonic construction of permutations",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "1",
  pages =        "45--53",
  year =         "2017",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1515/jmc-2016-0058",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  MRclass =      "05C99",
  MRnumber =     "3619141",
  bibdate =      "Fri Mar 17 08:36:49 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Anonymous:2017:F,
  author =       "Anonymous",
  title =        "Frontmatter",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "2",
  pages =        "i--iv",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.1515/jmc-2017-frontmatter2",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Thu Jun 22 10:34:34 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2017-frontmatter2/jmc-2017-frontmatter2.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Dehkordi:2017:MDZ,
  author =       "Massoud Hadian Dehkordi and Roghayeh Taghizadeh",
  title =        "Multiple differential-zero correlation linear
                 cryptanalysis of reduced-round {CAST-256}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "2",
  pages =        "55--??",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.1515/jmc-2016-0054",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Thu Jun 22 10:34:34 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0054/jmc-2016-0054.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Saraswat:2017:SAP,
  author =       "Vishal Saraswat and Rajeev Anand Sahu and Amit K.
                 Awasthi",
  title =        "A secure anonymous proxy signcryption scheme",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "2",
  pages =        "63--??",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.1515/jmc-2015-0014",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Thu Jun 22 10:34:34 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2015-0014/jmc-2015-0014.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Gupta:2017:ADT,
  author =       "Kishan Chand Gupta and Sumit Kumar Pandey and Indranil
                 Ghosh Ray",
  title =        "Applications of design theory for the constructions of
                 {MDS} matrices for lightweight cryptography",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "2",
  pages =        "85--??",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.1515/jmc-2016-0013",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Thu Jun 22 10:34:34 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jmathcryptol.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0013/jmc-2016-0013.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}

@Article{Lu:2017:CRV,
  author =       "Yao Lu and Liqiang Peng and Santanu Sarkar",
  title =        "Cryptanalysis of an {RSA} variant with moduli {$ N =
                 p^r q^l $}",
  journal =      j-J-MATH-CRYPTOL,
  volume =       "11",
  number =       "2",
  pages =        "117--??",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.1515/jmc-2016-0025",
  ISSN =         "1862-2976 (print), 1862-2984 (electronic)",
  ISSN-L =       "1862-2976",
  bibdate =      "Thu Jun 22 10:34:34 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/mcma.bib",
  URL =          "https://www.degruyter.com/view/j/jmc.2017.11.issue-2/jmc-2016-0025/jmc-2016-0025.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Cryptology",
  journal-URL =  "http://www.degruyter.com/view/j/jmc",
}