Jaime Muñoz Masqué

According to our database1, Jaime Muñoz Masqué authored at least 27 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A group law for PKC purposes.
CoRR, 2018

2015
Cryptanalysis of two combinatorial public key cryptosystems.
Log. J. IGPL, 2015

2013
Two proposals for group signature schemes based on number theory problems.
Log. J. IGPL, 2013

The Isomorphism of Polynomials Problem Applied to Multivariate Quadratic Cryptography.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

2012
Comments on a Cryptosystem Proposed by Wang and Hu.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Multisignature Scheme Based on the SDLP and on the IFP.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2009
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range.
Inf. Sci., 2009

Dimension of the intersection of a pair of orthogonal groups.
Int. J. Comput. Math., 2009

2008
Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes.
Int. J. Netw. Secur., 2008

Safer parameters for the Chor-Rivest cryptosystem.
Comput. Math. Appl., 2008

2007
A Twin for Euler's <i>phi</i> Function in F<sub>2</sub>[X].
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

2006
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem.
J. Inf. Sci. Eng., 2006

Maple Implementation of the Chor-Rivest Cryptosystem.
Proceedings of the Computational Science, 2006

2005
Optimal strong primes.
Inf. Process. Lett., 2005

Characterization of several classes of second-order ODEs by using differential invariants.
Int. J. Math. Math. Sci., 2005

Faa' di Bruno's formula, lattices, and partitions.
Discret. Appl. Math., 2005

2003
An algorithm to obtain an RSA modulus with a large private key.
IACR Cryptol. ePrint Arch., 2003

Large decryption exponents in RSA.
Appl. Math. Lett., 2003

A short proof of the generalized Faàdi Bruno's formula.
Appl. Math. Lett., 2003

2002
Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields.
Appl. Algebra Eng. Commun. Comput., 2002

2001
Classification of Lagrangians for surface design.
Appl. Math. Lett., 2001

Maximal Periods of x + c in F<sub>q</sub>.
Proceedings of the Applied Algebra, 2001

1999
Linear Complexity of the x<sup>2</sup> Mod p Orbits.
Inf. Process. Lett., 1999

1998
A factoring algorithm in F<sub>2</sub>[x].
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Maximal period of orbits of the BBS generator.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...