default search action
Journal of Mathematical Cryptology, Volume 13
Volume 13, Number 1, March 2019
- Thomas Wunderer:
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. 1-26 - Abdelmalek Azizi, Idriss Jerrari, Abdelkader Zekhnini, Mohammed Talbi:
Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields. 27-46 - Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt:
Estimation of the hardness of the learning with errors problem with a restricted number of samples. 47-67
Volume 13, Number 2, June 2019
- Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata:
Polynomial expressions of p-ary auction functions. 69-80 - Julien Lavauzelle, Françoise Levy-dit-Vehel:
Generic constructions of PoRs from codes and instantiations. 81-106 - Károly Harsányi, Péter Ligeti:
Exact information ratios for secret sharing on small graphs with girth at least 5. 107-116 - Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk:
Signcryption schemes with insider security in an ideal permutation model. 117-150
Volume 13, Numbers 3-4, October 2019
- Jean-François Biasse, Fang Song:
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in. 151-168 - Arnaud Sipasseuth, Thomas Plantard, Willy Susilo:
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices. 169-196 - Mridul Nandi, Tapas Pandit:
Predicate signatures from pair encodings via dual system proof technique. 197-228 - Stavros Kousidis, Andreas Wiemers:
On the first fall degree of summation polynomials. 229-237
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.