researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Mathematical Cryptology
Home
Index
Info
Volume
Volume
13
, Issue
3-4
151
--
168
Jean-François Biasse
,
Fang Song 0001
.
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in
169
--
196
Arnaud Sipasseuth
,
Thomas Plantard
,
Willy Susilo
.
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
197
--
228
Mridul Nandi
,
Tapas Pandit
.
Predicate signatures from pair encodings via dual system proof technique
229
--
237
Stavros Kousidis
,
Andreas Wiemers
.
On the first fall degree of summation polynomials
Volume
13
, Issue
2
69
--
80
Shizuo Kaji
,
Toshiaki Maeno
,
Koji Nuida
,
Yasuhide Numata
.
Polynomial expressions of p-ary auction functions
81
--
106
Julien Lavauzelle
,
Françoise Levy-dit-Vehel
.
Generic constructions of PoRs from codes and instantiations
107
--
116
Károly Harsányi
,
Péter Ligeti
.
Exact information ratios for secret sharing on small graphs with girth at least 5
117
--
150
Tarun Kumar Bansal
,
Xavier Boyen
,
Josef Pieprzyk
.
Signcryption schemes with insider security in an ideal permutation model
Volume
13
, Issue
1
1
--
26
Thomas Wunderer
.
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
27
--
46
Abdelmalek Azizi
,
Idriss Jerrari
,
Abdelkader Zekhnini
,
Mohammed Talbi
.
Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields
47
--
67
Nina Bindel
,
Johannes Buchmann 0001
,
Florian Göpfert
,
Markus Schmidt
.
Estimation of the hardness of the learning with errors problem with a restricted number of samples