Journal: J. Mathematical Cryptology

Volume 13, Issue 2

69 -- 80Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata. Polynomial expressions of p-ary auction functions
81 -- 106Julien Lavauzelle, Françoise Levy-dit-Vehel. Generic constructions of PoRs from codes and instantiations
107 -- 116Károly Harsányi, Péter Ligeti. Exact information ratios for secret sharing on small graphs with girth at least 5
117 -- 150Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk. Signcryption schemes with insider security in an ideal permutation model

Volume 13, Issue 1

1 -- 26Thomas Wunderer. A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
27 -- 46Abdelmalek Azizi, Idriss Jerrari, Abdelkader Zekhnini, Mohammed Talbi. Capitulation of the 2-ideal classes of type (2,  2,  2) of some quartic cyclic number fields
47 -- 67Nina Bindel, Johannes Buchmann 0001, Florian Göpfert, Markus Schmidt. Estimation of the hardness of the learning with errors problem with a restricted number of samples