Journal: J. Mathematical Cryptology

Volume 13, Issue 3-4

151 -- 168Jean-François Biasse, Fang Song 0001. On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in
169 -- 196Arnaud Sipasseuth, Thomas Plantard, Willy Susilo. Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
197 -- 228Mridul Nandi, Tapas Pandit. Predicate signatures from pair encodings via dual system proof technique
229 -- 237Stavros Kousidis, Andreas Wiemers. On the first fall degree of summation polynomials

Volume 13, Issue 2

69 -- 80Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata. Polynomial expressions of p-ary auction functions
81 -- 106Julien Lavauzelle, Françoise Levy-dit-Vehel. Generic constructions of PoRs from codes and instantiations
107 -- 116Károly Harsányi, Péter Ligeti. Exact information ratios for secret sharing on small graphs with girth at least 5
117 -- 150Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk. Signcryption schemes with insider security in an ideal permutation model

Volume 13, Issue 1

1 -- 26Thomas Wunderer. A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
27 -- 46Abdelmalek Azizi, Idriss Jerrari, Abdelkader Zekhnini, Mohammed Talbi. Capitulation of the 2-ideal classes of type (2,  2,  2) of some quartic cyclic number fields
47 -- 67Nina Bindel, Johannes Buchmann 0001, Florian Göpfert, Markus Schmidt. Estimation of the hardness of the learning with errors problem with a restricted number of samples