default search action
Journal of Cryptology, Volume 20
Volume 20, Number 1, January 2007
- Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". 3-37 - Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. 39-50 - Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. 51-83 - Jonathan Katz, Moti Yung:
Scalable Protocols for Authenticated Group Key Exchange. 85-113 - Dario Catalano, David Pointcheval, Thomas Pornin:
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. 115-149
Volume 20, Number 2, April 2007
- Johan Håstad:
The Security of the IAPM and IACBC Modes. 153-163 - Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel:
Constant-Round Oblivious Transfer in the Bounded Storage Model. 165-202 - Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. 203-235 - Tamir Tassa:
Hierarchical Threshold Secret Sharing. 237-264
Volume 20, Number 3, July 2007
- Ran Canetti, Shai Halevi, Jonathan Katz:
A Forward-Secure Public-Key Encryption Scheme. 265-294 - Amos Beimel, Yoav Stahl:
Robust Information-Theoretic Private Information Retrieval. 295-321 - Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. 323-373 - Qi Cheng:
Primality Proving via One Round in ECPP and One Iteration in AKS. 375-387 - Boaz Tsaban:
Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1. 389-392 - Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. 393 - Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. 394 - Martín Abadi, Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). 395
Volume 20, Number 4, October 2007
- Rafail Ostrovsky, William E. Skeith III:
Private Searching on Streaming Data. 397-430 - Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran:
Concurrent Composition of Secure Protocols in the Timing Model. 431-492 - Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang:
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. 493-514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.