


default search action
Journal of Cryptology, Volume 22
Volume 22, Number 1, January 2009
- Mihir Bellare, Chanathip Namprempre, Gregory Neven:

Security Proofs for Identity-Based Identification and Signature Schemes. 1-61 - Wolfgang Lempken, Tran van Trung, Spyros S. Magliveras, Wandi Wei:

A Public Key Cryptosystem Based on Non-abelian Finite Groups. 62-74 - Russell Impagliazzo

, Ragesh Jaiswal
, Valentine Kabanets:
Chernoff-Type Direct Product Theorems. 75-92 - Denis Xavier Charles, Kristin E. Lauter, Eyal Z. Goren:

Cryptographic Hash Functions from Expander Graphs. 93-113 - Adam Bender, Jonathan Katz, Ruggero Morselli:

Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. 114-138
Volume 22, Number 2, April 2009
- Phong Q. Nguyen, Oded Regev:

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. 139-160 - Yehuda Lindell

, Benny Pinkas:
A Proof of Security of Yao's Protocol for Two-Party Computation. 161-188 - Tal Moran, Ronen Shaltiel, Amnon Ta-Shma

:
Non-interactive Timestamping in the Bounded-Storage Model. 189-226 - Tamir Tassa, Nira Dyn:

Multipartite Secret Sharing by Bivariate Interpolation. 227-258 - Manuel Barbosa

, Andrew Moss, Dan Page:
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography. 259-281
Volume 22, Number 3, July 2009
- Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel:

Reducing Complexity Assumptions for Statistically-Hiding Commitment. 283-310 - John Black, Martin Cochran, Thomas Shrimpton:

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 311-329 - Karl Rubin, Alice Silverberg:

Using Abelian Varieties to Improve Pairing-Based Cryptography. 330-364 - Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell:

Upper and Lower Bounds on Black-Box Steganography. 365-394 - Yehuda Lindell

:
General Composition and Universal Composability in Secure Multiparty Computation. 395-428
Volume 22, Number 4, October 2009
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz:

Cryptography with Constant Input Locality. 429-469 - David Cash, Eike Kiltz

, Victor Shoup:
The Twin Diffie-Hellman Problem and Applications. 470-504 - Benjamin A. Smith

:
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves, . 505-529 - Marc Fischlin, Roger Fischlin:

Efficient Non-malleable Commitment Schemes. 530-571 - Mario Di Raimondo, Rosario Gennaro:

New Approaches for Deniable Authentication. 572-615

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














