


default search action
Journal of Cryptology, Volume 25
Volume 25, Number 1, January 2012
- Rahul Jain

:
Resource Requirements of Private Quantum Channels and Consequences for Oblivious Remote State Preparation. 1-13 - S. Dov Gordon, Jonathan Katz:

Partial Fairness in Secure Two-Party Computation. 14-40 - Jonathan Katz:

Which Languages Have 4-Round Zero-Knowledge Proofs? 41-56 - Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi:

Secure Proxy Signature Schemes for Delegation of Signing Rights. 57-115 - Krzysztof Pietrzak, Douglas Wikström:

Parallel Repetition of Computationally Sound Protocols Revisited. 116-135 - Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel

, Guy A. E. Vandenbosch, Ingrid Verbauwhede
:
A Practical Attack on KeeLoq. 136-157 - Shai Halevi, Yael Tauman Kalai:

Smooth Projective Hashing and Two-Message Oblivious Transfer. 158-193
Volume 25, Number 2, April 2012
- Jung Hee Cheon, Jin Hong

, Minkyu Kim:
Accelerating Pollard's Rho Algorithm on Finite Fields. 195-242 - Giuseppe Ateniese

, Alfredo De Santis
, Anna Lisa Ferrara, Barbara Masucci
:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. 243-270 - Shoichi Hirose

, Je Hong Park, Aaram Yun:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. 271-309 - Tom Roeder, Rafael Pass

, Fred B. Schneider:
Multi-Verifier Signatures. 310-348 - Lorenz Minder, Alistair Sinclair:

The Extended k-tree Algorithm. 349-382
Volume 25, Number 3, July 2012
- Carmit Hazay, Kobbi Nissim

:
Efficient Set Operations in the Presence of Malicious Adversaries. 383-433 - Oriol Farràs

, Jaume Martí-Farré
, Carles Padró
:
Ideal Multipartite Secret Sharing Schemes. 434-463 - Stanislav Smyshlyaev

:
Perfectly Balanced Boolean Functions and Golić Conjecture. 464-483 - Dennis Hofheinz, Eike Kiltz

:
Programmable Hash Functions and Their Applications. 484-527 - Akinori Kawachi, Takeshi Koshiba

, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. 528-555
Volume 25, Number 4, October 2012
- Yvo Desmedt, Josef Pieprzyk

, Ron Steinfeld, Xiaoming Sun
, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. 557-600 - David Cash, Dennis Hofheinz, Eike Kiltz

, Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis. 601-639 - Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen

, Chanathip Namprempre:
On-line Ciphers and the Hash-CBC Constructions. 640-679 - Yehuda Lindell

, Benny Pinkas:
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. 680-722 - Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen:

Batch Verification of Short Signatures. 723-747 - Praveen Gauravaram

, Lars R. Knudsen
:
Security Analysis of Randomize-Hash-then-Sign Digital Signatures. 748-779

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














