default search action
Journal of Cryptology, Volume 29
Volume 29, Number 1, January 2016
- Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Enhanced Public Key Security for the McEliece Cryptosystem. 1-27 - Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Fast Cryptography in Genus 2. 28-60 - Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro:
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. 61-114 - Michael J. Freedman, Carmit Hazay, Kobbi Nissim, Benny Pinkas:
Efficient Set Intersection with Simulation-Based Security. 115-155 - Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in Public-Key Models. 156-219 - Daniel R. L. Brown:
Breaking RSA May Be As Difficult As Factoring. 220-241
Volume 29, Number 2, April 2016
- Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation-Based Security. 243-282 - Iftach Haitner, Eran Omri, Hila Zarosim:
Limits on the Usefulness of Random Oracles. 283-335 - Amos Beimel, Oriol Farràs, Yuval Mintz:
Secret-Sharing Schemes for Very Dense Graphs. 336-362 - Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo:
Structure-Preserving Signatures and Commitments to Group Elements. 363-421 - Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure Against Hard-to-Invert Leakage. 422-455 - Yehuda Lindell:
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries. 456-490
Volume 29, Number 3, July 2016
- Tal Moran, Moni Naor, Gil Segev:
An Optimally Fair Coin Toss. 491-513 - Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:
Leakage-Resilient Cryptography from Minimal Assumptions. 514-551 - Benny Applebaum:
Garbling XOR Gates "For Free" in the Standard Model. 552-576 - Benny Applebaum, Andrej Bogdanov, Alon Rosen:
A Dichotomy for Local Small-Bias Generators. 577-596 - Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. 597-631 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. 632-656
Volume 29, Number 4, October 2016
- Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. 657-696 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. 697-728 - Xavier Boyen:
Unconditionally Anonymous Ring and Mesh Signatures. 729-774 - Eli Biham, Yaniv Carmeli, Adi Shamir:
Bug Attacks. 775-805 - Benjamin Smith:
The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves. 806-832 - Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 833-878 - Gilad Asharov, Ran Canetti, Carmit Hazay:
Toward a Game Theoretic View of Secure Computation. 879-926 - Franck Landelle, Thomas Peyrin:
Cryptanalysis of Full RIPEMD-128. 927-951
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.