


default search action
Journal of Cryptology, Volume 31
Volume 31, Number 1, January 2018
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz:

Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings. 1-22 - Dario Catalano, Dario Fiore:

Practical Homomorphic Message Authenticators for Arithmetic Circuits. 23-59 - Ilan Komargodski, Gil Segev, Eylon Yogev:

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions. 60-100 - Christina Boura, Virginie Lallemand, María Naya-Plasencia, Valentin Suder:

Making the Impossible Possible. 101-133 - Ilya Mironov

, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. 134-161 - Shoni Gilboa, Shay Gueron

, Ben Morris:
How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? 162-171 - Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:

A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption. 172-201 - Zvika Brakerski, Gil Segev:

Function-Private Functional Encryption in the Private-Key Setting. 202-225 - Eiichiro Fujisaki:

All-But-Many Encryption. 226-275 - Saqib A. Kakvi

, Eike Kiltz
:
Optimal Security Proofs for Full Domain Hash, Revisited. 276-306
Volume 31, Number 2, April 2018
- Michel Abdalla

, Mihir Bellare, Gregory Neven:
Robust Encryption. 307-350 - Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:

Multivariate High-Order Attacks of Shuffled Tables Recomputation. 351-393 - Bin Zhang, Chao Xu, Dengguo Feng:

Practical Cryptanalysis of Bluetooth Encryption with Condition Masking. 394-433 - Zvika Brakerski, Ilan Komargodski, Gil Segev:

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions. 434-520 - Ben Morris, Phillip Rogaway, Till Stegers:

Deterministic Encryption with the Thorp Shuffle. 521-536 - Carmit Hazay:

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 537-586 - Ran Cohen

, Iftach Haitner, Eran Omri
, Lior Rotem:
Characterization of Secure Multiparty Computation Without Broadcast. 587-609 - Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois

, Amin Sakzad
, Damien Stehlé
, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. 610-640
Volume 31, Number 3, July 2018
- Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:

Efficient Slide Attacks. 641-670 - Yehuda Lindell

, Eran Omri
, Hila Zarosim:
Completeness for Symmetric Two-Party Functionalities: Revisited. 671-697 - Gilad Asharov

, Gil Segev:
On Constructing One-Way Permutations from Indistinguishability Obfuscation. 698-736 - Yehuda Lindell

, Hila Zarosim:
On the Feasibility of Extending Oblivious Transfer. 737-773 - Vadim Lyubashevsky, Daniele Micciancio

:
Asymptotically Efficient Lattice-Based Digital Signatures. 774-797 - Shay Gueron

, Yehuda Lindell
, Ariel Nof, Benny Pinkas:
Fast Garbling of Circuits Under Standard Assumptions. 798-844 - Brice Minaud, Patrick Derbez

, Pierre-Alain Fouque
, Pierre Karpman:
Key-Recovery Attacks on ASASA. 845-884 - Anne Canteaut, Sergiu Carpov

, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
:
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. 885-916
Volume 31, Number 4, October 2018
- Michel Abdalla

, Fabrice Benhamouda
, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. 917-964 - Dominique Unruh:

Everlasting Multi-party Computation. 965-1011 - Ananth Raghunathan, Gil Segev, Salil P. Vadhan:

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions. 1012-1063 - Shan Chen

, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger:
Minimizing the Two-Round Even-Mansour Cipher. 1064-1119 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:

On the (Im-)Possibility of Extending Coin Toss. 1120-1163 - Michael Hutter, Erich Wenger:

Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. 1164-1182

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














