


default search action
Journal of Cryptology, Volume 38
Volume 38, Number 1, March 2025
- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

, Mor Weiss:
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more. 1 - Gaëtan Leurent, Clara Pernot:

New Representations of the AES Key Schedule. 2 - Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:

SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves. 3 - Alexander R. Block

, Albert Garreta, Pratyush Ranjan Tiwari, Michal Zajac:
On Soundness Notions for Interactive Oracle Proofs. 4 - Adi Akavia

, Craig Gentry, Shai Halevi
, Margarita Vald
:
Achievable CCA2 Relaxation for Homomorphic Encryption. 5 - Valeh Farzaliyev

, Calvin Pärn
, Heleen Saarse
, Jan Willemson
:
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting. 6 - Gennaro Avitabile

, Vincenzo Botta
, Daniele Friolo
, Daniele Venturi
, Ivan Visconti
:
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae. 7 - Chris Brzuska, Geoffroy Couteau:

On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness. 8 - Gildas Avoine, Loïc Ferreira:

Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol. 9 - Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng

, Kang Yang, Yu Yu:
An Efficient ZK Compiler from SIMD Circuits to General Circuits. 10 - Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi:

Fiat-Shamir Bulletproofs are Non-malleable (in the Random Oracle Model). 11 - Jianwei Li, Phong Q. Nguyen:

A Complete Analysis of the BKZ Lattice Reduction Algorithm. 12 - Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie:

Efficient Succinct Zero-Knowledge Arguments in the CL Framework. 13 - Matteo Campanelli

, Dario Fiore, Rosario Gennaro:
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them. 14 - Jung Hee Cheon, Wonhee Cho

, Jiseung Kim
:
Improved Universal Thresholdizer from Iterative Shamir Secret Sharing. 15 - Ran Cohen

, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. 16
Volume 38, Number 2, June 2025
- Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, Ye Zhang:

Ceno: Non-uniform, Segment and Parallel Zero-Knowledge Virtual Machine. 17 - Jianwei Li, Phong Q. Nguyen:

Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm. 18 - Hongrui Cui

, Xiao Wang
, Kang Yang
, Yu Yu
:
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. 19 - Claude Carlet:

Two Generalizations of Almost Perfect Nonlinearity. 20 - Xinxin Fan, Veronika Kuchta

, Francesco Sica
, Lei Xu:
Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs. 21
Volume 38, Number 3, July 2025
- Samuele Andreoli

, Enrico Piccione
, Lilya Budaghyan, Pantelimon Stanica, Svetla Nikova:
On Decompositions of Permutations in Quadratic Functions. 22 - Giacomo Borin, Edoardo Persichetti, Federico Pintore, Krijn Reijnders, Paolo Santini:

A Guide to the Design of Digital Signatures based on Cryptographic Group Actions. 23 - Longjiang Qu, Qiancheng Zhang, Kangquan Li:

Parametric Construction Approach of Balanced Boolean Functions from Two-to-one Mappings. 24 - Marco Calderini

, Alessio Caminata
, Irene Villa
:
A New Multivariate Primitive from CCZ Equivalence. 25 - Nuttapong Attrapadung, Junichi Tomida:

Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions. 26 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:

Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. 27 - Thibauld Feneuil, Matthieu Rivain:

Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments. 28
Volume 38, Number 4, October 2025
- Prabhanjan Ananth, Gilad Asharov

, Hila Dahari, Vipul Goyal:
Towards Accountability in CRS Generation. 29 - Tomer Ashur, Erik Takke:

A New Linear Distinguisher for Four-Round AES. 30 - Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:

Two-Round Threshold Signature from Algebraic One-More Learning with Errors. 31 - Quang Dao, Aayush Jain:

Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK. 32 - Navid Alamati, Varun Maram:

Quantum CCA-Secure PKE, Revisited. 33 - Antonio Flórez-Gutiérrez

, Yosuke Todo
:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. 34 - Ziran Tu, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Nian Li:

New Characterizations of Dillon-like Hyperbent Functions via Dickson Polynomials. 35 - Ittai Abraham, Gilad Asharov

, Shravani Patil, Arpita Patra:
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS. 36

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














