default search action
Journal of Cryptology, Volume 32
Volume 32, Number 1, January 2019
- Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Linear Cryptanalysis. 1-34 - Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. 35-83 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. 84-150 - Alexandre Duc, Stefan Dziembowski, Sebastian Faust:
Unifying Leakage Models: From Probing Attacks to Noisy Leakage. 151-177 - Susumu Kiyoshima:
Round-Efficient Black-Box Construction of Composable Multi-Party Computation. 178-238 - Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. 239-264
Volume 32, Number 2, April 2019
- Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. 265-323 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. 324-360 - Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor:
Hardness-Preserving Reductions via Cuckoo Hashing. 361-392 - Susumu Kiyoshima:
Non-black-box Simulation in the Fully Concurrent Setting, Revisited. 393-434 - Florent Bernard, Patrick Haddad, Viktor Fischer, Jean Nicolai:
From Physical to Stochastic Modeling of a TERO-Based TRNG. 435-458 - Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. 459-497 - Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. 498-546 - Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé:
Cryptanalysis of the CLT13 Multilinear Map. 547-565 - Nils Fleischhacker, Tibor Jager, Dominique Schröder:
On Tight Security Proofs for Schnorr Signatures. 566-599
Volume 32, Number 3, July 2019
- Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail:
Key Establishment à la Merkle in a Quantum World. 601-634 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Complexity of Universally Composable Security in the CRS Model. 635-689 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. 690-741 - Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage Resilience from Program Obfuscation. 742-824 - Mark Zhandry:
The Magic of ELFs. 825-866 - Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez:
Koblitz Curves over Quadratic Fields. 867-894 - Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda:
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. 895-940 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. 941-972 - Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments. 973-1025 - Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai:
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ. 1026-1069
Volume 32, Number 4, October 2019
- Felipe Gomes Lacerda, Joseph M. Renes, Renato Renner:
Classical Leakage Resilience from Fault-Tolerant Quantum Computation. 1071-1094 - Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff:
White-Box Cryptography: Don't Forget About Grey-Box Attacks. 1095-1143 - Carmit Hazay, Avishay Yanai:
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model. 1144-1199 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
What Security Can We Achieve Within 4 Rounds? 1200-1262 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version. 1263-1297 - Razvan Barbulescu, Sylvain Duquesne:
Updating Key Size Estimations for Pairings. 1298-1336 - Atsushi Takayasu, Yao Lu, Liqiang Peng:
Small CRT-Exponent RSA Revisited. 1337-1382 - Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. 1383-1422 - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of NORX v2.0. 1423-1447 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. 1448-1490 - Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption. 1491-1573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.