


default search action
Journal of Cryptology, Volume 24
Volume 24, Number 1, January 2011
- Sebastiaan Indesteege, Bart Preneel
:
Practical Collisions for EnRUPT. 1-23 - Andreas Enge, Pierrick Gaudry, Emmanuel Thomé
:
An L(1/3) Discrete Logarithm Algorithm for Low Degree Curves. 24-41 - Michel Abdalla
, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Jacob C. N. Schuldt, Nigel P. Smart:
Wildcarded Identity-Based Encryption. 42-82 - Ran Canetti, Jonathan Herzog:
Universally Composable Symbolic Security Analysis. 83-147 - Markus Grassl
, Ivana Ilic, Spyros S. Magliveras, Rainer Steinwandt:
Cryptanalysis of the Tillich-Zémor Hash Function. 148-156 - Gilad Asharov
, Yehuda Lindell
:
Utility Dependence in Correct and Fair Rational Secret Sharing. 157-202 - Marc Fischlin, Roger Fischlin:
Efficient Non-Malleable Commitment Schemes. 203-244
Volume 24, Number 2, April 2011
- Christof Paar, Jean-Jacques Quisquater, Berk Sunar:
Guest Editorial. 245-246 - Gaetan Canivet, Paolo Maistri, Régis Leveugle, Jessy Clédière
, Florent Valette, Marc Renaudin:
Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA. 247-268 - Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
, Nicolas Veyrat-Charvillon:
Mutual Information Analysis: a Comprehensive Study. 269-291 - Svetla Nikova
, Vincent Rijmen
, Martin Schläffer:
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. 292-321 - Axel Poschmann, Amir Moradi
, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling
:
Side-Channel Resistant Crypto for Less than 2, 300 GE. 322-345 - Agustin Dominguez-Oviedo, M. Anwar Hasan, Bijan Ansari:
Fault-Based Attack on Montgomery's Ladder Algorithm. 346-374 - Abhranil Maiti, Patrick Schaumont
:
Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive. 375-397 - Mathieu Baudet
, David Lubicz, Julien Micolod, André Tassiaux:
On the Security of Oscillator-Based Random Number Generators. 398-425
Volume 24, Number 3, July 2011
- Martin Hell
, Thomas Johansson
:
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time. 427-445 - Steven D. Galbraith
, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. 446-469 - Dennis Hofheinz:
Possibility and Impossibility Results for Selective Decommitments. 470-516 - Dafna Kidron, Yehuda Lindell
:
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs. 517-544 - Jean Monnerat, Serge Vaudenay:
Short Undeniable Signatures Based on Group Homomorphisms. 545-587 - Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. 588-613
Volume 24, Number 4, October 2011
- Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang:
Resource Fairness and Composability of Cryptographic Protocols. 615-658 - Dan Boneh, Xavier Boyen:
Efficient Selective Identity-Based Encryption Without Random Oracles. 659-693 - Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-Encryption. 694-719 - Boaz Barak, Ran Canetti, Yehuda Lindell
, Rafael Pass
, Tal Rabin:
Secure Computation Without Authentication. 720-760 - Yehuda Lindell
, Hila Zarosim:
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer. 761-799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
