Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Cryptology, Volume 37
Volume 37, Number 1, March 2024
- Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. 1 - Elette Boyle, Ran Cohen, Aarushi Goel:
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party. 2 - Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul:
BLEACH: Cleaning Errors in Discrete Computations Over CKKS. 3 - Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Lattice-Based Programmable Hash Functions and Applications. 4 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. 5 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation. 6 - Daniel J. Bernstein:
Cryptographic Competitions. 7 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi:
(Inner-Product) Functional Encryption with Updatable Ciphertexts. 8
Volume 37, Number 2, June 2024
- Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. 9 - Akshima, Siyao Guo, Qipeng Liu:
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions. 10 - Dmitrii I. Koshelev:
Hashing to Elliptic Curves Through Cipolla-Lehmer-Müller's Square Root Algorithm. 11 - Dennis Hofheinz, Jessica Koch, Christoph Striecks:
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. 12 - David Lubicz, Viktor Fischer:
Entropy Computation for Oscillator-based Physical Random Number Generators. 13 - Ron D. Rothblum, Prashant Nalini Vasudevan:
Collision Resistance from Multi-collision Resistance. 14 - Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda:
The COLM Authenticated Encryption Scheme. 15 - Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 16 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates. 17 - Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. 18 - Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. 19
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.