![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc22.bht:"
@article{DBLP:journals/joc/ApplebaumIK09, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Cryptography with Constant Input Locality}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {429--469}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9039-0}, doi = {10.1007/S00145-009-9039-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ApplebaumIK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarbosaMP09, author = {Manuel Barbosa and Andrew Moss and Dan Page}, title = {Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {259--281}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9023-0}, doi = {10.1007/S00145-008-9023-0}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarbosaMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BellareNN09, author = {Mihir Bellare and Chanathip Namprempre and Gregory Neven}, title = {Security Proofs for Identity-Based Identification and Signature Schemes}, journal = {J. Cryptol.}, volume = {22}, number = {1}, pages = {1--61}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9028-8}, doi = {10.1007/S00145-008-9028-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BellareNN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BenderKM09, author = {Adam Bender and Jonathan Katz and Ruggero Morselli}, title = {Ring Signatures: Stronger Definitions, and Constructions without Random Oracles}, journal = {J. Cryptol.}, volume = {22}, number = {1}, pages = {114--138}, year = {2009}, url = {https://doi.org/10.1007/s00145-007-9011-9}, doi = {10.1007/S00145-007-9011-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BenderKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlackCS09, author = {John Black and Martin Cochran and Thomas Shrimpton}, title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {311--329}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9030-1}, doi = {10.1007/S00145-008-9030-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlackCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CashKS09, author = {David Cash and Eike Kiltz and Victor Shoup}, title = {The Twin Diffie-Hellman Problem and Applications}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {470--504}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9041-6}, doi = {10.1007/S00145-009-9041-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CashKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CharlesLG09, author = {Denis Xavier Charles and Kristin E. Lauter and Eyal Z. Goren}, title = {Cryptographic Hash Functions from Expander Graphs}, journal = {J. Cryptol.}, volume = {22}, number = {1}, pages = {93--113}, year = {2009}, url = {https://doi.org/10.1007/s00145-007-9002-x}, doi = {10.1007/S00145-007-9002-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CharlesLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DedicIRR09, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, title = {Upper and Lower Bounds on Black-Box Steganography}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {365--394}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9020-3}, doi = {10.1007/S00145-008-9020-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DedicIRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinF09, author = {Marc Fischlin and Roger Fischlin}, title = {Efficient Non-malleable Commitment Schemes}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {530--571}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9045-2}, doi = {10.1007/S00145-009-9045-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HaitnerHKKMS09, author = {Iftach Haitner and Omer Horvitz and Jonathan Katz and Chiu{-}Yuen Koo and Ruggero Morselli and Ronen Shaltiel}, title = {Reducing Complexity Assumptions for Statistically-Hiding Commitment}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {283--310}, year = {2009}, url = {https://doi.org/10.1007/s00145-007-9012-8}, doi = {10.1007/S00145-007-9012-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HaitnerHKKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ImpagliazzoJK09, author = {Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets}, title = {Chernoff-Type Direct Product Theorems}, journal = {J. Cryptol.}, volume = {22}, number = {1}, pages = {75--92}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9029-7}, doi = {10.1007/S00145-008-9029-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ImpagliazzoJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LempkenTMW09, author = {Wolfgang Lempken and Tran van Trung and Spyros S. Magliveras and Wandi Wei}, title = {A Public Key Cryptosystem Based on Non-abelian Finite Groups}, journal = {J. Cryptol.}, volume = {22}, number = {1}, pages = {62--74}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9033-y}, doi = {10.1007/S00145-008-9033-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LempkenTMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Lindell09, author = {Yehuda Lindell}, title = {General Composition and Universal Composability in Secure Multiparty Computation}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {395--428}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9021-2}, doi = {10.1007/S00145-008-9021-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Lindell09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellP09, author = {Yehuda Lindell and Benny Pinkas}, title = {A Proof of Security of Yao's Protocol for Two-Party Computation}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {161--188}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9036-8}, doi = {10.1007/S00145-008-9036-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MoranST09, author = {Tal Moran and Ronen Shaltiel and Amnon Ta{-}Shma}, title = {Non-interactive Timestamping in the Bounded-Storage Model}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {189--226}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9035-9}, doi = {10.1007/S00145-008-9035-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MoranST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NguyenR09, author = {Phong Q. Nguyen and Oded Regev}, title = {Learning a Parallelepiped: Cryptanalysis of {GGH} and {NTRU} Signatures}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {139--160}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9031-0}, doi = {10.1007/S00145-008-9031-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NguyenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/RaimondoG09, author = {Mario Di Raimondo and Rosario Gennaro}, title = {New Approaches for Deniable Authentication}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {572--615}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9044-3}, doi = {10.1007/S00145-009-9044-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/RaimondoG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/RubinS09, author = {Karl Rubin and Alice Silverberg}, title = {Using Abelian Varieties to Improve Pairing-Based Cryptography}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {330--364}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9022-1}, doi = {10.1007/S00145-008-9022-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/RubinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Smith09, author = {Benjamin A. Smith}, title = {Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves\({}^{\mbox{, }}\)}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {505--529}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9038-1}, doi = {10.1007/S00145-009-9038-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/TassaD09, author = {Tamir Tassa and Nira Dyn}, title = {Multipartite Secret Sharing by Bivariate Interpolation}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {227--258}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9027-9}, doi = {10.1007/S00145-008-9027-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/TassaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.