Search dblp for Publications

export results for "toc:db/journals/joc/joc22.bht:"

 download as .bib file

@article{DBLP:journals/joc/ApplebaumIK09,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Cryptography with Constant Input Locality},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {429--469},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9039-0},
  doi          = {10.1007/S00145-009-9039-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ApplebaumIK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarbosaMP09,
  author       = {Manuel Barbosa and
                  Andrew Moss and
                  Dan Page},
  title        = {Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {259--281},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9023-0},
  doi          = {10.1007/S00145-008-9023-0},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarbosaMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BellareNN09,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  Gregory Neven},
  title        = {Security Proofs for Identity-Based Identification and Signature Schemes},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {1},
  pages        = {1--61},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9028-8},
  doi          = {10.1007/S00145-008-9028-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BellareNN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BenderKM09,
  author       = {Adam Bender and
                  Jonathan Katz and
                  Ruggero Morselli},
  title        = {Ring Signatures: Stronger Definitions, and Constructions without Random
                  Oracles},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {1},
  pages        = {114--138},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-007-9011-9},
  doi          = {10.1007/S00145-007-9011-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BenderKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlackCS09,
  author       = {John Black and
                  Martin Cochran and
                  Thomas Shrimpton},
  title        = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {311--329},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9030-1},
  doi          = {10.1007/S00145-008-9030-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlackCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CashKS09,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {470--504},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9041-6},
  doi          = {10.1007/S00145-009-9041-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CashKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CharlesLG09,
  author       = {Denis Xavier Charles and
                  Kristin E. Lauter and
                  Eyal Z. Goren},
  title        = {Cryptographic Hash Functions from Expander Graphs},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {1},
  pages        = {93--113},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-007-9002-x},
  doi          = {10.1007/S00145-007-9002-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CharlesLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DedicIRR09,
  author       = {Nenad Dedic and
                  Gene Itkis and
                  Leonid Reyzin and
                  Scott Russell},
  title        = {Upper and Lower Bounds on Black-Box Steganography},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {365--394},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9020-3},
  doi          = {10.1007/S00145-008-9020-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DedicIRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinF09,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  title        = {Efficient Non-malleable Commitment Schemes},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {530--571},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9045-2},
  doi          = {10.1007/S00145-009-9045-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HaitnerHKKMS09,
  author       = {Iftach Haitner and
                  Omer Horvitz and
                  Jonathan Katz and
                  Chiu{-}Yuen Koo and
                  Ruggero Morselli and
                  Ronen Shaltiel},
  title        = {Reducing Complexity Assumptions for Statistically-Hiding Commitment},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {283--310},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-007-9012-8},
  doi          = {10.1007/S00145-007-9012-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HaitnerHKKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ImpagliazzoJK09,
  author       = {Russell Impagliazzo and
                  Ragesh Jaiswal and
                  Valentine Kabanets},
  title        = {Chernoff-Type Direct Product Theorems},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {1},
  pages        = {75--92},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9029-7},
  doi          = {10.1007/S00145-008-9029-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ImpagliazzoJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LempkenTMW09,
  author       = {Wolfgang Lempken and
                  Tran van Trung and
                  Spyros S. Magliveras and
                  Wandi Wei},
  title        = {A Public Key Cryptosystem Based on Non-abelian Finite Groups},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {1},
  pages        = {62--74},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9033-y},
  doi          = {10.1007/S00145-008-9033-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LempkenTMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Lindell09,
  author       = {Yehuda Lindell},
  title        = {General Composition and Universal Composability in Secure Multiparty
                  Computation},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {395--428},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9021-2},
  doi          = {10.1007/S00145-008-9021-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Lindell09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellP09,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {A Proof of Security of Yao's Protocol for Two-Party Computation},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {161--188},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9036-8},
  doi          = {10.1007/S00145-008-9036-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MoranST09,
  author       = {Tal Moran and
                  Ronen Shaltiel and
                  Amnon Ta{-}Shma},
  title        = {Non-interactive Timestamping in the Bounded-Storage Model},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {189--226},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9035-9},
  doi          = {10.1007/S00145-008-9035-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MoranST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NguyenR09,
  author       = {Phong Q. Nguyen and
                  Oded Regev},
  title        = {Learning a Parallelepiped: Cryptanalysis of {GGH} and {NTRU} Signatures},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {139--160},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9031-0},
  doi          = {10.1007/S00145-008-9031-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NguyenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RaimondoG09,
  author       = {Mario Di Raimondo and
                  Rosario Gennaro},
  title        = {New Approaches for Deniable Authentication},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {572--615},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9044-3},
  doi          = {10.1007/S00145-009-9044-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/RaimondoG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RubinS09,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Using Abelian Varieties to Improve Pairing-Based Cryptography},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {330--364},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9022-1},
  doi          = {10.1007/S00145-008-9022-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/RubinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Smith09,
  author       = {Benjamin A. Smith},
  title        = {Isogenies and the Discrete Logarithm Problem in Jacobians of Genus
                  3 Hyperelliptic Curves\({}^{\mbox{, }}\)},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {505--529},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9038-1},
  doi          = {10.1007/S00145-009-9038-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/TassaD09,
  author       = {Tamir Tassa and
                  Nira Dyn},
  title        = {Multipartite Secret Sharing by Bivariate Interpolation},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {227--258},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9027-9},
  doi          = {10.1007/S00145-008-9027-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/TassaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics