default search action
Journal of Cryptology, Volume 30
Volume 30, Number 1, January 2017
- Andreas J. Winter:
Weak Locking Capacity of Quantum Channels Can be Much Larger Than Private Capacity. 1-21 - David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability Via Oblivious RAM. 22-57 - Gilad Asharov, Yehuda Lindell:
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation. 58-151 - Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier. 152-190 - Mahdi Cheraghchi, Venkatesan Guruswami:
Non-malleable Coding Against Bit-Wise and Split-State Tampering. 191-241 - Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Luis Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. 242-288 - Zvika Brakerski, Guy N. Rothblum:
Obfuscating Conjunctions. 289-320 - Carmit Hazay, Arpita Patra:
Efficient One-Sided Adaptively Secure Computation. 321-371
Volume 30, Number 2, April 2017
- Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, Takafumi Aoki:
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks. 373-391 - Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. 392-443 - Ilan Komargodski, Moni Naor, Eylon Yogev:
Secret-Sharing for NP. 444-469 - Dominique Schröder, Dominique Unruh:
Security of Blind Signatures Revisited. 470-494 - Jooyoung Lee, Martijn Stam, John P. Steinberger:
The Security of Tandem-DM in the Ideal Cipher Model. 495-518 - Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert:
Efficient Cryptosystems From 2k-th Power Residue Symbols. 519-549 - Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
Photonic Side-Channel Analysis of Arbiter PUFs. 550-571 - Hüseyin Hisil, Craig Costello:
Jacobian Coordinates on Genus 2 Curves. 572-600
Volume 30, Number 3, July 2017
- Manoj Prabhakaran, Mike Rosulek:
Reconciling Non-malleability with Homomorphic Encryption. 601-671 - Benny Applebaum, Yoni Moses:
Locally Computable UOWHF with Linear Shrinkage. 672-698 - Boaz Barak, Mohammad Mahmoody-Ghidary:
Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. 699-734 - Jae Hong Seo:
Short Signatures from Diffie-Hellman: Realizing Almost Compact Public Key. 735-759 - Hendrik W. Lenstra Jr., Alice Silverberg:
Lattices with Symmetry. 760-804 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions. 805-858 - Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. 859-888 - Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack. 889-919 - Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. 920-959
Volume 30, Number 4, October 2017
- Benny Applebaum, Pavel Raykov:
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. 961-988 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. 989-1066 - Sune K. Jakobsen:
Information Theoretical Cryptogenography. 1067-1115 - Charanjit S. Jutla, Arnab Roy:
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. 1116-1156 - Ran Cohen, Yehuda Lindell:
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation. 1157-1186 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly Secure Bit Encryption: Applications and Realizations. 1187-1237 - Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. 1238-1275 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:
Authenticated Confidential Channel Establishment and the Security of TLS-DHE. 1276-1324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.