


default search action
Journal of Cryptology, Volume 35
Volume 35, Number 1, January 2022
- Siyao Guo, Pritish Kamath, Alon Rosen
, Katerina Sotiraki
:
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange. 1 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. 2 - Marek Sýs
, Lubomír Obrátil, Vashek Matyás, Dusan Klinec:
A Bad Day to Die Hard: Correcting the Dieharder Battery. 3 - Ran Cohen
, Iftach Haitner, Eran Omri, Lior Rotem:
From Fairness to Full Security in Multiparty Computation. 4 - Dragos Rotaru
, Nigel P. Smart
, Titouan Tanguy
, Frederik Vercauteren
, Tim Wood
:
Actively Secure Setup for SPDZ. 5
Volume 35, Number 2, April 2022
- Gilad Asharov
, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass
, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. 6 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. 7 - Roy Radian, Or Sattath
:
Semi-quantum Money. 8 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
CCA Security and Trapdoor Functions via Key-Dependent-Message Security. 9 - Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky:
On the Round Complexity of Randomized Byzantine Agreement. 10 - Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and their Applications. 11 - Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat, Ran Cohen
:
Multiparty Generation of an RSA Modulus. 12 - Carmit Hazay, Emmanuela Orsini
, Peter Scholl, Eduardo Soria-Vazquez:
TinyKeys: A New Approach to Efficient Multi-Party Computation. 13 - Ivan Damgård, Claudio Orlandi, Akira Takahashi
, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. 14
Volume 35, Number 3, July 2022
- Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky
, Omer Paneth:
Succinct Non-Interactive Arguments via Linear Interactive Proofs. 15 - Susumu Kiyoshima:
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance. 16 - Keitaro Hashimoto
, Shuichi Katsumata, Kris Kwiatkowski
, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable. 17 - Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. 18 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Obfustopia Built on Secret-Key Functional Encryption. 19 - Bernardo Magri
, Giulio Malavolta
, Dominique Schröder, Dominique Unruh:
Everlasting UC Commitments from Fully Malicious PUFs. 20 - Gilad Asharov
, Ilan Komargodski, Rafael Pass
, Naomi Sirkin:
On the Complexity of Compressing Obfuscation. 21 - Charles Grover, Andrew Mendelsohn
, Cong Ling, Roope Vehkalahti:
Non-commutative Ring Learning with Errors from Cyclic Algebras. 22
Volume 35, Number 4, October 2022
- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
ZK-PCPs from Leakage-Resilient Secret Sharing. 23 - Wouter Castryck
, Jana Sotáková
, Frederik Vercauteren:
Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory: Extended Version. 24 - Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)Security of ROS. 25 - Jiaxin Pan
, Chen Qian
, Magnus Ringerud
:
Signed (Group) Diffie-Hellman Key Exchange with Tight Security. 26 - Ittai Abraham, Gilad Asharov
, Avishay Yanai:
Efficient Perfectly Secure Computation with Optimal Resilience. 27 - Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. 28 - Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. 29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.