![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Cryptology, Volume 36
Volume 36, Number 1, January 2023
- Katharina Boudgoust, Corentin Jeudy
, Adeline Roux-Langlois, Weiqiang Wen
:
On the Hardness of Module Learning with Errors with Short Distributions. 1 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. 2 - Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
Rotational Differential-Linear Cryptanalysis Revisited. 3
Volume 36, Number 2, April 2023
- David Pointcheval
, Nigel P. Smart
:
Topical Collection on Computing on Encrypted Data. 4 - Benny Applebaum, Yoni Moses:
Correction: Locally Computable UOWHF with Linear Shrinkage. 5 - Pratish Datta, Ilan Komargodski, Brent Waters:
Decentralized Multi-authority ABE for sfNC1 from BDH. 6 - Gilad Asharov
, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. 7 - Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung:
SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors. 8 - Susumu Kiyoshima:
No-Signaling Linear PCPs. 9 - Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux:
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption. 10 - Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. 11 - Robin Geelen
, Frederik Vercauteren:
Bootstrapping for BGV and BFV Revisited. 12 - Ashish Choudhury, Arpita Patra:
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience. 13 - Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa:
NIZK from SNARGs. 14
Volume 36, Number 3, July 2023
- Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. 15 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries. 16 - Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie:
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups. 17 - Murilo Coutinho
, Iago Passos
, Juan del Carmen Grados Vasquez
, Santanu Sarkar
, Fábio L. L. Mendonça
, Rafael Timóteo de Sousa Jr.
, Fábio Borges
:
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró. 18 - Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning. 19 - Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubácek:
Must the Communication Graph of MPC Protocols be an Expander? 20 - Jun Furukawa
, Yehuda Lindell, Ariel Nof, Or Weinstein:
High-Throughput Secure Three-Party Computation with an Honest Majority. 21 - Nishat Koti
, Shravani Mahesh Patil
, Arpita Patra
, Ajith Suresh
:
MPClan: Protocol Suite for Privacy-Conscious Computations. 22 - Benoît Libert, San Ling, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. 23 - Bar Alon
, Eran Omri:
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious. 24 - Bar Alon
, Ran Cohen, Eran Omri, Tom Suad:
On the Power of an Honest Majority in Three-Party Computation Without Broadcast. 25 - Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam:
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model. 26 - Zvika Brakerski, Nico Döttling, Sanjam Garg
, Giulio Malavolta
:
Candidate iO from Homomorphic Encryption Schemes. 27 - Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
Parameter Optimization and Larger Precision for (T)FHE. 28 - Uddipana Dowerah
, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
:
Unbounded Predicate Inner Product Functional Encryption from Pairings. 29 - Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, Abson Sae-Tang, Marius Vuille, Nicolas Gama, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi:
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic. 31
Volume 36, Number 4, October 2023
- Song Tian:
Cover Attacks for Elliptic Curves over Cubic Extension Fields. 32 - Yuyu Wang
, Jiaxin Pan
, Yu Chen
:
Fine-Grained Secure Attribute-Based Encryption. 33 - Raine Nieminen, Thomas Schneider
:
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires. 34 - Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model. 35 - Thomas Attema
, Serge Fehr, Michael Klooß
:
Fiat-Shamir Transformation of Multi-Round Interactive Proofs (Extended Version). 36 - Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-Preserving Signatures with Almost Tight Security. 37 - Valence Cristiani, Maxime Lecomte, Philippe Maurine:
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs. 38 - Marshall Ball
, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran:
Topology-Hiding Communication from Minimal Assumptions. 39 - Lior Rotem, Gil Segev:
Non-malleable Vector Commitments via Local Equivocability. 40 - Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
:
Rinocchio: SNARKs for Ring Arithmetic. 41
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.