default search action
Journal of Cryptology, Volume 28
Volume 28, Number 1, January 2015
- Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. 1-28 - Mihir Bellare, Dennis Hofheinz, Eike Kiltz:
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? 29-48 - Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation. 49-109 - Eli Biham, Rafi Chen, Antoine Joux:
Cryptanalysis of SHA-0 and Reduced SHA-1. 110-160 - Ämin Baumeler, Anne Broadbent:
Quantum Private Information Retrieval has Linear Communication Complexity. 161-175 - Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks:
Confined Guessing: New Signatures From Standard Assumptions. 176-208
Volume 28, Number 2, April 2015
- Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. 209-239 - Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad:
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions. 240-256 - Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. 257-296 - Itay Berman, Iftach Haitner:
From Non-adaptive to Adaptive Pseudorandom Functions. 297-311 - Yehuda Lindell, Benny Pinkas:
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. 312-350 - Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. 351-395
Volume 28, Number 3, July 2015
- Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. 397-422 - Dennis Hofheinz, Victor Shoup:
GNUC: A New Universal Composability Framework. 423-508 - Eric Miles, Emanuele Viola:
On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist). 509-532 - Lior Malka:
How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge. 533-550 - Amos Beimel, Eran Omri, Ilan Orlov:
Protocols for Multiparty Coin Toss with a Dishonest Majority. 551-600 - Boaz Tsaban:
Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography. 601-622 - Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma:
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. 623-640 - Sven Schäge:
Tight Security for Signature Schemes Without Random Oracles. 641-670 - Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. 671-717 - Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. 718-744
Volume 28, Number 4, October 2015
- Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Almost-Everywhere Secure Computation with Edge Corruptions. 745-768 - Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. 769-795 - James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta:
Spreading Alerts Quietly and the Subgroup Escape Problem. 796-819 - Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith:
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. 820-843 - Mihir Bellare:
New Proofs for NMAC and HMAC: Security without Collision Resistance. 844-878 - Thomas Peyrin:
Collision Attack on Grindahl. 879-898
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.