default search action
Journal of Cryptology, Volume 26
Volume 26, Number 1, January 2013
- Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng:
Public-Coin Parallel Zero-Knowledge for NP. 1-10 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. 11-38 - David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. 39-74 - Hossein Ghodosi:
Analysis of an Unconditionally Secure Distributed Oblivious Transfer. 75-79 - Eiichiro Fujisaki, Tatsuaki Okamoto:
Secure Integration of Asymmetric and Symmetric Encryption Schemes. 80-101 - Dennis Hofheinz, Eike Kiltz, Victor Shoup:
Practical Chosen Ciphertext Secure Encryption from Factoring. 102-118 - Antoine Joux, Vanessa Vitse:
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on $E(\mathbb{F}_{q^{5}})$. 119-143 - Andrej Bogdanov, Alon Rosen:
Input Locality and Hardness Amplification. 144-171 - Takanori Isobe:
A Single-Key Attack on the Full GOST Block Cipher. 172-189
Volume 26, Number 2, April 2013
- Jonathan Katz, Amit Sahai, Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. 191-224 - Tibor Jager, Jörg Schwenk:
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. 225-245 - Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi:
A Note on the Bivariate Coppersmith Theorem. 246-250 - Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. 251-279 - Joan Boyar, Philip Matthews, René Peralta:
Logic Minimization Techniques with Applications to Cryptology. 280-312 - Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. 313-339 - Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles. 340-373
Volume 26, Number 3, July 2013
- Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade:
Polynomial Runtime and Composability. 375-441 - Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. 442-483 - Oded Goldreich, Ron D. Rothblum:
Enhancements of Trapdoor Permutations. 484-512 - Elette Boyle, Gil Segev, Daniel Wichs:
Fully Leakage-Resilient Signatures. 513-558
Volume 26, Number 4, October 2013
- Jin Hong, Sunghwan Moon:
A Comparison of Cryptanalytic Tradeoff Algorithms. 559-637 - Yehuda Lindell:
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge. 638-654 - Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". 655-713 - Jonathan Katz, Vinod Vaikuntanathan:
Round-Optimal Password-Based Authenticated Key Exchange. 714-743
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.