


default search action
Journal of Cryptology, Volume 29
Volume 29, Number 1, January 2016
- Marco Baldi

, Marco Bianchi, Franco Chiaraluce
, Joachim Rosenthal
, Davide Schipani:
Enhanced Public Key Security for the McEliece Cryptosystem. 1-27 - Joppe W. Bos, Craig Costello

, Hüseyin Hisil
, Kristin E. Lauter:
Fast Cryptography in Genus 2. 28-60 - Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro:

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. 61-114 - Michael J. Freedman, Carmit Hazay

, Kobbi Nissim
, Benny Pinkas:
Efficient Set Intersection with Simulation-Based Security. 115-155 - Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:

Concurrent Knowledge Extraction in Public-Key Models. 156-219 - Daniel R. L. Brown:

Breaking RSA May Be As Difficult As Factoring. 220-241
Volume 29, Number 2, April 2016
- Rosario Gennaro, Carmit Hazay

, Jeffrey S. Sorensen:
Automata Evaluation and Text Search Protocols with Simulation-Based Security. 243-282 - Iftach Haitner, Eran Omri

, Hila Zarosim:
Limits on the Usefulness of Random Oracles. 283-335 - Amos Beimel

, Oriol Farràs
, Yuval Mintz:
Secret-Sharing Schemes for Very Dense Graphs. 336-362 - Masayuki Abe, Georg Fuchsbauer

, Jens Groth
, Kristiyan Haralambiev, Miyako Ohkubo:
Structure-Preserving Signatures and Commitments to Group Elements. 363-421 - Sebastian Faust, Carmit Hazay

, Jesper Buus Nielsen
, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure Against Hard-to-Invert Leakage. 422-455 - Yehuda Lindell

:
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries. 456-490
Volume 29, Number 3, July 2016
- Tal Moran, Moni Naor, Gil Segev:

An Optimally Fair Coin Toss. 491-513 - Carmit Hazay

, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
:
Leakage-Resilient Cryptography from Minimal Assumptions. 514-551 - Benny Applebaum:

Garbling XOR Gates "For Free" in the Standard Model. 552-576 - Benny Applebaum, Andrej Bogdanov, Alon Rosen:

A Dichotomy for Local Small-Bias Generators. 577-596 - Michel Abdalla

, Pierre-Alain Fouque
, Vadim Lyubashevsky, Mehdi Tibouchi
:
Tightly Secure Signatures From Lossy Identification Schemes. 597-631 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi

, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. 632-656
Volume 29, Number 4, October 2016
- Elena Andreeva

, Charles Bouillaguet
, Orr Dunkelman, Pierre-Alain Fouque
, Jonathan J. Hoch, John Kelsey
, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. 657-696 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. 697-728 - Xavier Boyen:

Unconditionally Anonymous Ring and Mesh Signatures. 729-774 - Eli Biham, Yaniv Carmeli, Adi Shamir:

Bug Attacks. 775-805 - Benjamin Smith

:
The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves. 806-832 - Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss

, Ryo Nishimaki, Miyako Ohkubo:
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 833-878 - Gilad Asharov

, Ran Canetti, Carmit Hazay
:
Toward a Game Theoretic View of Secure Computation. 879-926 - Franck Landelle, Thomas Peyrin

:
Cryptanalysis of Full RIPEMD-128. 927-951

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














