


default search action
Journal of Cryptology, Volume 20
Volume 20, Number 1, January 2007
- Neal Koblitz, Alfred Menezes:

Another Look at "Provable Security". 3-37 - Jean-Sébastien Coron, Alexander May

:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. 39-50 - Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. 51-83 - Jonathan Katz, Moti Yung:

Scalable Protocols for Authenticated Group Key Exchange. 85-113 - Dario Catalano, David Pointcheval

, Thomas Pornin:
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. 115-149
Volume 20, Number 2, April 2007
- Johan Håstad

:
The Security of the IAPM and IACBC Modes. 153-163 - Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel:

Constant-Round Oblivious Transfer in the Bounded Storage Model. 165-202 - Joonsang Baek

, Ron Steinfeld, Yuliang Zheng
:
Formal Proofs for the Security of Signcryption. 203-235 - Tamir Tassa:

Hierarchical Threshold Secret Sharing. 237-264
Volume 20, Number 3, July 2007
- Ran Canetti, Shai Halevi, Jonathan Katz:

A Forward-Secure Public-Key Encryption Scheme. 265-294 - Amos Beimel

, Yoav Stahl:
Robust Information-Theoretic Private Information Retrieval. 295-321 - Carlo Blundo

, Paolo D'Arco, Alfredo De Santis
, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. 323-373 - Qi Cheng

:
Primality Proving via One Round in ECPP and One Iteration in AKS. 375-387 - Boaz Tsaban:

Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1. 389-392 - Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:

Robust and Efficient Sharing of RSA Functions. 393 - Rosario Gennaro, Tal Rabin, Hugo Krawczyk:

RSA-Based Undeniable Signatures. 394 - Martín Abadi, Phillip Rogaway:

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). 395
Volume 20, Number 4, October 2007
- Rafail Ostrovsky

, William E. Skeith III:
Private Searching on Streaming Data. 397-430 - Yael Tauman Kalai, Yehuda Lindell

, Manoj Prabhakaran:
Concurrent Composition of Secure Protocols in the Timing Model. 431-492 - Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang:

Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. 493-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














