


default search action
Journal of Cryptology, Volume 21
Volume 21, Number 1, January 2008
- Johan Håstad

, Mats Näslund:
Practical Construction and Analysis of Pseudo-Randomness Primitives. 1-26 - Don Coppersmith, Jean-Sébastien Coron

, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1. 27-51 - Minh-Huyen Nguyen, Salil P. Vadhan:

Simpler Session-Key Generation from Short Random Passwords. 52-96 - Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:

Tag-KEM/DEM: A New Framework for Hybrid Encryption. 97-130 - Ali Aydin Selçuk

:
On Probability of Success in Linear and Differential Cryptanalysis. 131-147
Volume 21, Number 2, April 2008
- Dan Boneh, Xavier Boyen:

Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. 149-177 - Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel P. Smart:

Generic Constructions of Identity-Based and Certificateless KEMs. 178-199 - Yehuda Lindell

:
Lower Bounds and Impossibility Results for Concurrent Self Composition. 200-249 - Jérôme Renault, Tristan Tomala:

Probabilistic Reliability and Privacy of Communication Using Multicast in General Neighbor Networks. 250-279 - Raphael Overbeck:

Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes. 280-301
Volume 21, Number 3, July 2008
- Jonathan Katz, Yehuda Lindell

:
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. 303-349 - Michel Abdalla

, Mihir Bellare, Dario Catalano, Eike Kiltz
, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. 350-391 - Elad Barkan, Eli Biham, Nathan Keller:

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. 392-429 - Yi Lu, Serge Vaudenay:

Cryptanalysis of an E0-like Combiner with Memory. 430-457 - Francesco Matucci

:
Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group. 458-468
Volume 21, Number 4, October 2008
- Mihir Bellare, Chanathip Namprempre:

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. 469-491 - Ralf Küsters, Anupam Datta, John C. Mitchell

, Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security. 492-546 - Charanjit S. Jutla:

Encryption Modes with Almost Free Message Integrity. 547-578 - Rahul Jain

:
New Binding-Concealing Trade-Offs for Quantum String Commitment. 579-592 - Claus Diem, Emmanuel Thomé

:
Index Calculus in Class Groups of Non-hyperelliptic Curves of Genus Three. 593-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














