


default search action
Journal of Cryptology, Volume 26
Volume 26, Number 1, January 2013
- Rafael Pass

, Alon Rosen, Wei-Lung Dustin Tseng:
Public-Coin Parallel Zero-Knowledge for NP. 1-10 - Julia Borghoff, Lars R. Knudsen

, Gregor Leander
, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. 11-38 - David Mandell Freeman

, Oded Goldreich
, Eike Kiltz
, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. 39-74 - Hossein Ghodosi

:
Analysis of an Unconditionally Secure Distributed Oblivious Transfer. 75-79 - Eiichiro Fujisaki, Tatsuaki Okamoto:

Secure Integration of Asymmetric and Symmetric Encryption Schemes. 80-101 - Dennis Hofheinz, Eike Kiltz

, Victor Shoup:
Practical Chosen Ciphertext Secure Encryption from Factoring. 102-118 - Antoine Joux, Vanessa Vitse:

Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on $E(\mathbb{F}_{q^{5}})$. 119-143 - Andrej Bogdanov, Alon Rosen:

Input Locality and Hardness Amplification. 144-171 - Takanori Isobe:

A Single-Key Attack on the Full GOST Block Cipher. 172-189
Volume 26, Number 2, April 2013
- Jonathan Katz, Amit Sahai, Brent Waters:

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. 191-224 - Tibor Jager, Jörg Schwenk:

On the Analysis of Cryptographic Assumptions in the Generic Ring Model. 225-245 - Jean-Sébastien Coron

, Alexey Kirichenko, Mehdi Tibouchi
:
A Note on the Bivariate Coppersmith Theorem. 246-250 - Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:

Mercurial Commitments with Applications to Zero-Knowledge Sets. 251-279 - Joan Boyar

, Philip Matthews, René Peralta
:
Logic Minimization Techniques with Applications to Cryptology. 280-312 - Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:

Quark: A Lightweight Hash. 313-339 - Steve Lu, Rafail Ostrovsky

, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles. 340-373
Volume 26, Number 3, July 2013
- Dennis Hofheinz, Dominique Unruh

, Jörn Müller-Quade:
Polynomial Runtime and Composability. 375-441 - Hovav Shacham, Brent Waters:

Compact Proofs of Retrievability. 442-483 - Oded Goldreich

, Ron D. Rothblum:
Enhancements of Trapdoor Permutations. 484-512 - Elette Boyle, Gil Segev, Daniel Wichs

:
Fully Leakage-Resilient Signatures. 513-558
Volume 26, Number 4, October 2013
- Jin Hong

, Sunghwan Moon:
A Comparison of Cryptanalytic Tradeoff Algorithms. 559-637 - Yehuda Lindell

:
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge. 638-654 - Marten van Dijk

, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". 655-713 - Jonathan Katz, Vinod Vaikuntanathan:

Round-Optimal Password-Based Authenticated Key Exchange. 714-743

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














