


default search action
Journal of Cryptology, Volume 27
Volume 27, Number 1, January 2014
- Paul Stankovski

, Martin Hell
, Thomas Johansson
:
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers. 1-22 - Aggelos Kiayias, Yona Raekow, Alexander Russell

, Narasimha K. Shashidhar:
A One-Time Stegosystem and Applications to Efficient Covert Communication. 23-44 - Rafael Pass

, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
:
Concurrent Zero Knowledge, Revisited. 45-66 - Sourav Sen Gupta

, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. 67-108 - Iftach Haitner, Omer Reingold:

A New Interactive Hashing Theorem. 109-138 - James Birkett, Alexander W. Dent:

Security Models and Proof Strategies for Plaintext-Aware Encryption. 139-180 - Jin Hong, Sunghwan Moon:

Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms. 181
Volume 27, Number 2, April 2014
- Itai Dinur, Orr Dunkelman

, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. 183-209 - Zvika Brakerski, Gil Segev:

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. 210-247 - Patrick Longa, Francesco Sica

:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 248-283 - Ronald Cramer, Ivan Damgård, Marcel Keller

:
On the Amortized Complexity of Zero-Knowledge Protocols. 284-316 - Nir Bitansky

, Ran Canetti:
On Strong Simulation and Composable Point Obfuscation. 317-357 - Carmit Hazay, Tomas Toft:

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. 358-395
Volume 27, Number 3, July 2014
- Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:

Robust Multi-Property Combiners for Hash Functions. 397-428 - Benny Applebaum:

Key-Dependent Message Security: Generic Amplification and Completeness. 429-451 - Dmitry Khovratovich, Ivica Nikolic

, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. 452-479 - Shafi Goldwasser, Guy N. Rothblum:

On Best-Possible Obfuscation. 480-505 - Jens Groth

, Rafail Ostrovsky
:
Cryptography in the Multi-string Model. 506-543 - Michel Abdalla

, Dario Catalano, Dario Fiore:
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. 544-593
Volume 27, Number 4, October 2014
- Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault:

Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm. 595-635 - Yair Amir, Paul Bunn

, Rafail Ostrovsky
:
Authenticated Adversarial Routing. 636-771 - Jérémy Jean, María Naya-Plasencia

, Thomas Peyrin
:
Improved Cryptanalysis of AES-like Permutations. 772-798 - Mihir Bellare, Todor Ristov:

A Characterization of Chameleon Hash Functions and New, Efficient Designs. 799-823 - Orr Dunkelman, Nathan Keller, Adi Shamir:

A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. 824-849

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














