


default search action
Journal of Cryptology, Volume 30
Volume 30, Number 1, January 2017
- Andreas J. Winter

:
Weak Locking Capacity of Quantum Channels Can be Much Larger Than Private Capacity. 1-21 - David Cash, Alptekin Küpçü

, Daniel Wichs
:
Dynamic Proofs of Retrievability Via Oblivious RAM. 22-57 - Gilad Asharov

, Yehuda Lindell
:
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation. 58-151 - Ivan Damgård, Sebastian Faust, Pratyay Mukherjee

, Daniele Venturi
:
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier. 152-190 - Mahdi Cheraghchi

, Venkatesan Guruswami:
Non-malleable Coding Against Bit-Wise and Split-State Tampering. 191-241 - Alex Escala, Gottfried Herold, Eike Kiltz

, Carla Ràfols
, Jorge Luis Villar
:
An Algebraic Framework for Diffie-Hellman Assumptions. 242-288 - Zvika Brakerski, Guy N. Rothblum:

Obfuscating Conjunctions. 289-320 - Carmit Hazay, Arpita Patra:

Efficient One-Sided Adaptively Secure Computation. 321-371
Volume 30, Number 2, April 2017
- Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata

, Takafumi Aoki:
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks. 373-391 - Daniel Genkin, Adi Shamir, Eran Tromer:

Acoustic Cryptanalysis. 392-443 - Ilan Komargodski, Moni Naor, Eylon Yogev:

Secret-Sharing for NP. 444-469 - Dominique Schröder

, Dominique Unruh:
Security of Blind Signatures Revisited. 470-494 - Jooyoung Lee, Martijn Stam, John P. Steinberger:

The Security of Tandem-DM in the Ideal Cipher Model. 495-518 - Fabrice Benhamouda

, Javier Herranz
, Marc Joye, Benoît Libert:
Efficient Cryptosystems From 2k-th Power Residue Symbols. 519-549 - Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers

:
Photonic Side-Channel Analysis of Arbiter PUFs. 550-571 - Hüseyin Hisil

, Craig Costello
:
Jacobian Coordinates on Genus 2 Curves. 572-600
Volume 30, Number 3, July 2017
- Manoj Prabhakaran, Mike Rosulek:

Reconciling Non-malleability with Homomorphic Encryption. 601-671 - Benny Applebaum, Yoni Moses:

Locally Computable UOWHF with Linear Shrinkage. 672-698 - Boaz Barak, Mohammad Mahmoody-Ghidary

:
Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. 699-734 - Jae Hong Seo

:
Short Signatures from Diffie-Hellman: Realizing Almost Compact Public Key. 735-759 - Hendrik W. Lenstra Jr., Alice Silverberg:

Lattices with Symmetry. 760-804 - Gilad Asharov

, Yehuda Lindell
, Thomas Schneider
, Michael Zohner:
More Efficient Oblivious Transfer Extensions. 805-858 - Céline Blondeau, Gregor Leander

, Kaisa Nyberg
:
Differential-Linear Cryptanalysis Revisited. 859-888 - Eike Kiltz

, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack. 889-919 - Yosuke Todo

:
Integral Cryptanalysis on Full MISTY1. 920-959
Volume 30, Number 4, October 2017
- Benny Applebaum, Pavel Raykov:

From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. 961-988 - Nir Bitansky

, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
:
The Hunting of the SNARK. 989-1066 - Sune K. Jakobsen:

Information Theoretical Cryptogenography. 1067-1115 - Charanjit S. Jutla, Arnab Roy:

Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. 1116-1156 - Ran Cohen

, Yehuda Lindell
:
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation. 1157-1186 - Mohammad Hajiabadi, Bruce M. Kapron

:
Reproducible Circularly Secure Bit Encryption: Applications and Realizations. 1187-1237 - Eike Kiltz

, Krzysztof Pietrzak, Daniele Venturi
, David Cash, Abhishek Jain
:
Efficient Authentication from Hard Learning Problems. 1238-1275 - Tibor Jager, Florian Kohlar, Sven Schäge

, Jörg Schwenk:
Authenticated Confidential Channel Establishment and the Security of TLS-DHE. 1276-1324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














