Journal: Algorithmica

Volume 79, Issue 4

985 -- 986Juan A. Garay, Rafail Ostrovsky. Special Issue: Algorithmic Tools in Cryptography
987 -- 1013Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró. On the Information Ratio of Non-perfect Secret Sharing Schemes
1014 -- 1051Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth. On Virtual Grey Box Obfuscation for General Circuits
1052 -- 1101Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth. On the Impossibility of Cryptography with Tamperable Randomness
1102 -- 1160Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza. Scalable Zero Knowledge Via Cycles of Elliptic Curves
1161 -- 1195Itai Dinur, Gaëtan Leurent. Improved Generic Attacks Against Hash-Based MACs and HAIFA
1196 -- 1232Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs. How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
1233 -- 1285Dan Boneh, Mark Zhandry. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
1286 -- 1317Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro. Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
1318 -- 1352San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld. Hardness of k-LWE and Applications in Traitor Tracing
1353 -- 1373Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input