- Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai. Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. J. Cryptology, 37(1):1, March 2024.
- Ron D. Rothblum, Prashant Nalini Vasudevan. Collision Resistance from Multi-collision Resistance. J. Cryptology, 37(2):14, June 2024.
- Elette Boyle, Ran Cohen, Aarushi Goel. Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party. J. Cryptology, 37(1):2, March 2024.
- Dennis Hofheinz, Jessica Koch, Christoph Striecks. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. J. Cryptology, 37(2):12, June 2024.
- Jiang Zhang, Yu Chen, Zhenfeng Zhang. Lattice-Based Programmable Hash Functions and Applications. J. Cryptology, 37(1):4, March 2024.
- Marc Fischlin, Felix Günther 0001, Christian Janson. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. J. Cryptology, 37(2):9, June 2024.
- Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi. (Inner-Product) Functional Encryption with Updatable Ciphertexts. J. Cryptology, 37(1):8, March 2024.
- Jeremiah Blocki, Peiyuan Liu, Ling Ren 0001, Samson Zhou. Bandwidth-Hard Functions: Reductions and Lower Bounds. J. Cryptology, 37(2):16, June 2024.
- Akshima, Siyao Guo, Qipeng Liu 0001. Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions. J. Cryptology, 37(2):10, June 2024.
- David Lubicz, Viktor Fischer. Entropy Computation for Oscillator-based Physical Random Number Generators. J. Cryptology, 37(2):13, June 2024.