Journal: J. Cryptology

Volume 15, Issue 2

75 -- 96Victor Shoup, Rosario Gennaro. Securing Threshold Cryptosystems against Chosen Ciphertext Attack
97 -- 102Moni Naor, Omer Reingold. Constructing Pseudo-Random Permutations with a Prescribed Structure
103 -- 127Martín Abadi, Phillip Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
129 -- 138Steven D. Galbraith. Elliptic Curve Paillier Schemes
139 -- 148Anna M. Johnston, Peter Gemmell. Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack