Journal: J. Cryptology

Volume 20, Issue 2

153 -- 163Johan HÃ¥stad. The Security of the IAPM and IACBC Modes
165 -- 202Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel. Constant-Round Oblivious Transfer in the Bounded Storage Model
203 -- 235Joonsang Baek, Ron Steinfeld, Yuliang Zheng. Formal Proofs for the Security of Signcryption
237 -- 264Tamir Tassa. Hierarchical Threshold Secret Sharing