Journal: J. Cryptology

Volume 21, Issue 3

303 -- 349Jonathan Katz, Yehuda Lindell. Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
350 -- 391Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
392 -- 429Elad Barkan, Eli Biham, Nathan Keller. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
430 -- 457Yi Lu 0002, Serge Vaudenay. Cryptanalysis of an E0-like Combiner with Memory
458 -- 468Francesco Matucci. Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson s Group