Journal: J. Cryptology

Volume 25, Issue 1

1 -- 13Rahul Jain. Resource Requirements of Private Quantum Channels and Consequences for Oblivious Remote State Preparation
14 -- 40S. Dov Gordon, Jonathan Katz. Partial Fairness in Secure Two-Party Computation
41 -- 56Jonathan Katz. Which Languages Have 4-Round Zero-Knowledge Proofs?
57 -- 115Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights
116 -- 135Krzysztof Pietrzak, Douglas Wikström. Parallel Repetition of Computationally Sound Protocols Revisited
136 -- 157Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede. A Practical Attack on KeeLoq
158 -- 193Shai Halevi, Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer