Journal: J. Cryptology

Volume 25, Issue 3

383 -- 433Carmit Hazay, Kobbi Nissim. Efficient Set Operations in the Presence of Malicious Adversaries
434 -- 463Oriol Farràs, Jaume Martí-Farré, Carles Padró. Ideal Multipartite Secret Sharing Schemes
464 -- 483Stanislav Smyshlyaev. Perfectly Balanced Boolean Functions and Golić Conjecture
484 -- 527Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications
528 -- 555Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami. Computational Indistinguishability Between Quantum States and Its Cryptographic Application