Journal: J. Cryptology

Volume 25, Issue 4

557 -- 600Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao. Graph Coloring Applied to Secure Computation in Non-Abelian Groups
601 -- 639David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis
640 -- 679Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre. On-line Ciphers and the Hash-CBC Constructions
680 -- 722Yehuda Lindell, Benny Pinkas. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
723 -- 747Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen. Batch Verification of Short Signatures
748 -- 779Praveen Gauravaram, Lars R. Knudsen. Security Analysis of Randomize-Hash-then-Sign Digital Signatures