researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Issue
Volume
27
, Issue
2
183
--
209
Itai Dinur
,
Orr Dunkelman
,
Adi Shamir
.
Improved Practical Attacks on Round-Reduced Keccak
210
--
247
Zvika Brakerski
,
Gil Segev
.
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
248
--
283
Patrick Longa
,
Francesco Sica
.
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
284
--
316
Ronald Cramer
,
Ivan Damgård
,
Marcel Keller
.
On the Amortized Complexity of Zero-Knowledge Protocols
317
--
357
Nir Bitansky
,
Ran Canetti
.
On Strong Simulation and Composable Point Obfuscation
358
--
395
Carmit Hazay
,
Tomas Toft
.
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries