Journal: J. Cryptology

Volume 27, Issue 2

183 -- 209Itai Dinur, Orr Dunkelman, Adi Shamir. Improved Practical Attacks on Round-Reduced Keccak
210 -- 247Zvika Brakerski, Gil Segev. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
248 -- 283Patrick Longa, Francesco Sica. Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
284 -- 316Ronald Cramer, Ivan Damgård, Marcel Keller. On the Amortized Complexity of Zero-Knowledge Protocols
317 -- 357Nir Bitansky, Ran Canetti. On Strong Simulation and Composable Point Obfuscation
358 -- 395Carmit Hazay, Tomas Toft. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries