Journal: J. Cryptology

Volume 28, Issue 4

745 -- 768Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky. Almost-Everywhere Secure Computation with Edge Corruptions
769 -- 795Gordon Procter, Carlos Cid. On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
796 -- 819James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta. Spreading Alerts Quietly and the Subgroup Escape Problem
820 -- 843Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
844 -- 878Mihir Bellare. New Proofs for NMAC and HMAC: Security without Collision Resistance
879 -- 898Thomas Peyrin. Collision Attack on Grindahl