Journal: J. Cryptology

Volume 32, Issue 2

265 -- 323Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
324 -- 360Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt. Automated Analysis of Cryptographic Assumptions in Generic Group Models
361 -- 392Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor. Hardness-Preserving Reductions via Cuckoo Hashing
393 -- 434Susumu Kiyoshima. Non-black-box Simulation in the Fully Concurrent Setting, Revisited
435 -- 458Florent Bernard, Patrick Haddad, Viktor Fischer, Jean Nicolai. From Physical to Stochastic Modeling of a TERO-Based TRNG
459 -- 497Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou. (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
498 -- 546Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
547 -- 565Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé. Cryptanalysis of the CLT13 Multilinear Map
566 -- 599Nils Fleischhacker, Tibor Jager, Dominique Schröder. On Tight Security Proofs for Schnorr Signatures