Journal: J. Cryptology

Volume 32, Issue 3

601 -- 634Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail. Key Establishment à la Merkle in a Quantum World
635 -- 689Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. On Black-Box Complexity of Universally Composable Security in the CRS Model
690 -- 741Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas. Probabilistic Termination and Composability of Cryptographic Protocols
742 -- 824Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou. Leakage Resilience from Program Obfuscation
825 -- 866Mark Zhandry. The Magic of ELFs
867 -- 894Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez. Koblitz Curves over Quadratic Fields
895 -- 940Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda. Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
941 -- 972Dana Dachman-Soled, Chang Liu 0021, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin. Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
973 -- 1025Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi. Efficient Fully Structure-Preserving Signatures and Shrinking Commitments
1026 -- 1069Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai. Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ