Journal: J. Cryptology

Volume 32, Issue 4

1071 -- 1094Felipe G. Lacerda, Joseph M. Renes, Renato Renner. Classical Leakage Resilience from Fault-Tolerant Quantum Computation
1095 -- 1143Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff. White-Box Cryptography: Don't Forget About Grey-Box Attacks
1144 -- 1199Carmit Hazay, Avishay Yanai. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
1200 -- 1262Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. What Security Can We Achieve Within 4 Rounds?
1263 -- 1297Alexandre Duc, Sebastian Faust, François-Xavier Standaert. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
1298 -- 1336Razvan Barbulescu, Sylvain Duquesne. Updating Key Size Estimations for Pairings
1337 -- 1382Atsushi Takayasu, Yao Lu 0002, Liqiang Peng. Small CRT-Exponent RSA Revisited
1383 -- 1422Yosuke Todo, Gregor Leander, Yu Sasaki. Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64
1423 -- 1447Colin Chaigneau, Thomas Fuhr 0001, Henri Gilbert, Jérémy Jean, Jean-René Reinhard. Cryptanalysis of NORX v2.0
1448 -- 1490Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
1491 -- 1573Tatsuaki Okamoto, Katsuyuki Takashima. Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption