Journal: J. Cryptology

Volume 36, Issue 2

4 -- 0David Pointcheval, Nigel P. Smart. Topical Collection on Computing on Encrypted Data
5 -- 0Benny Applebaum, Yoni Moses. Correction: Locally Computable UOWHF with Linear Shrinkage
6 -- 0Pratish Datta, Ilan Komargodski, Brent Waters. 1 from BDH
7 -- 0Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi. Oblivious RAM with Worst-Case Logarithmic Overhead
8 -- 0Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung. SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors
9 -- 0Susumu Kiyoshima. No-Signaling Linear PCPs
10 -- 0Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux. An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
11 -- 0Ran Cohen, Abhi Shelat, Daniel Wichs. Adaptively Secure MPC with Sublinear Communication Complexity
12 -- 0Robin Geelen, Frederik Vercauteren. Bootstrapping for BGV and BFV Revisited
13 -- 0Ashish Choudhury, Arpita Patra. On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience
14 -- 0Fuyuki Kitagawa, Takahiro Matsuda 0002, Takashi Yamakawa. NIZK from SNARGs