Journal: J. Cryptology

Volume 13, Issue 4

397 -- 416Rosario Gennaro, Tal Rabin, Hugo Krawczyk. RSA-Based Undeniable Signatures
417 -- 436Lars R. Knudsen. A Detailed Analysis of SAFER K
437 -- 447John M. Pollard. Kangaroos, Monopoly and Discrete Logarithms
449 -- 472Joan Boyar, Ivan Damgård, René Peralta. Short Non-Interactive Cryptographic Proofs
473 -- 492Michael J. Jacobson Jr.. Computing Discrete Logarithms in Quadratic Orders

Volume 13, Issue 3

301 -- 314Muxiang Zhang. Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers
315 -- 338Erez Petrank, Charles Rackoff. CBC MAC for Real-Time Data Sources
339 -- 360Don Coppersmith, Igor Shparlinski. On Polynomial Approximation of the Discrete Logarithm and the Diffie - Hellman Mapping
361 -- 396David Pointcheval, Jacques Stern. Security Arguments for Digital Signatures and Blind Signatures

Volume 13, Issue 2

207 -- 220H. Zbinden, Nicolas Gisin, B. Huttner, A. Muller, W. Tittel. Practical Aspects of Quantum Cryptographic Key Distribution
221 -- 244Roger Fischlin, Claus-Peter Schnorr. Stronger Security Proofs for RSA and Rabin Bits
245 -- 262Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson. Fast Correlation Attacks on the Summation Generator
263 -- 272Sachar Paulus, Tsuyoshi Takagi. A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time
273 -- 300Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk. Robust and Efficient Sharing of RSA Functions

Volume 13, Issue 1

1 -- 7Oded Goldreich. Preface
9 -- 30Matthew K. Franklin, Rebecca N. Wright. Secure Communication in Minimal Connectivity Models
31 -- 60Martin Hirt, Ueli M. Maurer. Player Simulation and General Adversary Structures in Perfect Multiparty Computation
61 -- 105Ran Canetti, Shai Halevi, Amir Herzberg. Maintaining Authenticated Communication in the Presence of Break-Ins
107 -- 142Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén. Randomness versus Fault-Tolerance
143 -- 202Ran Canetti. Security and Composition of Multiparty Cryptographic Protocols