Journal: J. Cryptology

Volume 15, Issue 4

223 -- 249Victor Shoup. OAEP Reconsidered
251 -- 269Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham. Paillier s Trapdoor Function Hides up to ::::O::::(::::n::::) Bits
271 -- 284Mihir Bellare. A Note on Negligible Functions
285 -- 297Spyros S. Magliveras, Douglas R. Stinson, Tran van Trung. New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups

Volume 15, Issue 3

151 -- 176Phong Q. Nguyen, Igor Shparlinski. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces
177 -- 206Yehuda Lindell, Benny Pinkas. Privacy Preserving Data Mining
207 -- 222Lars R. Knudsen. The Security of Feistel Ciphers with Six Rounds or Less

Volume 15, Issue 2

75 -- 96Victor Shoup, Rosario Gennaro. Securing Threshold Cryptosystems against Chosen Ciphertext Attack
97 -- 102Moni Naor, Omer Reingold. Constructing Pseudo-Random Permutations with a Prescribed Structure
103 -- 127Martín Abadi, Phillip Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
129 -- 138Steven D. Galbraith. Elliptic Curve Paillier Schemes
139 -- 148Anna M. Johnston, Peter Gemmell. Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack

Volume 15, Issue 1

1 -- 18Silvio Micali, Leonid Reyzin. Improving the Exact Security of Digital Signature Schemes
19 -- 46Pierrick Gaudry, Florian Hess, Nigel P. Smart. Constructive and Destructive Facets of Weil Descent on Elliptic Curves
47 -- 59Eli Biham, Lars R. Knudsen. Cryptanalysis of the ANSI X9.52 CBCM Mode
61 -- 72Alexander A. Moldovyan, Nick A. Moldovyan. A Cipher Based on Data-Dependent Permutations