researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
15
, Issue
4
223
--
249
Victor Shoup
.
OAEP Reconsidered
251
--
269
Dario Catalano
,
Rosario Gennaro
,
Nick Howgrave-Graham
.
Paillier s Trapdoor Function Hides up to ::::O::::(::::n::::) Bits
271
--
284
Mihir Bellare
.
A Note on Negligible Functions
285
--
297
Spyros S. Magliveras
,
Douglas R. Stinson
,
Tran van Trung
.
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups
Volume
15
, Issue
3
151
--
176
Phong Q. Nguyen
,
Igor Shparlinski
.
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces
177
--
206
Yehuda Lindell
,
Benny Pinkas
.
Privacy Preserving Data Mining
207
--
222
Lars R. Knudsen
.
The Security of Feistel Ciphers with Six Rounds or Less
Volume
15
, Issue
2
75
--
96
Victor Shoup
,
Rosario Gennaro
.
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
97
--
102
Moni Naor
,
Omer Reingold
.
Constructing Pseudo-Random Permutations with a Prescribed Structure
103
--
127
MartÃn Abadi
,
Phillip Rogaway
.
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
129
--
138
Steven D. Galbraith
.
Elliptic Curve Paillier Schemes
139
--
148
Anna M. Johnston
,
Peter Gemmell
.
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
Volume
15
, Issue
1
1
--
18
Silvio Micali
,
Leonid Reyzin
.
Improving the Exact Security of Digital Signature Schemes
19
--
46
Pierrick Gaudry
,
Florian Hess
,
Nigel P. Smart
.
Constructive and Destructive Facets of Weil Descent on Elliptic Curves
47
--
59
Eli Biham
,
Lars R. Knudsen
.
Cryptanalysis of the ANSI X9.52 CBCM Mode
61
--
72
Alexander A. Moldovyan
,
Nick A. Moldovyan
.
A Cipher Based on Data-Dependent Permutations