researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
16
, Issue
4
219
--
237
Gilles Brassard
,
Claude Crépeau
,
Stefan Wolf
.
Oblivious Transfers and Privacy Amplification
239
--
247
Antoine Joux
,
Kim Nguyen
.
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
249
--
286
Serge Vaudenay
.
Decorrelation: A Theory for Block Cipher Security
287
--
289
Adam Kalai
.
Generating Random Factored Numbers, Easily
Volume
16
, Issue
3
143
--
184
Yehuda Lindell
.
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
185
--
215
Mihir Bellare
,
Chanathip Namprempre
,
David Pointcheval
,
Michael Semanko
.
The One-More-RSA-Inversion Problems and the Security of Chaum s Blind Signature Scheme
Volume
16
, Issue
2
71
--
93
Oded Goldreich
,
Vered Rosen
.
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
95
--
116
Michael Ben-Or
,
Danny Gutfreund
.
Trading Help for Interaction in Statistical Zero-Knowledge Proofs
117
--
139
Siguna Müller
.
A Probable Prime Test with Very High Confidence for n L 3 mod 4
Volume
16
, Issue
1
1
--
24
Steven Myers
.
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators
25
--
39
Amos Beimel
,
Shlomi Dolev
.
Buses for Anonymous Message Delivery
41
--
68
Jovan Dj. Golic
,
Renato Menicocci
.
Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators