Journal: J. Cryptology

Volume 16, Issue 4

219 -- 237Gilles Brassard, Claude Crépeau, Stefan Wolf. Oblivious Transfers and Privacy Amplification
239 -- 247Antoine Joux, Kim Nguyen. Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
249 -- 286Serge Vaudenay. Decorrelation: A Theory for Block Cipher Security
287 -- 289Adam Kalai. Generating Random Factored Numbers, Easily

Volume 16, Issue 3

143 -- 184Yehuda Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
185 -- 215Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. The One-More-RSA-Inversion Problems and the Security of Chaum s Blind Signature Scheme

Volume 16, Issue 2

71 -- 93Oded Goldreich, Vered Rosen. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
95 -- 116Michael Ben-Or, Danny Gutfreund. Trading Help for Interaction in Statistical Zero-Knowledge Proofs
117 -- 139Siguna Müller. A Probable Prime Test with Very High Confidence for n L 3 mod 4

Volume 16, Issue 1

1 -- 24Steven Myers. Efficient Amplification of the Security of Weak Pseudo-Random Function Generators
25 -- 39Amos Beimel, Shlomi Dolev. Buses for Anonymous Message Delivery
41 -- 68Jovan Dj. Golic, Renato Menicocci. Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators