Journal: J. Cryptology

Volume 18, Issue 4

291 -- 311Eli Biham, Alex Biryukov, Adi Shamir. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
313 -- 335Adrian Kent. Secure Classical Bit Commitment Using Fixed Capacity Communication Channels
337 -- 355Joachim von zur Gathen, Michael Nöcker. Polynomial and Normal Bases for Finite Fields
357 -- 373Roberto Maria Avanzi. The Complexity of Certain Multi-Exponentiation Techniques in Cryptography
375 -- 389Lars R. Knudsen, Chris J. Mitchell. Partial Key Recovery Attack Against RMAC
391 -- 414Carlo Blundo, Paolo D Arco. Analysis and Design of Distributed Key Distribution Centers

Volume 18, Issue 3

187 -- 189Ran Canetti. Preface
191 -- 217Jeffrey Considine, Matthias Fitzi, Matthew K. Franklin, Leonid A. Levin, Ueli M. Maurer, David Metcalf. Byzantine Agreement Given Partial Broadcast
219 -- 246Christian Cachin, Klaus Kursawe, Victor Shoup. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography
247 -- 287Shafi Goldwasser, Yehuda Lindell. Secure Multi-Party Computation without Agreement

Volume 18, Issue 2

79 -- 89Régis Dupont, Andreas Enge, François Morain. Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields
91 -- 110Rosario Gennaro. An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem
111 -- 131John Black, Phillip Rogaway. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
133 -- 165Hoi-Kwong Lo, H. F. Chau, M. Ardehali. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
167 -- 183Tamir Tassa. Low Bandwidth Dynamic Traitor Tracing Schemes

Volume 18, Issue 1

1 -- 35Moni Naor, Benny Pinkas. Computationally Secure Oblivious Transfer
37 -- 61Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky. Minimal Complete Primitives for Secure Multi-Party Computation
63 -- 76Henri Cohen. Analysis of the Sliding Window Powering Algorithm