Journal: J. Cryptology

Volume 19, Issue 4

381 -- 439Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury. A Proof of the Security of Quantum Key Distribution
441 -- 462Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi. Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
463 -- 487Marc Girault, Guillaume Poupard, Jacques Stern. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
489 -- 520Ivan Damgård, Gudmund Skovbjerg Frandsen. An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate
521 -- 552Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen. Completeness in Two-Party Secure Computation: A Computational View
553 -- 562Florian Luca, Igor Shparlinski. Elliptic Curves with Low Embedding Degree

Volume 19, Issue 3

241 -- 340Oded Goldreich, Yehuda Lindell. Session-Key Generation Using Human Passwords Only
341 -- 357Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey. Private Computation: k-Connected versus 1-Connected Networks
359 -- 377Yehuda Lindell. A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions

Volume 19, Issue 2

135 -- 167Ran Canetti, Eyal Kushilevitz, Yehuda Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
169 -- 209Juan A. Garay, Philip D. MacKenzie, Ke Yang. Strengthening Zero-Knowledge Protocols Using Signatures
211 -- 239Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams. An Improved Real-Quadratic-Field-Based Key Exchange Procedure

Volume 19, Issue 1

1 -- 25Jan Denef, Frederik Vercauteren. An Extension of Kedlaya s Algorithm to Hyperelliptic Curves in Characteristic 2
27 -- 66Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson. Threshold Password-Authenticated Key Exchange
67 -- 95Jonathan Katz, Moti Yung. Characterization of Security Notions for Probabilistic Private-Key Encryption
97 -- 114Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu. The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
115 -- 133Edlyn Teske. An Elliptic Curve Trapdoor System