Journal: J. Cryptology

Volume 20, Issue 4

397 -- 430Rafail Ostrovsky, William E. Skeith III. Private Searching on Streaming Data
431 -- 492Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran. Concurrent Composition of Secure Protocols in the Timing Model
493 -- 514Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang. Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems

Volume 20, Issue 3

265 -- 294Ran Canetti, Shai Halevi, Jonathan Katz. A Forward-Secure Public-Key Encryption Scheme
295 -- 321Amos Beimel, Yoav Stahl. Robust Information-Theoretic Private Information Retrieval
323 -- 373Carlo Blundo, Paolo D Arco, Alfredo De Santis, Douglas R. Stinson. On Unconditionally Secure Distributed Oblivious Transfer
375 -- 387Qi Cheng. Primality Proving via One Round in ECPP and One Iteration in AKS
389 -- 392Boaz Tsaban. Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1
393 -- 0Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk. Robust and Efficient Sharing of RSA Functions
394 -- 0Rosario Gennaro, Tal Rabin, Hugo Krawczyk. RSA-Based Undeniable Signatures
395 -- 0Martín Abadi, Phillip Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)

Volume 20, Issue 2

153 -- 163Johan Håstad. The Security of the IAPM and IACBC Modes
165 -- 202Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel. Constant-Round Oblivious Transfer in the Bounded Storage Model
203 -- 235Joonsang Baek, Ron Steinfeld, Yuliang Zheng. Formal Proofs for the Security of Signcryption
237 -- 264Tamir Tassa. Hierarchical Threshold Secret Sharing

Volume 20, Issue 1

3 -- 37Neal Koblitz, Alfred Menezes. Another Look at Provable Security
39 -- 50Jean-Sébastien Coron, Alexander May. Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
51 -- 83Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
85 -- 113Jonathan Katz, Moti Yung. Scalable Protocols for Authenticated Group Key Exchange
115 -- 149Dario Catalano, David Pointcheval, Thomas Pornin. Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication