Journal: J. Cryptology

Volume 21, Issue 4

469 -- 491Mihir Bellare, Chanathip Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
492 -- 546Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan. On the Relationships between Notions of Simulation-Based Security
547 -- 578Charanjit S. Jutla. Encryption Modes with Almost Free Message Integrity
579 -- 592Rahul Jain. New Binding-Concealing Trade-Offs for Quantum String Commitment
593 -- 611Claus Diem, Emmanuel Thomé. Index Calculus in Class Groups of Non-hyperelliptic Curves of Genus Three

Volume 21, Issue 3

303 -- 349Jonathan Katz, Yehuda Lindell. Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
350 -- 391Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
392 -- 429Elad Barkan, Eli Biham, Nathan Keller. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
430 -- 457Yi Lu 0002, Serge Vaudenay. Cryptanalysis of an E0-like Combiner with Memory
458 -- 468Francesco Matucci. Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson s Group

Volume 21, Issue 2

149 -- 177Dan Boneh, Xavier Boyen. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
178 -- 199Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel P. Smart. Generic Constructions of Identity-Based and Certificateless KEMs
200 -- 249Yehuda Lindell. Lower Bounds and Impossibility Results for Concurrent Self Composition
250 -- 279Jérôme Renault, Tristan Tomala. Probabilistic Reliability and Privacy of Communication Using Multicast in General Neighbor Networks
280 -- 301Raphael Overbeck. Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes

Volume 21, Issue 1

1 -- 26Johan Håstad, Mats Näslund. Practical Construction and Analysis of Pseudo-Randomness Primitives
27 -- 51Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern. Cryptanalysis of ISO/IEC 9796-1
52 -- 96Minh-Huyen Nguyen, Salil P. Vadhan. Simpler Session-Key Generation from Short Random Passwords
97 -- 130Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa. Tag-KEM/DEM: A New Framework for Hybrid Encryption
131 -- 147Ali Aydin Selçuk. On Probability of Success in Linear and Differential Cryptanalysis