Journal: J. Cryptology

Volume 22, Issue 4

429 -- 469Benny Applebaum, Yuval Ishai, Eyal Kushilevitz. Cryptography with Constant Input Locality
470 -- 504David Cash, Eike Kiltz, Victor Shoup. The Twin Diffie-Hellman Problem and Applications
505 -- 529Benjamin Smith. Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves:::, :::
530 -- 571Marc Fischlin, Roger Fischlin. Efficient Non-malleable Commitment Schemes
572 -- 615Mario Di Raimondo, Rosario Gennaro. New Approaches for Deniable Authentication

Volume 22, Issue 3

283 -- 310Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel. Reducing Complexity Assumptions for Statistically-Hiding Commitment
311 -- 329John Black, Martin Cochran, Thomas Shrimpton. On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
330 -- 364Karl Rubin, Alice Silverberg. Using Abelian Varieties to Improve Pairing-Based Cryptography
365 -- 394Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell. Upper and Lower Bounds on Black-Box Steganography
395 -- 428Yehuda Lindell. General Composition and Universal Composability in Secure Multiparty Computation

Volume 22, Issue 2

139 -- 160Phong Q. Nguyen, Oded Regev. Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
161 -- 188Yehuda Lindell, Benny Pinkas. A Proof of Security of Yao s Protocol for Two-Party Computation
189 -- 226Tal Moran, Ronen Shaltiel, Amnon Ta-Shma. Non-interactive Timestamping in the Bounded-Storage Model
227 -- 258Tamir Tassa, Nira Dyn. Multipartite Secret Sharing by Bivariate Interpolation
259 -- 281Manuel Bernardo Barbosa, Andrew Moss, Dan Page. Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography

Volume 22, Issue 1

1 -- 61Mihir Bellare, Chanathip Namprempre, Gregory Neven. Security Proofs for Identity-Based Identification and Signature Schemes
62 -- 74Wolfgang Lempken, Tran van Trung, Spyros S. Magliveras, Wandi Wei. A Public Key Cryptosystem Based on Non-abelian Finite Groups
75 -- 92Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets. Chernoff-Type Direct Product Theorems
93 -- 113Denis Xavier Charles, Kristin E. Lauter, Eyal Z. Goren. Cryptographic Hash Functions from Expander Graphs
114 -- 138Adam Bender, Jonathan Katz, Ruggero Morselli. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles