Journal: J. Cryptology

Volume 23, Issue 4

505 -- 518Alex Biryukov, Adi Shamir. Structural Cryptanalysis of SASAS
519 -- 545John Black, Phillip Rogaway, Thomas Shrimpton, Martijn Stam. An Analysis of the Blockcipher-Based Hash Functions from PGV
546 -- 579Jens Groth. A Verifiable Secret Shuffle of Homomorphic Encryptions
580 -- 593Omer Barkol, Yuval Ishai, Enav Weinreb. On ::::d::::-Multiplicative Secret Sharing
594 -- 671Jörn Müller-Quade, Dominique Unruh. Long-Term Security and Universal Composability

Volume 23, Issue 3

373 -- 401Gagan Aggarwal, Nina Mishra, Benny Pinkas. Secure Computation of the Median (and Other Elements of Specified Ranks)
402 -- 421Jonathan Katz, Ji Sun Shin, Adam Smith. Parallel and Concurrent Security of the HB and HB:::+::: Protocols
422 -- 456Carmit Hazay, Yehuda Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
457 -- 476Jung Hee Cheon. Discrete Logarithm Problems with Auxiliary Inputs
477 -- 503Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis. On the Efficient Generation of Prime-Order Elliptic Curves

Volume 23, Issue 2

169 -- 186Daniele Micciancio. The RSA Group is Pseudo-Free
187 -- 223Paul Morrissey, Nigel P. Smart, Bogdan Warinschi. The TLS Handshake Protocol: A Modular Analysis
224 -- 280David Freeman, Michael Scott, Edlyn Teske. A Taxonomy of Pairing-Friendly Elliptic Curves
281 -- 343Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
344 -- 371Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb. How Should We Solve Search Problems Privately?

Volume 23, Issue 1

1 -- 36Oded Goldreich. On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
37 -- 71Eran Tromer, Dag Arne Osvik, Adi Shamir. Efficient Cache Attacks on AES, and Countermeasures
72 -- 90Lars R. Knudsen, John Erik Mathiassen, Frédéric Muller, Søren S. Thomsen. Cryptanalysis of MD2
91 -- 120Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup. A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
121 -- 168Dennis Hofheinz, John Malone-Lee, Martijn Stam. Obfuscation for Cryptographic Purposes