researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
23
, Issue
4
505
--
518
Alex Biryukov
,
Adi Shamir
.
Structural Cryptanalysis of SASAS
519
--
545
John Black
,
Phillip Rogaway
,
Thomas Shrimpton
,
Martijn Stam
.
An Analysis of the Blockcipher-Based Hash Functions from PGV
546
--
579
Jens Groth
.
A Verifiable Secret Shuffle of Homomorphic Encryptions
580
--
593
Omer Barkol
,
Yuval Ishai
,
Enav Weinreb
.
On ::::d::::-Multiplicative Secret Sharing
594
--
671
Jörn Müller-Quade
,
Dominique Unruh
.
Long-Term Security and Universal Composability
Volume
23
, Issue
3
373
--
401
Gagan Aggarwal
,
Nina Mishra
,
Benny Pinkas
.
Secure Computation of the Median (and Other Elements of Specified Ranks)
402
--
421
Jonathan Katz
,
Ji Sun Shin
,
Adam Smith
.
Parallel and Concurrent Security of the HB and HB:::+::: Protocols
422
--
456
Carmit Hazay
,
Yehuda Lindell
.
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
457
--
476
Jung Hee Cheon
.
Discrete Logarithm Problems with Auxiliary Inputs
477
--
503
Elisavet Konstantinou
,
Aristides Kontogeorgis
,
Yannis C. Stamatiou
,
Christos D. Zaroliagis
.
On the Efficient Generation of Prime-Order Elliptic Curves
Volume
23
, Issue
2
169
--
186
Daniele Micciancio
.
The RSA Group is Pseudo-Free
187
--
223
Paul Morrissey
,
Nigel P. Smart
,
Bogdan Warinschi
.
The TLS Handshake Protocol: A Modular Analysis
224
--
280
David Freeman
,
Michael Scott
,
Edlyn Teske
.
A Taxonomy of Pairing-Friendly Elliptic Curves
281
--
343
Yonatan Aumann
,
Yehuda Lindell
.
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
344
--
371
Amos Beimel
,
Tal Malkin
,
Kobbi Nissim
,
Enav Weinreb
.
How Should We Solve Search Problems Privately?
Volume
23
, Issue
1
1
--
36
Oded Goldreich
.
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
37
--
71
Eran Tromer
,
Dag Arne Osvik
,
Adi Shamir
.
Efficient Cache Attacks on AES, and Countermeasures
72
--
90
Lars R. Knudsen
,
John Erik Mathiassen
,
Frédéric Muller
,
Søren S. Thomsen
.
Cryptanalysis of MD2
91
--
120
Yvo Desmedt
,
Rosario Gennaro
,
Kaoru Kurosawa
,
Victor Shoup
.
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
121
--
168
Dennis Hofheinz
,
John Malone-Lee
,
Martijn Stam
.
Obfuscation for Cryptographic Purposes