Journal: J. Cryptology

Volume 24, Issue 4

615 -- 658Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang. Resource Fairness and Composability of Cryptographic Protocols
659 -- 693Dan Boneh, Xavier Boyen. Efficient Selective Identity-Based Encryption Without Random Oracles
694 -- 719Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan. Securely Obfuscating Re-Encryption
720 -- 760Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin. Secure Computation Without Authentication
761 -- 799Yehuda Lindell, Hila Zarosim. Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer

Volume 24, Issue 3

427 -- 445Martin Hell, Thomas Johansson. Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time
446 -- 469Steven D. Galbraith, Xibin Lin, Michael Scott. Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
470 -- 516Dennis Hofheinz. Possibility and Impossibility Results for Selective Decommitments
517 -- 544Dafna Kidron, Yehuda Lindell. Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
545 -- 587Jean Monnerat, Serge Vaudenay. Short Undeniable Signatures Based on Group Homomorphisms
588 -- 613Moses Liskov, Ronald L. Rivest, David Wagner. Tweakable Block Ciphers

Volume 24, Issue 2

245 -- 246Christof Paar, Jean-Jacques Quisquater, Berk Sunar. Guest Editorial
247 -- 268Gaetan Canivet, Paolo Maistri, Régis Leveugle, Jessy Clédière, Florent Valette, Marc Renaudin. Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA
269 -- 291Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon. Mutual Information Analysis: a Comprehensive Study
292 -- 321Svetla Nikova, Vincent Rijmen, Martin Schläffer. Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches
322 -- 345Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling. Side-Channel Resistant Crypto for Less than 2, 300 GE
346 -- 374Agustin Dominguez-Oviedo, M. Anwar Hasan, Bijan Ansari. Fault-Based Attack on Montgomery s Ladder Algorithm
375 -- 397Abhranil Maiti, Patrick Schaumont. Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive
398 -- 425Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux. On the Security of Oscillator-Based Random Number Generators

Volume 24, Issue 1

1 -- 23Sebastiaan Indesteege, Bart Preneel. Practical Collisions for EnRUPT
24 -- 41Andreas Enge, Pierrick Gaudry, Emmanuel Thomé. An ::::L::::(1/3) Discrete Logarithm Algorithm for Low Degree Curves
42 -- 82Michel Abdalla, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Jacob C. N. Schuldt, Nigel P. Smart. Wildcarded Identity-Based Encryption
83 -- 147Ran Canetti, Jonathan Herzog. Universally Composable Symbolic Security Analysis
148 -- 156Markus Grassl, Ivana Ilic, Spyros S. Magliveras, Rainer Steinwandt. Cryptanalysis of the Tillich-Zémor Hash Function
157 -- 202Gilad Asharov, Yehuda Lindell. Utility Dependence in Correct and Fair Rational Secret Sharing
203 -- 244Marc Fischlin, Roger Fischlin. Efficient Non-Malleable Commitment Schemes