Journal: J. Cryptology

Volume 25, Issue 4

557 -- 600Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao. Graph Coloring Applied to Secure Computation in Non-Abelian Groups
601 -- 639David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis
640 -- 679Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre. On-line Ciphers and the Hash-CBC Constructions
680 -- 722Yehuda Lindell, Benny Pinkas. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
723 -- 747Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen. Batch Verification of Short Signatures
748 -- 779Praveen Gauravaram, Lars R. Knudsen. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

Volume 25, Issue 3

383 -- 433Carmit Hazay, Kobbi Nissim. Efficient Set Operations in the Presence of Malicious Adversaries
434 -- 463Oriol Farràs, Jaume Martí-Farré, Carles Padró. Ideal Multipartite Secret Sharing Schemes
464 -- 483Stanislav Smyshlyaev. Perfectly Balanced Boolean Functions and Golić Conjecture
484 -- 527Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications
528 -- 555Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami. Computational Indistinguishability Between Quantum States and Its Cryptographic Application

Volume 25, Issue 2

195 -- 242Jung Hee Cheon, Jin Hong 0001, Minkyu Kim. Accelerating Pollard's Rho Algorithm on Finite Fields
243 -- 270Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
271 -- 309Shoichi Hirose, Je Hong Park, Aaram Yun. A Simple Variant of the Merkle-Damgård Scheme with a Permutation
310 -- 348Tom Roeder, Rafael Pass, Fred B. Schneider. Multi-Verifier Signatures
349 -- 382Lorenz Minder, Alistair Sinclair. The Extended k-tree Algorithm

Volume 25, Issue 1

1 -- 13Rahul Jain. Resource Requirements of Private Quantum Channels and Consequences for Oblivious Remote State Preparation
14 -- 40S. Dov Gordon, Jonathan Katz. Partial Fairness in Secure Two-Party Computation
41 -- 56Jonathan Katz. Which Languages Have 4-Round Zero-Knowledge Proofs?
57 -- 115Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights
116 -- 135Krzysztof Pietrzak, Douglas Wikström. Parallel Repetition of Computationally Sound Protocols Revisited
136 -- 157Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede. A Practical Attack on KeeLoq
158 -- 193Shai Halevi, Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer