Journal: J. Cryptology

Volume 27, Issue 4

595 -- 635Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault. Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
636 -- 771Yair Amir, Paul Bunn, Rafail Ostrovsky. Authenticated Adversarial Routing
772 -- 798Jérémy Jean, María Naya-Plasencia, Thomas Peyrin. Improved Cryptanalysis of AES-like Permutations
799 -- 823Mihir Bellare, Todor Ristov. A Characterization of Chameleon Hash Functions and New, Efficient Designs
824 -- 849Orr Dunkelman, Nathan Keller, Adi Shamir. A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony

Volume 27, Issue 3

397 -- 428Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak. Robust Multi-Property Combiners for Hash Functions
429 -- 451Benny Applebaum. Key-Dependent Message Security: Generic Amplification and Completeness
452 -- 479Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger. Rotational Rebound Attacks on Reduced Skein
480 -- 505Shafi Goldwasser, Guy N. Rothblum. On Best-Possible Obfuscation
506 -- 543Jens Groth, Rafail Ostrovsky. Cryptography in the Multi-string Model
544 -- 593Michel Abdalla, Dario Catalano, Dario Fiore. Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions

Volume 27, Issue 2

183 -- 209Itai Dinur, Orr Dunkelman, Adi Shamir. Improved Practical Attacks on Round-Reduced Keccak
210 -- 247Zvika Brakerski, Gil Segev. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
248 -- 283Patrick Longa, Francesco Sica. Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
284 -- 316Ronald Cramer, Ivan Damgård, Marcel Keller. On the Amortized Complexity of Zero-Knowledge Protocols
317 -- 357Nir Bitansky, Ran Canetti. On Strong Simulation and Composable Point Obfuscation
358 -- 395Carmit Hazay, Tomas Toft. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

Volume 27, Issue 1

1 -- 22Paul Stankovski, Martin Hell, Thomas Johansson. An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
23 -- 44Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar. A One-Time Stegosystem and Applications to Efficient Covert Communication
45 -- 66Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam. Concurrent Zero Knowledge, Revisited
67 -- 108Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar. (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher
109 -- 138Iftach Haitner, Omer Reingold. A New Interactive Hashing Theorem
139 -- 180James Birkett, Alexander W. Dent. Security Models and Proof Strategies for Plaintext-Aware Encryption
181 -- 0Jin Hong 0001, Sunghwan Moon. Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms