Journal: J. Cryptology

Volume 28, Issue 4

745 -- 768Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky. Almost-Everywhere Secure Computation with Edge Corruptions
769 -- 795Gordon Procter, Carlos Cid. On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
796 -- 819James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta. Spreading Alerts Quietly and the Subgroup Escape Problem
820 -- 843Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
844 -- 878Mihir Bellare. New Proofs for NMAC and HMAC: Security without Collision Resistance
879 -- 898Thomas Peyrin. Collision Attack on Grindahl

Volume 28, Issue 3

397 -- 422Orr Dunkelman, Nathan Keller, Adi Shamir. Improved Single-Key Attacks on 8-Round AES-192 and AES-256
423 -- 508Dennis Hofheinz, Victor Shoup. GNUC: A New Universal Composability Framework
509 -- 532Eric Miles, Emanuele Viola. On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist)
533 -- 550Lior Malka. How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge
551 -- 600Amos Beimel, Eran Omri, Ilan Orlov. Protocols for Multiparty Coin Toss with a Dishonest Majority
601 -- 622Boaz Tsaban. Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography
623 -- 640Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma. Provable Unlinkability Against Traffic Analysis with Low Message Overhead
641 -- 670Sven Schäge. Tight Security for Signature Schemes Without Random Oracles
671 -- 717Benjamin Fuller, Adam O'Neill, Leonid Reyzin. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
718 -- 744Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang 0012, Yanfeng Wang. Reflection Cryptanalysis of PRINCE-Like Ciphers

Volume 28, Issue 2

209 -- 239Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir. New Attacks on IDEA with at Least 6 Rounds
240 -- 256Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad. Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions
257 -- 296Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
297 -- 311Itay Berman, Iftach Haitner. From Non-adaptive to Adaptive Pseudorandom Functions
312 -- 350Yehuda Lindell, Benny Pinkas. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
351 -- 395Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters. Computing on Authenticated Data

Volume 28, Issue 1

1 -- 28Orr Dunkelman, Nathan Keller, Adi Shamir. Slidex Attacks on the Even-Mansour Encryption Scheme
29 -- 48Mihir Bellare, Dennis Hofheinz, Eike Kiltz. Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
49 -- 109Arpita Patra, Ashish Choudhury, C. Pandu Rangan. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
110 -- 160Eli Biham, Rafi Chen, Antoine Joux. Cryptanalysis of SHA-0 and Reduced SHA-1
161 -- 175Ämin Baumeler, Anne Broadbent. Quantum Private Information Retrieval has Linear Communication Complexity
176 -- 208Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks. Confined Guessing: New Signatures From Standard Assumptions