Journal: J. Cryptology

Volume 29, Issue 4

657 -- 696Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer. New Second-Preimage Attacks on Hash Functions
697 -- 728Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes
729 -- 774Xavier Boyen. Unconditionally Anonymous Ring and Mesh Signatures
775 -- 805Eli Biham, Yaniv Carmeli, Adi Shamir. Bug Attacks
806 -- 832Benjamin Smith. The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves
833 -- 878Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
879 -- 926Gilad Asharov, Ran Canetti, Carmit Hazay. Toward a Game Theoretic View of Secure Computation
927 -- 951Franck Landelle, Thomas Peyrin. Cryptanalysis of Full RIPEMD-128

Volume 29, Issue 3

491 -- 513Tal Moran, Moni Naor, Gil Segev. An Optimally Fair Coin Toss
514 -- 551Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs. Leakage-Resilient Cryptography from Minimal Assumptions
552 -- 576Benny Applebaum. Garbling XOR Gates "For Free" in the Standard Model
577 -- 596Benny Applebaum, Andrej Bogdanov, Alon Rosen. A Dichotomy for Local Small-Bias Generators
597 -- 631Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi. Tightly Secure Signatures From Lossy Identification Schemes
632 -- 656Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann. Practical Cryptanalysis of ISO 9796-2 and EMV Signatures

Volume 29, Issue 2

243 -- 282Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen. Automata Evaluation and Text Search Protocols with Simulation-Based Security
283 -- 335Iftach Haitner, Eran Omri, Hila Zarosim. Limits on the Usefulness of Random Oracles
336 -- 362Amos Beimel, Oriol Farràs, Yuval Mintz. Secret-Sharing Schemes for Very Dense Graphs
363 -- 421Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo. Structure-Preserving Signatures and Commitments to Group Elements
422 -- 455Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel. Signature Schemes Secure Against Hard-to-Invert Leakage
456 -- 490Yehuda Lindell. Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries

Volume 29, Issue 1

1 -- 27Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani. Enhanced Public Key Security for the McEliece Cryptosystem
28 -- 60Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter. Fast Cryptography in Genus 2
61 -- 114Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro. How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction
115 -- 155Michael J. Freedman, Carmit Hazay, Kobbi Nissim, Benny Pinkas. Efficient Set Intersection with Simulation-Based Security
156 -- 219Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao. Concurrent Knowledge Extraction in Public-Key Models
220 -- 241Daniel R. L. Brown. Breaking RSA May Be As Difficult As Factoring