Journal: J. Cryptology

Volume 31, Issue 4

917 -- 964Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
965 -- 1011Dominique Unruh. Everlasting Multi-party Computation
1012 -- 1063Ananth Raghunathan, Gil Segev, Salil P. Vadhan. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
1064 -- 1119Shan Chen, Rodolphe Lampe, Jooyoung Lee 0001, Yannick Seurin, John P. Steinberger. Minimizing the Two-Round Even-Mansour Cipher
1120 -- 1163Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh. On the (Im-)Possibility of Extending Coin Toss
1164 -- 1182Michael Hutter, Erich Wenger. Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

Volume 31, Issue 3

641 -- 670Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller. Efficient Slide Attacks
671 -- 697Yehuda Lindell, Eran Omri, Hila Zarosim. Completeness for Symmetric Two-Party Functionalities: Revisited
698 -- 736Gilad Asharov, Gil Segev. On Constructing One-Way Permutations from Indistinguishability Obfuscation
737 -- 773Yehuda Lindell, Hila Zarosim. On the Feasibility of Extending Oblivious Transfer
774 -- 797Vadim Lyubashevsky, Daniele Micciancio. Asymptotically Efficient Lattice-Based Digital Signatures
798 -- 844Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas. Fast Garbling of Circuits Under Standard Assumptions
845 -- 884Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman. Key-Recovery Attacks on ASASA
885 -- 916Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Volume 31, Issue 2

307 -- 350Michel Abdalla, Mihir Bellare, Gregory Neven. Robust Encryption
351 -- 393Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia. Multivariate High-Order Attacks of Shuffled Tables Recomputation
394 -- 433Bin Zhang 0003, Chao Xu, Dengguo Feng. Practical Cryptanalysis of Bluetooth Encryption with Condition Masking
434 -- 520Zvika Brakerski, Ilan Komargodski, Gil Segev. Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
521 -- 536Ben Morris, Phillip Rogaway, Till Stegers. Deterministic Encryption with the Thorp Shuffle
537 -- 586Carmit Hazay. Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
587 -- 609Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem. Characterization of Secure Multiparty Computation Without Broadcast
610 -- 640Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, Ron Steinfeld. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance

Volume 31, Issue 1

1 -- 22Benny Applebaum, Yuval Ishai, Eyal Kushilevitz. Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings
23 -- 59Dario Catalano, Dario Fiore. Practical Homomorphic Message Authenticators for Arithmetic Circuits
60 -- 100Ilan Komargodski, Gil Segev, Eylon Yogev. Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
101 -- 133Christina Boura, Virginie Lallemand, María Naya-Plasencia, Valentin Suder. Making the Impossible Possible
134 -- 161Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev. Incremental Deterministic Public-Key Encryption
162 -- 171Shoni Gilboa, Shay Gueron, Ben Morris. How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?
172 -- 201Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption
202 -- 225Zvika Brakerski, Gil Segev. Function-Private Functional Encryption in the Private-Key Setting
226 -- 275Eiichiro Fujisaki. All-But-Many Encryption
276 -- 306Saqib A. Kakvi, Eike Kiltz. Optimal Security Proofs for Full Domain Hash, Revisited