Journal: J. Cryptology

Volume 32, Issue 4

1071 -- 1094Felipe G. Lacerda, Joseph M. Renes, Renato Renner. Classical Leakage Resilience from Fault-Tolerant Quantum Computation
1095 -- 1143Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff. White-Box Cryptography: Don't Forget About Grey-Box Attacks
1144 -- 1199Carmit Hazay, Avishay Yanai. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
1200 -- 1262Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. What Security Can We Achieve Within 4 Rounds?
1263 -- 1297Alexandre Duc, Sebastian Faust, François-Xavier Standaert. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
1298 -- 1336Razvan Barbulescu, Sylvain Duquesne. Updating Key Size Estimations for Pairings
1337 -- 1382Atsushi Takayasu, Yao Lu 0002, Liqiang Peng. Small CRT-Exponent RSA Revisited
1383 -- 1422Yosuke Todo, Gregor Leander, Yu Sasaki. Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64
1423 -- 1447Colin Chaigneau, Thomas Fuhr 0001, Henri Gilbert, Jérémy Jean, Jean-René Reinhard. Cryptanalysis of NORX v2.0
1448 -- 1490Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
1491 -- 1573Tatsuaki Okamoto, Katsuyuki Takashima. Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption

Volume 32, Issue 3

601 -- 634Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail. Key Establishment à la Merkle in a Quantum World
635 -- 689Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. On Black-Box Complexity of Universally Composable Security in the CRS Model
690 -- 741Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas. Probabilistic Termination and Composability of Cryptographic Protocols
742 -- 824Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou. Leakage Resilience from Program Obfuscation
825 -- 866Mark Zhandry. The Magic of ELFs
867 -- 894Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez. Koblitz Curves over Quadratic Fields
895 -- 940Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda. Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
941 -- 972Dana Dachman-Soled, Chang Liu 0021, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin. Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
973 -- 1025Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi. Efficient Fully Structure-Preserving Signatures and Shrinking Commitments
1026 -- 1069Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai. Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Volume 32, Issue 2

265 -- 323Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
324 -- 360Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt. Automated Analysis of Cryptographic Assumptions in Generic Group Models
361 -- 392Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor. Hardness-Preserving Reductions via Cuckoo Hashing
393 -- 434Susumu Kiyoshima. Non-black-box Simulation in the Fully Concurrent Setting, Revisited
435 -- 458Florent Bernard, Patrick Haddad, Viktor Fischer, Jean Nicolai. From Physical to Stochastic Modeling of a TERO-Based TRNG
459 -- 497Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou. (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
498 -- 546Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
547 -- 565Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé. Cryptanalysis of the CLT13 Multilinear Map
566 -- 599Nils Fleischhacker, Tibor Jager, Dominique Schröder. On Tight Security Proofs for Schnorr Signatures

Volume 32, Issue 1

1 -- 34Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg. Multidimensional Linear Cryptanalysis
35 -- 83Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield. Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem
84 -- 150Michel Abdalla, Fabrice Benhamouda, David Pointcheval. On the Tightness of Forward-Secure Signature Reductions
151 -- 177Alexandre Duc, Stefan Dziembowski, Sebastian Faust. Unifying Leakage Models: From Probing Attacks to Noisy Leakage
178 -- 238Susumu Kiyoshima. Round-Efficient Black-Box Construction of Composable Multi-Party Computation
239 -- 264Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya. On the Impossibility of Structure-Preserving Deterministic Primitives