Journal: J. Cryptology

Volume 34, Issue 4

36 -- 0Ted Krovetz, Phillip Rogaway. The Design and Evolution of OCB
37 -- 0Benjamin Dowling, Marc Fischlin, Felix Günther 0001, Douglas Stebila. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
38 -- 0Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan. Unconditionally Secure Computation Against Low-Complexity Leakage
39 -- 0Lior Rotem, Gil Segev 0001. Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?
40 -- 0Arpita Patra, Divya Ravi. On the Exact Round Complexity of Secure Three-Party Computation
42 -- 0Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings
43 -- 0Amir Jafari, Shahram Khazaei. On Abelian and Homomorphic Secret Sharing Schemes
44 -- 0Yehuda Lindell. Fast Secure Two-Party ECDSA Signing
45 -- 0Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras. Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli

Volume 34, Issue 3

15 -- 0Vincent Rijmen. Editorial
16 -- 0Giuseppe Ateniese, Danilo Francati, David Nuñez 0001, Daniele Venturi 0001. Match Me if You Can: Matchmaking Encryption and Its Applications
17 -- 0Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac 0001. On Subversion-Resistant SNARKs
18 -- 0Mor Weiss, Daniel Wichs. Is There an Oblivious RAM Lower Bound for Online Reads?
19 -- 0Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam. Round-Optimal Secure Multi-party Computation
20 -- 0Nimrod Aviram, Kai Gellert, Tibor Jager. Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
21 -- 0Chester Rebeiro, Debdeep Mukhopadhyay. A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
22 -- 0Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang 0001. Modeling for Three-Subset Division Property without Unknown Subset
23 -- 0Shohei Egashira, Yuyu Wang, Keisuke Tanaka. Fine-Grained Cryptography Revisited
24 -- 0Colin Boyd. Introduction to the Special Issue on TLS 1.3
25 -- 0Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka. Simple and Generic Constructions of Succinct Functional Encryption
26 -- 0Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru. Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
27 -- 0Nir Drucker, Shay Gueron. Selfie: reflections on TLS 1.3 with PSK
28 -- 0Sam Kim, David J. Wu. Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
29 -- 0Benoît Libert, Damien Stehlé, Radu Titiu. Adaptively Secure Distributed PRFs from sf LWE
30 -- 0Denis Diemert, Tibor Jager. On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments
31 -- 0Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Yannick Seurin. The Deoxys AEAD Family
32 -- 0Song Tian. Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with (ℓ , ℓ , ℓ )-Isogenies
33 -- 0Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer. Ascon v1.2: Lightweight Authenticated Encryption and Hashing
34 -- 0Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart. High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer
35 -- 0Qipeng Liu, Mark Zhandry. Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness

Volume 34, Issue 2

9 -- 0Gilad Asharov, Gil Segev 0001, Ido Shahaf. Tight Tradeoffs in Searchable Symmetric Encryption
10 -- 0Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin. On the Local Leakage Resilience of Linear Secret Sharing Schemes
11 -- 0Benny Applebaum, Prashant Nalini Vasudevan. Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
12 -- 0Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas. Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
13 -- 0David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
14 -- 0Benny Applebaum, Zvika Brakerski. Obfuscating Circuits Via Composite-Order Graded Encoding

Volume 34, Issue 1

1 -- 0Léo Ducas, Yang Yu. Learning Strikes Again: The Case of the DRS Signature Scheme
2 -- 0Ran Canetti, Benjamin Fuller 0001, Omer Paneth, Leonid Reyzin, Adam D. Smith. Reusable Fuzzy Extractors for Low-Entropy Distributions
3 -- 0Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki. Toward Non-interactive Zero-Knowledge Proofs for NP from LWE
4 -- 0Christian Kaspers, Yue Zhou. The Number of Almost Perfect Nonlinear Functions Grows Exponentially
5 -- 0Shuichi Katsumata, Shota Yamada 0001, Takashi Yamakawa. Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
6 -- 0Mark Zhandry. Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions
7 -- 0Shai Halevi, Victor Shoup. Bootstrapping for HElib
8 -- 0Alon Rosen, Gil Segev 0001, Ido Shahaf. Can PPAD Hardness be Based on Standard Cryptographic Assumptions?