Journal: J. Cryptology

Volume 37, Issue 4

33 -- 0Mihir Bellare, Anna Lysyanskaya. Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption
34 -- 0Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani. Randomness Recoverable Secret Sharing Schemes
35 -- 0Akinori Hosoyamada, Takashi Yamakawa. Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
36 -- 0Andre Esser 0001, Arindam Mukherjee 0003, Santanu Sarkar 0001. Memory-Efficient Attacks on Small LWE Keys
37 -- 0Antonio Sanso, Youssef El Housni. Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves
38 -- 0Tohru Kohrita, Patrick Towa. Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments
39 -- 0Hart Montgomery, Mark Zhandry. Full Quantum Equivalence of Group Action DLog and CDH, and More

Volume 37, Issue 3

20 -- 0Morten Øygarden, Patrick Felke, Håvard Raddum. *
21 -- 0Navid Alamati, Sikhar Patranabis. Cryptographic Primitives with Hinting Property
22 -- 0Fuyuki Kitagawa, Ryo Nishimaki. Watermarking PRFs and PKE Against Quantum Adversaries
23 -- 0Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. Compact NIZKs from Standard Assumptions on Bilinear Maps
24 -- 0Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi 0001. Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors
25 -- 0Noam Mazor, Jiapeng Zhang. Simple Constructions from (Almost) Regular One-Way Functions
26 -- 0Lior Rotem, Gil Segev 0001. Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols
27 -- 0Victor Shoup, Nigel P. Smart. Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
28 -- 0Chris Peikert, Zachary Pepin. Algebraically Structured LWE, Revisited
29 -- 0David Derler, Kai Samelin, Daniel Slamanig. Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
30 -- 0Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. The Price of Active Security in Cryptographic Protocols
31 -- 0Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen 0001. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
32 -- 0Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. The Retracing Boomerang Attack, with Application to Reduced-Round AES

Volume 37, Issue 2

9 -- 0Marc Fischlin, Felix Günther 0001, Christian Janson. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
10 -- 0Akshima, Siyao Guo, Qipeng Liu 0001. Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions
11 -- 0Dmitrii I. Koshelev. Hashing to Elliptic Curves Through Cipolla-Lehmer-Müller's Square Root Algorithm
12 -- 0Dennis Hofheinz, Jessica Koch, Christoph Striecks. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
13 -- 0David Lubicz, Viktor Fischer. Entropy Computation for Oscillator-based Physical Random Number Generators
14 -- 0Ron D. Rothblum, Prashant Nalini Vasudevan. Collision Resistance from Multi-collision Resistance
15 -- 0Elena Andreeva 0001, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda. The COLM Authenticated Encryption Scheme
16 -- 0Jeremiah Blocki, Peiyuan Liu, Ling Ren 0001, Samson Zhou. Bandwidth-Hard Functions: Reductions and Lower Bounds
17 -- 0Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis. (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
18 -- 0Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas. Bitcoin as a Transaction Ledger: A Composable Treatment

Volume 37, Issue 1

1 -- 0Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai. Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
2 -- 0Elette Boyle, Ran Cohen, Aarushi Goel. Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
3 -- 0Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul. BLEACH: Cleaning Errors in Discrete Computations Over CKKS
4 -- 0Jiang Zhang, Yu Chen, Zhenfeng Zhang. Lattice-Based Programmable Hash Functions and Applications
5 -- 0Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi. Masking the GLP Lattice-Based Signature Scheme at Any Order
6 -- 0Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot. Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation
7 -- 0Daniel J. Bernstein. Cryptographic Competitions
8 -- 0Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi. (Inner-Product) Functional Encryption with Updatable Ciphertexts