Journal: J. Cryptology

Volume 38, Issue 4

29 -- 0Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal. Towards Accountability in CRS Generation
30 -- 0Tomer Ashur, Erik Takke. A New Linear Distinguisher for Four-Round AES
31 -- 0Thomas Espitau, Shuichi Katsumata, Kaoru Takemure. Two-Round Threshold Signature from Algebraic One-More Learning with Errors
32 -- 0Quang-Dao, Aayush Jain. Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK
33 -- 0Navid Alamati, Varun Maram. Quantum CCA-Secure PKE, Revisited
34 -- 0Antonio Flórez-Gutiérrez, Yosuke Todo. Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing
35 -- 0Ziran Tu, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Nian Li. New Characterizations of Dillon-like Hyperbent Functions via Dickson Polynomials
36 -- 0Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra. Asymptotically Free Broadcast in Constant Expected Time via Packed VSS

Volume 38, Issue 3

22 -- 0Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stanica, Svetla Nikova. On Decompositions of Permutations in Quadratic Functions
23 -- 0Giacomo Borin, Edoardo Persichetti, Federico Pintore, Krijn Reijnders, Paolo Santini. A Guide to the Design of Digital Signatures based on Cryptographic Group Actions
24 -- 0Longjiang Qu, Qiancheng Zhang, Kangquan Li. Parametric Construction Approach of Balanced Boolean Functions from Two-to-one Mappings
25 -- 0Marco Calderini, Alessio Caminata, Irene Villa. A New Multivariate Primitive from CCZ Equivalence
26 -- 0Nuttapong Attrapadung, Junichi Tomida. Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
27 -- 0Kaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu 0008, Xiaoyun Wang 0001. Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem
28 -- 0Thibauld Feneuil, Matthieu Rivain. Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments

Volume 38, Issue 2

17 -- 0Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, Ye Zhang. Ceno: Non-uniform, Segment and Parallel Zero-Knowledge Virtual Machine
18 -- 0Jianwei Li, Phong Q. Nguyen. Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm
19 -- 0Hongrui Cui, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
20 -- 0Claude Carlet. Two Generalizations of Almost Perfect Nonlinearity
21 -- 0Xinxin Fan, Veronika Kuchta, Francesco Sica 0001, Lei Xu 0012. Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs

Volume 38, Issue 1

1 -- 0Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more
2 -- 0Gaëtan Leurent, Clara Pernot. New Representations of the AES Key Schedule
3 -- 0Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi. SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves
4 -- 0Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, Michal Zajac 0001. On Soundness Notions for Interactive Oracle Proofs
5 -- 0Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald. Achievable CCA2 Relaxation for Homomorphic Encryption
6 -- 0Valeh Farzaliyev, Calvin Pärn, Heleen Saarse, Jan Willemson. Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting
7 -- 0Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi 0001, Ivan Visconti. Compact Proofs of Partial Knowledge for Overlapping CNF Formulae
8 -- 0Chris Brzuska, Geoffroy Couteau. On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness
9 -- 0Gildas Avoine, Loïc Ferreira. Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol
10 -- 0Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang 0012, Chenkai Weng, Kang Yang 0002, Yu Yu 0001. An Efficient ZK Compiler from SIMD Circuits to General Circuits
11 -- 0Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi 0002, Daniel Tschudi. Fiat-Shamir Bulletproofs are Non-malleable (in the Random Oracle Model)
12 -- 0Jianwei Li, Phong Q. Nguyen. A Complete Analysis of the BKZ Lattice Reduction Algorithm
13 -- 0Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie. Efficient Succinct Zero-Knowledge Arguments in the CL Framework
14 -- 0Matteo Campanelli, Dario Fiore 0001, Rosario Gennaro. Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them
15 -- 0Jung Hee Cheon, Wonhee Cho, Jiseung Kim 0001. Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
16 -- 0Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat. Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols