Journal: J. Cryptology

Volume 9, Issue 4

199 -- 216Russell Impagliazzo, Moni Naor. Efficient Cryptographic Schemes Provably as Secure as Subset Sum
217 -- 232Matthew K. Franklin, Stuart Haber. Joint Encryption and Message-Efficient Secure Computation
233 -- 250Wen-Ai Jackson, Keith M. Martin, Christine M. O Keefe. Ideal Secret Sharing Schemes with Multiple Secrets
251 -- 261Yenjo Han, Lane A. Hemaspaandra. Pseudorandom Generators and the Frequency of Simplicity

Volume 9, Issue 3

127 -- 128Claude Crépeau. Guest Editor s Introduction
129 -- 148Alfredo De Santis, Giuseppe Persiano. The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge
149 -- 166Mihir Bellare, Moti Yung. Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation
167 -- 190Oded Goldreich, Ariel Kahan. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP
191 -- 195Michael J. Fischer, Silvio Micali, Charles Rackoff. A Secure Protocol for the Oblivious Transfer (Extended Abstract)

Volume 9, Issue 2

71 -- 99Michael J. Fischer, Rebecca N. Wright. Bounds on Secret Key Exchange Using a Random Deal of Cards
101 -- 109Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii. A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity
111 -- 126Jovan Dj. Golic. Correlation Properties of a General Binary Combiner with Memory

Volume 9, Issue 1

1 -- 19Howard M. Heys, Stafford E. Tavares. Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
21 -- 34Ishai Ben-Aroya, Eli Biham. Differential Cryptanalysis of Lucifer
35 -- 67Shimon Even, Oded Goldreich, Silvio Micali. On-Line/Off-Line Digital Signatures