default search action
Journal of Cryptology, Volume 37
Volume 37, Number 1, March 2024
- Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. 1 - Elette Boyle, Ran Cohen, Aarushi Goel:
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party. 2 - Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul:
BLEACH: Cleaning Errors in Discrete Computations Over CKKS. 3 - Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Lattice-Based Programmable Hash Functions and Applications. 4 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. 5 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation. 6 - Daniel J. Bernstein:
Cryptographic Competitions. 7 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi:
(Inner-Product) Functional Encryption with Updatable Ciphertexts. 8
Volume 37, Number 2, June 2024
- Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. 9 - Akshima, Siyao Guo, Qipeng Liu:
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions. 10 - Dmitrii I. Koshelev:
Hashing to Elliptic Curves Through Cipolla-Lehmer-Müller's Square Root Algorithm. 11 - Dennis Hofheinz, Jessica Koch, Christoph Striecks:
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. 12 - David Lubicz, Viktor Fischer:
Entropy Computation for Oscillator-based Physical Random Number Generators. 13 - Ron D. Rothblum, Prashant Nalini Vasudevan:
Collision Resistance from Multi-collision Resistance. 14 - Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda:
The COLM Authenticated Encryption Scheme. 15 - Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 16 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates. 17 - Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. 18 - Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. 19
Volume 37, Number 3, September 2024
- Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C*. 20 - Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. 21 - Fuyuki Kitagawa, Ryo Nishimaki:
Watermarking PRFs and PKE Against Quantum Adversaries. 22 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. 23 - Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi:
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors. 24 - Noam Mazor, Jiapeng Zhang:
Simple Constructions from (Almost) Regular One-Way Functions. 25 - Lior Rotem, Gil Segev:
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols. 26 - Victor Shoup, Nigel P. Smart:
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience. 27 - Chris Peikert, Zachary Pepin:
Algebraically Structured LWE, Revisited. 28 - David Derler, Kai Samelin, Daniel Slamanig:
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. 29 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
The Price of Active Security in Cryptographic Protocols. 30 - Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen:
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency. 31 - Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. 32
Volume 37, Number 4, December 2024
- Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption. 33 - Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani:
Randomness Recoverable Secret Sharing Schemes. 34 - Akinori Hosoyamada, Takashi Yamakawa:
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness. 35 - Andre Esser, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. 36 - Antonio Sanso, Youssef El Housni:
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves. 37 - Tohru Kohrita, Patrick Towa:
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments. 38 - Hart Montgomery, Mark Zhandry:
Full Quantum Equivalence of Group Action DLog and CDH, and More. 39
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.