default search action
Journal of Cryptology, Volume 19
Volume 19, Number 1, January 2006
- Jan Denef, Frederik Vercauteren:
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2. 1-25 - Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson:
Threshold Password-Authenticated Key Exchange. 27-66 - Jonathan Katz, Moti Yung:
Characterization of Security Notions for Probabilistic Private-Key Encryption. 67-95 - Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu:
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. 97-114 - Edlyn Teske:
An Elliptic Curve Trapdoor System. 115-133
Volume 19, Number 2, April 2006
- Ran Canetti, Eyal Kushilevitz, Yehuda Lindell:
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. 135-167 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Strengthening Zero-Knowledge Protocols Using Signatures. 169-209 - Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams:
An Improved Real-Quadratic-Field-Based Key Exchange Procedure. 211-239
Volume 19, Number 3, July 2006
- Oded Goldreich, Yehuda Lindell:
Session-Key Generation Using Human Passwords Only. 241-340 - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:
Private Computation: k-Connected versus 1-Connected Networks. 341-357 - Yehuda Lindell:
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. 359-377
Volume 19, Number 4, October 2006
- Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution. 381-439 - Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. 441-462 - Marc Girault, Guillaume Poupard, Jacques Stern:
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. 463-487 - Ivan Damgård, Gudmund Skovbjerg Frandsen:
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate. 489-520 - Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen:
Completeness in Two-Party Secure Computation: A Computational View. 521-552 - Florian Luca, Igor E. Shparlinski:
Elliptic Curves with Low Embedding Degree. 553-562
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.