default search action
Journal of Cryptology, Volume 27
Volume 27, Number 1, January 2014
- Paul Stankovski, Martin Hell, Thomas Johansson:
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers. 1-22 - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-Time Stegosystem and Applications to Efficient Covert Communication. 23-44 - Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Concurrent Zero Knowledge, Revisited. 45-66 - Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. 67-108 - Iftach Haitner, Omer Reingold:
A New Interactive Hashing Theorem. 109-138 - James Birkett, Alexander W. Dent:
Security Models and Proof Strategies for Plaintext-Aware Encryption. 139-180 - Jin Hong, Sunghwan Moon:
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms. 181
Volume 27, Number 2, April 2014
- Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. 183-209 - Zvika Brakerski, Gil Segev:
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. 210-247 - Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 248-283 - Ronald Cramer, Ivan Damgård, Marcel Keller:
On the Amortized Complexity of Zero-Knowledge Protocols. 284-316 - Nir Bitansky, Ran Canetti:
On Strong Simulation and Composable Point Obfuscation. 317-357 - Carmit Hazay, Tomas Toft:
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. 358-395
Volume 27, Number 3, July 2014
- Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. 397-428 - Benny Applebaum:
Key-Dependent Message Security: Generic Amplification and Completeness. 429-451 - Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. 452-479 - Shafi Goldwasser, Guy N. Rothblum:
On Best-Possible Obfuscation. 480-505 - Jens Groth, Rafail Ostrovsky:
Cryptography in the Multi-string Model. 506-543 - Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. 544-593
Volume 27, Number 4, October 2014
- Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault:
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm. 595-635 - Yair Amir, Paul Bunn, Rafail Ostrovsky:
Authenticated Adversarial Routing. 636-771 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. 772-798 - Mihir Bellare, Todor Ristov:
A Characterization of Chameleon Hash Functions and New, Efficient Designs. 799-823 - Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. 824-849
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.