Login / Signup
J. Cryptol.
1988
1998
2013
2024
1988
2024
Keyphrases
Publications
volume 37, number 1, 2024
Yuval Ishai
,
Alexis Korb
,
Paul Lou
,
Amit Sahai
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation.
J. Cryptol.
37 (1) (2024)
Nir Drucker
,
Guy Moshkowich
,
Tomer Pelleg
,
Hayim Shaul
BLEACH: Cleaning Errors in Discrete Computations Over CKKS.
J. Cryptol.
37 (1) (2024)
Gilles Barthe
,
Sonia Belaïd
,
Thomas Espitau
,
Pierre-Alain Fouque
,
Benjamin Grégoire
,
Mélissa Rossi
,
Mehdi Tibouchi
Masking the GLP Lattice-Based Signature Scheme at Any Order.
J. Cryptol.
37 (1) (2024)
Jiang Zhang
,
Yu Chen
,
Zhenfeng Zhang
Lattice-Based Programmable Hash Functions and Applications.
J. Cryptol.
37 (1) (2024)
Gabrielle De Micheli
,
Pierrick Gaudry
,
Cécile Pierrot
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation.
J. Cryptol.
37 (1) (2024)
Elette Boyle
,
Ran Cohen
,
Aarushi Goel
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
J. Cryptol.
37 (1) (2024)
Daniel J. Bernstein
Cryptographic Competitions.
J. Cryptol.
37 (1) (2024)
Valerio Cini
,
Sebastian Ramacher
,
Daniel Slamanig
,
Christoph Striecks
,
Erkan Tairi
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
J. Cryptol.
37 (1) (2024)
volume 37, number 2, 2024
Dennis Hofheinz
,
Jessica Koch
,
Christoph Striecks
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
J. Cryptol.
37 (2) (2024)
Qianqian Yang
,
Ling Song
,
Nana Zhang
,
Danping Shi
,
Libo Wang
,
Jiahao Zhao
,
Lei Hu
,
Jian Weng
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol.
37 (2) (2024)
David Lubicz
,
Viktor Fischer
Entropy Computation for Oscillator-based Physical Random Number Generators.
J. Cryptol.
37 (2) (2024)
Marc Fischlin
,
Felix Günther
,
Christian Janson
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
J. Cryptol.
37 (2) (2024)
Dmitrii I. Koshelev
Hashing to Elliptic Curves Through Cipolla-Lehmer-Müller's Square Root Algorithm.
J. Cryptol.
37 (2) (2024)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
J. Cryptol.
37 (2) (2024)
Ron D. Rothblum
,
Prashant Nalini Vasudevan
Collision Resistance from Multi-collision Resistance.
J. Cryptol.
37 (2) (2024)
Aggelos Kiayias
,
Feng-Hao Liu
,
Yiannis Tselekounis
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol.
37 (2) (2024)
Jeremiah Blocki
,
Peiyuan Liu
,
Ling Ren
,
Samson Zhou
Bandwidth-Hard Functions: Reductions and Lower Bounds.
J. Cryptol.
37 (2) (2024)
Elena Andreeva
,
Andrey Bogdanov
,
Nilanjan Datta
,
Atul Luykx
,
Bart Mennink
,
Mridul Nandi
,
Elmar Tischhauser
,
Kan Yasuda
The COLM Authenticated Encryption Scheme.
J. Cryptol.
37 (2) (2024)
Christian Badertscher
,
Ueli Maurer
,
Daniel Tschudi
,
Vassilis Zikas
Bitcoin as a Transaction Ledger: A Composable Treatment.
J. Cryptol.
37 (2) (2024)
volume 37, number 3, 2024
Morten Øygarden
,
Patrick Felke
,
Håvard Raddum
.
J. Cryptol.
37 (3) (2024)
Orr Dunkelman
,
Nathan Keller
,
Eyal Ronen
,
Adi Shamir
The Retracing Boomerang Attack, with Application to Reduced-Round AES.
J. Cryptol.
37 (3) (2024)
Shuichi Katsumata
,
Ryo Nishimaki
,
Shota Yamada
,
Takashi Yamakawa
Compact NIZKs from Standard Assumptions on Bilinear Maps.
J. Cryptol.
37 (3) (2024)
Danilo Francati
,
Daniele Friolo
,
Giulio Malavolta
,
Daniele Venturi
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors.
J. Cryptol.
37 (3) (2024)
Chris Peikert
,
Zachary Pepin
Algebraically Structured LWE, Revisited.
J. Cryptol.
37 (3) (2024)
Giacomo Fenzi
,
Hossein Moghaddas
,
Ngoc Khanh Nguyen
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency.
J. Cryptol.
37 (3) (2024)
Victor Shoup
,
Nigel P. Smart
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience.
J. Cryptol.
37 (3) (2024)
Navid Alamati
,
Sikhar Patranabis
Cryptographic Primitives with Hinting Property.
J. Cryptol.
37 (3) (2024)
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
,
Mor Weiss
The Price of Active Security in Cryptographic Protocols.
J. Cryptol.
37 (3) (2024)
Lior Rotem
,
Gil Segev
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols.
J. Cryptol.
37 (3) (2024)
Fuyuki Kitagawa
,
Ryo Nishimaki
Watermarking PRFs and PKE Against Quantum Adversaries.
J. Cryptol.
37 (3) (2024)
Noam Mazor
,
Jiapeng Zhang
Simple Constructions from (Almost) Regular One-Way Functions.
J. Cryptol.
37 (3) (2024)
David Derler
,
Kai Samelin
,
Daniel Slamanig
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes.
J. Cryptol.
37 (3) (2024)
volume 36, number 3, 2023
Cyril Bouvier
,
Guilhem Castagnos
,
Laurent Imbert
,
Fabien Laguillaumie
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups.
J. Cryptol.
36 (3) (2023)
Jun Furukawa
,
Yehuda Lindell
,
Ariel Nof
,
Or Weinstein
High-Throughput Secure Three-Party Computation with an Honest Majority.
J. Cryptol.
36 (3) (2023)
Koji Chida
,
Koki Hamada
,
Dai Ikarashi
,
Ryo Kikuchi
,
Daniel Genkin
,
Yehuda Lindell
,
Ariel Nof
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
J. Cryptol.
36 (3) (2023)
Benoît Libert
,
San Ling
,
Khoa Nguyen
,
Huaxiong Wang
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol.
36 (3) (2023)
Sayandeep Saha
,
Manaar Alam
,
Arnab Bag
,
Debdeep Mukhopadhyay
,
Pallab Dasgupta
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning.
J. Cryptol.
36 (3) (2023)
Elette Boyle
,
Ran Cohen
,
Deepesh Data
,
Pavel Hubácek
Must the Communication Graph of MPC Protocols be an Expander?
J. Cryptol.
36 (3) (2023)
Mariya Georgieva Belorgey
,
Sergiu Carpov
,
Kevin Deforth
,
Dimitar Jetchev
,
Abson Sae-Tang
,
Marius Vuille
,
Nicolas Gama
,
Jonathan Katz
,
Iraklis Leontiadis
,
Mohsen Mohammadi
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic.
J. Cryptol.
36 (3) (2023)
Zvika Brakerski
,
Nico Döttling
,
Sanjam Garg
,
Giulio Malavolta
Candidate iO from Homomorphic Encryption Schemes.
J. Cryptol.
36 (3) (2023)
volume 36, number 4, 2023
Valence Cristiani
,
Maxime Lecomte
,
Philippe Maurine
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs.
J. Cryptol.
36 (4) (2023)
Marshall Ball
,
Elette Boyle
,
Ran Cohen
,
Lisa Kohl
,
Tal Malkin
,
Pierre Meyer
,
Tal Moran
Topology-Hiding Communication from Minimal Assumptions.
J. Cryptol.
36 (4) (2023)
Marten van Dijk
,
Chenglu Jin
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
J. Cryptol.
36 (4) (2023)
Lior Rotem
,
Gil Segev
Non-malleable Vector Commitments via Local Equivocability.
J. Cryptol.
36 (4) (2023)
Yuyu Wang
,
Jiaxin Pan
,
Yu Chen
Fine-Grained Secure Attribute-Based Encryption.
J. Cryptol.
36 (4) (2023)
Chaya Ganesh
,
Anca Nitulescu
,
Eduardo Soria-Vazquez
Rinocchio: SNARKs for Ring Arithmetic.
J. Cryptol.
36 (4) (2023)
Raine Nieminen
,
Thomas Schneider
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
J. Cryptol.
36 (4) (2023)
Masayuki Abe
,
Dennis Hofheinz
,
Ryo Nishimaki
,
Miyako Ohkubo
,
Jiaxin Pan
Compact Structure-Preserving Signatures with Almost Tight Security.
J. Cryptol.
36 (4) (2023)
Thomas Attema
,
Serge Fehr
,
Michael Klooß
Fiat-Shamir Transformation of Multi-Round Interactive Proofs (Extended Version).
J. Cryptol.
36 (4) (2023)
Song Tian
Cover Attacks for Elliptic Curves over Cubic Extension Fields.
J. Cryptol.
36 (4) (2023)