Sign in
J. Cryptol.
1988
2000
2012
2024
1988
2024
Keyphrases
Publications
volume 37, number 1, 2024
Gabrielle De Micheli
,
Pierrick Gaudry
,
Cécile Pierrot
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation.
J. Cryptol.
37 (1) (2024)
Jiang Zhang
,
Yu Chen
,
Zhenfeng Zhang
Lattice-Based Programmable Hash Functions and Applications.
J. Cryptol.
37 (1) (2024)
Nir Drucker
,
Guy Moshkowich
,
Tomer Pelleg
,
Hayim Shaul
BLEACH: Cleaning Errors in Discrete Computations Over CKKS.
J. Cryptol.
37 (1) (2024)
Gilles Barthe
,
Sonia Belaïd
,
Thomas Espitau
,
Pierre-Alain Fouque
,
Benjamin Grégoire
,
Mélissa Rossi
,
Mehdi Tibouchi
Masking the GLP Lattice-Based Signature Scheme at Any Order.
J. Cryptol.
37 (1) (2024)
Yuval Ishai
,
Alexis Korb
,
Paul Lou
,
Amit Sahai
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation.
J. Cryptol.
37 (1) (2024)
Elette Boyle
,
Ran Cohen
,
Aarushi Goel
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
J. Cryptol.
37 (1) (2024)
Daniel J. Bernstein
Cryptographic Competitions.
J. Cryptol.
37 (1) (2024)
Valerio Cini
,
Sebastian Ramacher
,
Daniel Slamanig
,
Christoph Striecks
,
Erkan Tairi
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
J. Cryptol.
37 (1) (2024)
volume 37, number 2, 2024
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
J. Cryptol.
37 (2) (2024)
Marc Fischlin
,
Felix Günther
,
Christian Janson
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
J. Cryptol.
37 (2) (2024)
volume 36, number 1, 2023
Yunwen Liu
,
Zhongfeng Niu
,
Siwei Sun
,
Chao Li
,
Lei Hu
Rotational Differential-Linear Cryptanalysis Revisited.
J. Cryptol.
36 (1) (2023)
Katharina Boudgoust
,
Corentin Jeudy
,
Adeline Roux-Langlois
,
Weiqiang Wen
On the Hardness of Module Learning with Errors with Short Distributions.
J. Cryptol.
36 (1) (2023)
Navid Alamati
,
Hart Montgomery
,
Sikhar Patranabis
,
Arnab Roy
Minicrypt Primitives with Algebraic Structure and Applications.
J. Cryptol.
36 (1) (2023)
volume 36, number 2, 2023
Gilad Asharov
,
Ilan Komargodski
,
Wei-Kai Lin
,
Elaine Shi
Oblivious RAM with Worst-Case Logarithmic Overhead.
J. Cryptol.
36 (2) (2023)
Jonathan Takeshita
,
Ryan Karl
,
Ting Gong
,
Taeho Jung
SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors.
J. Cryptol.
36 (2) (2023)
Pratish Datta
,
Ilan Komargodski
,
Brent Waters
from BDH.
J. Cryptol.
36 (2) (2023)
Benny Applebaum
,
Yoni Moses
Correction: Locally Computable UOWHF with Linear Shrinkage.
J. Cryptol.
36 (2) (2023)
Ran Cohen
,
Abhi Shelat
,
Daniel Wichs
Adaptively Secure MPC with Sublinear Communication Complexity.
J. Cryptol.
36 (2) (2023)
David Pointcheval
,
Nigel P. Smart
Topical Collection on Computing on Encrypted Data.
J. Cryptol.
36 (2) (2023)
Christian Mouchet
,
Elliott Bertrand
,
Jean-Pierre Hubaux
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption.
J. Cryptol.
36 (2) (2023)
Ashish Choudhury
,
Arpita Patra
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience.
J. Cryptol.
36 (2) (2023)
Robin Geelen
,
Frederik Vercauteren
Bootstrapping for BGV and BFV Revisited.
J. Cryptol.
36 (2) (2023)
Susumu Kiyoshima
No-Signaling Linear PCPs.
J. Cryptol.
36 (2) (2023)
Fuyuki Kitagawa
,
Takahiro Matsuda
,
Takashi Yamakawa
NIZK from SNARGs.
J. Cryptol.
36 (2) (2023)
volume 36, number 3, 2023
Cyril Bouvier
,
Guilhem Castagnos
,
Laurent Imbert
,
Fabien Laguillaumie
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups.
J. Cryptol.
36 (3) (2023)
Jun Furukawa
,
Yehuda Lindell
,
Ariel Nof
,
Or Weinstein
High-Throughput Secure Three-Party Computation with an Honest Majority.
J. Cryptol.
36 (3) (2023)
Bar Alon
,
Eran Omri
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious.
J. Cryptol.
36 (3) (2023)
Koji Chida
,
Koki Hamada
,
Dai Ikarashi
,
Ryo Kikuchi
,
Daniel Genkin
,
Yehuda Lindell
,
Ariel Nof
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
J. Cryptol.
36 (3) (2023)
Benoît Libert
,
San Ling
,
Khoa Nguyen
,
Huaxiong Wang
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol.
36 (3) (2023)
Sayandeep Saha
,
Manaar Alam
,
Arnab Bag
,
Debdeep Mukhopadhyay
,
Pallab Dasgupta
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning.
J. Cryptol.
36 (3) (2023)
Elette Boyle
,
Ran Cohen
,
Deepesh Data
,
Pavel Hubácek
Must the Communication Graph of MPC Protocols be an Expander?
J. Cryptol.
36 (3) (2023)
Mariya Georgieva Belorgey
,
Sergiu Carpov
,
Kevin Deforth
,
Dimitar Jetchev
,
Abson Sae-Tang
,
Marius Vuille
,
Nicolas Gama
,
Jonathan Katz
,
Iraklis Leontiadis
,
Mohsen Mohammadi
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic.
J. Cryptol.
36 (3) (2023)
Zvika Brakerski
,
Nico Döttling
,
Sanjam Garg
,
Giulio Malavolta
Candidate iO from Homomorphic Encryption Schemes.
J. Cryptol.
36 (3) (2023)
Uddipana Dowerah
,
Subhranil Dutta
,
Aikaterini Mitrokotsa
,
Sayantan Mukherjee
,
Tapas Pal
Unbounded Predicate Inner Product Functional Encryption from Pairings.
J. Cryptol.
36 (3) (2023)
Carmit Hazay
,
Yuval Ishai
,
Muthuramakrishnan Venkitasubramaniam
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
J. Cryptol.
36 (3) (2023)
Nishat Koti
,
Shravani Mahesh Patil
,
Arpita Patra
,
Ajith Suresh
MPClan: Protocol Suite for Privacy-Conscious Computations.
J. Cryptol.
36 (3) (2023)
Loris Bergerat
,
Anas Boudi
,
Quentin Bourgerie
,
Ilaria Chillotti
,
Damien Ligier
,
Jean-Baptiste Orfila
,
Samuel Tap
Parameter Optimization and Larger Precision for (T)FHE.
J. Cryptol.
36 (3) (2023)
Murilo Coutinho
,
Iago Passos
,
Juan C. Grados Vásquez
,
Santanu Sarkar
,
Fábio L. L. Mendonça
,
Rafael Timóteo de Sousa Jr.
,
Fábio Borges
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró.
J. Cryptol.
36 (3) (2023)
Bar Alon
,
Ran Cohen
,
Eran Omri
,
Tom Suad
On the Power of an Honest Majority in Three-Party Computation Without Broadcast.
J. Cryptol.
36 (3) (2023)
Ananya Appan
,
Anirudh Chandramouli
,
Ashish Choudhury
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries.
J. Cryptol.
36 (3) (2023)
volume 36, number 4, 2023
Valence Cristiani
,
Maxime Lecomte
,
Philippe Maurine
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs.
J. Cryptol.
36 (4) (2023)
Masayuki Abe
,
Dennis Hofheinz
,
Ryo Nishimaki
,
Miyako Ohkubo
,
Jiaxin Pan
Compact Structure-Preserving Signatures with Almost Tight Security.
J. Cryptol.
36 (4) (2023)
Yuyu Wang
,
Jiaxin Pan
,
Yu Chen
Fine-Grained Secure Attribute-Based Encryption.
J. Cryptol.
36 (4) (2023)
Thomas Attema
,
Serge Fehr
,
Michael Klooß
Fiat-Shamir Transformation of Multi-Round Interactive Proofs (Extended Version).
J. Cryptol.
36 (4) (2023)
Raine Nieminen
,
Thomas Schneider
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
J. Cryptol.
36 (4) (2023)
Chaya Ganesh
,
Anca Nitulescu
,
Eduardo Soria-Vazquez
Rinocchio: SNARKs for Ring Arithmetic.
J. Cryptol.
36 (4) (2023)
Song Tian
Cover Attacks for Elliptic Curves over Cubic Extension Fields.
J. Cryptol.
36 (4) (2023)
Lior Rotem
,
Gil Segev
Non-malleable Vector Commitments via Local Equivocability.
J. Cryptol.
36 (4) (2023)
Marshall Ball
,
Elette Boyle
,
Ran Cohen
,
Lisa Kohl
,
Tal Malkin
,
Pierre Meyer
,
Tal Moran
Topology-Hiding Communication from Minimal Assumptions.
J. Cryptol.
36 (4) (2023)
Marten van Dijk
,
Chenglu Jin
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
J. Cryptol.
36 (4) (2023)