Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique On tight security proofs for Schnorr signatures. (English) Zbl 1434.94065 J. Cryptology 32, No. 2, 566-599 (2019). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{N. Fleischhacker} et al., J. Cryptology 32, No. 2, 566--599 (2019; Zbl 1434.94065) Full Text: DOI
Cheon, Jung Hee; Han, Kyoohyung; Lee, Changmin; Ryu, Hansol; Stehlé, Damien Cryptanalysis of the CLT13 multilinear map. (English) Zbl 1434.94061 J. Cryptology 32, No. 2, 547-565 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{J. H. Cheon} et al., J. Cryptology 32, No. 2, 547--565 (2019; Zbl 1434.94061) Full Text: DOI
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. (English) Zbl 1434.94066 J. Cryptology 32, No. 2, 498-546 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Fuchsbauer} et al., J. Cryptology 32, No. 2, 498--546 (2019; Zbl 1434.94066) Full Text: DOI
Choi, Seung Geol; Katz, Jonathan; Schröder, Dominique; Yerukhimovich, Arkady; Zhou, Hong-Sheng (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens. (English) Zbl 1434.94062 J. Cryptology 32, No. 2, 459-497 (2019). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{S. G. Choi} et al., J. Cryptology 32, No. 2, 459--497 (2019; Zbl 1434.94062) Full Text: DOI
Bernard, Florent; Haddad, Patrick; Fischer, Viktor; Nicolai, Jean From physical to stochastic modeling of a TERO-based TRNG. (English) Zbl 1434.94078 J. Cryptology 32, No. 2, 435-458 (2019). MSC: 94A62 94A17 PDF BibTeX XML Cite \textit{F. Bernard} et al., J. Cryptology 32, No. 2, 435--458 (2019; Zbl 1434.94078) Full Text: DOI
Kiyoshima, Susumu Non-black-box simulation in the fully concurrent setting, revisited. (English) Zbl 1434.94072 J. Cryptology 32, No. 2, 393-434 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Kiyoshima}, J. Cryptology 32, No. 2, 393--434 (2019; Zbl 1434.94072) Full Text: DOI
Berman, Itay; Haitner, Iftach; Komargodski, Ilan; Naor, Moni Hardness-preserving reductions via cuckoo hashing. (English) Zbl 1434.94058 J. Cryptology 32, No. 2, 361-392 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Berman} et al., J. Cryptology 32, No. 2, 361--392 (2019; Zbl 1434.94058) Full Text: DOI
Barthe, Gilles; Fagerholm, Edvard; Fiore, Dario; Mitchell, John; Scedrov, Andre; Schmidt, Benedikt Automated analysis of cryptographic assumptions in generic group models. (English) Zbl 1434.94057 J. Cryptology 32, No. 2, 324-360 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Barthe} et al., J. Cryptology 32, No. 2, 324--360 (2019; Zbl 1434.94057) Full Text: DOI
Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino Efficient RSA key generation and threshold Paillier in the two-party setting. (English) Zbl 1434.94068 J. Cryptology 32, No. 2, 265-323 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Hazay} et al., J. Cryptology 32, No. 2, 265--323 (2019; Zbl 1434.94068) Full Text: DOI