Applebaum, Benny; Vasudevan, Prashant Nalini Placing conditional disclosure of secrets in the communication complexity universe. (English) Zbl 1467.94026 J. Cryptology 34, No. 2, Paper No. 11, 46 p. (2021). MSC: 94A60 94A62 94A05 PDFBibTeX XMLCite \textit{B. Applebaum} and \textit{P. N. Vasudevan}, J. Cryptology 34, No. 2, Paper No. 11, 46 p. (2021; Zbl 1467.94026) Full Text: DOI Link
Galbraith, Steven D.; Petit, Christophe; Silva, Javier Identification protocols and signature schemes based on supersingular isogeny problems. (English) Zbl 1455.94155 J. Cryptology 33, No. 1, 130-175 (2020). MSC: 94A60 94A62 81P94 PDFBibTeX XMLCite \textit{S. D. Galbraith} et al., J. Cryptology 33, No. 1, 130--175 (2020; Zbl 1455.94155) Full Text: DOI
Dachman-Soled, Dana; Liu, Chang; Papamanthou, Charalampos; Shi, Elaine; Vishkin, Uzi Oblivious network RAM and leveraging parallelism to achieve obliviousness. (English) Zbl 1466.94023 J. Cryptology 32, No. 3, 941-972 (2019). MSC: 94A60 68P25 68Q10 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., J. Cryptology 32, No. 3, 941--972 (2019; Zbl 1466.94023) Full Text: DOI
Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John Minimizing the two-round Even-Mansour cipher. (English) Zbl 1442.94033 J. Cryptology 31, No. 4, 1064-1119 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Chen} et al., J. Cryptology 31, No. 4, 1064--1119 (2018; Zbl 1442.94033) Full Text: DOI
Komargodski, Ilan; Naor, Moni; Yogev, Eylon Secret-sharing for NP. (English) Zbl 1377.94057 J. Cryptology 30, No. 2, 444-469 (2017). MSC: 94A60 94A62 68Q17 PDFBibTeX XMLCite \textit{I. Komargodski} et al., J. Cryptology 30, No. 2, 444--469 (2017; Zbl 1377.94057) Full Text: DOI arXiv
Moran, Tal; Naor, Moni; Segev, Gil An optimally fair coin toss. (English) Zbl 1348.94070 J. Cryptology 29, No. 3, 491-513 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Moran} et al., J. Cryptology 29, No. 3, 491--513 (2016; Zbl 1348.94070) Full Text: DOI
Beimel, Amos; Farràs, Oriol; Mintz, Yuval Secret-sharing schemes for very dense graphs. (English) Zbl 1355.94047 J. Cryptology 29, No. 2, 336-362 (2016). MSC: 94A62 05C42 PDFBibTeX XMLCite \textit{A. Beimel} et al., J. Cryptology 29, No. 2, 336--362 (2016; Zbl 1355.94047) Full Text: DOI Link
Miles, Eric; Viola, Emanuele On the complexity of constructing pseudorandom functions (especially when they don’t exist). (English) Zbl 1356.94078 J. Cryptology 28, No. 3, 509-532 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Miles} and \textit{E. Viola}, J. Cryptology 28, No. 3, 509--532 (2015; Zbl 1356.94078) Full Text: DOI
Kiayias, Aggelos; Raekow, Yona; Russell, Alexander; Shashidhar, Narasimha A one-time stegosystem and applications to efficient covert communication. (English) Zbl 1350.94043 J. Cryptology 27, No. 1, 23-44 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Kiayias} et al., J. Cryptology 27, No. 1, 23--44 (2014; Zbl 1350.94043) Full Text: DOI arXiv
Shacham, Hovav; Waters, Brent Compact proofs of retrievability. (English) Zbl 1323.68258 J. Cryptology 26, No. 3, 442-483 (2013). MSC: 68P20 68P25 94A60 PDFBibTeX XMLCite \textit{H. Shacham} and \textit{B. Waters}, J. Cryptology 26, No. 3, 442--483 (2013; Zbl 1323.68258) Full Text: DOI
Bogdanov, Andrej; Rosen, Alon Input locality and hardness amplification. (English) Zbl 1291.94059 J. Cryptology 26, No. 1, 144-171 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} and \textit{A. Rosen}, J. Cryptology 26, No. 1, 144--171 (2013; Zbl 1291.94059) Full Text: DOI Link
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih Graph coloring applied to secure computation in non-abelian groups. (English) Zbl 1278.94046 J. Cryptology 25, No. 4, 557-600 (2012). MSC: 94A60 05C15 20F99 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{Y. Desmedt} et al., J. Cryptology 25, No. 4, 557--600 (2012; Zbl 1278.94046) Full Text: DOI Link
Haitner, Iftach; Horvitz, Omer; Katz, Jonathan; Koo, Chiu-Yuen; Morselli, Ruggero; Shaltiel, Ronen Reducing complexity assumptions for statistically-hiding commitment. (English) Zbl 1173.94006 J. Cryptology 22, No. 3, 283-310 (2009). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{I. Haitner} et al., J. Cryptology 22, No. 3, 283--310 (2009; Zbl 1173.94006) Full Text: DOI
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z. Cryptographic hash functions from expander graphs. (English) Zbl 1166.94006 J. Cryptology 22, No. 1, 93-113 (2009). MSC: 94A60 05C90 PDFBibTeX XMLCite \textit{D. X. Charles} et al., J. Cryptology 22, No. 1, 93--113 (2009; Zbl 1166.94006) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. (English) Zbl 1159.94369 J. Cryptology 22, No. 2, 139-160 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, J. Cryptology 22, No. 2, 139--160 (2009; Zbl 1159.94369) Full Text: DOI
Håstad, Johan; Näslund, Mats Practical construction and analysis of pseudo-randomness primitives. (English) Zbl 1147.68020 J. Cryptology 21, No. 1, 1-26 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Håstad} and \textit{M. Näslund}, J. Cryptology 21, No. 1, 1--26 (2008; Zbl 1147.68020) Full Text: DOI
Maurer, Ueli M.; Massey, James L. Local randomness in pseudorandom sequences. (English) Zbl 0748.65008 J. Cryptology 4, No. 2, 135-149 (1991). Reviewer: P.Staniewski (Warszawa) MSC: 65C10 94A60 68P25 PDFBibTeX XMLCite \textit{U. M. Maurer} and \textit{J. L. Massey}, J. Cryptology 4, No. 2, 135--149 (1991; Zbl 0748.65008) Full Text: DOI