×

Journal of Cryptology

The Journal of the International Association for Cryptologic Research

Short Title: J. Cryptology
Publisher: Springer US, New York, NY
ISSN: 0933-2790; 1432-1378/e
Online: http://link.springer.com/journal/volumesAndIssues/145
Comments: Indexed cover-to-cover
Documents Indexed: 719 Publications (since 1988)
References Indexed: 542 Publications with 20,196 References.
all top 5

Latest Issues

36, No. 2 (2023)
36, No. 1 (2023)
35, No. 4 (2022)
35, No. 3 (2022)
35, No. 2 (2022)
35, No. 1 (2022)
34, No. 4 (2021)
34, No. 3 (2021)
34, No. 2 (2021)
34, No. 1 (2021)
33, No. 4 (2020)
33, No. 3 (2020)
33, No. 2 (2020)
33, No. 1 (2020)
32, No. 4 (2019)
32, No. 3 (2019)
32, No. 2 (2019)
32, No. 1 (2019)
31, No. 4 (2018)
31, No. 3 (2018)
31, No. 2 (2018)
31, No. 1 (2018)
30, No. 4 (2017)
30, No. 3 (2017)
30, No. 2 (2017)
30, No. 1 (2017)
29, No. 4 (2016)
29, No. 3 (2016)
29, No. 2 (2016)
29, No. 1 (2016)
28, No. 4 (2015)
28, No. 3 (2015)
28, No. 2 (2015)
28, No. 1 (2015)
27, No. 4 (2014)
27, No. 3 (2014)
27, No. 2 (2014)
27, No. 1 (2014)
26, No. 4 (2013)
26, No. 3 (2013)
26, No. 2 (2013)
26, No. 1 (2013)
25, No. 4 (2012)
25, No. 3 (2012)
25, No. 2 (2012)
25, No. 1 (2012)
24, No. 4 (2011)
24, No. 3 (2011)
24, No. 2 (2011)
24, No. 1 (2011)
23, No. 4 (2010)
23, No. 3 (2010)
23, No. 2 (2010)
23, No. 1 (2010)
22, No. 4 (2009)
22, No. 3 (2009)
22, No. 2 (2009)
22, No. 1 (2009)
21, No. 4 (2008)
21, No. 3 (2008)
21, No. 2 (2008)
21, No. 1 (2008)
20, No. 4 (2007)
20, No. 3 (2007)
20, No. 2 (2007)
20, No. 1 (2007)
19, No. 4 (2006)
19, No. 3 (2006)
19, No. 2 (2006)
19, No. 1 (2006)
18, No. 4 (2005)
18, No. 3 (2005)
18, No. 2 (2005)
18, No. 1 (2005)
17, No. 4 (2004)
17, No. 3 (2004)
17, No. 2 (2004)
17, No. 1 (2004)
16, No. 4 (2003)
16, No. 3 (2003)
16, No. 2 (2003)
16, No. 1 (2003)
15, No. 4 (2002)
15, No. 3 (2002)
15, No. 2 (2002)
15, No. 1 (2001)
14, No. 4 (2001)
14, No. 3 (2001)
14, No. 2 (2001)
14, No. 1 (2001)
13, No. 4 (2000)
13, No. 3 (2000)
13, No. 2 (2000)
13, No. 1 (2000)
12, No. 4 (1999)
12, No. 3 (1999)
12, No. 2 (1999)
12, No. 1 (1999)
11, No. 4 (1998)
11, No. 3 (1998)
...and 35 more Volumes
all top 5

Authors

30 Lindell, Yehuda
19 Hazay, Carmit
17 Shamir, Adi
15 Biham, Eli
14 Katz, Jonathan N.
14 Segev, Gil
12 Bellare, Mihir
12 Canetti, Ran
12 Dunkelman, Orr
12 Goldreich, Oded
12 Ishai, Yuval
12 Keller, Nathan
12 Knudsen, Lars Ramkilde
11 Hofheinz, Dennis
11 Kiltz, Eike
11 Maurer, Ueli M.
11 Naor, Moni
11 Ostrovsky, Rafail
11 Smart, Nigel Paul
10 Applebaum, Benny
10 Gennaro, Rosario
10 Stinson, Douglas Robert
9 Asharov, Gilad
9 Damgård, Ivan Bjerre
9 Pinkas, Benny
9 Rogaway, Phillip
9 Shoup, Victor
8 Haitner, Iftach
8 Rosen, Alon
7 Abdalla, Michel
7 Beimel, Amos
7 Cohen, Ran
7 Coppersmith, Don
7 De Santis, Alfredo
7 Halevi, Shai
7 Jager, Tibor
7 Kushilevitz, Eyal
6 Bitansky, Nir
6 Boyar, Joan F.
6 Catalano, Dario
6 Dinur, Itai
6 Garay, Juan A.
6 Groth, Jens
6 Komargodski, Ilan
6 Naya-Plasencia, María
6 Omri, Eran
6 Pass, Rafael
6 Pointcheval, David
6 Rabin, Tal
6 Stern, Jacques
6 Unruh, Dominique
6 Vaudenay, Serge
6 Venkitasubramaniam, Muthuramakrishnan
6 Yung, Moti
5 Abe, Masayuki
5 Benhamouda, Fabrice
5 Blundo, Carlo
5 Bogdanov, Andrej
5 Boneh, Dan
5 Brakerski, Zvika
5 Brassard, Gilles
5 Coron, Jean-Sébastien
5 Dachman-Soled, Dana
5 Faust, Sebastian
5 Golić, Jovan Dj.
5 Joux, Antoine
5 Leander, Gregor
5 Malkin, Tal G.
5 Meier, Willi
5 Nishimaki, Ryo
5 Reingold, Omer
5 Reyzin, Leonid
5 Schröder, Dominique
5 Tibouchi, Mehdi
5 Vanstone, Scott Alexander
5 Venturi, Daniele
5 Wichs, Daniel
4 Cash, David M.
4 Desmedt, Yvo G.
4 Fiat, Amos
4 Fischlin, Marc
4 Galbraith, Steven D.
4 Johansson, Thomas
4 Kiyoshima, Susumu
4 Klapper, Andrew M.
4 Koblitz, Neal I.
4 Kurosawa, Kaoru
4 Magliveras, Spyros S.
4 Malone-Lee, John
4 Micali, Silvio
4 Murphy, Sean
4 Namprempre, Chanathip
4 Neven, Gregory
4 Nyberg, Kaisa
4 Peralta, René C.
4 Peyrin, Thomas
4 Rivest, Ronald Linn
4 Schnorr, Claus Peter
4 Tanaka, Keisuke
4 Tassa, Tamir
...and 901 more Authors

Publications by Year

Citations contained in zbMATH Open

553 Publications have been cited 6,664 times in 4,213 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
287
1991
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P.
178
1991
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques
152
2000
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
117
2000
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don
103
1997
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John
102
1992
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni
99
1991
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J.
94
1999
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
92
2004
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David
91
1988
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn
82
2010
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
77
1988
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z.
75
2009
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S.
72
2004
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal
70
1989
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M.
69
1991
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar
68
1989
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo
68
1993
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair
66
1994
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
64
2009
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel
60
1996
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
60
2008
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M.
54
2005
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay
52
1997
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer
49
1999
The size of a share must be large. Zbl 0897.94012
Csirmaz, László
46
1997
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P.
46
2001
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo
44
1995
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark
44
1997
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio
44
1996
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R.
42
1992
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather
42
1988
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
42
1994
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın
42
2008
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R.
39
1990
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
38
2003
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki
36
2013
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli
35
2000
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni
35
1996
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde
35
1995
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R.
34
2001
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine
34
2004
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir
34
2007
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao
33
1993
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin
33
2011
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran
33
2002
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge
33
2003
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan
31
2012
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal
29
2007
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P.
29
1999
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
29
2012
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.
28
1999
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
28
2002
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
27
2008
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E.
27
2002
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal
27
1998
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques
27
1998
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
26
2005
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M.
26
2000
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
26
2012
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David
26
2011
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
26
2002
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor
25
2000
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P.
25
2004
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris
25
1990
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P.
25
2008
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M.
24
1992
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D.
24
1992
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo
24
1992
A key distribution system equivalent to factoring. Zbl 0659.94003
McCurley, Kevin S.
24
1988
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
24
2006
An implementation for a fast public-key cryptosystem. Zbl 0725.94002
Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A.
24
1991
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim
23
2003
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R.
23
2008
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M.
22
1992
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
22
2001
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan
22
2007
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San
22
2011
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
21
2003
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011
Verheul, Eric R.
20
2004
Another look at “provable security”. Zbl 1115.68078
Koblitz, Neal; Menezes, Alfred J.
20
2007
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Philip
20
2001
Logic minimization techniques with applications to cryptology. Zbl 1279.94056
Boyar, Joan; Matthews, Philip; Peralta, René
20
2013
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael
20
2011
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
19
2011
Fully leakage-resilient signatures. Zbl 1335.94089
Boyle, Elette; Segev, Gil; Wichs, Daniel
19
2013
A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069
Goldreich, Oded
18
1993
Is the data encryption standard a group? (Results of cycling experiments on DES). Zbl 0658.94008
Kaliski, Burton S. jun.; Rivest, Ronald L.; Sherman, Alan T.
18
1988
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
18
2008
A public key cryptosystem based on non-abelian finite groups. Zbl 1168.94005
Lempken, Wolfgang; van Trung, Tran; Magliveras, Spyros S.; Wei, Wandi
18
2009
Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016
Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti
18
1998
Cryptanalysis of MD4. Zbl 0972.94033
Dobbertin, Hans
18
1998
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Zbl 0733.68006
Beaver, Donald
18
1991
Secure communication in minimal connectivity models. Zbl 0957.68042
Franklin, Matthew; Wright, Rebecca N.
17
2000
The structured design of cryptographically good s-boxes. Zbl 0711.94016
Adams, Carlisle; Tavares, Stafford
17
1990
Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431
Bender, Adam; Katz, Jonathan; Morselli, Ruggero
17
2009
Bounds on secret key exchange using a random deal of cards. Zbl 0851.94018
Fischer, Michael J.; Wright, Rebecca N.
17
1996
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
17
2020
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
17
2021
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
17
2019
Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina
2
2022
Actively secure setup for SPDZ. Zbl 1481.94122
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim
2
2022
Semi-quantum money. Zbl 1491.81016
Radian, Roy; Sattath, Or
2
2022
From fairness to full security in multiparty computation. Zbl 1486.94091
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
1
2022
On the round complexity of randomized Byzantine agreement. Zbl 1489.94092
Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex
1
2022
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
17
2021
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082
Diemert, Denis; Jager, Tibor
9
2021
The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081
Kaspers, Christian; Zhou, Yue
3
2021
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina
3
2021
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114
Zhandry, Mark
2
2021
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
2
2021
Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026
Applebaum, Benny; Vasudevan, Prashant Nalini
2
2021
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111
Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph
2
2021
On subversion-resistant SNARKs. Zbl 1467.94021
Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał
2
2021
Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin
2
2021
The design and evolution of OCB. Zbl 1472.94056
Krovetz, Ted; Rogaway, Phillip
2
2021
Fine-grained cryptography revisited. Zbl 1469.94094
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke
2
2021
Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073
Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi
1
2021
Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025
Applebaum, Benny; Brakerski, Zvika
1
2021
Is there an oblivious RAM lower bound for online reads? Zbl 07367489
Weiss, Mor; Wichs, Daniel
1
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
1
2021
Simple and generic constructions of succinct functional encryption. Zbl 1469.94103
Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke
1
2021
Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 07376834
Kim, Sam; Wu, David J.
1
2021
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
17
2020
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
8
2020
Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155
Galbraith, Steven D.; Petit, Christophe; Silva, Javier
5
2020
Efficient and scalable universal circuits. Zbl 1462.94027
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
4
2020
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
4
2020
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza
4
2020
The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
3
2020
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel
3
2020
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
2
2020
Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099
Beyne, Tim
2
2020
Efficient verifiable delay functions. Zbl 1453.94125
Wesolowski, Benjamin
2
2020
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
1
2020
Kummer for genus one over prime-order fields. Zbl 1455.94169
Karati, Sabyasachi; Sarkar, Palash
1
2020
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng
1
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
1
2020
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi
1
2020
Tight security of cascaded LRW2. Zbl 1457.94141
Jha, Ashwin; Nandi, Mridul
1
2020
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail
1
2020
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
1
2020
Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo
1
2020
Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127
Bitansky, Nir
1
2020
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
17
2019
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel
8
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
6
2019
On tight security proofs for Schnorr signatures. Zbl 1434.94065
Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique
4
2019
Probabilistic termination and composability of cryptographic protocols. Zbl 1466.94022
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis
4
2019
Small CRT-exponent RSA revisited. Zbl 1435.94140
Takayasu, Atsushi; Lu, Yao; Peng, Liqiang
3
2019
Efficient RSA key generation and threshold Paillier in the two-party setting. Zbl 1434.94068
Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino
2
2019
The magic of ELFs. Zbl 1466.94040
Zhandry, Mark
2
2019
Koblitz curves over quadratic fields. Zbl 1466.94034
Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco
2
2019
Multidimensional linear cryptanalysis. Zbl 1435.94132
Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa
2
2019
Improved combinatorial algorithms for the inhomogeneous short integer solution problem. Zbl 1435.11144
Bai, Shi; Galbraith, Steven D.; Li, Liangze; Sheffield, Daniel
2
2019
Unifying leakage models: from probing attacks to noisy leakage. Zbl 1435.94128
Duc, Alexandre; Dziembowski, Stefan; Faust, Sebastian
2
2019
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. Zbl 1435.94145
Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier
2
2019
Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2019
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
1
2019
Efficient fully structure-preserving signatures and shrinking commitments. Zbl 1466.94018
Abe, Masayuki; Groth, Jens; Kohlweiss, Markulf; Ohkubo, Miyako; Tibouchi, Mehdi
1
2019
On the tightness of forward-secure signature reductions. Zbl 1435.94119
Abdalla, Michel; Benhamouda, Fabrice; Pointcheval, David
1
2019
On the impossibility of structure-preserving deterministic primitives. Zbl 1435.94120
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria
1
2019
Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138
Okamoto, Tatsuaki; Takashima, Katsuyuki
1
2019
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
13
2018
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud
13
2018
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. Zbl 1444.94043
Bai, Shi; Lepoint, Tancrède; Roux-Langlois, Adeline; Sakzad, Amin; Stehlé, Damien; Steinfeld, Ron
7
2018
How many queries are needed to distinguish a truncated random permutation from a random function? Zbl 1421.94030
Gilboa, Shoni; Gueron, Shay; Morris, Ben
7
2018
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
6
2018
Making the impossible possible. Zbl 1421.94041
Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin
6
2018
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
4
2018
Function-private functional encryption in the private-key setting. Zbl 1426.94085
Brakerski, Zvika; Segev, Gil
4
2018
Characterization of secure multiparty computation without broadcast. Zbl 1444.94056
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
3
2018
Efficient slide attacks. Zbl 1400.94116
Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2018
Asymptotically efficient lattice-based digital signatures. Zbl 1400.94165
Lyubashevsky, Vadim; Micciancio, Daniele
3
2018
Practical homomorphic message authenticators for arithmetic circuits. Zbl 1421.94042
Catalano, Dario; Fiore, Dario
2
2018
Incremental deterministic public-key encryption. Zbl 1421.94064
Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil
2
2018
A black-box construction of non-malleable encryption from semantically secure encryption. Zbl 1426.94091
Choi, Seung Geol; Dachman-Soled, Dana; Malkin, Tal; Wee, Hoeteck
2
2018
Robust encryption. Zbl 1444.94035
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
1
2018
Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050
Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick
1
2018
Deterministic encryption with the Thorp shuffle. Zbl 1444.94092
Morris, Ben; Rogaway, Phillip; Stegers, Till
1
2018
Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Zbl 1444.94069
Hazay, Carmit
1
2018
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112
Asharov, Gilad; Segev, Gil
1
2018
Key-recovery attacks on \(\mathsf{ASASA}\). Zbl 1400.94166
Minaud, Brice; Derbez, Patrick; Fouque, Pierre-Alain; Karpman, Pierre
1
2018
Related-key security for pseudorandom functions beyond the linear barrier. Zbl 1442.94029
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G.
1
2018
Minimizing the two-round Even-Mansour cipher. Zbl 1442.94033
Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John
1
2018
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge
17
2017
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
15
2017
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
13
2017
Differential-linear cryptanalysis revisited. Zbl 1377.94038
Blondeau, Céline; Leander, Gregor; Nyberg, Kaisa
8
2017
Shorter quasi-adaptive NIZK proofs for linear subspaces. Zbl 1386.94078
Jutla, Charanjit S.; Roy, Arnab
6
2017
More efficient oblivious transfer extensions. Zbl 1377.94030
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
5
2017
Jacobian coordinates on genus 2 curves. Zbl 1377.94053
Hisil, Huseyin; Costello, Craig
5
2017
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1386.94067
Cohen, Ran; Lindell, Yehuda
4
2017
Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. Zbl 1377.94034
Barak, Boaz; Mahmoody, Mohammad
3
2017
Short signatures from Diffie-Hellman: realizing almost compact public key. Zbl 1377.94072
Seo, Jae Hong
3
2017
Lattices with symmetry. Zbl 1377.94060
Lenstra, H. W. jun.; Silverberg, A.
3
2017
Secret-sharing for NP. Zbl 1377.94057
Komargodski, Ilan; Naor, Moni; Yogev, Eylon
3
2017
Authenticated confidential channel establishment and the security of TLS-DHE. Zbl 1386.94095
Jager, Tibor; Kohlar, Florian; Schäge, Sven; Schwenk, Jörg
3
2017
Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1377.94056
Kiltz, Eike; O’Neill, Adam; Smith, Adam
2
2017
...and 453 more Documents
all top 5

Cited by 5,447 Authors

46 Susilo, Willy
38 Shparlinski, Igor E.
30 Hazay, Carmit
27 De Santis, Alfredo
27 Ostrovsky, Rafail
27 Stinson, Douglas Robert
26 Mu, Yi
25 Kiltz, Eike
25 Lindell, Yehuda
25 Wang, Huaxiong
23 Cao, Zhenfu
23 Ishai, Yuval
23 Pass, Rafael
22 Bellare, Mihir
22 Dunkelman, Orr
22 Qi, Wenfeng
21 Applebaum, Benny
21 Carlet, Claude
21 Galbraith, Steven D.
21 Hofheinz, Dennis
21 Lin, Dongdai
21 Rijmen, Vincent
21 Sarkar, Palash
20 Menezes, Alfred J.
20 Padró, Carles
20 Venkitasubramaniam, Muthuramakrishnan
19 Jager, Tibor
19 Libert, Benoît
19 Segev, Gil
18 Bitansky, Nir
18 Calderini, Marco
18 Hu, Lei
18 Katz, Jonathan N.
18 Vaikuntanathan, Vinod
18 Vaudenay, Serge
18 Yung, Moti
18 Zhang, Fangguo
17 Blundo, Carlo
17 Canetti, Ran
17 Keller, Nathan
17 Maurer, Ueli M.
16 Damgård, Ivan Bjerre
16 Haitner, Iftach
16 Komargodski, Ilan
16 Mesnager, Sihem
16 Seurin, Yannick
16 Shamir, Adi
16 Smart, Nigel Paul
16 Tan, Chik How
16 Venturi, Daniele
15 Farràs, Oriol
15 Goldreich, Oded
15 Maitra, Subhamoy
15 Nandi, Mridul
15 Sarkar, Santanu
15 Tessaro, Stefano
15 Waters, Brent
14 Herranz, Javier
14 Johansson, Thomas
14 Knudsen, Lars Ramkilde
14 Li, Chao
14 Nishimaki, Ryo
14 Takagi, Tsuyoshi
14 Takayasu, Atsushi
14 Wichs, Daniel
13 Beimel, Amos
13 Cheon, Jung Hee
13 Fischlin, Marc
13 Guo, Fuchun
13 Kurosawa, Kaoru
13 Ling, San
13 Petit, Christophe
13 Pointcheval, David
13 Sala, Massimiliano
13 Tibouchi, Mehdi
13 Vergnaud, Damien
13 Wu, Wenling
13 Yang, Guomin
12 Abe, Masayuki
12 Aragona, Riccardo
12 Asharov, Gilad
12 Bogdanov, Andrey
12 Brakerski, Zvika
12 Dinur, Itai
12 Emura, Keita
12 Fuchsbauer, Georg
12 Goyal, Vipul
12 Pasalic, Enes
12 Pietrzak, Krzysztof
12 Qu, Longjiang
12 Sahai, Amit
12 Wang, Meiqin
11 Biham, Eli
11 Boneh, Dan
11 Costello, Craig
11 Gu, Dawu
11 Hanaoka, Goichiro
11 Hu, Yupu
11 Lange, Tanja
11 Mendel, Florian
...and 5,347 more Authors
all top 5

Cited in 296 Journals

338 Journal of Cryptology
336 Designs, Codes and Cryptography
166 Theoretical Computer Science
122 Information Processing Letters
120 Information Sciences
102 Cryptography and Communications
97 Quantum Information Processing
86 Journal of Mathematical Cryptology
83 Finite Fields and their Applications
68 Discrete Applied Mathematics
60 Mathematics of Computation
46 Applicable Algebra in Engineering, Communication and Computing
44 Journal of Discrete Mathematical Sciences & Cryptography
40 International Journal of Theoretical Physics
40 Matematicheskie Voprosy Kriptografii
36 Advances in Mathematics of Communications
32 Information and Computation
31 Applied Mathematics and Computation
31 SIAM Journal on Computing
30 Journal of Computer and System Sciences
26 International Journal of Foundations of Computer Science
24 Discrete Mathematics
22 Science China. Information Sciences
22 Prikladnaya Diskretnaya Matematika
21 International Journal of Computer Mathematics
20 Journal of Number Theory
19 Computers & Mathematics with Applications
18 Journal of Symbolic Computation
16 LMS Journal of Computation and Mathematics
15 Algorithmica
15 Mathematical and Computer Modelling
15 Mathematical Problems in Engineering
14 Journal of Complexity
14 Wuhan University Journal of Natural Sciences (WUJNS)
14 International Journal of Quantum Information
14 Groups, Complexity, Cryptology
13 Distributed Computing
12 Soft Computing
12 Journal of Systems Science and Complexity
11 Cybernetics and Systems Analysis
10 Computational Complexity
10 Journal of Modern Optics
10 Science in China. Series F
9 Experimental Mathematics
9 New Journal of Physics
9 Journal of Applied Mathematics
8 Chaos, Solitons and Fractals
8 Journal of Computer Science and Technology
8 Discrete Mathematics and Applications
8 Discrete Mathematics, Algorithms and Applications
7 Computing
7 Journal of Computational and Applied Mathematics
7 Journal of Automated Reasoning
7 Journal of Mathematical Sciences (New York)
7 Nonlinear Dynamics
7 Physical Review Letters
6 Bulletin of the Australian Mathematical Society
6 Acta Applicandae Mathematicae
6 Formal Aspects of Computing
6 MSCS. Mathematical Structures in Computer Science
6 Theory of Computing Systems
6 The Journal of Logic and Algebraic Programming
6 JSIAM Letters
5 Journal of Algebra
5 Journal of Combinatorial Theory. Series A
5 SIAM Journal on Discrete Mathematics
5 Automation and Remote Control
5 Linear Algebra and its Applications
5 Pattern Recognition
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Journal of Shanghai Jiaotong University (Science)
5 Science China. Mathematics
5 Symmetry
5 Arabian Journal for Science and Engineering
4 Communications in Algebra
4 Physics Letters. A
4 Journal of Statistical Planning and Inference
4 European Journal of Combinatorics
4 Japan Journal of Industrial and Applied Mathematics
4 Games and Economic Behavior
4 Tatra Mountains Mathematical Publications
4 Applied Mathematics. Series B (English Edition)
4 Journal of Combinatorial Optimization
4 Acta Mathematica Sinica. English Series
4 Electronic Commerce Research
4 Journal of Applied Mathematics and Computing
4 Mathematical Biosciences and Engineering
4 Mathematics in Computer Science
3 Periodica Mathematica Hungarica
3 Problems of Information Transmission
3 Archiv der Mathematik
3 International Journal of Game Theory
3 Proceedings of the Japan Academy. Series A
3 Theory and Decision
3 Transactions of the American Mathematical Society
3 Cryptologia
3 Acta Mathematicae Applicatae Sinica. English Series
3 Journal of Parallel and Distributed Computing
3 Discrete Event Dynamic Systems
3 Journal of Applied Non-Classical Logics
...and 196 more Journals
all top 5

Cited in 52 Fields

3,522 Information and communication theory, circuits (94-XX)
1,131 Computer science (68-XX)
720 Number theory (11-XX)
350 Quantum theory (81-XX)
324 Algebraic geometry (14-XX)
180 Combinatorics (05-XX)
77 Group theory and generalizations (20-XX)
77 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
59 Order, lattices, ordered algebraic structures (06-XX)
49 Field theory and polynomials (12-XX)
42 Statistics (62-XX)
42 Numerical analysis (65-XX)
40 Probability theory and stochastic processes (60-XX)
32 Operations research, mathematical programming (90-XX)
26 Dynamical systems and ergodic theory (37-XX)
25 Mathematical logic and foundations (03-XX)
20 Geometry (51-XX)
18 Associative rings and algebras (16-XX)
17 Commutative algebra (13-XX)
17 Linear and multilinear algebra; matrix theory (15-XX)
8 Systems theory; control (93-XX)
7 Convex and discrete geometry (52-XX)
5 Optics, electromagnetic theory (78-XX)
5 Statistical mechanics, structure of matter (82-XX)
4 General and overarching topics; collections (00-XX)
4 History and biography (01-XX)
4 Mechanics of particles and systems (70-XX)
4 Geophysics (86-XX)
4 Biology and other natural sciences (92-XX)
3 General algebraic systems (08-XX)
3 Difference and functional equations (39-XX)
3 Abstract harmonic analysis (43-XX)
2 Special functions (33-XX)
2 Partial differential equations (35-XX)
2 Approximations and expansions (41-XX)
2 Harmonic analysis on Euclidean spaces (42-XX)
2 Fluid mechanics (76-XX)
1 Nonassociative rings and algebras (17-XX)
1 Category theory; homological algebra (18-XX)
1 Topological groups, Lie groups (22-XX)
1 Real functions (26-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Ordinary differential equations (34-XX)
1 Sequences, series, summability (40-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 General topology (54-XX)
1 Manifolds and cell complexes (57-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Relativity and gravitational theory (83-XX)
1 Mathematics education (97-XX)

Citations by Year