Journal of CryptologyThe Journal of the International Association for Cryptologic Research Short Title: J. Cryptology Publisher: Springer US, New York, NY ISSN: 0933-2790; 1432-1378/e Online: http://link.springer.com/journal/volumesAndIssues/145 Comments: Indexed cover-to-cover Documents Indexed: 719 Publications (since 1988) References Indexed: 542 Publications with 20,196 References. all top 5 Latest Issues 36, No. 2 (2023) 36, No. 1 (2023) 35, No. 4 (2022) 35, No. 3 (2022) 35, No. 2 (2022) 35, No. 1 (2022) 34, No. 4 (2021) 34, No. 3 (2021) 34, No. 2 (2021) 34, No. 1 (2021) 33, No. 4 (2020) 33, No. 3 (2020) 33, No. 2 (2020) 33, No. 1 (2020) 32, No. 4 (2019) 32, No. 3 (2019) 32, No. 2 (2019) 32, No. 1 (2019) 31, No. 4 (2018) 31, No. 3 (2018) 31, No. 2 (2018) 31, No. 1 (2018) 30, No. 4 (2017) 30, No. 3 (2017) 30, No. 2 (2017) 30, No. 1 (2017) 29, No. 4 (2016) 29, No. 3 (2016) 29, No. 2 (2016) 29, No. 1 (2016) 28, No. 4 (2015) 28, No. 3 (2015) 28, No. 2 (2015) 28, No. 1 (2015) 27, No. 4 (2014) 27, No. 3 (2014) 27, No. 2 (2014) 27, No. 1 (2014) 26, No. 4 (2013) 26, No. 3 (2013) 26, No. 2 (2013) 26, No. 1 (2013) 25, No. 4 (2012) 25, No. 3 (2012) 25, No. 2 (2012) 25, No. 1 (2012) 24, No. 4 (2011) 24, No. 3 (2011) 24, No. 2 (2011) 24, No. 1 (2011) 23, No. 4 (2010) 23, No. 3 (2010) 23, No. 2 (2010) 23, No. 1 (2010) 22, No. 4 (2009) 22, No. 3 (2009) 22, No. 2 (2009) 22, No. 1 (2009) 21, No. 4 (2008) 21, No. 3 (2008) 21, No. 2 (2008) 21, No. 1 (2008) 20, No. 4 (2007) 20, No. 3 (2007) 20, No. 2 (2007) 20, No. 1 (2007) 19, No. 4 (2006) 19, No. 3 (2006) 19, No. 2 (2006) 19, No. 1 (2006) 18, No. 4 (2005) 18, No. 3 (2005) 18, No. 2 (2005) 18, No. 1 (2005) 17, No. 4 (2004) 17, No. 3 (2004) 17, No. 2 (2004) 17, No. 1 (2004) 16, No. 4 (2003) 16, No. 3 (2003) 16, No. 2 (2003) 16, No. 1 (2003) 15, No. 4 (2002) 15, No. 3 (2002) 15, No. 2 (2002) 15, No. 1 (2001) 14, No. 4 (2001) 14, No. 3 (2001) 14, No. 2 (2001) 14, No. 1 (2001) 13, No. 4 (2000) 13, No. 3 (2000) 13, No. 2 (2000) 13, No. 1 (2000) 12, No. 4 (1999) 12, No. 3 (1999) 12, No. 2 (1999) 12, No. 1 (1999) 11, No. 4 (1998) 11, No. 3 (1998) ...and 35 more Volumes all top 5 Authors 30 Lindell, Yehuda 19 Hazay, Carmit 17 Shamir, Adi 15 Biham, Eli 14 Katz, Jonathan N. 14 Segev, Gil 12 Bellare, Mihir 12 Canetti, Ran 12 Dunkelman, Orr 12 Goldreich, Oded 12 Ishai, Yuval 12 Keller, Nathan 12 Knudsen, Lars Ramkilde 11 Hofheinz, Dennis 11 Kiltz, Eike 11 Maurer, Ueli M. 11 Naor, Moni 11 Ostrovsky, Rafail 11 Smart, Nigel Paul 10 Applebaum, Benny 10 Gennaro, Rosario 10 Stinson, Douglas Robert 9 Asharov, Gilad 9 Damgård, Ivan Bjerre 9 Pinkas, Benny 9 Rogaway, Phillip 9 Shoup, Victor 8 Haitner, Iftach 8 Rosen, Alon 7 Abdalla, Michel 7 Beimel, Amos 7 Cohen, Ran 7 Coppersmith, Don 7 De Santis, Alfredo 7 Halevi, Shai 7 Jager, Tibor 7 Kushilevitz, Eyal 6 Bitansky, Nir 6 Boyar, Joan F. 6 Catalano, Dario 6 Dinur, Itai 6 Garay, Juan A. 6 Groth, Jens 6 Komargodski, Ilan 6 Naya-Plasencia, María 6 Omri, Eran 6 Pass, Rafael 6 Pointcheval, David 6 Rabin, Tal 6 Stern, Jacques 6 Unruh, Dominique 6 Vaudenay, Serge 6 Venkitasubramaniam, Muthuramakrishnan 6 Yung, Moti 5 Abe, Masayuki 5 Benhamouda, Fabrice 5 Blundo, Carlo 5 Bogdanov, Andrej 5 Boneh, Dan 5 Brakerski, Zvika 5 Brassard, Gilles 5 Coron, Jean-Sébastien 5 Dachman-Soled, Dana 5 Faust, Sebastian 5 Golić, Jovan Dj. 5 Joux, Antoine 5 Leander, Gregor 5 Malkin, Tal G. 5 Meier, Willi 5 Nishimaki, Ryo 5 Reingold, Omer 5 Reyzin, Leonid 5 Schröder, Dominique 5 Tibouchi, Mehdi 5 Vanstone, Scott Alexander 5 Venturi, Daniele 5 Wichs, Daniel 4 Cash, David M. 4 Desmedt, Yvo G. 4 Fiat, Amos 4 Fischlin, Marc 4 Galbraith, Steven D. 4 Johansson, Thomas 4 Kiyoshima, Susumu 4 Klapper, Andrew M. 4 Koblitz, Neal I. 4 Kurosawa, Kaoru 4 Magliveras, Spyros S. 4 Malone-Lee, John 4 Micali, Silvio 4 Murphy, Sean 4 Namprempre, Chanathip 4 Neven, Gregory 4 Nyberg, Kaisa 4 Peralta, René C. 4 Peyrin, Thomas 4 Rivest, Ronald Linn 4 Schnorr, Claus Peter 4 Tanaka, Keisuke 4 Tassa, Tamir ...and 901 more Authors all top 5 Fields 679 Information and communication theory, circuits (94-XX) 227 Computer science (68-XX) 60 Number theory (11-XX) 40 Algebraic geometry (14-XX) 16 Combinatorics (05-XX) 16 Quantum theory (81-XX) 15 Numerical analysis (65-XX) 7 Group theory and generalizations (20-XX) 6 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 5 Probability theory and stochastic processes (60-XX) 4 Order, lattices, ordered algebraic structures (06-XX) 3 General and overarching topics; collections (00-XX) 3 Field theory and polynomials (12-XX) 3 Statistics (62-XX) 2 Approximations and expansions (41-XX) 1 Mathematical logic and foundations (03-XX) 1 Geometry (51-XX) 1 Operations research, mathematical programming (90-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 553 Publications have been cited 6,664 times in 4,213 Documents Cited by ▼ Year ▼ Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 287 1991 Efficient signature generation by smart cards. Zbl 0743.68058Schnorr, C. P. 178 1991 Security arguments for digital signatures and blind signatures. Zbl 1025.94015Pointcheval, David; Stern, Jacques 152 2000 Security and composition of multiparty cryptographic protocols. Zbl 0957.68040Canetti, Ran 117 2000 Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056Coppersmith, Don 103 1997 Experimental quantum cryptography. Zbl 1114.94005Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John 102 1992 Bit commitment using pseudorandomness. Zbl 0731.68033Naor, Moni 99 1991 Parallel collision search with cryptanalytic applications. Zbl 0992.94028van Oorschot, Paul C.; Wiener, Michael J. 94 1999 Short signatures from the Weil pairing. Zbl 1070.94010Boneh, Dan; Lynn, Ben; Shacham, Hovav 92 2004 The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012Chaum, David 91 1988 A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094Freeman, David; Scott, Michael; Teske, Edlyn 82 2010 Zero-knowledge proofs of identity. Zbl 0659.94006Feige, Uriel; Fiat, Amos; Shamir, Adi 77 1988 Cryptographic hash functions from expander graphs. Zbl 1166.94006Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z. 75 2009 The Weil pairing, and its efficient calculation. Zbl 1078.14043Miller, Victor S. 72 2004 Hyperelliptic cryptosystems. Zbl 0674.94010Koblitz, Neal 70 1989 On the classification of ideal secret sharing schemes. Zbl 0747.94010Brickell, Ernest F.; Davenport, Daniel M. 69 1991 Fast correlation attacks on certain stream ciphers. Zbl 0673.94010Meier, Willi; Staffelbach, Othmar 68 1989 On the size of shares for secret sharing schemes. Zbl 0786.68030Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo 68 1993 Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010Goldreich, Oded; Oren, Yair 66 1994 A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364Lindell, Yehuda; Pinkas, Benny 64 2009 How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085Goldreich, Oded; Kahan, Ariel 60 1996 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373Boneh, Dan; Boyen, Xavier 60 2008 Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M. 54 2005 A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552Even, Shimon; Mansour, Yishay 52 1997 On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010Naor, Moni; Reingold, Omer 49 1999 The size of a share must be large. Zbl 0897.94012Csirmaz, László 46 1997 Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036Gaudry, P.; Hess, F.; Smart, N. P. 46 2001 Graph decompositions and secret sharing schemes. Zbl 0816.94013Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo 44 1995 Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029Klapper, Andrew; Goresky, Mark 44 1997 On-line/off-line digital signatures. Zbl 0844.94011Even, Shimon; Goldreich, Oded; Micali, Silvio 44 1996 Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008Brickell, E. F.; Stinson, D. R. 42 1992 How to share a secret with cheaters. Zbl 0659.94008Tompa, Martin; Woll, Heather 42 1988 New types of cryptanalytic attacks using related keys. Zbl 0812.94012Biham, Eli 42 1994 On probability of success in linear and differential cryptanalysis. Zbl 1147.68510Selçuk, Ali Aydın 42 2008 The combinatorics of authentication and secrecy codes. Zbl 0701.94006Stinson, D. R. 39 1990 The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M. 38 2003 Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085Fujisaki, Eiichiro; Okamoto, Tatsuaki 36 2013 Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019Hirt, Martin; Maurer, Ueli 35 2000 Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015Impagliazzo, Russell; Naor, Moni 35 1996 Provable security against a differential attack. Zbl 0817.94016Nyberg, Kaisa; Knudsen, Lars Ramkilde 35 1995 Selecting cryptographic key sizes. Zbl 1006.94020Lenstra, Arjen K.; Verheul, Eric R. 34 2001 A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007Joux, Antoine 34 2004 Hierarchical threshold secret sharing. Zbl 1113.68048Tassa, Tamir 34 2007 Multiple assignment scheme for sharing secret. Zbl 0795.68070Ito, Mitsuru; Saito, Akira; Nishizeki, Takao 33 1993 Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin 33 2011 New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010Magliveras, S. S.; Stinson, D. R.; van Trung, Tran 33 2002 Decorrelation: a theory for block cipher security. Zbl 1070.94009Vaudenay, Serge 33 2003 Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan 31 2012 Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal 29 2007 The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068Smart, N. P. 29 1999 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 29 2012 On the contrast in visual cryptography schemes. Zbl 0944.94010Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R. 28 1999 Privacy preserving data mining. Zbl 1010.94008Lindell, Yehuda; Pinkas, Benny 28 2002 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 27 2008 The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011Nguyen, Phong Q.; Shparlinski, Igor E. 27 2002 The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038Balasubramanian, R.; Koblitz, Neal 27 1998 Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011Joux, Antoine; Stern, Jacques 27 1998 Secure multi-party computation without agreement. Zbl 1102.68472Goldwasser, Shafi; Lindell, Yehuda 26 2005 Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057Pollard, J. M. 26 2000 Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033Halevi, Shai; Kalai, Yael Tauman 26 2012 Tweakable block ciphers. Zbl 1258.94040Liskov, Moses; Rivest, Ronald L.; Wagner, David 26 2011 Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066Abadi, Martín; Rogaway, Phillip 26 2002 On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007Coppersmith, Don; Shparlinski, Igor 25 2000 Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016Vadhan, Salil P. 25 2004 Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010Mitchell, Chris 25 1990 Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P. 25 2008 Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013Maurer, Ueli M. 24 1992 Algebraic properties of cryptosystem PGM. Zbl 0763.94014Magliveras, Spyros S.; Memon, Nasir D. 24 1992 Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007Dai, Zong-Duo 24 1992 A key distribution system equivalent to factoring. Zbl 0659.94003McCurley, Kevin S. 24 1988 A proof of the security of quantum key distribution. Zbl 1109.68045Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani 24 2006 An implementation for a fast public-key cryptosystem. Zbl 0725.94002Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A. 24 1991 Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309Joux, Antoine; Nguyen, Kim 23 2003 Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009Overbeck, R. 23 2008 A universal statistical test for random bit generators. Zbl 0790.94014Maurer, Ueli M. 22 1992 On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. 22 2001 Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan 22 2007 Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San 22 2011 Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011Lindell, Yehuda 21 2003 Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011Verheul, Eric R. 20 2004 Another look at “provable security”. Zbl 1115.68078Koblitz, Neal; Menezes, Alfred J. 20 2007 How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531Kilian, Joe; Rogaway, Philip 20 2001 Logic minimization techniques with applications to cryptology. Zbl 1279.94056Boyar, Joan; Matthews, Philip; Peralta, René 20 2013 Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036Galbraith, Steven D.; Lin, Xibin; Scott, Michael 20 2011 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022Boneh, Dan; Boyen, Xavier 19 2011 Fully leakage-resilient signatures. Zbl 1335.94089Boyle, Elette; Segev, Gil; Wichs, Daniel 19 2013 A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069Goldreich, Oded 18 1993 Is the data encryption standard a group? (Results of cycling experiments on DES). Zbl 0658.94008Kaliski, Burton S. jun.; Rivest, Ronald L.; Sherman, Alan T. 18 1988 Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435Bellare, Mihir; Namprempre, Chanathip 18 2008 A public key cryptosystem based on non-abelian finite groups. Zbl 1168.94005Lempken, Wolfgang; van Trung, Tran; Magliveras, Spyros S.; Wei, Wandi 18 2009 Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti 18 1998 Cryptanalysis of MD4. Zbl 0972.94033Dobbertin, Hans 18 1998 Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Zbl 0733.68006Beaver, Donald 18 1991 Secure communication in minimal connectivity models. Zbl 0957.68042Franklin, Matthew; Wright, Rebecca N. 17 2000 The structured design of cryptographically good s-boxes. Zbl 0711.94016Adams, Carlisle; Tavares, Stafford 17 1990 Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431Bender, Adam; Katz, Jonathan; Morselli, Ruggero 17 2009 Bounds on secret key exchange using a random deal of cards. Zbl 0851.94018Fischer, Michael J.; Wright, Rebecca N. 17 1996 A formal security analysis of the Signal messaging protocol. Zbl 1453.94133Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas 17 2020 A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas 17 2021 Updating key size estimations for pairings. Zbl 1435.94122Barbulescu, Razvan; Duquesne, Sylvain 17 2019 Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina 2 2022 Actively secure setup for SPDZ. Zbl 1481.94122Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim 2 2022 Semi-quantum money. Zbl 1491.81016Radian, Roy; Sattath, Or 2 2022 From fairness to full security in multiparty computation. Zbl 1486.94091Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior 1 2022 On the round complexity of randomized Byzantine agreement. Zbl 1489.94092Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex 1 2022 A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas 17 2021 On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082Diemert, Denis; Jager, Tibor 9 2021 The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081Kaspers, Christian; Zhou, Yue 3 2021 Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina 3 2021 Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114Zhandry, Mark 2 2021 On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal 2 2021 Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026Applebaum, Benny; Vasudevan, Prashant Nalini 2 2021 Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph 2 2021 On subversion-resistant SNARKs. Zbl 1467.94021Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał 2 2021 Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin 2 2021 The design and evolution of OCB. Zbl 1472.94056Krovetz, Ted; Rogaway, Phillip 2 2021 Fine-grained cryptography revisited. Zbl 1469.94094Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke 2 2021 Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi 1 2021 Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025Applebaum, Benny; Brakerski, Zvika 1 2021 Is there an oblivious RAM lower bound for online reads? Zbl 07367489Weiss, Mor; Wichs, Daniel 1 2021 High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. 1 2021 Simple and generic constructions of succinct functional encryption. Zbl 1469.94103Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke 1 2021 Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 07376834Kim, Sam; Wu, David J. 1 2021 A formal security analysis of the Signal messaging protocol. Zbl 1453.94133Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas 17 2020 TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika 8 2020 Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155Galbraith, Steven D.; Petit, Christophe; Silva, Javier 5 2020 Efficient and scalable universal circuits. Zbl 1462.94027Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas 4 2020 From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175Komargodski, Ilan; Segev, Gil 4 2020 CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza 4 2020 The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel 3 2020 From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel 3 2020 Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling 2 2020 Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099Beyne, Tim 2 2020 Efficient verifiable delay functions. Zbl 1453.94125Wesolowski, Benjamin 2 2020 Solving LPN using covering codes. Zbl 1455.94161Guo, Qian; Johansson, Thomas; Löndahl, Carl 1 2020 Kummer for genus one over prime-order fields. Zbl 1455.94169Karati, Sabyasachi; Sarkar, Palash 1 2020 Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng 1 2020 A practical forgery attack on Lilliput-AE. Zbl 1457.94126Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu 1 2020 Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi 1 2020 Tight security of cascaded LRW2. Zbl 1457.94141Jha, Ashwin; Nandi, Mridul 1 2020 Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104Bunn, Paul; Ostrovsky, Rafail 1 2020 Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel 1 2020 Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo 1 2020 Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127Bitansky, Nir 1 2020 Updating key size estimations for pairings. Zbl 1435.94122Barbulescu, Razvan; Duquesne, Sylvain 17 2019 Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel 8 2019 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141Todo, Yosuke; Leander, Gregor; Sasaki, Yu 6 2019 On tight security proofs for Schnorr signatures. Zbl 1434.94065Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique 4 2019 Probabilistic termination and composability of cryptographic protocols. Zbl 1466.94022Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis 4 2019 Small CRT-exponent RSA revisited. Zbl 1435.94140Takayasu, Atsushi; Lu, Yao; Peng, Liqiang 3 2019 Efficient RSA key generation and threshold Paillier in the two-party setting. Zbl 1434.94068Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino 2 2019 The magic of ELFs. Zbl 1466.94040Zhandry, Mark 2 2019 Koblitz curves over quadratic fields. Zbl 1466.94034Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco 2 2019 Multidimensional linear cryptanalysis. Zbl 1435.94132Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa 2 2019 Improved combinatorial algorithms for the inhomogeneous short integer solution problem. Zbl 1435.11144Bai, Shi; Galbraith, Steven D.; Li, Liangze; Sheffield, Daniel 2 2019 Unifying leakage models: from probing attacks to noisy leakage. Zbl 1435.94128Duc, Alexandre; Dziembowski, Stefan; Faust, Sebastian 2 2019 Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. Zbl 1435.94145Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier 2 2019 Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2019 Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan 1 2019 Efficient fully structure-preserving signatures and shrinking commitments. Zbl 1466.94018Abe, Masayuki; Groth, Jens; Kohlweiss, Markulf; Ohkubo, Miyako; Tibouchi, Mehdi 1 2019 On the tightness of forward-secure signature reductions. Zbl 1435.94119Abdalla, Michel; Benhamouda, Fabrice; Pointcheval, David 1 2019 On the impossibility of structure-preserving deterministic primitives. Zbl 1435.94120Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria 1 2019 Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138Okamoto, Tatsuaki; Takashima, Katsuyuki 1 2019 Fast garbling of circuits under standard assumptions. Zbl 1400.94146Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny 13 2018 Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud 13 2018 Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. Zbl 1444.94043Bai, Shi; Lepoint, Tancrède; Roux-Langlois, Adeline; Sakzad, Amin; Stehlé, Damien; Steinfeld, Ron 7 2018 How many queries are needed to distinguish a truncated random permutation from a random function? Zbl 1421.94030Gilboa, Shoni; Gueron, Shay; Morris, Ben 7 2018 Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049Brakerski, Zvika; Komargodski, Ilan; Segev, Gil 6 2018 Making the impossible possible. Zbl 1421.94041Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin 6 2018 Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal 4 2018 Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061Komargodski, Ilan; Segev, Gil; Yogev, Eylon 4 2018 Function-private functional encryption in the private-key setting. Zbl 1426.94085Brakerski, Zvika; Segev, Gil 4 2018 Characterization of secure multiparty computation without broadcast. Zbl 1444.94056Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior 3 2018 Efficient slide attacks. Zbl 1400.94116Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan 3 2018 Asymptotically efficient lattice-based digital signatures. Zbl 1400.94165Lyubashevsky, Vadim; Micciancio, Daniele 3 2018 Practical homomorphic message authenticators for arithmetic circuits. Zbl 1421.94042Catalano, Dario; Fiore, Dario 2 2018 Incremental deterministic public-key encryption. Zbl 1421.94064Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil 2 2018 A black-box construction of non-malleable encryption from semantically secure encryption. Zbl 1426.94091Choi, Seung Geol; Dachman-Soled, Dana; Malkin, Tal; Wee, Hoeteck 2 2018 Robust encryption. Zbl 1444.94035Abdalla, Michel; Bellare, Mihir; Neven, Gregory 1 2018 Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick 1 2018 Deterministic encryption with the Thorp shuffle. Zbl 1444.94092Morris, Ben; Rogaway, Phillip; Stegers, Till 1 2018 Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Zbl 1444.94069Hazay, Carmit 1 2018 On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112Asharov, Gilad; Segev, Gil 1 2018 Key-recovery attacks on \(\mathsf{ASASA}\). Zbl 1400.94166Minaud, Brice; Derbez, Patrick; Fouque, Pierre-Alain; Karpman, Pierre 1 2018 Related-key security for pseudorandom functions beyond the linear barrier. Zbl 1442.94029Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G. 1 2018 Minimizing the two-round Even-Mansour cipher. Zbl 1442.94033Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John 1 2018 An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 17 2017 The hunting of the SNARK. Zbl 1386.94066Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran 15 2017 A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480Asharov, Gilad; Lindell, Yehuda 13 2017 Differential-linear cryptanalysis revisited. Zbl 1377.94038Blondeau, Céline; Leander, Gregor; Nyberg, Kaisa 8 2017 Shorter quasi-adaptive NIZK proofs for linear subspaces. Zbl 1386.94078Jutla, Charanjit S.; Roy, Arnab 6 2017 More efficient oblivious transfer extensions. Zbl 1377.94030Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael 5 2017 Jacobian coordinates on genus 2 curves. Zbl 1377.94053Hisil, Huseyin; Costello, Craig 5 2017 Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1386.94067Cohen, Ran; Lindell, Yehuda 4 2017 Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. Zbl 1377.94034Barak, Boaz; Mahmoody, Mohammad 3 2017 Short signatures from Diffie-Hellman: realizing almost compact public key. Zbl 1377.94072Seo, Jae Hong 3 2017 Lattices with symmetry. Zbl 1377.94060Lenstra, H. W. jun.; Silverberg, A. 3 2017 Secret-sharing for NP. Zbl 1377.94057Komargodski, Ilan; Naor, Moni; Yogev, Eylon 3 2017 Authenticated confidential channel establishment and the security of TLS-DHE. Zbl 1386.94095Jager, Tibor; Kohlar, Florian; Schäge, Sven; Schwenk, Jörg 3 2017 Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1377.94056Kiltz, Eike; O’Neill, Adam; Smith, Adam 2 2017 ...and 453 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 5,447 Authors 46 Susilo, Willy 38 Shparlinski, Igor E. 30 Hazay, Carmit 27 De Santis, Alfredo 27 Ostrovsky, Rafail 27 Stinson, Douglas Robert 26 Mu, Yi 25 Kiltz, Eike 25 Lindell, Yehuda 25 Wang, Huaxiong 23 Cao, Zhenfu 23 Ishai, Yuval 23 Pass, Rafael 22 Bellare, Mihir 22 Dunkelman, Orr 22 Qi, Wenfeng 21 Applebaum, Benny 21 Carlet, Claude 21 Galbraith, Steven D. 21 Hofheinz, Dennis 21 Lin, Dongdai 21 Rijmen, Vincent 21 Sarkar, Palash 20 Menezes, Alfred J. 20 Padró, Carles 20 Venkitasubramaniam, Muthuramakrishnan 19 Jager, Tibor 19 Libert, Benoît 19 Segev, Gil 18 Bitansky, Nir 18 Calderini, Marco 18 Hu, Lei 18 Katz, Jonathan N. 18 Vaikuntanathan, Vinod 18 Vaudenay, Serge 18 Yung, Moti 18 Zhang, Fangguo 17 Blundo, Carlo 17 Canetti, Ran 17 Keller, Nathan 17 Maurer, Ueli M. 16 Damgård, Ivan Bjerre 16 Haitner, Iftach 16 Komargodski, Ilan 16 Mesnager, Sihem 16 Seurin, Yannick 16 Shamir, Adi 16 Smart, Nigel Paul 16 Tan, Chik How 16 Venturi, Daniele 15 Farràs, Oriol 15 Goldreich, Oded 15 Maitra, Subhamoy 15 Nandi, Mridul 15 Sarkar, Santanu 15 Tessaro, Stefano 15 Waters, Brent 14 Herranz, Javier 14 Johansson, Thomas 14 Knudsen, Lars Ramkilde 14 Li, Chao 14 Nishimaki, Ryo 14 Takagi, Tsuyoshi 14 Takayasu, Atsushi 14 Wichs, Daniel 13 Beimel, Amos 13 Cheon, Jung Hee 13 Fischlin, Marc 13 Guo, Fuchun 13 Kurosawa, Kaoru 13 Ling, San 13 Petit, Christophe 13 Pointcheval, David 13 Sala, Massimiliano 13 Tibouchi, Mehdi 13 Vergnaud, Damien 13 Wu, Wenling 13 Yang, Guomin 12 Abe, Masayuki 12 Aragona, Riccardo 12 Asharov, Gilad 12 Bogdanov, Andrey 12 Brakerski, Zvika 12 Dinur, Itai 12 Emura, Keita 12 Fuchsbauer, Georg 12 Goyal, Vipul 12 Pasalic, Enes 12 Pietrzak, Krzysztof 12 Qu, Longjiang 12 Sahai, Amit 12 Wang, Meiqin 11 Biham, Eli 11 Boneh, Dan 11 Costello, Craig 11 Gu, Dawu 11 Hanaoka, Goichiro 11 Hu, Yupu 11 Lange, Tanja 11 Mendel, Florian ...and 5,347 more Authors all top 5 Cited in 296 Journals 338 Journal of Cryptology 336 Designs, Codes and Cryptography 166 Theoretical Computer Science 122 Information Processing Letters 120 Information Sciences 102 Cryptography and Communications 97 Quantum Information Processing 86 Journal of Mathematical Cryptology 83 Finite Fields and their Applications 68 Discrete Applied Mathematics 60 Mathematics of Computation 46 Applicable Algebra in Engineering, Communication and Computing 44 Journal of Discrete Mathematical Sciences & Cryptography 40 International Journal of Theoretical Physics 40 Matematicheskie Voprosy Kriptografii 36 Advances in Mathematics of Communications 32 Information and Computation 31 Applied Mathematics and Computation 31 SIAM Journal on Computing 30 Journal of Computer and System Sciences 26 International Journal of Foundations of Computer Science 24 Discrete Mathematics 22 Science China. Information Sciences 22 Prikladnaya Diskretnaya Matematika 21 International Journal of Computer Mathematics 20 Journal of Number Theory 19 Computers & Mathematics with Applications 18 Journal of Symbolic Computation 16 LMS Journal of Computation and Mathematics 15 Algorithmica 15 Mathematical and Computer Modelling 15 Mathematical Problems in Engineering 14 Journal of Complexity 14 Wuhan University Journal of Natural Sciences (WUJNS) 14 International Journal of Quantum Information 14 Groups, Complexity, Cryptology 13 Distributed Computing 12 Soft Computing 12 Journal of Systems Science and Complexity 11 Cybernetics and Systems Analysis 10 Computational Complexity 10 Journal of Modern Optics 10 Science in China. Series F 9 Experimental Mathematics 9 New Journal of Physics 9 Journal of Applied Mathematics 8 Chaos, Solitons and Fractals 8 Journal of Computer Science and Technology 8 Discrete Mathematics and Applications 8 Discrete Mathematics, Algorithms and Applications 7 Computing 7 Journal of Computational and Applied Mathematics 7 Journal of Automated Reasoning 7 Journal of Mathematical Sciences (New York) 7 Nonlinear Dynamics 7 Physical Review Letters 6 Bulletin of the Australian Mathematical Society 6 Acta Applicandae Mathematicae 6 Formal Aspects of Computing 6 MSCS. Mathematical Structures in Computer Science 6 Theory of Computing Systems 6 The Journal of Logic and Algebraic Programming 6 JSIAM Letters 5 Journal of Algebra 5 Journal of Combinatorial Theory. Series A 5 SIAM Journal on Discrete Mathematics 5 Automation and Remote Control 5 Linear Algebra and its Applications 5 Pattern Recognition 5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 5 Journal of Shanghai Jiaotong University (Science) 5 Science China. Mathematics 5 Symmetry 5 Arabian Journal for Science and Engineering 4 Communications in Algebra 4 Physics Letters. A 4 Journal of Statistical Planning and Inference 4 European Journal of Combinatorics 4 Japan Journal of Industrial and Applied Mathematics 4 Games and Economic Behavior 4 Tatra Mountains Mathematical Publications 4 Applied Mathematics. Series B (English Edition) 4 Journal of Combinatorial Optimization 4 Acta Mathematica Sinica. English Series 4 Electronic Commerce Research 4 Journal of Applied Mathematics and Computing 4 Mathematical Biosciences and Engineering 4 Mathematics in Computer Science 3 Periodica Mathematica Hungarica 3 Problems of Information Transmission 3 Archiv der Mathematik 3 International Journal of Game Theory 3 Proceedings of the Japan Academy. Series A 3 Theory and Decision 3 Transactions of the American Mathematical Society 3 Cryptologia 3 Acta Mathematicae Applicatae Sinica. English Series 3 Journal of Parallel and Distributed Computing 3 Discrete Event Dynamic Systems 3 Journal of Applied Non-Classical Logics ...and 196 more Journals all top 5 Cited in 52 Fields 3,522 Information and communication theory, circuits (94-XX) 1,131 Computer science (68-XX) 720 Number theory (11-XX) 350 Quantum theory (81-XX) 324 Algebraic geometry (14-XX) 180 Combinatorics (05-XX) 77 Group theory and generalizations (20-XX) 77 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 59 Order, lattices, ordered algebraic structures (06-XX) 49 Field theory and polynomials (12-XX) 42 Statistics (62-XX) 42 Numerical analysis (65-XX) 40 Probability theory and stochastic processes (60-XX) 32 Operations research, mathematical programming (90-XX) 26 Dynamical systems and ergodic theory (37-XX) 25 Mathematical logic and foundations (03-XX) 20 Geometry (51-XX) 18 Associative rings and algebras (16-XX) 17 Commutative algebra (13-XX) 17 Linear and multilinear algebra; matrix theory (15-XX) 8 Systems theory; control (93-XX) 7 Convex and discrete geometry (52-XX) 5 Optics, electromagnetic theory (78-XX) 5 Statistical mechanics, structure of matter (82-XX) 4 General and overarching topics; collections (00-XX) 4 History and biography (01-XX) 4 Mechanics of particles and systems (70-XX) 4 Geophysics (86-XX) 4 Biology and other natural sciences (92-XX) 3 General algebraic systems (08-XX) 3 Difference and functional equations (39-XX) 3 Abstract harmonic analysis (43-XX) 2 Special functions (33-XX) 2 Partial differential equations (35-XX) 2 Approximations and expansions (41-XX) 2 Harmonic analysis on Euclidean spaces (42-XX) 2 Fluid mechanics (76-XX) 1 Nonassociative rings and algebras (17-XX) 1 Category theory; homological algebra (18-XX) 1 Topological groups, Lie groups (22-XX) 1 Real functions (26-XX) 1 Measure and integration (28-XX) 1 Functions of a complex variable (30-XX) 1 Ordinary differential equations (34-XX) 1 Sequences, series, summability (40-XX) 1 Functional analysis (46-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 General topology (54-XX) 1 Manifolds and cell complexes (57-XX) 1 Global analysis, analysis on manifolds (58-XX) 1 Relativity and gravitational theory (83-XX) 1 Mathematics education (97-XX) Citations by Year