×

Journal of Cryptology

The Journal of the International Association for Cryptologic Research

Short Title: J. Cryptology
Publisher: Springer US, New York, NY
ISSN: 0933-2790; 1432-1378/e
Online: http://link.springer.com/journal/volumesAndIssues/145
Comments: Indexed cover-to-cover
Documents Indexed: 710 Publications (since 1988)
References Indexed: 534 Publications with 19,747 References.
all top 5

Latest Issues

35, No. 4 (2022)
35, No. 3 (2022)
35, No. 2 (2022)
35, No. 1 (2022)
34, No. 4 (2021)
34, No. 3 (2021)
34, No. 2 (2021)
34, No. 1 (2021)
33, No. 4 (2020)
33, No. 3 (2020)
33, No. 2 (2020)
33, No. 1 (2020)
32, No. 4 (2019)
32, No. 3 (2019)
32, No. 2 (2019)
32, No. 1 (2019)
31, No. 4 (2018)
31, No. 3 (2018)
31, No. 2 (2018)
31, No. 1 (2018)
30, No. 4 (2017)
30, No. 3 (2017)
30, No. 2 (2017)
30, No. 1 (2017)
29, No. 4 (2016)
29, No. 3 (2016)
29, No. 2 (2016)
29, No. 1 (2016)
28, No. 4 (2015)
28, No. 3 (2015)
28, No. 2 (2015)
28, No. 1 (2015)
27, No. 4 (2014)
27, No. 3 (2014)
27, No. 2 (2014)
27, No. 1 (2014)
26, No. 4 (2013)
26, No. 3 (2013)
26, No. 2 (2013)
26, No. 1 (2013)
25, No. 4 (2012)
25, No. 3 (2012)
25, No. 2 (2012)
25, No. 1 (2012)
24, No. 4 (2011)
24, No. 3 (2011)
24, No. 2 (2011)
24, No. 1 (2011)
23, No. 4 (2010)
23, No. 3 (2010)
23, No. 2 (2010)
23, No. 1 (2010)
22, No. 4 (2009)
22, No. 3 (2009)
22, No. 2 (2009)
22, No. 1 (2009)
21, No. 4 (2008)
21, No. 3 (2008)
21, No. 2 (2008)
21, No. 1 (2008)
20, No. 4 (2007)
20, No. 3 (2007)
20, No. 2 (2007)
20, No. 1 (2007)
19, No. 4 (2006)
19, No. 3 (2006)
19, No. 2 (2006)
19, No. 1 (2006)
18, No. 4 (2005)
18, No. 3 (2005)
18, No. 2 (2005)
18, No. 1 (2005)
17, No. 4 (2004)
17, No. 3 (2004)
17, No. 2 (2004)
17, No. 1 (2004)
16, No. 4 (2003)
16, No. 3 (2003)
16, No. 2 (2003)
16, No. 1 (2003)
15, No. 4 (2002)
15, No. 3 (2002)
15, No. 2 (2002)
15, No. 1 (2001)
14, No. 4 (2001)
14, No. 3 (2001)
14, No. 2 (2001)
14, No. 1 (2001)
13, No. 4 (2000)
13, No. 3 (2000)
13, No. 2 (2000)
13, No. 1 (2000)
12, No. 4 (1999)
12, No. 3 (1999)
12, No. 2 (1999)
12, No. 1 (1999)
11, No. 4 (1998)
11, No. 3 (1998)
11, No. 2 (1998)
11, No. 1 (1998)
...and 33 more Volumes
all top 5

Authors

30 Lindell, Yehuda
19 Hazay, Carmit
17 Shamir, Adi
15 Biham, Eli
14 Katz, Jonathan N.
14 Segev, Gil
12 Bellare, Mihir
12 Canetti, Ran
12 Dunkelman, Orr
12 Goldreich, Oded
12 Ishai, Yuval
12 Keller, Nathan
12 Knudsen, Lars Ramkilde
11 Hofheinz, Dennis
11 Kiltz, Eike
11 Maurer, Ueli M.
11 Naor, Moni
11 Ostrovsky, Rafail
10 Applebaum, Benny
10 Gennaro, Rosario
10 Smart, Nigel P.
10 Stinson, Douglas Robert
9 Damgård, Ivan Bjerre
9 Pinkas, Benny
9 Rogaway, Phillip
9 Shoup, Victor
8 Asharov, Gilad
8 Haitner, Iftach
8 Rosen, Alon
7 Abdalla, Michel
7 Beimel, Amos
7 Cohen, Ran
7 Coppersmith, Don
7 De Santis, Alfredo
7 Halevi, Shai
7 Jager, Tibor
7 Kushilevitz, Eyal
6 Bitansky, Nir
6 Boyar, Joan F.
6 Catalano, Dario
6 Dinur, Itai
6 Garay, Juan A.
6 Groth, Jens
6 Komargodski, Ilan
6 Omri, Eran
6 Pass, Rafael
6 Rabin, Tal
6 Stern, Jacques
6 Unruh, Dominique
6 Vaudenay, Serge
6 Venkitasubramaniam, Muthuramakrishnan
6 Yung, Moti
5 Abe, Masayuki
5 Benhamouda, Fabrice
5 Blundo, Carlo
5 Bogdanov, Andrej
5 Boneh, Dan
5 Brakerski, Zvika
5 Brassard, Gilles
5 Coron, Jean-Sébastien
5 Dachman-Soled, Dana
5 Faust, Sebastian
5 Golić, Jovan Dj.
5 Joux, Antoine
5 Malkin, Tal G.
5 Naya-Plasencia, María
5 Nishimaki, Ryo
5 Pointcheval, David
5 Reingold, Omer
5 Reyzin, Leonid
5 Schröder, Dominique
5 Tibouchi, Mehdi
5 Vanstone, Scott Alexander
5 Venturi, Daniele
5 Wichs, Daniel
4 Cash, David M.
4 Desmedt, Yvo G.
4 Fiat, Amos
4 Fischlin, Marc
4 Galbraith, Steven D.
4 Johansson, Thomas
4 Kiyoshima, Susumu
4 Klapper, Andrew M.
4 Koblitz, Neal I.
4 Kurosawa, Kaoru
4 Leander, Gregor
4 Magliveras, Spyros S.
4 Malone-Lee, John
4 Meier, Willi
4 Micali, Silvio
4 Murphy, Sean
4 Namprempre, Chanathip
4 Neven, Gregory
4 Nyberg, Kaisa
4 Peralta, René C.
4 Peyrin, Thomas
4 Rivest, Ronald Linn
4 Schnorr, Claus Peter
4 Tanaka, Keisuke
4 Tassa, Tamir
...and 878 more Authors

Publications by Year

Citations contained in zbMATH Open

547 Publications have been cited 6,273 times in 4,032 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
274
1991
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P.
168
1991
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques
143
2000
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
110
2000
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don
96
1997
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni
96
1991
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
91
2004
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John
90
1992
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J.
88
1999
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David
85
1988
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn
80
2010
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S.
72
2004
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M.
69
1991
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
69
1988
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo
68
1993
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z.
67
2009
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal
67
1989
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar
66
1989
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
59
2009
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair
57
1994
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
57
2008
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel
55
1996
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer
47
1999
The size of a share must be large. Zbl 0897.94012
Csirmaz, László
46
1997
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P.
46
2001
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M.
45
2005
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark
44
1997
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay
43
1997
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo
43
1995
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R.
42
1992
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio
41
1996
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
40
1994
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın
39
2008
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R.
39
1990
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather
39
1988
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
35
2003
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni
34
1996
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde
34
1995
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki
34
2013
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli
33
2000
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine
33
2004
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao
32
1993
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R.
32
2001
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran
32
2002
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir
31
2007
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin
31
2011
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge
29
2003
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal
29
2007
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.
28
1999
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan
28
2012
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal
27
1998
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P.
27
1999
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
27
2002
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
26
2002
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
26
2012
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
25
2008
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
25
2005
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques
25
1998
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P.
25
2008
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
25
2012
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo
24
1992
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P.
24
2004
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris
24
1990
A key distribution system equivalent to factoring. Zbl 0659.94003
McCurley, Kevin S.
24
1988
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David
24
2011
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D.
23
1992
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor
23
2000
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim
23
2003
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E.
23
2002
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M.
22
1992
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M.
22
2000
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R.
22
2008
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San
22
2011
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M.
21
1992
An implementation for a fast public-key cryptosystem. Zbl 0725.94002
Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A.
21
1991
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
21
2001
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
20
2006
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
19
2003
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011
Verheul, Eric R.
19
2004
Another look at “provable security”. Zbl 1115.68078
Koblitz, Neal; Menezes, Alfred J.
19
2007
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan
19
2007
Fully leakage-resilient signatures. Zbl 1335.94089
Boyle, Elette; Segev, Gil; Wichs, Daniel
19
2013
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Philip
18
2001
Cryptanalysis of MD4. Zbl 0972.94033
Dobbertin, Hans
18
1998
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
18
2011
Logic minimization techniques with applications to cryptology. Zbl 1279.94056
Boyar, Joan; Matthews, Philip; Peralta, René
18
2013
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael
18
2011
A public key cryptosystem based on non-abelian finite groups. Zbl 1168.94005
Lempken, Wolfgang; van Trung, Tran; Magliveras, Spyros S.; Wei, Wandi
17
2009
A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069
Goldreich, Oded
17
1993
The structured design of cryptographically good s-boxes. Zbl 0711.94016
Adams, Carlisle; Tavares, Stafford
17
1990
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Zbl 0733.68006
Beaver, Donald
17
1991
Is the data encryption standard a group? (Results of cycling experiments on DES). Zbl 0658.94008
Kaliski, Burton S. jun.; Rivest, Ronald L.; Sherman, Alan T.
17
1988
Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431
Bender, Adam; Katz, Jonathan; Morselli, Ruggero
16
2009
Secure communication in minimal connectivity models. Zbl 0957.68042
Franklin, Matthew; Wright, Rebecca N.
16
2000
Bounds on secret key exchange using a random deal of cards. Zbl 0851.94018
Fischer, Michael J.; Wright, Rebecca N.
16
1996
Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016
Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti
16
1998
Securing threshold cryptosystems against chosen ciphertext attack. Zbl 0997.94016
Shoup, Victor; Gennaro, Rosario
16
2002
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
16
2019
Key-minimal cryptosystems for unconditional secrecy. Zbl 0711.94015
Godlewski, Philippe; Mitchell, Chris
16
1990
Multipartite secret sharing by bivariate interpolation. Zbl 1159.94373
Tassa, Tamir; Dyn, Nira
15
2009
Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina
2
2022
Actively secure setup for SPDZ. Zbl 1481.94122
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim
2
2022
From fairness to full security in multiparty computation. Zbl 1486.94091
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
1
2022
On the round complexity of randomized Byzantine agreement. Zbl 1489.94092
Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex
1
2022
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
9
2021
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082
Diemert, Denis; Jager, Tibor
7
2021
Fine-grained cryptography revisited. Zbl 1469.94094
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke
2
2021
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina
2
2021
The design and evolution of OCB. Zbl 1472.94056
Krovetz, Ted; Rogaway, Phillip
2
2021
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
2
2021
Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026
Applebaum, Benny; Vasudevan, Prashant Nalini
2
2021
The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081
Kaspers, Christian; Zhou, Yue
2
2021
Simple and generic constructions of succinct functional encryption. Zbl 1469.94103
Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke
1
2021
Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 07376834
Kim, Sam; Wu, David J.
1
2021
Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin
1
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
1
2021
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111
Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph
1
2021
Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025
Applebaum, Benny; Brakerski, Zvika
1
2021
On subversion-resistant SNARKs. Zbl 1467.94021
Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał
1
2021
Is there an oblivious RAM lower bound for online reads? Zbl 07367489
Weiss, Mor; Wichs, Daniel
1
2021
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas
11
2020
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika
7
2020
Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155
Galbraith, Steven D.; Petit, Christophe; Silva, Javier
4
2020
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
4
2020
Efficient and scalable universal circuits. Zbl 1462.94027
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
4
2020
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel
3
2020
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza
3
2020
Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099
Beyne, Tim
2
2020
The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
2
2020
Efficient verifiable delay functions. Zbl 1453.94125
Wesolowski, Benjamin
2
2020
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
1
2020
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
1
2020
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng
1
2020
Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127
Bitansky, Nir
1
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
1
2020
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi
1
2020
Tight security of cascaded LRW2. Zbl 1457.94141
Jha, Ashwin; Nandi, Mridul
1
2020
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail
1
2020
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel
1
2020
Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo
1
2020
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
16
2019
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel
8
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
4
2019
On tight security proofs for Schnorr signatures. Zbl 1434.94065
Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique
4
2019
Small CRT-exponent RSA revisited. Zbl 1435.94140
Takayasu, Atsushi; Lu, Yao; Peng, Liqiang
3
2019
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. Zbl 1435.94145
Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier
2
2019
Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2019
Efficient RSA key generation and threshold Paillier in the two-party setting. Zbl 1434.94068
Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal; Toft, Tomas; Nicolosi, Angelo Agatino
2
2019
Improved combinatorial algorithms for the inhomogeneous short integer solution problem. Zbl 1435.11144
Bai, Shi; Galbraith, Steven D.; Li, Liangze; Sheffield, Daniel
2
2019
Unifying leakage models: from probing attacks to noisy leakage. Zbl 1435.94128
Duc, Alexandre; Dziembowski, Stefan; Faust, Sebastian
2
2019
Probabilistic termination and composability of cryptographic protocols. Zbl 1466.94022
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis
2
2019
Koblitz curves over quadratic fields. Zbl 1466.94034
Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco
2
2019
Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138
Okamoto, Tatsuaki; Takashima, Katsuyuki
1
2019
Multidimensional linear cryptanalysis. Zbl 1435.94132
Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa
1
2019
On the tightness of forward-secure signature reductions. Zbl 1435.94119
Abdalla, Michel; Benhamouda, Fabrice; Pointcheval, David
1
2019
On the impossibility of structure-preserving deterministic primitives. Zbl 1435.94120
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria
1
2019
The magic of ELFs. Zbl 1466.94040
Zhandry, Mark
1
2019
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
1
2019
Efficient fully structure-preserving signatures and shrinking commitments. Zbl 1466.94018
Abe, Masayuki; Groth, Jens; Kohlweiss, Markulf; Ohkubo, Miyako; Tibouchi, Mehdi
1
2019
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
13
2018
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud
11
2018
Making the impossible possible. Zbl 1421.94041
Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin
6
2018
How many queries are needed to distinguish a truncated random permutation from a random function? Zbl 1421.94030
Gilboa, Shoni; Gueron, Shay; Morris, Ben
6
2018
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
6
2018
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. Zbl 1444.94043
Bai, Shi; Lepoint, Tancrède; Roux-Langlois, Adeline; Sakzad, Amin; Stehlé, Damien; Steinfeld, Ron
6
2018
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
4
2018
Function-private functional encryption in the private-key setting. Zbl 1426.94085
Brakerski, Zvika; Segev, Gil
4
2018
Efficient slide attacks. Zbl 1400.94116
Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2018
Asymptotically efficient lattice-based digital signatures. Zbl 1400.94165
Lyubashevsky, Vadim; Micciancio, Daniele
3
2018
Characterization of secure multiparty computation without broadcast. Zbl 1444.94056
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
3
2018
Practical homomorphic message authenticators for arithmetic circuits. Zbl 1421.94042
Catalano, Dario; Fiore, Dario
2
2018
A black-box construction of non-malleable encryption from semantically secure encryption. Zbl 1426.94091
Choi, Seung Geol; Dachman-Soled, Dana; Malkin, Tal; Wee, Hoeteck
2
2018
Related-key security for pseudorandom functions beyond the linear barrier. Zbl 1442.94029
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G.
1
2018
Minimizing the two-round Even-Mansour cipher. Zbl 1442.94033
Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John
1
2018
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112
Asharov, Gilad; Segev, Gil
1
2018
Key-recovery attacks on \(\mathsf{ASASA}\). Zbl 1400.94166
Minaud, Brice; Derbez, Patrick; Fouque, Pierre-Alain; Karpman, Pierre
1
2018
Incremental deterministic public-key encryption. Zbl 1421.94064
Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil
1
2018
Robust encryption. Zbl 1444.94035
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
1
2018
Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050
Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick
1
2018
Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Zbl 1444.94069
Hazay, Carmit
1
2018
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge
14
2017
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
14
2017
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
12
2017
Differential-linear cryptanalysis revisited. Zbl 1377.94038
Blondeau, Céline; Leander, Gregor; Nyberg, Kaisa
7
2017
Jacobian coordinates on genus 2 curves. Zbl 1377.94053
Hisil, Huseyin; Costello, Craig
5
2017
More efficient oblivious transfer extensions. Zbl 1377.94030
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
5
2017
Shorter quasi-adaptive NIZK proofs for linear subspaces. Zbl 1386.94078
Jutla, Charanjit S.; Roy, Arnab
5
2017
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1386.94067
Cohen, Ran; Lindell, Yehuda
4
2017
Secret-sharing for NP. Zbl 1377.94057
Komargodski, Ilan; Naor, Moni; Yogev, Eylon
3
2017
Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. Zbl 1377.94034
Barak, Boaz; Mahmoody, Mohammad
3
2017
Short signatures from Diffie-Hellman: realizing almost compact public key. Zbl 1377.94072
Seo, Jae Hong
3
2017
Lattices with symmetry. Zbl 1377.94060
Lenstra, H. W. jun.; Silverberg, A.
3
2017
Bounded tamper resilience: how to go beyond the algebraic barrier. Zbl 1370.94501
Damgård, Ivan; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele
2
2017
Non-malleable coding against bit-wise and split-state tampering. Zbl 1370.94497
Cheraghchi, Mahdi; Guruswami, Venkatesan
2
2017
Efficient cryptosystems from \(2^k\)-th power residue symbols. Zbl 1377.94035
Benhamouda, Fabrice; Herranz, Javier; Joye, Marc; Libert, Benoît
2
2017
Weak locking capacity of quantum channels can be much larger than private capacity. Zbl 1370.81043
Winter, Andreas
1
2017
Dynamic proofs of retrievability via oblivious RAM. Zbl 1372.68085
Cash, David; Küpçü, Alptekin; Wichs, Daniel
1
2017
Security of blind signatures revisited. Zbl 1377.94063
Schröder, Dominique; Unruh, Dominique
1
2017
Photonic side-channel analysis of arbiter PUFs. Zbl 1377.94065
Tajik, Shahin; Nedospasov, Dmitry; Seifert, Jean-Pierre; Dietz, Enrico; Frohmann, Sven; Dittrich, Helmar; Hübers, Heinz-Wilhelm; Helfmeier, Clemens; Boit, Christian
1
2017
...and 447 more Documents
all top 5

Cited by 5,158 Authors

45 Susilo, Willy
37 Shparlinski, Igor E.
30 Hazay, Carmit
27 De Santis, Alfredo
27 Ostrovsky, Rafail
27 Stinson, Douglas Robert
26 Mu, Yi
25 Kiltz, Eike
25 Lindell, Yehuda
25 Wang, Huaxiong
23 Cao, Zhenfu
23 Ishai, Yuval
23 Pass, Rafael
22 Bellare, Mihir
22 Dunkelman, Orr
22 Qi, Wenfeng
21 Carlet, Claude
21 Galbraith, Steven D.
21 Hofheinz, Dennis
21 Rijmen, Vincent
20 Applebaum, Benny
20 Menezes, Alfred J.
20 Padró, Carles
20 Sarkar, Palash
20 Venkitasubramaniam, Muthuramakrishnan
19 Jager, Tibor
19 Lin, Dongdai
19 Segev, Gil
18 Katz, Jonathan N.
18 Libert, Benoît
18 Vaikuntanathan, Vinod
18 Vaudenay, Serge
18 Yung, Moti
17 Blundo, Carlo
17 Calderini, Marco
17 Canetti, Ran
17 Keller, Nathan
16 Bitansky, Nir
16 Haitner, Iftach
16 Komargodski, Ilan
16 Seurin, Yannick
16 Shamir, Adi
16 Tan, Chik How
16 Venturi, Daniele
16 Zhang, Fangguo
15 Damgård, Ivan Bjerre
15 Farràs, Oriol
15 Maitra, Subhamoy
15 Maurer, Ueli M.
15 Waters, Brent
14 Goldreich, Oded
14 Herranz, Javier
14 Hu, Lei
14 Johansson, Thomas
14 Knudsen, Lars Ramkilde
14 Sarkar, Santanu
14 Smart, Nigel P.
14 Takayasu, Atsushi
14 Tessaro, Stefano
13 Beimel, Amos
13 Cheon, Jung Hee
13 Guo, Fuchun
13 Kurosawa, Kaoru
13 Li, Chao
13 Ling, San
13 Mesnager, Sihem
13 Petit, Christophe
13 Pointcheval, David
13 Sala, Massimiliano
13 Tibouchi, Mehdi
13 Wichs, Daniel
13 Yang, Guomin
12 Aragona, Riccardo
12 Bogdanov, Andrey
12 Dinur, Itai
12 Emura, Keita
12 Fuchsbauer, Georg
12 Nandi, Mridul
12 Nishimaki, Ryo
12 Pietrzak, Krzysztof
12 Qu, Longjiang
12 Sahai, Amit
12 Takagi, Tsuyoshi
12 Vergnaud, Damien
12 Wang, Meiqin
11 Asharov, Gilad
11 Biham, Eli
11 Boneh, Dan
11 Brakerski, Zvika
11 Fischlin, Marc
11 Goyal, Vipul
11 Hanaoka, Goichiro
11 Hu, Yupu
11 Lange, Tanja
11 Mendel, Florian
11 Naor, Moni
11 Nielsen, Jesper Buus
11 Omri, Eran
11 Sasaki, Yu
11 Vercauteren, Frederik
...and 5,058 more Authors
all top 5

Cited in 289 Journals

334 Designs, Codes and Cryptography
333 Journal of Cryptology
164 Theoretical Computer Science
121 Information Processing Letters
120 Information Sciences
98 Cryptography and Communications
85 Journal of Mathematical Cryptology
80 Finite Fields and their Applications
66 Discrete Applied Mathematics
60 Mathematics of Computation
57 Quantum Information Processing
45 Applicable Algebra in Engineering, Communication and Computing
40 Journal of Discrete Mathematical Sciences & Cryptography
39 International Journal of Theoretical Physics
38 Matematicheskie Voprosy Kriptografii
35 Advances in Mathematics of Communications
32 Information and Computation
31 Applied Mathematics and Computation
31 SIAM Journal on Computing
30 Journal of Computer and System Sciences
26 International Journal of Foundations of Computer Science
24 Discrete Mathematics
23 Prikladnaya Diskretnaya Matematika
22 Science China. Information Sciences
21 International Journal of Computer Mathematics
19 Computers & Mathematics with Applications
19 Journal of Number Theory
18 Journal of Symbolic Computation
16 LMS Journal of Computation and Mathematics
15 Algorithmica
15 Mathematical and Computer Modelling
15 Mathematical Problems in Engineering
14 Wuhan University Journal of Natural Sciences (WUJNS)
14 International Journal of Quantum Information
14 Groups, Complexity, Cryptology
13 Journal of Complexity
12 Distributed Computing
12 Journal of Systems Science and Complexity
11 Cybernetics and Systems Analysis
11 Soft Computing
10 Computational Complexity
10 Journal of Modern Optics
10 Science in China. Series F
9 Chaos, Solitons and Fractals
9 Experimental Mathematics
9 New Journal of Physics
9 Journal of Applied Mathematics
8 Journal of Computer Science and Technology
8 Discrete Mathematics and Applications
8 Discrete Mathematics, Algorithms and Applications
7 Computing
7 Journal of Computational and Applied Mathematics
7 Journal of Automated Reasoning
7 Journal of Mathematical Sciences (New York)
7 Nonlinear Dynamics
7 Physical Review Letters
6 Bulletin of the Australian Mathematical Society
6 Acta Applicandae Mathematicae
6 Formal Aspects of Computing
6 MSCS. Mathematical Structures in Computer Science
6 The Journal of Logic and Algebraic Programming
6 JSIAM Letters
5 Journal of Algebra
5 SIAM Journal on Discrete Mathematics
5 Automation and Remote Control
5 Linear Algebra and its Applications
5 Pattern Recognition
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Theory of Computing Systems
5 Mathematical Biosciences and Engineering
5 Journal of Shanghai Jiaotong University (Science)
5 Science China. Mathematics
5 Symmetry
5 Arabian Journal for Science and Engineering
4 Communications in Algebra
4 Physics Letters. A
4 Journal of Combinatorial Theory. Series A
4 Journal of Statistical Planning and Inference
4 European Journal of Combinatorics
4 Japan Journal of Industrial and Applied Mathematics
4 Games and Economic Behavior
4 Tatra Mountains Mathematical Publications
4 Applied Mathematics. Series B (English Edition)
4 Journal of Combinatorial Optimization
4 Acta Mathematica Sinica. English Series
4 Electronic Commerce Research
4 Journal of Applied Mathematics and Computing
4 Mathematics in Computer Science
3 Periodica Mathematica Hungarica
3 Problems of Information Transmission
3 Archiv der Mathematik
3 International Journal of Game Theory
3 Proceedings of the Japan Academy. Series A
3 Theory and Decision
3 Cryptologia
3 Acta Mathematicae Applicatae Sinica. English Series
3 Journal of Parallel and Distributed Computing
3 Discrete Event Dynamic Systems
3 Journal of Applied Non-Classical Logics
3 Journal de Théorie des Nombres de Bordeaux
...and 189 more Journals
all top 5

Cited in 50 Fields

3,378 Information and communication theory, circuits (94-XX)
1,095 Computer science (68-XX)
695 Number theory (11-XX)
315 Algebraic geometry (14-XX)
301 Quantum theory (81-XX)
172 Combinatorics (05-XX)
74 Group theory and generalizations (20-XX)
74 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
58 Order, lattices, ordered algebraic structures (06-XX)
45 Field theory and polynomials (12-XX)
43 Numerical analysis (65-XX)
41 Statistics (62-XX)
39 Probability theory and stochastic processes (60-XX)
29 Operations research, mathematical programming (90-XX)
26 Dynamical systems and ergodic theory (37-XX)
24 Mathematical logic and foundations (03-XX)
18 Geometry (51-XX)
17 Commutative algebra (13-XX)
16 Linear and multilinear algebra; matrix theory (15-XX)
16 Associative rings and algebras (16-XX)
8 Systems theory; control (93-XX)
7 Convex and discrete geometry (52-XX)
5 Optics, electromagnetic theory (78-XX)
4 General and overarching topics; collections (00-XX)
4 History and biography (01-XX)
4 Statistical mechanics, structure of matter (82-XX)
4 Geophysics (86-XX)
4 Biology and other natural sciences (92-XX)
3 General algebraic systems (08-XX)
3 Difference and functional equations (39-XX)
3 Abstract harmonic analysis (43-XX)
3 Mechanics of particles and systems (70-XX)
2 Topological groups, Lie groups (22-XX)
2 Special functions (33-XX)
2 Approximations and expansions (41-XX)
2 Harmonic analysis on Euclidean spaces (42-XX)
2 Manifolds and cell complexes (57-XX)
2 Fluid mechanics (76-XX)
1 Category theory; homological algebra (18-XX)
1 Real functions (26-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Partial differential equations (35-XX)
1 Sequences, series, summability (40-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Differential geometry (53-XX)
1 General topology (54-XX)
1 Relativity and gravitational theory (83-XX)
1 Mathematics education (97-XX)

Citations by Year