×

zbMATH — the first resource for mathematics

Journal of Cryptology

The Journal of the International Association for Cryptologic Research

Short Title: J. Cryptology
Publisher: Springer US, New York, NY
ISSN: 0933-2790; 1432-1378/e
Online: http://link.springer.com/journal/volumesAndIssues/145
Comments: Indexed cover-to-cover
Documents Indexed: 683 Publications (since 1988)
References Indexed: 507 Publications with 18,171 References.
all top 5

Latest Issues

34, No. 4 (2021)
34, No. 3 (2021)
34, No. 2 (2021)
34, No. 1 (2021)
33, No. 4 (2020)
33, No. 3 (2020)
33, No. 2 (2020)
33, No. 1 (2020)
32, No. 4 (2019)
32, No. 3 (2019)
32, No. 2 (2019)
32, No. 1 (2019)
31, No. 4 (2018)
31, No. 3 (2018)
31, No. 2 (2018)
31, No. 1 (2018)
30, No. 4 (2017)
30, No. 3 (2017)
30, No. 2 (2017)
30, No. 1 (2017)
29, No. 4 (2016)
29, No. 3 (2016)
29, No. 2 (2016)
29, No. 1 (2016)
28, No. 4 (2015)
28, No. 3 (2015)
28, No. 2 (2015)
28, No. 1 (2015)
27, No. 4 (2014)
27, No. 3 (2014)
27, No. 2 (2014)
27, No. 1 (2014)
26, No. 4 (2013)
26, No. 3 (2013)
26, No. 2 (2013)
26, No. 1 (2013)
25, No. 4 (2012)
25, No. 3 (2012)
25, No. 2 (2012)
25, No. 1 (2012)
24, No. 4 (2011)
24, No. 3 (2011)
24, No. 2 (2011)
24, No. 1 (2011)
23, No. 4 (2010)
23, No. 3 (2010)
23, No. 2 (2010)
23, No. 1 (2010)
22, No. 4 (2009)
22, No. 3 (2009)
22, No. 2 (2009)
22, No. 1 (2009)
21, No. 4 (2008)
21, No. 3 (2008)
21, No. 2 (2008)
21, No. 1 (2008)
20, No. 4 (2007)
20, No. 3 (2007)
20, No. 2 (2007)
20, No. 1 (2007)
19, No. 4 (2006)
19, No. 3 (2006)
19, No. 2 (2006)
19, No. 1 (2006)
18, No. 4 (2005)
18, No. 3 (2005)
18, No. 2 (2005)
18, No. 1 (2005)
17, No. 4 (2004)
17, No. 3 (2004)
17, No. 2 (2004)
17, No. 1 (2004)
16, No. 4 (2003)
16, No. 3 (2003)
16, No. 2 (2003)
16, No. 1 (2003)
15, No. 4 (2002)
15, No. 3 (2002)
15, No. 2 (2002)
15, No. 1 (2001)
14, No. 4 (2001)
14, No. 3 (2001)
14, No. 2 (2001)
14, No. 1 (2001)
13, No. 4 (2000)
13, No. 3 (2000)
13, No. 2 (2000)
13, No. 1 (2000)
12, No. 4 (1999)
12, No. 3 (1999)
12, No. 2 (1999)
12, No. 1 (1999)
11, No. 4 (1998)
11, No. 3 (1998)
11, No. 2 (1998)
11, No. 1 (1998)
10, No. 4 (1997)
10, No. 3 (1997)
10, No. 2 (1997)
10, No. 1 (1997)
...and 29 more Volumes
all top 5

Authors

29 Lindell, Yehuda
17 Hazay, Carmit
17 Shamir, Adi
15 Biham, Eli
14 Katz, Jonathan N.
14 Segev, Gil
12 Bellare, Mihir
12 Canetti, Ran
12 Dunkelman, Orr
12 Goldreich, Oded
12 Keller, Nathan
12 Knudsen, Lars Ramkilde
11 Hofheinz, Dennis
11 Kiltz, Eike
11 Maurer, Ueli M.
11 Naor, Moni
10 Applebaum, Benny
10 Gennaro, Rosario
10 Ostrovsky, Rafail
10 Stinson, Douglas Robert
9 Ishai, Yuval
9 Pinkas, Benny
9 Rogaway, Phillip
9 Shoup, Victor
9 Smart, Nigel P.
8 Damgård, Ivan Bjerre
7 Abdalla, Michel
7 Beimel, Amos
7 Coppersmith, Don
7 De Santis, Alfredo
7 Halevi, Shai
7 Jager, Tibor
7 Kushilevitz, Eyal
7 Rosen, Alon
6 Asharov, Gilad
6 Boyar, Joan F.
6 Catalano, Dario
6 Dinur, Itai
6 Garay, Juan A.
6 Groth, Jens
6 Haitner, Iftach
6 Rabin, Tal
6 Stern, Jacques
6 Vaudenay, Serge
6 Yung, Moti
5 Abe, Masayuki
5 Blundo, Carlo
5 Boneh, Dan
5 Brakerski, Zvika
5 Brassard, Gilles
5 Coron, Jean-Sébastien
5 Dachman-Soled, Dana
5 Faust, Sebastian
5 Golić, Jovan Dj.
5 Joux, Antoine
5 Komargodski, Ilan
5 Malkin, Tal G.
5 Omri, Eran
5 Pointcheval, David
5 Reingold, Omer
5 Reyzin, Leonid
5 Unruh, Dominique
5 Vanstone, Scott Alexander
5 Venkitasubramaniam, Muthuramakrishnan
5 Venturi, Daniele
5 Wichs, Daniel
4 Benhamouda, Fabrice
4 Bitansky, Nir
4 Cash, David M.
4 Cohen, Ran
4 Desmedt, Yvo G.
4 Fiat, Amos
4 Fischlin, Marc
4 Galbraith, Steven D.
4 Johansson, Thomas
4 Klapper, Andrew M.
4 Koblitz, Neal I.
4 Kurosawa, Kaoru
4 Leander, Gregor
4 Magliveras, Spyros S.
4 Malone-Lee, John
4 Meier, Willi
4 Micali, Silvio
4 Murphy, Sean
4 Namprempre, Chanathip
4 Naya-Plasencia, María
4 Neven, Gregory
4 Nyberg, Kaisa
4 Pass, Rafael
4 Peralta, René C.
4 Peyrin, Thomas
4 Rivest, Ronald Linn
4 Schnorr, Claus Peter
4 Schröder, Dominique
4 Tassa, Tamir
4 Tibouchi, Mehdi
4 Vadhan, Salil P.
4 Waters, Brent
4 Zarosim, Hila
3 Biryukov, Alex
...and 832 more Authors

Publications by Year

Citations contained in zbMATH Open

482 Publications have been cited 5,097 times in 3,304 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
229
1991
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P.
137
1991
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques
116
2000
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
85
2000
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don
80
1997
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John
79
1992
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
78
2004
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni
77
1991
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David
76
1988
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn
72
2010
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S.
70
2004
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J.
68
1999
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal
65
1989
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M.
63
1991
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
63
1988
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo
59
1993
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar
58
1989
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z.
48
2009
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
48
2008
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P.
45
2001
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M.
44
2005
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel
42
1996
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R.
42
1992
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo
42
1995
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark
39
1997
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer
38
1999
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair
38
1994
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
37
2009
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio
37
1996
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R.
37
1990
The size of a share must be large. Zbl 0897.94012
Csirmaz, László
36
1997
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather
36
1988
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay
35
1997
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
32
1994
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine
32
2004
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R.
30
2001
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın
30
2008
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni
29
1996
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran
29
2002
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.
28
1999
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir
27
2007
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan
27
2012
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal
26
1998
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
26
2002
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
26
2003
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge
26
2003
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde
26
1995
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao
25
1993
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
25
2002
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli
25
2000
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo
24
1992
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor
23
2000
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P.
23
1999
A key distribution system equivalent to factoring. Zbl 0659.94003
McCurley, Kevin S.
23
1988
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris
23
1990
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim
23
2003
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P.
23
2008
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques
22
1998
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D.
22
1992
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
21
2008
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin
21
2011
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
20
2006
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E.
19
2002
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M.
19
2000
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M.
19
1992
An implementation for a fast public-key cryptosystem. Zbl 0725.94002
Agnew, G. B.; Mullin, R. C.; Onyszchuk, I. M.; Vanstone, S. A.
19
1991
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P.
19
2004
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
18
2005
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David
18
2011
Fully leakage-resilient signatures. Zbl 1335.94089
Boyle, Elette; Segev, Gil; Wichs, Daniel
18
2013
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Zbl 1075.94011
Verheul, Eric R.
18
2004
Cryptanalysis of MD4. Zbl 0972.94033
Dobbertin, Hans
17
1998
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
17
2001
Another look at “provable security”. Zbl 1115.68078
Koblitz, Neal; Menezes, Alfred J.
17
2007
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal
17
2007
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan
17
2007
A public key cryptosystem based on non-abelian finite groups. Zbl 1168.94005
Lempken, Wolfgang; van Trung, Tran; Magliveras, Spyros S.; Wei, Wandi
16
2009
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M.
16
1992
The structured design of cryptographically good s-boxes. Zbl 0711.94016
Adams, Carlisle; Tavares, Stafford
16
1990
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
16
2011
Secure communication in minimal connectivity models. Zbl 0957.68042
Franklin, Matthew; Wright, Rebecca N.
16
2000
Some constructions and bounds for authentication codes. Zbl 0654.94011
Stinson, D. R.
15
1988
Is the data encryption standard a group? (Results of cycling experiments on DES). Zbl 0658.94008
Kaliski, Burton S. jun.; Rivest, Ronald L.; Sherman, Alan T.
15
1988
Key-minimal cryptosystems for unconditional secrecy. Zbl 0711.94015
Godlewski, Philippe; Mitchell, Chris
15
1990
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Zbl 0733.68006
Beaver, Donald
15
1991
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
15
2012
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San
15
2011
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael
15
2011
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R.
15
2008
Information-theoretic bounds for authentication codes and block designs. Zbl 0839.94008
Pei, Dingyi
14
1995
On key storage in secure networks. Zbl 0840.94015
Dyer, Martin; Fenner, Trevor; Frieze, Alan; Thomason, Andrew
14
1995
Bounds on secret key exchange using a random deal of cards. Zbl 0851.94018
Fischer, Michael J.; Wright, Rebecca N.
14
1996
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Philip
14
2001
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki
14
2013
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
13
2005
Multipartite secret sharing by bivariate interpolation. Zbl 1159.94373
Tassa, Tamir; Dyn, Nira
13
2009
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
13
2008
A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069
Goldreich, Oded
13
1993
A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. Zbl 0701.94008
Simmons, Gustavus J.
13
1990
Building curves with arbitrary small MOV degree over finite prime fields. Zbl 1084.94014
Dupont, Régis; Enge, Andreas; Morain, François
13
2005
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 07376832
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina
1
2021
Selfie: reflections on TLS 1.3 with PSK. Zbl 07376833
Drucker, Nir; Gueron, Shay
1
2021
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 07380416
Diemert, Denis; Jager, Tibor
1
2021
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
3
2020
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel
2
2020
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza
2
2020
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi
1
2020
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail
1
2020
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
1
2020
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng
1
2020
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain
3
2019
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel
2
2019
Koblitz curves over quadratic fields. Zbl 1466.94034
Oliveira, Thomaz; López, Julio; Cervantes-Vázquez, Daniel; Rodríguez-Henríquez, Francisco
2
2019
Small CRT-exponent RSA revisited. Zbl 1435.94140
Takayasu, Atsushi; Lu, Yao; Peng, Liqiang
1
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
1
2019
Fully secure functional encryption with a large class of relations from the decisional linear assumption. Zbl 1435.94138
Okamoto, Tatsuaki; Takashima, Katsuyuki
1
2019
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud
5
2018
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
4
2018
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
How many queries are needed to distinguish a truncated random permutation from a random function? Zbl 1421.94030
Gilboa, Shoni; Gueron, Shay; Morris, Ben
3
2018
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
3
2018
Efficient slide attacks. Zbl 1400.94116
Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan
2
2018
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
2
2018
Making the impossible possible. Zbl 1421.94041
Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin
2
2018
Function-private functional encryption in the private-key setting. Zbl 1426.94085
Brakerski, Zvika; Segev, Gil
2
2018
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. Zbl 1444.94043
Bai, Shi; Lepoint, Tancrède; Roux-Langlois, Adeline; Sakzad, Amin; Stehlé, Damien; Steinfeld, Ron
2
2018
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112
Asharov, Gilad; Segev, Gil
1
2018
Incremental deterministic public-key encryption. Zbl 1421.94064
Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil
1
2018
A black-box construction of non-malleable encryption from semantically secure encryption. Zbl 1426.94091
Choi, Seung Geol; Dachman-Soled, Dana; Malkin, Tal; Wee, Hoeteck
1
2018
Minimizing the two-round Even-Mansour cipher. Zbl 1442.94033
Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John
1
2018
Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050
Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick
1
2018
Characterization of secure multiparty computation without broadcast. Zbl 1444.94056
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior
1
2018
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
10
2017
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
10
2017
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge
4
2017
Shorter quasi-adaptive NIZK proofs for linear subspaces. Zbl 1386.94078
Jutla, Charanjit S.; Roy, Arnab
3
2017
More efficient oblivious transfer extensions. Zbl 1377.94030
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
3
2017
Differential-linear cryptanalysis revisited. Zbl 1377.94038
Blondeau, Céline; Leander, Gregor; Nyberg, Kaisa
3
2017
Short signatures from Diffie-Hellman: realizing almost compact public key. Zbl 1377.94072
Seo, Jae Hong
2
2017
Lattices with symmetry. Zbl 1377.94060
Lenstra, H. W. jun.; Silverberg, A.
2
2017
Non-malleable coding against bit-wise and split-state tampering. Zbl 1370.94497
Cheraghchi, Mahdi; Guruswami, Venkatesan
2
2017
Secret-sharing for NP. Zbl 1377.94057
Komargodski, Ilan; Naor, Moni; Yogev, Eylon
2
2017
From private simultaneous messages to zero-information Arthur-Merlin protocols and back. Zbl 1386.94062
Applebaum, Benny; Raykov, Pavel
1
2017
Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. Zbl 1377.94034
Barak, Boaz; Mahmoody, Mohammad
1
2017
Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1377.94056
Kiltz, Eike; O’Neill, Adam; Smith, Adam
1
2017
Weak locking capacity of quantum channels can be much larger than private capacity. Zbl 1370.81043
Winter, Andreas
1
2017
Bounded tamper resilience: how to go beyond the algebraic barrier. Zbl 1370.94501
Damgård, Ivan; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele
1
2017
Efficient cryptosystems from \(2^k\)-th power residue symbols. Zbl 1377.94035
Benhamouda, Fabrice; Herranz, Javier; Joye, Marc; Libert, Benoît
1
2017
Photonic side-channel analysis of arbiter PUFs. Zbl 1377.94065
Tajik, Shahin; Nedospasov, Dmitry; Seifert, Jean-Pierre; Dietz, Enrico; Frohmann, Sven; Dittrich, Helmar; Hübers, Heinz-Wilhelm; Helfmeier, Clemens; Boit, Christian
1
2017
Jacobian coordinates on genus 2 curves. Zbl 1377.94053
Hisil, Huseyin; Costello, Craig
1
2017
Enhanced public key security for the McEliece cryptosystem. Zbl 1351.94024
Baldi, Marco; Bianchi, Marco; Chiaraluce, Franco; Rosenthal, Joachim; Schipani, Davide
7
2016
Secret-sharing schemes for very dense graphs. Zbl 1355.94047
Beimel, Amos; Farràs, Oriol; Mintz, Yuval
6
2016
Structure-preserving signatures and commitments to group elements. Zbl 1355.94042
Abe, Masayuki; Fuchsbauer, Georg; Groth, Jens; Haralambiev, Kristiyan; Ohkubo, Miyako
6
2016
Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
5
2016
Efficient set intersection with simulation-based security. Zbl 1351.94044
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny
5
2016
Breaking RSA may be as difficult as factoring. Zbl 1351.94030
Brown, Daniel R. L.
5
2016
How to build an ideal cipher: the indifferentiability of the Feistel construction. Zbl 1351.94037
Coron, Jean-Sébastien; Holenstein, Thomas; Künzler, Robin; Patarin, Jacques; Seurin, Yannick; Tessaro, Stefano
3
2016
Constant-size structure-preserving signatures: generic constructions and simple assumptions. Zbl 1365.94395
Abe, Masayuki; Chase, Melissa; David, Bernardo; Kohlweiss, Markulf; Nishimaki, Ryo; Ohkubo, Miyako
3
2016
Fast cut-and-choose-based protocols for malicious and covert adversaries. Zbl 1355.94068
Lindell, Yehuda
2
2016
Leakage-resilient cryptography from minimal assumptions. Zbl 1348.94054
Hazay, Carmit; López-Alt, Adriana; Wee, Hoeteck; Wichs, Daniel
2
2016
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2016
Limits on the usefulness of random oracles. Zbl 1355.94060
Haitner, Iftach; Omri, Eran; Zarosim, Hila
1
2016
An optimally fair coin toss. Zbl 1348.94070
Moran, Tal; Naor, Moni; Segev, Gil
1
2016
Tightly secure signatures from lossy identification schemes. Zbl 1348.94026
Abdalla, Michel; Fouque, Pierre-Alain; Lyubashevsky, Vadim; Tibouchi, Mehdi
1
2016
New second-preimage attacks on hash functions. Zbl 1365.94397
Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien
1
2016
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
Toward a game theoretic view of secure computation. Zbl 1365.94475
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
1
2016
Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography. Zbl 1356.94086
Tsaban, Boaz
12
2015
The rebound attack and subspace distinguishers: application to Whirlpool. Zbl 1314.94082
Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent
10
2015
GNUC: a new universal composability framework. Zbl 1356.94062
Hofheinz, Dennis; Shoup, Victor
7
2015
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2015
Confined guessing: new signatures from standard assumptions. Zbl 1308.94060
Böhl, Florian; Hofheinz, Dennis; Jager, Tibor; Koch, Jessica; Striecks, Christoph
5
2015
A unified approach to deterministic encryption: new constructions and a connection to computational entropy. Zbl 1356.94057
Fuller, Benjamin; O’Neill, Adam; Reyzin, Leonid
5
2015
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Zbl 1308.94059
Bellare, Mihir; Hofheinz, Dennis; Kiltz, Eike
3
2015
Quantum private information retrieval has linear communication complexity. Zbl 1335.68084
Baumeler, Ämin; Broadbent, Anne
3
2015
Reflection cryptanalysis of PRINCE-like ciphers. Zbl 1356.94082
Soleimany, Hadi; Blondeau, Céline; Yu, Xiaoli; Wu, Wenling; Nyberg, Kaisa; Zhang, Huiling; Zhang, Lei; Wang, Yanfeng
3
2015
From non-adaptive to adaptive pseudorandom functions. Zbl 1314.94056
Berman, Itay; Haitner, Iftach
2
2015
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086
Lindell, Yehuda; Pinkas, Benny
2
2015
Protocols for multiparty coin toss with a dishonest majority. Zbl 1356.94049
Beimel, Amos; Omri, Eran; Orlov, Ilan
2
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Cryptanalysis of SHA-0 and reduced SHA-1. Zbl 1334.94061
Biham, Eli; Chen, Rafi; Joux, Antoine
1
2015
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Efficient recursive diffusion layers for block ciphers and hash functions. Zbl 1367.94342
Sajadieh, Mahdi; Dakhilalian, Mohammad; Mala, Hamid; Sepehrdad, Pouyan
1
2015
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
1
2015
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
How to achieve perfect simulation and a complete problem for non-interactive perfect zero-knowledge. Zbl 1356.94076
Malka, Lior
1
2015
Tight security for signature schemes without random oracles. Zbl 1356.94091
Schäge, Sven
1
2015
Almost-everywhere secure computation with edge corruptions. Zbl 1332.94062
Chandran, Nishanth; Garay, Juan A.; Ostrovsky, Rafail
1
2015
New proofs for NMAC and HMAC: security without collision resistance. Zbl 1332.94056
Bellare, Mihir
1
2015
(Non-)random sequences from (non-)random permutations – analysis of RC4 stream cipher. Zbl 1350.94049
Sen Gupta, Sourav; Maitra, Subhamoy; Paul, Goutam; Sarkar, Santanu
9
2014
Key-dependent message security: generic amplification and completeness. Zbl 1302.94033
Applebaum, Benny
8
2014
Using symmetries in the index calculus for elliptic curves discrete logarithm. Zbl 1320.94063
Faugère, Jean-Charles; Gaudry, Pierrick; Huot, Louise; Renault, Guénaël
7
2014
On best-possible obfuscation. Zbl 1302.94048
Goldwasser, Shafi; Rothblum, Guy N.
5
2014
Concurrent zero knowledge, revisited. Zbl 1350.94048
Pass, Rafael; Dustin Tseng, Wei-Lung; Venkitasubramaniam, Muthuramakrishnan
5
2014
Verifiable random functions: relations to identity-based key encapsulation and new constructions. Zbl 1302.94031
Abdalla, Michel; Catalano, Dario; Fiore, Dario
4
2014
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. Zbl 1297.94088
Longa, Patrick; Sica, Francesco
4
2014
On strong simulation and composable point obfuscation. Zbl 1296.94086
Bitansky, Nir; Canetti, Ran
3
2014
Robust multi-property combiners for hash functions. Zbl 1302.94046
Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof
2
2014
Computationally secure pattern matching in the presence of malicious adversaries. Zbl 1297.94075
Hazay, Carmit; Toft, Tomas
2
2014
...and 382 more Documents
all top 5

Cited by 4,299 Authors

38 Susilo, Willy
37 Shparlinski, Igor E.
27 De Santis, Alfredo
26 Mu, Yi
25 Stinson, Douglas Robert
23 Cao, Zhenfu
23 Hazay, Carmit
23 Lindell, Yehuda
20 Kiltz, Eike
20 Menezes, Alfred J.
20 Qi, Wenfeng
20 Wang, Huaxiong
19 Bellare, Mihir
19 Carlet, Claude
19 Galbraith, Steven D.
19 Hofheinz, Dennis
19 Ostrovsky, Rafail
19 Padró, Carles
19 Rijmen, Vincent
19 Sarkar, Palash
17 Blundo, Carlo
17 Pass, Rafael
16 Dunkelman, Orr
16 Ishai, Yuval
16 Katz, Jonathan N.
16 Keller, Nathan
15 Applebaum, Benny
15 Tan, Chik How
15 Yung, Moti
15 Zhang, Fangguo
14 Calderini, Marco
14 Canetti, Ran
14 Farràs, Oriol
14 Herranz, Javier
14 Knudsen, Lars Ramkilde
14 Segev, Gil
14 Venturi, Daniele
13 Johansson, Thomas
13 Lin, Dongdai
13 Sala, Massimiliano
13 Sarkar, Santanu
13 Shamir, Adi
13 Smart, Nigel P.
13 Vaikuntanathan, Vinod
13 Venkitasubramaniam, Muthuramakrishnan
13 Yang, Guomin
12 Damgård, Ivan Bjerre
12 Hu, Lei
12 Libert, Benoît
12 Maitra, Subhamoy
12 Sahai, Amit
12 Seurin, Yannick
12 Takayasu, Atsushi
12 Vaudenay, Serge
11 Bitansky, Nir
11 Boneh, Dan
11 Fuchsbauer, Georg
11 Goldreich, Oded
11 Guo, Fuchun
11 Jager, Tibor
11 Komargodski, Ilan
11 Kurosawa, Kaoru
11 Maurer, Ueli M.
11 Qu, Longjiang
11 Takagi, Tsuyoshi
11 Wong, Duncan S.
10 Aragona, Riccardo
10 Beimel, Amos
10 Biham, Eli
10 Di Crescenzo, Giovanni
10 Dinur, Itai
10 Du, Beiliang
10 Golić, Jovan Dj.
10 Gu, Dawu
10 Haitner, Iftach
10 Hu, Yupu
10 Joye, Marc
10 Klapper, Andrew M.
10 Li, Chao
10 Mendel, Florian
10 Peralta, René C.
10 Pietrzak, Krzysztof
10 Rogaway, Phillip
10 Tang, Chunming
10 Vaccaro, Ugo
10 Vergnaud, Damien
10 Waters, Brent
10 Wu, Qianhong
9 Abe, Masayuki
9 Bogdanov, Andrey
9 Budaghyan, Lilya
9 Chen, Kefei
9 Cheon, Jung Hee
9 Emura, Keita
9 Fischlin, Marc
9 Gennaro, Rosario
9 Hanaoka, Goichiro
9 Joux, Antoine
9 Lange, Tanja
9 Ling, San
...and 4,199 more Authors
all top 5

Cited in 258 Journals

313 Journal of Cryptology
305 Designs, Codes and Cryptography
149 Theoretical Computer Science
116 Information Processing Letters
112 Information Sciences
81 Journal of Mathematical Cryptology
80 Cryptography and Communications
74 Finite Fields and their Applications
63 Discrete Applied Mathematics
60 Mathematics of Computation
57 Quantum Information Processing
43 Applicable Algebra in Engineering, Communication and Computing
33 Advances in Mathematics of Communications
32 Matematicheskie Voprosy Kriptografii
30 International Journal of Theoretical Physics
30 Applied Mathematics and Computation
30 Information and Computation
29 Journal of Computer and System Sciences
26 International Journal of Foundations of Computer Science
23 Discrete Mathematics
22 SIAM Journal on Computing
22 Science China. Information Sciences
21 Prikladnaya Diskretnaya Matematika
20 International Journal of Computer Mathematics
20 Journal of Discrete Mathematical Sciences & Cryptography
19 Computers & Mathematics with Applications
19 Journal of Number Theory
18 Journal of Symbolic Computation
16 LMS Journal of Computation and Mathematics
15 Algorithmica
15 Mathematical and Computer Modelling
15 Mathematical Problems in Engineering
14 Wuhan University Journal of Natural Sciences (WUJNS)
14 International Journal of Quantum Information
14 Groups, Complexity, Cryptology
13 Journal of Complexity
12 Distributed Computing
12 Journal of Systems Science and Complexity
11 Cybernetics and Systems Analysis
10 Soft Computing
10 Journal of Modern Optics
10 Science in China. Series F
9 Computational Complexity
9 Experimental Mathematics
9 New Journal of Physics
9 Journal of Applied Mathematics
8 Chaos, Solitons and Fractals
8 Journal of Computer Science and Technology
8 Discrete Mathematics and Applications
8 Discrete Mathematics, Algorithms and Applications
7 Computing
7 Journal of Computational and Applied Mathematics
7 Journal of Automated Reasoning
7 Journal of Mathematical Sciences (New York)
7 Nonlinear Dynamics
7 Physical Review Letters
6 Bulletin of the Australian Mathematical Society
6 Acta Applicandae Mathematicae
6 Formal Aspects of Computing
6 MSCS. Mathematical Structures in Computer Science
6 The Journal of Logic and Algebraic Programming
6 JSIAM Letters
5 SIAM Journal on Discrete Mathematics
5 Automation and Remote Control
5 Pattern Recognition
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Theory of Computing Systems
5 Journal of Shanghai Jiaotong University (Science)
5 Science China. Mathematics
5 Symmetry
5 Arabian Journal for Science and Engineering
4 Journal of Statistical Planning and Inference
4 European Journal of Combinatorics
4 Japan Journal of Industrial and Applied Mathematics
4 Games and Economic Behavior
4 Linear Algebra and its Applications
4 Tatra Mountains Mathematical Publications
4 Applied Mathematics. Series B (English Edition)
4 Journal of Combinatorial Optimization
4 Acta Mathematica Sinica. English Series
4 Electronic Commerce Research
4 Journal of Applied Mathematics and Computing
3 Communications in Algebra
3 Physics Letters. A
3 Problems of Information Transmission
3 Archiv der Mathematik
3 International Journal of Game Theory
3 Journal of Algebra
3 Journal of Combinatorial Theory. Series A
3 Proceedings of the Japan Academy. Series A
3 Theory and Decision
3 Cryptologia
3 Acta Mathematicae Applicatae Sinica. English Series
3 Journal of Parallel and Distributed Computing
3 Discrete Event Dynamic Systems
3 Journal of Applied Non-Classical Logics
3 Journal de Théorie des Nombres de Bordeaux
3 Lobachevskii Journal of Mathematics
3 International Journal of Modern Physics C
3 Entropy
...and 158 more Journals
all top 5

Cited in 47 Fields

2,728 Information and communication theory, circuits (94-XX)
888 Computer science (68-XX)
625 Number theory (11-XX)
283 Algebraic geometry (14-XX)
216 Quantum theory (81-XX)
152 Combinatorics (05-XX)
65 Group theory and generalizations (20-XX)
57 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
56 Order, lattices, ordered algebraic structures (06-XX)
43 Field theory and polynomials (12-XX)
37 Numerical analysis (65-XX)
34 Statistics (62-XX)
32 Probability theory and stochastic processes (60-XX)
25 Dynamical systems and ergodic theory (37-XX)
23 Operations research, mathematical programming (90-XX)
19 Mathematical logic and foundations (03-XX)
17 Commutative algebra (13-XX)
17 Geometry (51-XX)
15 Associative rings and algebras (16-XX)
11 Linear and multilinear algebra; matrix theory (15-XX)
8 Systems theory; control (93-XX)
6 Convex and discrete geometry (52-XX)
5 Optics, electromagnetic theory (78-XX)
4 General and overarching topics; collections (00-XX)
4 History and biography (01-XX)
4 Geophysics (86-XX)
3 Difference and functional equations (39-XX)
3 Abstract harmonic analysis (43-XX)
3 Biology and other natural sciences (92-XX)
2 General algebraic systems (08-XX)
2 Real functions (26-XX)
2 Special functions (33-XX)
2 Approximations and expansions (41-XX)
2 Mechanics of particles and systems (70-XX)
2 Fluid mechanics (76-XX)
1 Category theory; homological algebra (18-XX)
1 Topological groups, Lie groups (22-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Partial differential equations (35-XX)
1 Harmonic analysis on Euclidean spaces (42-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 General topology (54-XX)
1 Statistical mechanics, structure of matter (82-XX)
1 Relativity and gravitational theory (83-XX)
1 Mathematics education (97-XX)

Citations by Year