![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Cryptology, Volume 35
Volume 35, Number 1, January 2022
- Siyao Guo, Pritish Kamath, Alon Rosen
, Katerina Sotiraki
:
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange. 1 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. 2 - Marek Sýs
, Lubomír Obrátil, Vashek Matyás, Dusan Klinec:
A Bad Day to Die Hard: Correcting the Dieharder Battery. 3 - Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem:
From Fairness to Full Security in Multiparty Computation. 4 - Dragos Rotaru
, Nigel P. Smart
, Titouan Tanguy
, Frederik Vercauteren
, Tim Wood
:
Actively Secure Setup for SPDZ. 5
Volume 35, Number 2, April 2022
- Gilad Asharov
, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass
, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. 6 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. 7 - Roy Radian, Or Sattath
:
Semi-quantum Money. 8 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
CCA Security and Trapdoor Functions via Key-Dependent-Message Security. 9 - Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky:
On the Round Complexity of Randomized Byzantine Agreement. 10 - Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and their Applications. 11 - Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat, Ran Cohen:
Multiparty Generation of an RSA Modulus. 12 - Carmit Hazay, Emmanuela Orsini
, Peter Scholl, Eduardo Soria-Vazquez:
TinyKeys: A New Approach to Efficient Multi-Party Computation. 13 - Ivan Damgård, Claudio Orlandi, Akira Takahashi
, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. 14
Volume 35, Number 3, July 2022
- Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:
Succinct Non-Interactive Arguments via Linear Interactive Proofs. 15 - Susumu Kiyoshima:
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance. 16 - Keitaro Hashimoto
, Shuichi Katsumata, Kris Kwiatkowski
, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable. 17 - Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. 18 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Obfustopia Built on Secret-Key Functional Encryption. 19 - Bernardo Magri, Giulio Malavolta
, Dominique Schröder, Dominique Unruh:
Everlasting UC Commitments from Fully Malicious PUFs. 20 - Gilad Asharov
, Ilan Komargodski, Rafael Pass
, Naomi Sirkin:
On the Complexity of Compressing Obfuscation. 21 - Charles Grover, Andrew Mendelsohn
, Cong Ling, Roope Vehkalahti:
Non-commutative Ring Learning with Errors from Cyclic Algebras. 22
Volume 35, Number 4, October 2022
- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
ZK-PCPs from Leakage-Resilient Secret Sharing. 23 - Wouter Castryck
, Jana Sotáková
, Frederik Vercauteren:
Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory: Extended Version. 24 - Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)Security of ROS. 25 - Jiaxin Pan
, Chen Qian
, Magnus Ringerud
:
Signed (Group) Diffie-Hellman Key Exchange with Tight Security. 26 - Ittai Abraham, Gilad Asharov
, Avishay Yanai:
Efficient Perfectly Secure Computation with Optimal Resilience. 27 - Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. 28 - Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. 29
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.