Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 818 results
Sort by: relevance publication year

A generalization of Hellman's extension to Shannon's approach to cryptography

JOURNAL ARTICLE published October 1989 in Journal of Cryptology

Authors: Pierre Beauchemin | Gilles Brassard

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

JOURNAL ARTICLE published October 2020 in Journal of Cryptology

Authors: Akiko Inoue | Tetsu Iwata | Kazuhiko Minematsu | Bertram Poettering

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles

JOURNAL ARTICLE published April 2013 in Journal of Cryptology

Authors: Steve Lu | Rafail Ostrovsky | Amit Sahai | Hovav Shacham | Brent Waters

Journal of Cryptology

JOURNAL published

Guest editors' introduction

JOURNAL ARTICLE published January 1991 in Journal of Cryptology

Authors: Thomas A. Berson | Rainer A. Rueppel

White-Box Cryptography: Don’t Forget About Grey-Box Attacks

JOURNAL ARTICLE published October 2019 in Journal of Cryptology

Authors: Estuardo Alpirez Bock | Joppe W. Bos | Chris Brzuska | Charles Hubain | Wil Michiels | Cristofaro Mune | Eloi Sanfelix Gonzalez | Philippe Teuwen | Alexander Treff

Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions

JOURNAL ARTICLE published October 2020 in Journal of Cryptology

Authors: Benoît Libert | Moti Yung

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver

JOURNAL ARTICLE published March 1999 in Journal of Cryptology

Authors: Shai Halevi

Editorial

JOURNAL ARTICLE published January 1988 in Journal of Cryptology

Authors: Ernest F. Brickell

A secure protocol for the oblivious transfer (extended abstract)

JOURNAL ARTICLE published June 1996 in Journal of Cryptology

Authors: M. J. Fischer | S. Micali | C. Rackoff

Low Bandwidth Dynamic Traitor Tracing Schemes

JOURNAL ARTICLE published April 2005 in Journal of Cryptology

Authors: Tamir Tassa

An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable

JOURNAL ARTICLE published July 2022 in Journal of Cryptology

Authors: Keitaro Hashimoto | Shuichi Katsumata | Kris Kwiatkowski | Thomas Prest

The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives

JOURNAL ARTICLE published January 2006 in Journal of Cryptology

Authors: Yan-Cheng Chang | Chun-Yuan Hsiao | Chi-Jen Lu

Authenticated Adversarial Routing

JOURNAL ARTICLE published October 2014 in Journal of Cryptology

Authors: Yair Amir | Paul Bunn | Rafail Ostrovsky

A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

JOURNAL ARTICLE published July 2006 in Journal of Cryptology

Authors: Yehuda Lindell

Efficient Implementation of Pairing-Based Cryptosystems

JOURNAL ARTICLE published September 2004 in Journal of Cryptology

Authors: Paulo S. L. M. Barreto | Ben Lynn | Michael Scott

Cryptanalysis of SHA-0 and Reduced SHA-1

JOURNAL ARTICLE published January 2015 in Journal of Cryptology

Authors: Eli Biham | Rafi Chen | Antoine Joux

Efficient Slide Attacks

JOURNAL ARTICLE published July 2018 in Journal of Cryptology

Authors: Achiya Bar-On | Eli Biham | Orr Dunkelman | Nathan Keller

Robust and Efficient Sharing of RSA Functions

JOURNAL ARTICLE published July 2007 in Journal of Cryptology

Authors: Rosario Gennaro | Tal Rabin | Stanislav Jarecki | Hugo Krawczyk

The Full Cost of Cryptanalytic Attacks

JOURNAL ARTICLE published March 2004 in Journal of Cryptology

Authors: Michael J. Wiener