Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 818 results
Sort by: relevance publication year

Journal of Cryptology

JOURNAL published

Guest editors' introduction

JOURNAL ARTICLE published January 1991 in Journal of Cryptology

Authors: Thomas A. Berson | Rainer A. Rueppel

Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions

JOURNAL ARTICLE published October 2020 in Journal of Cryptology

Authors: Benoît Libert | Moti Yung

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver

JOURNAL ARTICLE published March 1999 in Journal of Cryptology

Authors: Shai Halevi

A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation

JOURNAL ARTICLE published January 2017 in Journal of Cryptology

Authors: Gilad Asharov | Yehuda Lindell

Bucket Hashing and Its Application to Fast Message Authentication

JOURNAL ARTICLE published March 1999 in Journal of Cryptology

Authors: Phillip Rogaway

Jacobian Coordinates on Genus 2 Curves

JOURNAL ARTICLE published April 2017 in Journal of Cryptology

Authors: Huseyin Hisil | Craig Costello

Hyperelliptic cryptosystems

JOURNAL ARTICLE published October 1989 in Journal of Cryptology

Authors: Neal Koblitz

Secure Integration of Asymmetric and Symmetric Encryption Schemes

JOURNAL ARTICLE published January 2013 in Journal of Cryptology

Authors: Eiichiro Fujisaki | Tatsuaki Okamoto

Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier

JOURNAL ARTICLE published January 2017 in Journal of Cryptology

Authors: Ivan Damgård | Sebastian Faust | Pratyay Mukherjee | Daniele Venturi

On Tight Security Proofs for Schnorr Signatures

JOURNAL ARTICLE published April 2019 in Journal of Cryptology

Authors: Nils Fleischhacker | Tibor Jager | Dominique Schröder

Securely Obfuscating Re-Encryption

JOURNAL ARTICLE published October 2011 in Journal of Cryptology

Authors: Susan Hohenberger | Guy N. Rothblum | Abhi Shelat | Vinod Vaikuntanathan

Discrete Logarithm Problems with Auxiliary Inputs

JOURNAL ARTICLE published July 2010 in Journal of Cryptology

Authors: Jung Hee Cheon

Updating Key Size Estimations for Pairings

JOURNAL ARTICLE published October 2019 in Journal of Cryptology

Authors: Razvan Barbulescu | Sylvain Duquesne

Editorial

JOURNAL ARTICLE published January 1988 in Journal of Cryptology

Authors: Ernest F. Brickell

Simple and Generic Constructions of Succinct Functional Encryption

JOURNAL ARTICLE published July 2021 in Journal of Cryptology

Authors: Fuyuki Kitagawa | Ryo Nishimaki | Keisuke Tanaka

The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives

JOURNAL ARTICLE published January 2006 in Journal of Cryptology

Authors: Yan-Cheng Chang | Chun-Yuan Hsiao | Chi-Jen Lu

Authenticated Adversarial Routing

JOURNAL ARTICLE published October 2014 in Journal of Cryptology

Authors: Yair Amir | Paul Bunn | Rafail Ostrovsky

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions

JOURNAL ARTICLE published July 2009 in Journal of Cryptology

Authors: J. Black | M. Cochran | T. Shrimpton

Cryptanalysis of Full RIPEMD-128

JOURNAL ARTICLE published October 2016 in Journal of Cryptology

Authors: Franck Landelle | Thomas Peyrin