


default search action
Journal of Cryptology, Volume 19
Volume 19, Number 1, January 2006
- Jan Denef, Frederik Vercauteren

:
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2. 1-25 - Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson:

Threshold Password-Authenticated Key Exchange. 27-66 - Jonathan Katz, Moti Yung:

Characterization of Security Notions for Probabilistic Private-Key Encryption. 67-95 - Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu:

The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. 97-114 - Edlyn Teske:

An Elliptic Curve Trapdoor System. 115-133
Volume 19, Number 2, April 2006
- Ran Canetti, Eyal Kushilevitz, Yehuda Lindell

:
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. 135-167 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:

Strengthening Zero-Knowledge Protocols Using Signatures. 169-209 - Michael J. Jacobson Jr., Renate Scheidler

, Hugh C. Williams:
An Improved Real-Quadratic-Field-Based Key Exchange Procedure. 211-239
Volume 19, Number 3, July 2006
- Oded Goldreich

, Yehuda Lindell
:
Session-Key Generation Using Human Passwords Only. 241-340 - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:

Private Computation: k-Connected versus 1-Connected Networks. 341-357 - Yehuda Lindell

:
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. 359-377
Volume 19, Number 4, October 2006
- Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury:

A Proof of the Security of Quantum Key Distribution. 381-439 - Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung

, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. 441-462 - Marc Girault, Guillaume Poupard, Jacques Stern:

On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. 463-487 - Ivan Damgård, Gudmund Skovbjerg Frandsen:

An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate. 489-520 - Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen:

Completeness in Two-Party Secure Computation: A Computational View. 521-552 - Florian Luca, Igor E. Shparlinski

:
Elliptic Curves with Low Embedding Degree. 553-562

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














