What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 2009
Year
Venue
Title
2009
JOFC
A Proof of Security of Yao's Protocol for Two-Party Computation
Yehuda Lindell
Benny Pinkas
2009
JOFC
A Public Key Cryptosystem Based on Non-abelian Finite Groups
Wolfgang Lempken
Spyros S. Magliveras
Tran van Trung
Wandi Wei
2009
JOFC
Chernoff-Type Direct Product Theorems
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
2009
JOFC
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
Manuel Barbosa
Andrew Moss
Daniel Page
2009
JOFC
Cryptographic Hash Functions from Expander Graphs
Denis Xavier Charles
Eyal Z. Goren
Kristin E. Lauter
2009
JOFC
Cryptography with Constant Input Locality
Benny Applebaum
Yuval Ishai
Eyal Kushilevitz
2009
JOFC
Efficient Non-malleable Commitment Schemes
Roger Fischlin
Marc Fischlin
2009
JOFC
General Composition and Universal Composability in Secure Multiparty Computation
Yehuda Lindell
2009
JOFC
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves<sup>, </sup>
Benjamin Smith
2009
JOFC
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Phong Q. Nguyen
Oded Regev
2009
JOFC
Multipartite Secret Sharing by Bivariate Interpolation
Nira Dyn
Tamir Tassa
2009
JOFC
New Approaches for Deniable Authentication
Rosario Gennaro
Mario Di Raimondo
2009
JOFC
Non-interactive Timestamping in the Bounded-Storage Model
Tal Moran
Ronen Shaltiel
Amnon Ta-Shma
2009
JOFC
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black
Martin Cochran
Thomas Shrimpton
2009
JOFC
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Iftach Haitner
Omer Horvitz
Jonathan Katz
Chiu-Yuen Koo
Ruggero Morselli
Ronen Shaltiel
2009
JOFC
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Adam Bender
Jonathan Katz
Ruggero Morselli
2009
JOFC
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare
Chanathip Namprempre
Gregory Neven
2009
JOFC
The Twin Diffie-Hellman Problem and Applications
David Cash
Eike Kiltz
Victor Shoup
2009
JOFC
Upper and Lower Bounds on Black-Box Steganography
Nenad Dedic
Gene Itkis
Leonid Reyzin
Scott Russell
2009
JOFC
Using Abelian Varieties to Improve Pairing-Based Cryptography
Karl Rubin
Alice Silverberg