Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 2006
Page
Title
1-25
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
27-66
Threshold Password-Authenticated Key Exchange
67-95
Characterization of Security Notions for Probabilistic Private-Key Encryption
97-114
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
115-133
An Elliptic Curve Trapdoor System
135-167
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
169-209
Strengthening Zero-Knowledge Protocols Using Signatures
211-239
An Improved Real-Quadratic-Field-Based Key Exchange Procedure
241-340
Session-Key Generation Using Human Passwords Only
341-357
Private Computation: k-Connected versus 1-Connected Networks
359-377
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions
381-439
A Proof of the Security of Quantum Key Distribution
441-462
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
463-487
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
489-520
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate
521-552
Completeness in Two-Party Secure Computation: A Computational View
553-562
Elliptic Curves with Low Embedding Degree