Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 2007
Page
Title
3-37
Another Look at "Provable Security"
39-50
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
51-83
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
85-113
Scalable Protocols for Authenticated Group Key Exchange
115-149
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
153-163
The Security of the IAPM and IACBC Modes
165-202
Constant-Round Oblivious Transfer in the Bounded Storage Model
203-235
Formal Proofs for the Security of Signcryption
237-264
Hierarchical Threshold Secret Sharing
265-294
A Forward-Secure Public-Key Encryption Scheme
295-321
Robust Information-Theoretic Private Information Retrieval
323-373
On Unconditionally Secure Distributed Oblivious Transfer
375-387
Primality Proving via One Round in ECPP and One Iteration in AKS
389-392
Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1
393
Robust and Efficient Sharing of RSA Functions
394
RSA-Based Undeniable Signatures
395
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)