Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 2009
Page
Title
1-61
Security Proofs for Identity-Based Identification and Signature Schemes
62-74
A Public Key Cryptosystem Based on Non-abelian Finite Groups
75-92
Chernoff-Type Direct Product Theorems
93-113
Cryptographic Hash Functions from Expander Graphs
114-138
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
139-160
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
161-188
A Proof of Security of Yao's Protocol for Two-Party Computation
189-226
Non-interactive Timestamping in the Bounded-Storage Model
227-258
Multipartite Secret Sharing by Bivariate Interpolation
259-281
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
283-310
Reducing Complexity Assumptions for Statistically-Hiding Commitment
311-329
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
330-364
Using Abelian Varieties to Improve Pairing-Based Cryptography
365-394
Upper and Lower Bounds on Black-Box Steganography
395-428
General Composition and Universal Composability in Secure Multiparty Computation
429-469
Cryptography with Constant Input Locality
470-504
The Twin Diffie-Hellman Problem and Applications
505-529
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves
,
530-571
Efficient Non-malleable Commitment Schemes
572-615
New Approaches for Deniable Authentication