What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 2006
Year
Venue
Title
2006
JOFC
A Proof of the Security of Quantum Key Distribution
Eli Biham
Michel Boyer
P. Oscar Boykin
Tal Mor
Vwani P. Roychowdhury
2006
JOFC
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions
Yehuda Lindell
2006
JOFC
An Elliptic Curve Trapdoor System
Edlyn Teske
2006
JOFC
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate
Ivan Damgård
Gudmund Skovbjerg Frandsen
2006
JOFC
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
Jan Denef
Frederik Vercauteren
2006
JOFC
An Improved Real-Quadratic-Field-Based Key Exchange Procedure
Michael J. Jacobson Jr.
Renate Scheidler
Hugh C. Williams
2006
JOFC
Characterization of Security Notions for Probabilistic Private-Key Encryption
Jonathan Katz
Moti Yung
2006
JOFC
Completeness in Two-Party Secure Computation: A Computational View
Danny Harnik
Moni Naor
Omer Reingold
Alon Rosen
2006
JOFC
Elliptic Curves with Low Embedding Degree
Florian Luca
Igor E. Shparlinski
2006
JOFC
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
Deukjo Hong
Seokhie Hong
Wonil Lee
Sangjin Lee
Jongin Lim
Jaechul Sung
Okyeon Yi
2006
JOFC
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Marc Girault
Guillaume Poupard
Jacques Stern
2006
JOFC
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
Ran Canetti
Eyal Kushilevitz
Yehuda Lindell
2006
JOFC
Private Computation: k-Connected versus 1-Connected Networks
Markus Bläser
Andreas Jakoby
Maciej Liskiewicz
Bodo Manthey
2006
JOFC
Session-Key Generation Using Human Passwords Only
Oded Goldreich
Yehuda Lindell
2006
JOFC
Strengthening Zero-Knowledge Protocols Using Signatures
Juan A. Garay
Philip D. MacKenzie
Ke Yang
2006
JOFC
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
Yan-Cheng Chang
Chun-Yuan Hsiao
Chi-Jen Lu
2006
JOFC
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie
Thomas Shrimpton
Markus Jakobsson