What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 2010
Year
Venue
Title
2010
JOFC
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
Yvo Desmedt
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2010
JOFC
A Taxonomy of Pairing-Friendly Elliptic Curves
David Freeman
Michael Scott
Edlyn Teske
2010
JOFC
A Verifiable Secret Shuffle of Homomorphic Encryptions
Jens Groth
2010
JOFC
An Analysis of the Blockcipher-Based Hash Functions from PGV
John Black
Phillip Rogaway
Thomas Shrimpton
Martijn Stam
2010
JOFC
Cryptanalysis of MD2
Lars R. Knudsen
John Erik Mathiassen
Frédéric Muller
Søren S. Thomsen
2010
JOFC
Discrete Logarithm Problems with Auxiliary Inputs
Jung Hee Cheon
2010
JOFC
Efficient Cache Attacks on AES, and Countermeasures
Dag Arne Osvik
Adi Shamir
Eran Tromer
2010
JOFC
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Carmit Hazay
Yehuda Lindell
2010
JOFC
How Should We Solve Search Problems Privately?
Amos Beimel
Tal Malkin
Kobbi Nissim
Enav Weinreb
2010
JOFC
Long-Term Security and Universal Composability
Jörn Müller-Quade
Dominique Unruh
2010
JOFC
Obfuscation for Cryptographic Purposes
Dennis Hofheinz
John Malone-Lee
Martijn Stam
2010
JOFC
On <i>d</i>-Multiplicative Secret Sharing
Omer Barkol
Yuval Ishai
Enav Weinreb
2010
JOFC
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
Oded Goldreich
2010
JOFC
On the Efficient Generation of Prime-Order Elliptic Curves
Elisavet Konstantinou
Aristides Kontogeorgis
Yannis C. Stamatiou
Christos D. Zaroliagis
2010
JOFC
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols
Jonathan Katz
Ji Sun Shin
Adam Smith
2010
JOFC
Secure Computation of the Median (and Other Elements of Specified Ranks)
Gagan Aggarwal
Nina Mishra
Benny Pinkas
2010
JOFC
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Yonatan Aumann
Yehuda Lindell
2010
JOFC
Structural Cryptanalysis of SASAS
Alex Biryukov
Adi Shamir
2010
JOFC
The RSA Group is Pseudo-Free
Daniele Micciancio
2010
JOFC
The TLS Handshake Protocol: A Modular Analysis
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi