What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 2014
Year
Venue
Title
2014
JOFC
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher
Sourav Sen Gupta
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
2014
JOFC
A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare
Todor Ristov
2014
JOFC
A New Interactive Hashing Theorem
Iftach Haitner
Omer Reingold
2014
JOFC
A One-Time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias
Yona Raekow
Alexander Russell
Narasimha Shashidhar
2014
JOFC
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
JOFC
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
Paul Stankovski
Martin Hell
Thomas Johansson
2014
JOFC
Authenticated Adversarial Routing
Yair Amir
Paul Bunn
Rafail Ostrovsky
2014
JOFC
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Zvika Brakerski
Gil Segev
2014
JOFC
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Carmit Hazay
Tomas Toft
2014
JOFC
Concurrent Zero Knowledge, Revisited
Rafael Pass
Wei-Lung Dustin Tseng
Muthuramakrishnan Venkitasubramaniam
2014
JOFC
Cryptography in the Multi-string Model
Jens Groth
Rafail Ostrovsky
2014
JOFC
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms
Jin Hong
Sunghwan Moon
2014
JOFC
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Patrick Longa
Francesco Sica
2014
JOFC
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2014
JOFC
Improved Practical Attacks on Round-Reduced Keccak
Itai Dinur
Orr Dunkelman
Adi Shamir
2014
JOFC
Key-Dependent Message Security: Generic Amplification and Completeness
Benny Applebaum
2014
JOFC
On Best-Possible Obfuscation
Shafi Goldwasser
Guy N. Rothblum
2014
JOFC
On Strong Simulation and Composable Point Obfuscation
Nir Bitansky
Ran Canetti
2014
JOFC
On the Amortized Complexity of Zero-Knowledge Protocols
Ronald Cramer
Ivan Damgård
Marcel Keller
2014
JOFC
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin
Anja Lehmann
Krzysztof Pietrzak
2014
JOFC
Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich
Ivica Nikolic
Christian Rechberger
2014
JOFC
Security Models and Proof Strategies for Plaintext-Aware Encryption
James Birkett
Alexander W. Dent
2014
JOFC
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère
Pierrick Gaudry
Louise Huot
Guénaël Renault
2014
JOFC
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions
Michel Abdalla
Dario Catalano
Dario Fiore