![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Publisher: Springer Publishing Company
Founded in: 1988
Total resources: 13
E-ISSN: 1432-1378
ISSN: 0933-2790
Subject:
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Journal of Cryptology
Menu
![](/images/ico/ico5.png)
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
By Brakerski Zvika,Segev Gil in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
On the Amortized Complexity of Zero-Knowledge Protocols
By Cramer Ronald,Damgård Ivan,Keller Marcel in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
Improved Practical Attacks on Round-Reduced Keccak
By Dinur Itai,Dunkelman Orr,Shamir Adi in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication
By Longa Patrick,Sica Francesco in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
On Strong Simulation and Composable Point Obfuscation
By Bitansky Nir,Canetti Ran in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
By Hazay Carmit,Toft Tomas in (2014)
Journal of Cryptology , Vol. 27, Iss. 2, 2014-04 , pp.![](/images/ico/ico5.png)
Short Undeniable Signatures Based on Group Homomorphisms
Journal of Cryptology , Vol. 24, Iss. 3, 2011-07 , pp.![](/images/ico/ico5.png)
By Liskov Moses,Rivest Ronald,Wagner David in (2011)
Journal of Cryptology , Vol. 24, Iss. 3, 2011-07 , pp.![](/images/ico/ico5.png)
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
By Galbraith Steven,Lin Xibin,Scott Michael in (2011)
Journal of Cryptology , Vol. 24, Iss. 3, 2011-07 , pp.![](/images/ico/ico5.png)
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
By Kidron Dafna,Lindell Yehuda in (2011)
Journal of Cryptology , Vol. 24, Iss. 3, 2011-07 , pp.