{"title":"Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage","authors":"Andrej Bogdanov, Y. Ishai, Akshayaram Srinivasan","doi":"10.1007/s00145-021-09417-9","DOIUrl":"https://doi.org/10.1007/s00145-021-09417-9","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49027017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dragos Rotaru, N. Smart, Titouan Tanguy, F. Vercauteren, Tim Wood
{"title":"Actively Secure Setup for SPDZ","authors":"Dragos Rotaru, N. Smart, Titouan Tanguy, F. Vercauteren, Tim Wood","doi":"10.1007/s00145-021-09416-w","DOIUrl":"https://doi.org/10.1007/s00145-021-09416-w","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48448793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marek Sýs, Ľubomír Obrátil, Vashek Matyás, Dusan Klinec
{"title":"A Bad Day to Die Hard: Correcting the Dieharder Battery","authors":"Marek Sýs, Ľubomír Obrátil, Vashek Matyás, Dusan Klinec","doi":"10.1007/s00145-021-09414-y","DOIUrl":"https://doi.org/10.1007/s00145-021-09414-y","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46264568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage","authors":"Andrej Bogdanov, Y. Ishai, Akshayaram Srinivasan","doi":"10.1007/s00145-021-09412-0","DOIUrl":"https://doi.org/10.1007/s00145-021-09412-0","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"35 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51966059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Flórez-Gutiérrez, G. Leurent, M. Naya-Plasencia, Léo Perrin, A. Schrottenloher, Ferdinand Sibleyras
{"title":"Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli","authors":"Antonio Flórez-Gutiérrez, G. Leurent, M. Naya-Plasencia, Léo Perrin, A. Schrottenloher, Ferdinand Sibleyras","doi":"10.1007/s00145-021-09413-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09413-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46573022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuichi Katsumata, R. Nishimaki, Shota Yamada, Takashi Yamakawa
{"title":"Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings","authors":"Shuichi Katsumata, R. Nishimaki, Shota Yamada, Takashi Yamakawa","doi":"10.1007/s00145-021-09408-w","DOIUrl":"https://doi.org/10.1007/s00145-021-09408-w","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correction to: Editorial","authors":"V. Rijmen","doi":"10.1007/s00145-021-09407-x","DOIUrl":"https://doi.org/10.1007/s00145-021-09407-x","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48573679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Evolution of OCB","authors":"Ted Krovetz, P. Rogaway","doi":"10.1007/s00145-021-09399-8","DOIUrl":"https://doi.org/10.1007/s00145-021-09399-8","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09399-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49334221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness","authors":"Qipeng Liu, Mark Zhandry","doi":"10.1007/s00145-021-09400-4","DOIUrl":"https://doi.org/10.1007/s00145-021-09400-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09400-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41520950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}