Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit HazayGert Læssøe MikkelsenAngelo Agatino Nicolosi OriginalPaper 05 February 2018 Pages: 265 - 323
Automated Analysis of Cryptographic Assumptions in Generic Group Models Gilles BartheEdvard FagerholmBenedikt Schmidt OriginalPaper 18 December 2018 Pages: 324 - 360
Hardness-Preserving Reductions via Cuckoo Hashing Itay BermanIftach HaitnerMoni Naor OriginalPaper 07 May 2018 Pages: 361 - 392
Non-black-box Simulation in the Fully Concurrent Setting, Revisited Susumu Kiyoshima OriginalPaper 06 February 2019 Pages: 393 - 434
From Physical to Stochastic Modeling of a TERO-Based TRNG Florent BernardPatrick HaddadJean Nicolai OriginalPaper Open access 29 March 2018 Pages: 435 - 458
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Seung Geol ChoiJonathan KatzHong-Sheng Zhou OriginalPaper 23 March 2018 Pages: 459 - 497
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials Georg FuchsbauerChristian HanserDaniel Slamanig OriginalPaper 15 February 2018 Pages: 498 - 546
Cryptanalysis of the CLT13 Multilinear Map Jung Hee CheonKyoohyung HanDamien Stehlé OriginalPaper Open access 06 December 2018 Pages: 547 - 565
On Tight Security Proofs for Schnorr Signatures Nils FleischhackerTibor JagerDominique Schröder OriginalPaper 06 February 2019 Pages: 566 - 599