


default search action
Journal of Cryptology, Volume 1
Volume 1, Number 1, 1988
- Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). 3-36 - Douglas R. Stinson:
Some Constructions and Bounds for Authentication Codes. 37-52 - Pierre Beauchemin, Gilles Brassard, Claude Crépeau, Claude Goutier, Carl Pomerance:
The Generation of Random Numbers that Are Probably Prime. 53-64 - David Chaum:
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. 65-75
Volume 1, Number 2, 1988
- Uriel Feige, Amos Fiat, Adi Shamir:
Zero-Knowledge Proofs of Identity. 77-94 - Kevin S. McCurley
:
A Key Distribution System Equivalent to Factoring. 95-105 - Johannes Buchmann, Hugh C. Williams:
A Key-Exchange System Based on Imaginary Quadratic Fields. 107-118 - Douglas R. Stinson:
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. 119-127 - Pierre Beauchemin, Gilles Brassard:
A Generalization of Hellman's Extension to Shannon's Approach to Cryptography. 129-131 - Martin Tompa, Heather Woll:
How to Share a Secret with Cheaters. 133-138
Volume 1, Number 3, 1989
- Neal Koblitz:
Hyperelliptic Cryptosystems. 139-150 - Michael Luby, Charles Rackoff:
A Study of Password Security. 151-158 - Willi Meier, Othmar Staffelbach:
Fast Correlation Attacks on Certain Stream Ciphers. 159-176 - Joan Boyar
:
Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits. 177-184 - Fred Piper, Michael Walker:
Linear Ciphers and Spreads. 185-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.