default search action
Journal of Cryptology, Volume 10
Volume 10, Number 1, 1997
- Peter de Rooij:
On Schnorr's Preprocessing for Digital Signature Schemes. 1-16 - Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway:
Locally Random Reductions: Improvements and Applications. 17-36 - Toshiya Itoh, Yuji Ohta, Hiroki Shizuya:
A Language-Dependent Cryptographic Primitive. 37-50 - Hans Dobbertin:
RIPEMD with Two-Round Compress Function is Not Collision-Free. 51-70 - Burton S. Kaliski Jr.:
A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem. 71-72
Volume 10, Number 2, 1997
- Amos Fiat:
Batch RSA. 75-88 - Yacov Yacobi, Michael J. Beller:
Batch Diffie-Hellman Key Agreement Systems. 89-96 - Christian Cachin, Ueli M. Maurer:
Linking Information Reconciliation and Privacy Amplification. 97-110 - Andrew Klapper, Mark Goresky:
Feedback Shift Registers, 2-Adic Span, and Combiners with Memory. 111-147
Volume 10, Number 3, 1997
- Shimon Even, Yishay Mansour:
A Construction of a Cipher from a Single Pseudorandom Permutation. 151-162 - Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. 163-194 - Eli Biham, Alex Biryukov:
An Improvement of Davies' Attack on DES. 195-206 - Don Coppersmith, Jacques Stern, Serge Vaudenay:
The Security of the Birational Permutation Signature Schemes. 207-221
Volume 10, Number 4, 1997
- László Csirmaz:
The Size of a Share Must Be Large. 223-231 - Don Coppersmith:
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. 233-260 - Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes. 261-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.