


default search action
Journal of Cryptology, Volume 14
Volume 14, Number 1, 2001
- Andrew Klapper:
On the Existence of Secure Keystream Generators. 1-15 - Joe Kilian, Phillip Rogaway:
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX). 17-35 - Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky
:
Universal Service-Providers for Private Information Retrieval. 37-74
Volume 14, Number 2, 2001
- Don Coppersmith:
Weakness in Quaternion Signatures. 77-85 - Serge Vaudenay:
Cryptanalysis of the Chor - Rivest Cryptosystem. 87-100 - Dan Boneh, Richard A. DeMillo, Richard J. Lipton:
On the Importance of Eliminating Errors in Cryptographic Computations. 101-119 - Yongge Wang
, Yvo Desmedt:
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. 121-135 - Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam:
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. 137-150
Volume 14, Number 3, 2001
- Daniel V. Bailey, Christof Paar:
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography. 153-176 - Mikael Goldmann, Mats Näslund, Alexander Russell
:
Complexity Bounds on General Hard-Core Predicates. 177-195 - Thomas Jakobsen, Lars R. Knudsen:
Attacks on Block Ciphers of Low Algebraic Degree. 197-210 - Amos Fiat, Tamir Tassa:
Dynamic Traitor Tracing. 211-223
Volume 14, Number 4, 2001
- Thomas Scanlon
:
Public Key Cryptosystems Based on Drinfeld Modules Are Insecure. 225-230 - Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson:
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications. 231-253 - Arjen K. Lenstra, Eric R. Verheul:
Selecting Cryptographic Key Sizes. 255-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.