default search action
Journal of Cryptology, Volume 2
Volume 2, Number 1, 1990
- Martín Abadi, Joan Feigenbaum:
Secure Circuit Evaluation. 1-12 - K. Nishimura, M. Sibuya:
Probability To Meet in the Middle. 13-22 - Douglas R. Stinson:
The Combinatorics of Authentication and Secrecy Codes. 23-49 - Li Gong, David J. Wheeler:
A Matrix Key-Distribution Scheme. 51-59
Volume 2, Number 2, 1990
- Joan Boyar, Stuart A. Kurtz, Mark W. Krentel:
A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs. 63-76 - Gustavus J. Simmons:
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration. 77-104 - Harald Niederreiter:
A Combinatorial Approach to Probabilistic Results on the Linear Complexity Profile of Random Sequences. 105-112
Volume 2, Number 3, 1990
- R. Forre:
Methods and Instruments for Designing S-Boxes. 115-130 - Michael Walker:
Information-Theoretic Bounds for Authentication Schemes. 131-143 - Sean Murphy:
The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts. 145-154 - Chris J. Mitchell:
Enumerating Boolean Functions of Cryptographic Significance. 155-170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.