


default search action
Journal of Cryptology, Volume 5
Volume 5, Number 1, 1992
- Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin:
Experimental Quantum Cryptography. 3-28 - Ernest F. Brickell, Kevin S. McCurley
:
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. 29-39 - Jan-Hendrik Evertse, Eugène van Heyst:
Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures? 41-52 - Ueli M. Maurer:
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. 53-66 - Willi Meier, Othmar Staffelbach:
Correlation Properties of Combiners with Memory in Stream Ciphers. 67-86
Volume 5, Number 2, 1992
- Ueli M. Maurer:
A Universal Statistical Test for Random Bit Generators. 89-105 - Sheelagh Lloyd:
Counting Binary Functions with Certain Cryptographic Properties. 107-131 - Jean Georgiades:
Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels. 133-137 - John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry:
A Cubic RSA Code Equivalent to Factorization. 139-150
Volume 5, Number 3, 1992
- Ernest F. Brickell, Douglas R. Stinson:
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. 153-166 - Spyros S. Magliveras, Nasir D. Memon
:
Algebraic Properties of Cryptosystem PGM. 167-183 - S. J. Phillips, N. C. Phillips:
Strongly Ideal Secret Sharing Schemes. 185-191 - Zong-Duo Dai:
Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials. 193-207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.