default search action
Journal of Cryptology, Volume 8
Volume 8, Number 1, 1995
- Donald W. Davies, Sean Murphy:
Pairs and Triplets of DES S-Boxes. 1-25 - Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against a Differential Attack. 27-37 - Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. 39-64
Volume 8, Number 2, 1995
- Luke O'Connor:
On the Distribution of Characteristics in Bijective Mappings. 67-86 - Alexander Russell:
Necessary and Sufficient Condtions for Collision-Free Hashing. 87-100 - Scott A. Vanstone, Robert J. Zuccherato:
Short RSA Keys and Their Generation. 101-114
Volume 8, Number 3, 1995
- Yixian Yang, Baoan Guo:
Further Enumerating Boolean Functions of Cryptographic Significance. 115-122 - Ueli M. Maurer:
Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. 123-155 - Simon R. Blackburn, Sean Murphy, Jacques Stern:
The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings. 157-166 - Douglas R. Stinson, James L. Massey:
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions. 167-173
Volume 8, Number 4, 1995
- Dingyi Pei:
Information-Theoretic Bounds for Authentication Codes and Block Designs. 177-188 - Martin E. Dyer, Trevor I. Fenner, Alan M. Frieze, Andrew Thomason:
On Key Storage in Secure Networks. 189-200 - Ivan Damgård:
Practical and Provably Secure Release of a Secret and Exchange of Signatures. 201-222
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.