default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc12.bht:"
@article{DBLP:journals/joc/BellareR99, author = {Mihir Bellare and Ronald L. Rivest}, title = {Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {117--139}, year = {1999}, url = {https://doi.org/10.1007/PL00003819}, doi = {10.1007/PL00003819}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BellareR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bernstein99, author = {Daniel J. Bernstein}, title = {How to Stretch Random Functions: The Security of Protected Counter Sums}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {185--192}, year = {1999}, url = {https://doi.org/10.1007/s001459900051}, doi = {10.1007/S001459900051}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bernstein99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Biham99, author = {Eli Biham}, title = {Cryptanalysis of Triple Modes of Operation}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {161--184}, year = {1999}, url = {https://doi.org/10.1007/s001459900050}, doi = {10.1007/S001459900050}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Biham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSKO99, author = {Carlo Blundo and Alfredo De Santis and Kaoru Kurosawa and Wakaha Ogata}, title = {On a Fallacious Bound for Authentication Codes}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {155--159}, year = {1999}, url = {https://doi.org/10.1007/s001459900049}, doi = {10.1007/S001459900049}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSS99, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {261--289}, year = {1999}, url = {https://doi.org/10.1007/s001459900057}, doi = {10.1007/S001459900057}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BurmesterDISS99, author = {Mike Burmester and Yvo Desmedt and Toshiya Itoh and Kouichi Sakurai and Hiroki Shizuya}, title = {Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {197--223}, year = {1999}, url = {https://doi.org/10.1007/s001459900053}, doi = {10.1007/S001459900053}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BurmesterDISS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Halevi99, author = {Shai Halevi}, title = {Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {77--89}, year = {1999}, url = {https://doi.org/10.1007/PL00003821}, doi = {10.1007/PL00003821}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Halevi99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JoyeLQ99, author = {Marc Joye and Arjen K. Lenstra and Jean{-}Jacques Quisquater}, title = {Chinese Remaindering Based Cryptosystems in the Presence of Faults}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {241--245}, year = {1999}, url = {https://doi.org/10.1007/s001459900055}, doi = {10.1007/S001459900055}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorR99, author = {Moni Naor and Omer Reingold}, title = {On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited}, journal = {J. Cryptol.}, volume = {12}, number = {1}, pages = {29--66}, year = {1999}, url = {https://doi.org/10.1007/PL00003817}, doi = {10.1007/PL00003817}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/OorschotW99, author = {Paul C. van Oorschot and Michael J. Wiener}, title = {Parallel Collision Search with Cryptanalytic Applications}, journal = {J. Cryptol.}, volume = {12}, number = {1}, pages = {1--28}, year = {1999}, url = {https://doi.org/10.1007/PL00003816}, doi = {10.1007/PL00003816}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/OorschotW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Quinn99, author = {Kathleen A. S. Quinn}, title = {Bounds for Key Distribution Patterns}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {227--239}, year = {1999}, url = {https://doi.org/10.1007/s001459900054}, doi = {10.1007/S001459900054}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Quinn99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Rogaway99, author = {Phillip Rogaway}, title = {Bucket Hashing and Its Application to Fast Message Authentication}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {91--115}, year = {1999}, url = {https://doi.org/10.1007/PL00003822}, doi = {10.1007/PL00003822}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Rogaway99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Shoup99, author = {Victor Shoup}, title = {On the Security of a Practical Identification Scheme}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {247--260}, year = {1999}, url = {https://doi.org/10.1007/s001459900056}, doi = {10.1007/S001459900056}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Shoup99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Smart99, author = {Nigel P. Smart}, title = {Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {141--151}, year = {1999}, url = {https://doi.org/10.1007/PL00003820}, doi = {10.1007/PL00003820}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Smart99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Smart99a, author = {Nigel P. Smart}, title = {The Discrete Logarithm Problem on Elliptic Curves of Trace One}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {193--196}, year = {1999}, url = {https://doi.org/10.1007/s001459900052}, doi = {10.1007/S001459900052}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Smart99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SmartS99, author = {Nigel P. Smart and Samir Siksek}, title = {A Fast Diffie-Hellman Protocol in Genus 2}, journal = {J. Cryptol.}, volume = {12}, number = {1}, pages = {67--73}, year = {1999}, url = {https://doi.org/10.1007/PL00003818}, doi = {10.1007/PL00003818}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SmartS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.