Search dblp for Publications

export results for "toc:db/journals/joc/joc12.bht:"

 download as .bib file

@article{DBLP:journals/joc/BellareR99,
  author       = {Mihir Bellare and
                  Ronald L. Rivest},
  title        = {Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation
                  via Fractional Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {117--139},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003819},
  doi          = {10.1007/PL00003819},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BellareR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bernstein99,
  author       = {Daniel J. Bernstein},
  title        = {How to Stretch Random Functions: The Security of Protected Counter
                  Sums},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {185--192},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900051},
  doi          = {10.1007/S001459900051},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Bernstein99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Biham99,
  author       = {Eli Biham},
  title        = {Cryptanalysis of Triple Modes of Operation},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {161--184},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900050},
  doi          = {10.1007/S001459900050},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Biham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSKO99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {On a Fallacious Bound for Authentication Codes},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {155--159},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900049},
  doi          = {10.1007/S001459900049},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSS99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {On the Contrast in Visual Cryptography Schemes},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {261--289},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900057},
  doi          = {10.1007/S001459900057},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BurmesterDISS99,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Toshiya Itoh and
                  Kouichi Sakurai and
                  Hiroki Shizuya},
  title        = {Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {197--223},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900053},
  doi          = {10.1007/S001459900053},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BurmesterDISS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Halevi99,
  author       = {Shai Halevi},
  title        = {Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {77--89},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003821},
  doi          = {10.1007/PL00003821},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Halevi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JoyeLQ99,
  author       = {Marc Joye and
                  Arjen K. Lenstra and
                  Jean{-}Jacques Quisquater},
  title        = {Chinese Remaindering Based Cryptosystems in the Presence of Faults},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {241--245},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900055},
  doi          = {10.1007/S001459900055},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorR99,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {29--66},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003817},
  doi          = {10.1007/PL00003817},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/OorschotW99,
  author       = {Paul C. van Oorschot and
                  Michael J. Wiener},
  title        = {Parallel Collision Search with Cryptanalytic Applications},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {1--28},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003816},
  doi          = {10.1007/PL00003816},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/OorschotW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Quinn99,
  author       = {Kathleen A. S. Quinn},
  title        = {Bounds for Key Distribution Patterns},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {227--239},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900054},
  doi          = {10.1007/S001459900054},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Quinn99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Rogaway99,
  author       = {Phillip Rogaway},
  title        = {Bucket Hashing and Its Application to Fast Message Authentication},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {91--115},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003822},
  doi          = {10.1007/PL00003822},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Rogaway99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Shoup99,
  author       = {Victor Shoup},
  title        = {On the Security of a Practical Identification Scheme},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {247--260},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900056},
  doi          = {10.1007/S001459900056},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Shoup99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Smart99,
  author       = {Nigel P. Smart},
  title        = {Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {141--151},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003820},
  doi          = {10.1007/PL00003820},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Smart99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Smart99a,
  author       = {Nigel P. Smart},
  title        = {The Discrete Logarithm Problem on Elliptic Curves of Trace One},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {193--196},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900052},
  doi          = {10.1007/S001459900052},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Smart99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/SmartS99,
  author       = {Nigel P. Smart and
                  Samir Siksek},
  title        = {A Fast Diffie-Hellman Protocol in Genus 2},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {67--73},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003818},
  doi          = {10.1007/PL00003818},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/SmartS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}