Journal of Cryptology
, Volume 1
Volume 1, Number 1, 1988
Burton S. Kaliski Jr.
,
Ronald L. Rivest
,
Alan T. Sherman
: Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). 3-36
BibTeX
Douglas R. Stinson
: Some Constructions and Bounds for Authentication Codes. 37-52
BibTeX
Pierre Beauchemin
,
Gilles Brassard
,
Claude Crépeau
,
Claude Goutier
,
Carl Pomerance
: The Generation of Random Numbers that Are Probably Prime. 53-64
BibTeX
David Chaum
: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. 65-75
BibTeX
Volume 1, Number 2, 1988
Uriel Feige
,
Amos Fiat
,
Adi Shamir
: Zero-Knowledge Proofs of Identity. 77-94
BibTeX
Kevin S. McCurley
: A Key Distribution System Equivalent to Factoring. 95-105
BibTeX
Johannes Buchmann
,
Hugh C. Williams
: A Key-Exchange System Based on Imaginary Quadratic Fields. 107-118
BibTeX
Douglas R. Stinson
: A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. 119-127
BibTeX
Pierre Beauchemin
,
Gilles Brassard
: A Generalization of Hellman's Extension to Shannon's Approach to Cryptography. 129-131
BibTeX
Martin Tompa
,
Heather Woll
: How to Share a Secret with Cheaters. 133-138
BibTeX
Volume 1, Number 3, 1989
Neal Koblitz
: Hyperelliptic Cryptosystems. 139-150
BibTeX
Michael Luby
,
Charles Rackoff
: A Study of Password Security. 151-158
BibTeX
Willi Meier
,
Othmar Staffelbach
: Fast Correlation Attacks on Certain Stream Ciphers. 159-176
BibTeX
Joan Boyar
: Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits. 177-184
BibTeX
Fred Piper
,
Michael Walker
: Linear Ciphers and Spreads. 185-188
BibTeX
Copyright ©
Sun May 17 00:10:24 2009 by
Michael Ley
(
ley@uni-trier.de
)