Journal of Cryptology
, Volume 12
Volume 12, Number 1, 1999
Paul C. van Oorschot
,
Michael J. Wiener
:
Parallel Collision Search with Cryptanalytic Applications.
1-28
Electronic Edition
(
Springer LINK
)
BibTeX
Moni Naor
,
Omer Reingold
:
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited.
29-66
Electronic Edition
(
Springer LINK
)
BibTeX
Nigel P. Smart
,
Samir Siksek
:
A Fast Diffie-Hellman Protocol in Genus 2.
67-73
Electronic Edition
(
Springer LINK
)
BibTeX
Volume 12, Number 2, 1999
Shai Halevi
:
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.
77-89
Electronic Edition
(
Springer LINK
)
BibTeX
Phillip Rogaway
:
Bucket Hashing and Its Application to Fast Message Authentication.
91-115
Electronic Edition
(
Springer LINK
)
BibTeX
Mihir Bellare
,
Ronald L. Rivest
:
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer.
117-139
Electronic Edition
(
Springer LINK
)
BibTeX
Nigel P. Smart
:
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic.
141-151
Electronic Edition
(
Springer LINK
)
BibTeX
Volume 12, Number 3, 1999
Carlo Blundo
,
Alfredo De Santis
,
Kaoru Kurosawa
,
Wakaha Ogata
:
On a Fallacious Bound for Authentication Codes.
155-159
Electronic Edition
(
Springer LINK
)
BibTeX
Eli Biham
:
Cryptanalysis of Triple Modes of Operation.
161-184
Electronic Edition
(
Springer LINK
)
BibTeX
Daniel J. Bernstein
:
How to Stretch Random Functions: The Security of Protected Counter Sums.
185-192
Electronic Edition
(
Springer LINK
)
BibTeX
Nigel P. Smart
:
The Discrete Logarithm Problem on Elliptic Curves of Trace One.
193-196
Electronic Edition
(
Springer LINK
)
BibTeX
Mike Burmester
,
Yvo Desmedt
,
Toshiya Itoh
,
Kouichi Sakurai
,
Hiroki Shizuya
:
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
197-223
Electronic Edition
(
Springer LINK
)
BibTeX
Volume 12, Number 4, 1999
Kathleen A. S. Quinn
:
Bounds for Key Distribution Patterns.
227-239
Electronic Edition
(
Springer LINK
)
BibTeX
Marc Joye
,
Arjen K. Lenstra
,
Jean-Jacques Quisquater
:
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
241-245
Electronic Edition
(
Springer LINK
)
BibTeX
Victor Shoup
:
On the Security of a Practical Identification Scheme.
247-260
Electronic Edition
(
Springer LINK
)
BibTeX
Carlo Blundo
,
Alfredo De Santis
,
Douglas R. Stinson
:
On the Contrast in Visual Cryptography Schemes.
261-289
Electronic Edition
(
Springer LINK
)
BibTeX
Copyright ©
Sun May 17 00:10:25 2009 by
Michael Ley
(
ley@uni-trier.de
)