Journal of Cryptology
, Volume 18
Volume 18, Number 1, January 2005
Moni Naor
,
Benny Pinkas
:
Computationally Secure Oblivious Transfer.
1-35
Electronic Edition
(link)
BibTeX
Matthias Fitzi
,
Juan A. Garay
,
Ueli M. Maurer
,
Rafail Ostrovsky
:
Minimal Complete Primitives for Secure Multi-Party Computation.
37-61
Electronic Edition
(link)
BibTeX
Henri Cohen
:
Analysis of the Sliding Window Powering Algorithm.
63-76
Electronic Edition
(link)
BibTeX
Volume 18, Number 2, April 2005
Régis Dupont
,
Andreas Enge
,
François Morain
:
Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields.
79-89
Electronic Edition
(link)
BibTeX
Rosario Gennaro
:
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem.
91-110
Electronic Edition
(link)
BibTeX
John Black
,
Phillip Rogaway
:
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
111-131
Electronic Edition
(link)
BibTeX
Hoi-Kwong Lo
,
H. F. Chau
,
M. Ardehali
:
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security.
133-165
Electronic Edition
(link)
BibTeX
Tamir Tassa
:
Low Bandwidth Dynamic Traitor Tracing Schemes.
167-183
Electronic Edition
(link)
BibTeX
Volume 18, Number 3, July 2005
Ran Canetti
:
Preface.
187-189
Electronic Edition
(link)
BibTeX
Jeffrey Considine
,
Matthias Fitzi
,
Matthew K. Franklin
,
Leonid A. Levin
,
Ueli M. Maurer
,
David Metcalf
:
Byzantine Agreement Given Partial Broadcast.
191-217
Electronic Edition
(link)
BibTeX
Christian Cachin
,
Klaus Kursawe
,
Victor Shoup
:
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography.
219-246
Electronic Edition
(link)
BibTeX
Shafi Goldwasser
,
Yehuda Lindell
:
Secure Multi-Party Computation without Agreement.
247-287
Electronic Edition
(link)
BibTeX
Volume 18, Number 4, September 2005
Eli Biham
,
Alex Biryukov
,
Adi Shamir
:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
291-311
Electronic Edition
(link)
BibTeX
Adrian Kent
:
Secure Classical Bit Commitment Using Fixed Capacity Communication Channels.
313-335
Electronic Edition
(link)
BibTeX
Joachim von zur Gathen
,
Michael Nöcker
:
Polynomial and Normal Bases for Finite Fields.
337-355
Electronic Edition
(link)
BibTeX
Roberto Maria Avanzi
:
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography.
357-373
Electronic Edition
(link)
BibTeX
Lars R. Knudsen
,
Chris J. Mitchell
:
Partial Key Recovery Attack Against RMAC.
375-389
Electronic Edition
(link)
BibTeX
Carlo Blundo
,
Paolo D'Arco
:
Analysis and Design of Distributed Key Distribution Centers.
391-414
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:10:26 2009 by
Michael Ley
(
ley@uni-trier.de
)