Journal of Cryptology
, Volume 2
Volume 2, Number 1, 1990
Martín Abadi
,
Joan Feigenbaum
: Secure Circuit Evaluation. 1-12
BibTeX
K. Nishimura
,
M. Sibuya
: Probability To Meet in the Middle. 13-22
BibTeX
Douglas R. Stinson
: The Combinatorics of Authentication and Secrecy Codes. 23-49
BibTeX
Li Gong
,
D. J. Wheeler
: A Matrix Key-Distribution Scheme. 51-59
BibTeX
Volume 2, Number 2, 1990
Joan Boyar
,
S. A. Kurtz
,
Mark W. Krentel
: A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs. 63-76
BibTeX
Gustavus J. Simmons
: A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration. 77-104
BibTeX
Harald Niederreiter
: A Combinatorial Approach to Probabilistic Results on the Linear Complexity Profile of Random Sequences. 105-112
BibTeX
Volume 2, Number 3, 1990
R. Forre
: Methods and Instruments for Designing S-Boxes. 115-130
BibTeX
Michael Walker
: Information-Theoretic Bounds for Authentication Schemes. 131-143
BibTeX
Sean Murphy
: The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts. 145-154
BibTeX
Chris J. Mitchell
: Enumerating Boolean Functions of Cryptographic Significance. 155-170
BibTeX
Copyright ©
Sun May 17 00:10:24 2009 by
Michael Ley
(
ley@uni-trier.de
)