Journal of Cryptology
, Volume 3
Volume 3, Number 1, 1990
Philippe Godlewski
,
Chris J. Mitchell
: Key-Minimal Crytosystems for Unconditional Secrecy. 1-25
BibTeX
Carlisle M. Adams
,
Stafford E. Tavares
: The Structured Design of Cryptographically Good S-Boxes. 27-41
BibTeX
Ralph C. Merkle
: A Fast Software One-Way Hash Function. 43-58
BibTeX
Volume 3, Number 2, 1991
Gordon B. Agnew
,
Ronald C. Mullin
,
I. M. Onyszchuk
,
Scott A. Vanstone
: An Implementation for a Fast Public-Key Cryptosystem. 63-79
BibTeX
Klaus Gaarder
,
Einar Snekkenes
: Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. 81-98
BibTeX
Stuart Haber
,
W. Scott Stornetta
: How to Time-Stamp a Digital Document. 99-111
BibTeX
Stephen M. Matyas
: Key Processing with Control Vectors. 113-136
BibTeX
J. Pastor
: CRYPTOPOST - A Cryptographic Application to Mail Processing. 137-146
BibTeX
Volume 3, Number 3, 1991
Hendrik W. Lenstra Jr.
: On the Chor-Rivest Knapsack Cryptosystem. 149-155
BibTeX
Silvio Micali
,
Claus-Peter Schnorr
: Efficient, Perfect Polynomial Random Number Generators. 157-172
BibTeX
Marijke De Soete
: New Bounds and Constructions for Authentication/Secrecy Codes with Splitting. 173-186
BibTeX
Burton S. Kaliski Jr.
: One-Way Permutations on Elliptic Curves. 187-199
BibTeX
Jovan Dj. Golic
,
Miodrag J. Mihaljevic
: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. 201-212
BibTeX
Copyright ©
Sun May 17 00:10:24 2009 by
Michael Ley
(
ley@uni-trier.de
)