Journal of Cryptology
, Volume 5
Volume 5, Number 1, 1992
Charles H. Bennett
,
François Bessette
,
Gilles Brassard
,
Louis Salvail
,
John A. Smolin
: Experimental Quantum Cryptography. 3-28
BibTeX
Ernest F. Brickell
,
Kevin S. McCurley
: An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. 29-39
BibTeX
Jan-Hendrik Evertse
,
Eugène van Heyst
: Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures? 41-52
BibTeX
Ueli M. Maurer
: Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. 53-66
BibTeX
Willi Meier
,
Othmar Staffelbach
: Correlation Properties of Combiners with Memory in Stream Ciphers. 67-86
BibTeX
Volume 5, Number 2, 1992
Ueli M. Maurer
: A Universal Statistical Test for Random Bit Generators. 89-105
BibTeX
S. Lloyd
: Counting Binary Functions with Certain Cryptographic Properties. 107-131
BibTeX
J. Georgiades
: Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels. 133-137
BibTeX
John H. Loxton
,
David S. P. Khoo
,
Gregory J. Bird
,
Jennifer Seberry
: A Cubic RSA Code Equivalent to Factorization. 139-150
BibTeX
Volume 5, Number 3, 1992
Ernest F. Brickell
,
Douglas R. Stinson
: Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. 153-166
BibTeX
Spyros S. Magliveras
,
Nasir D. Memon
: Algebraic Properties of Cryptosystem PGM. 167-183
BibTeX
S. J. Phillips
,
N. C. Phillips
: Strongly Ideal Secret Sharing Schemes. 185-191
BibTeX
Zong-Duo Dai
: Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials. 193-207
BibTeX
Copyright ©
Sun May 17 00:10:24 2009 by
Michael Ley
(
ley@uni-trier.de
)