Journal of Cryptology
, Volume 7
Volume 7, Number 1, 1994
Oded Goldreich
,
Yair Oren
: Definitions and Properties of Zero-Knowledge Proof Systems. 1-32
BibTeX
Andrew Klapper
: The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic. 33-51
BibTeX
Benny Chor
,
Mihály Geréb-Graus
,
Eyal Kushilevitz
: On the Structure of the Privacy Hierarchy. 53-60
BibTeX
Sean Murphy
,
Kenneth G. Paterson
,
Peter R. Wild
: A Weak Cipher that Generates the Symmetric Group. 61-65
BibTeX
Volume 7, Number 2, 1994
Gustavus J. Simmons
: Proof of Soundness (Integrity) of Cryptographic Protocols. 69-77
BibTeX
Richard A. Kemmerer
,
Catherine Meadows
,
Jonathan K. Millen
: Three System for Cryptographic Protocol Analysis. 79-130
BibTeX
Volume 7, Number 3, 1994
Luke O'Connor
: An Analysis of a Class of Algorithms for S-Box Construction. 133-151
BibTeX
Shang-Hua Teng
: Functional Inversion and Communication Complexity. 153-170
BibTeX
Renate Scheidler
,
Johannes Buchmann
,
Hugh C. Williams
: A Key-Exchange Protocol Using Real Quadratic Fields. 171-199
BibTeX
Volume 7, Number 4, 1994
Minghua Qu
,
Scott A. Vanstone
: Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance. 201-212
BibTeX
Luke O'Connor
,
Andrew Klapper
: Algebraic Nonlinearity and Its Applications to Cryptography. 213-227
BibTeX
Eli Biham
: New Types of Cryptanalytic Attacks Using Related Keys. 229-246
BibTeX
Copyright ©
Sun May 17 00:10:24 2009 by
Michael Ley
(
ley@uni-trier.de
)