Journal: Des. Codes Cryptography

Volume 7, Issue 1-2

7 -- 9Thomas Beth, Whitfield Diffie. Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue
9 -- 12Whitfield Diffie. The National Security Establishment and the Development of Public-Key Cryptography
13 -- 15Mary Fischer. And Now For Something Completely Different (The Egyptologist and the Cryptographer: A Personal Reminiscence)
17 -- 25Thomas Beth. Watching the Bhang Meter and Flying through Dirt
27 -- 59Paul F. Syverson, Catherine Meadows. A Formal Language for Cryptographic Protocol Requirements
61 -- 81Kaisa Nyberg, Rainer A. Rueppel. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
83 -- 99Reihaneh Safavi-Naini, L. Tombak. Authentication Codes in Plaintext and Chosen-Content Attacks
101 -- 110Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild. Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes
111 -- 134Xian-Mo Zhang, Yuliang Zheng. Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors
135 -- 151Dieter Gollmann, Yongfei Han, Chris J. Mitchell. Redundant Integer Representations and Fast Exponentiation
153 -- 174Renate Scheidler, Andreas Stein, Hugh C. Williams. Key-Exchange in Real Quadratic Congruence Function Fields