Journal: J. Cryptology

Volume 2, Issue 3

115 -- 130R. Forre. Methods and Instruments for Designing S-Boxes
131 -- 143Michael Walker. Information-Theoretic Bounds for Authentication Schemes
145 -- 154Sean Murphy. The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts
155 -- 170Chris J. Mitchell. Enumerating Boolean Functions of Cryptographic Significance