Journal: J. Cryptology

Volume 5, Issue 1

3 -- 28Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin. Experimental Quantum Cryptography
29 -- 39Ernest F. Brickell, Kevin S. McCurley. An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
41 -- 52Jan-Hendrik Evertse, Eugène van Heyst. Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures?
53 -- 66Ueli M. Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
67 -- 86Willi Meier, Othmar Staffelbach. Correlation Properties of Combiners with Memory in Stream Ciphers