Journal: J. Cryptology

Volume 1, Issue 3

139 -- 150Neal Koblitz. Hyperelliptic Cryptosystems
151 -- 158Michael Luby, Charles Rackoff. A Study of Password Security
159 -- 176Willi Meier, Othmar Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers
177 -- 184Joan Boyar. Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits
185 -- 188Fred Piper, Michael Walker. Linear Ciphers and Spreads

Volume 1, Issue 2

77 -- 94Uriel Feige, Amos Fiat, Adi Shamir. Zero-Knowledge Proofs of Identity
95 -- 105Kevin S. McCurley. A Key Distribution System Equivalent to Factoring
107 -- 118Johannes Buchmann, Hugh C. Williams. A Key-Exchange System Based on Imaginary Quadratic Fields
119 -- 127Douglas R. Stinson. A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
129 -- 131Pierre Beauchemin, Gilles Brassard. A Generalization of Hellman s Extension to Shannon s Approach to Cryptography
133 -- 138Martin Tompa, Heather Woll. How to Share a Secret with Cheaters

Volume 1, Issue 1

3 -- 36Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman. Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES)
37 -- 52Douglas R. Stinson. Some Constructions and Bounds for Authentication Codes
53 -- 64Pierre Beauchemin, Gilles Brassard, Claude Crépeau, Claude Goutier, Carl Pomerance. The Generation of Random Numbers that Are Probably Prime
65 -- 75David Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability