researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
1
, Issue
3
139
--
150
Neal Koblitz
.
Hyperelliptic Cryptosystems
151
--
158
Michael Luby
,
Charles Rackoff
.
A Study of Password Security
159
--
176
Willi Meier
,
Othmar Staffelbach
.
Fast Correlation Attacks on Certain Stream Ciphers
177
--
184
Joan Boyar
.
Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits
185
--
188
Fred Piper
,
Michael Walker
.
Linear Ciphers and Spreads
Volume
1
, Issue
2
77
--
94
Uriel Feige
,
Amos Fiat
,
Adi Shamir
.
Zero-Knowledge Proofs of Identity
95
--
105
Kevin S. McCurley
.
A Key Distribution System Equivalent to Factoring
107
--
118
Johannes Buchmann
,
Hugh C. Williams
.
A Key-Exchange System Based on Imaginary Quadratic Fields
119
--
127
Douglas R. Stinson
.
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
129
--
131
Pierre Beauchemin
,
Gilles Brassard
.
A Generalization of Hellman s Extension to Shannon s Approach to Cryptography
133
--
138
Martin Tompa
,
Heather Woll
.
How to Share a Secret with Cheaters
Volume
1
, Issue
1
3
--
36
Burton S. Kaliski Jr.
,
Ronald L. Rivest
,
Alan T. Sherman
.
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES)
37
--
52
Douglas R. Stinson
.
Some Constructions and Bounds for Authentication Codes
53
--
64
Pierre Beauchemin
,
Gilles Brassard
,
Claude Crépeau
,
Claude Goutier
,
Carl Pomerance
.
The Generation of Random Numbers that Are Probably Prime
65
--
75
David Chaum
.
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability