Journal: J. Cryptology

Volume 10, Issue 4

223 -- 231László Csirmaz. The Size of a Share Must Be Large
233 -- 260Don Coppersmith. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
261 -- 289Wen-Ai Jackson, Keith M. Martin, Christine M. O Keefe. Mutually Trusted Authority-Free Secret Sharing Schemes

Volume 10, Issue 3

151 -- 162Shimon Even, Yishay Mansour. A Construction of a Cipher from a Single Pseudorandom Permutation
163 -- 194Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann. On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
195 -- 206Eli Biham, Alex Biryukov. An Improvement of Davies Attack on DES
207 -- 221Don Coppersmith, Jacques Stern, Serge Vaudenay. The Security of the Birational Permutation Signature Schemes

Volume 10, Issue 2

75 -- 88Amos Fiat. Batch RSA
89 -- 96Yacov Yacobi, Michael J. Beller. Batch Diffie-Hellman Key Agreement Systems
97 -- 110Christian Cachin, Ueli M. Maurer. Linking Information Reconciliation and Privacy Amplification
111 -- 147Andrew Klapper, Mark Goresky. Feedback Shift Registers, 2-Adic Span, and Combiners with Memory

Volume 10, Issue 1

1 -- 16Peter de Rooij. On Schnorr s Preprocessing for Digital Signature Schemes
17 -- 36Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway. Locally Random Reductions: Improvements and Applications
37 -- 50Toshiya Itoh, Yuji Ohta, Hiroki Shizuya. A Language-Dependent Cryptographic Primitive
51 -- 70Hans Dobbertin. RIPEMD with Two-Round Compress Function is Not Collision-Free