researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
10
, Issue
4
223
--
231
László Csirmaz
.
The Size of a Share Must Be Large
233
--
260
Don Coppersmith
.
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
261
--
289
Wen-Ai Jackson
,
Keith M. Martin
,
Christine M. O Keefe
.
Mutually Trusted Authority-Free Secret Sharing Schemes
Volume
10
, Issue
3
151
--
162
Shimon Even
,
Yishay Mansour
.
A Construction of a Cipher from a Single Pseudorandom Permutation
163
--
194
Ivan Damgård
,
Torben P. Pedersen
,
Birgit Pfitzmann
.
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
195
--
206
Eli Biham
,
Alex Biryukov
.
An Improvement of Davies Attack on DES
207
--
221
Don Coppersmith
,
Jacques Stern
,
Serge Vaudenay
.
The Security of the Birational Permutation Signature Schemes
Volume
10
, Issue
2
75
--
88
Amos Fiat
.
Batch RSA
89
--
96
Yacov Yacobi
,
Michael J. Beller
.
Batch Diffie-Hellman Key Agreement Systems
97
--
110
Christian Cachin
,
Ueli M. Maurer
.
Linking Information Reconciliation and Privacy Amplification
111
--
147
Andrew Klapper
,
Mark Goresky
.
Feedback Shift Registers, 2-Adic Span, and Combiners with Memory
Volume
10
, Issue
1
1
--
16
Peter de Rooij
.
On Schnorr s Preprocessing for Digital Signature Schemes
17
--
36
Donald Beaver
,
Joan Feigenbaum
,
Joe Kilian
,
Phillip Rogaway
.
Locally Random Reductions: Improvements and Applications
37
--
50
Toshiya Itoh
,
Yuji Ohta
,
Hiroki Shizuya
.
A Language-Dependent Cryptographic Primitive
51
--
70
Hans Dobbertin
.
RIPEMD with Two-Round Compress Function is Not Collision-Free