researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
11
, Issue
4
219
--
234
Volker Müller
.
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two
235
--
251
Sean Murphy
.
An Analysis of SAFER
253
--
271
Hans Dobbertin
.
Cryptanalysis of MD4
273
--
287
Phillip Rogaway
,
Don Coppersmith
.
A Software-Optimized Encryption Algorithm
Volume
11
, Issue
3
147
--
159
Jørgen Brandt
,
Ivan Damgård
,
Peter Landrock
,
Torben P. Pedersen
.
Zero-Knowledge Authentication Scheme with Secret Key Exchange
161
--
185
Antoine Joux
,
Jacques Stern
.
Lattice Reduction: A Toolbox for the Cryptanalyst
187
--
208
Cynthia Dwork
,
Moni Naor
.
An Efficient Existentially Unforgeable Signature Scheme and Its Applications
209
--
218
Ivan Damgård
,
Lars R. Knudsen
.
Two-Key Triple Encryption
Volume
11
, Issue
2
75
--
86
Jovan Dj. Golic
.
On Matroid Characterization of Ideal Secret Sharing Schemes
87
--
108
Moni Naor
,
Rafail Ostrovsky
,
Ramarathnam Venkatesan
,
Moti Yung
.
Perfect Zero-Knowledge Arguments for ::::NP:::: Using Any One-Way Permutation
109
--
124
Renate Scheidler
.
A Public-Key Cryptosystem Using Purely Cubic Fields
125
--
140
Claus-Peter Schnorr
,
Serge Vaudenay
.
The Black-Box Model for Cryptographic Primitives
141
--
145
R. Balasubramanian
,
Neal Koblitz
.
The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm
Volume
11
, Issue
1
1
--
27
Joe Kilian
,
Erez Petrank
.
An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions
29
--
43
Kouichi Sakurai
,
Hiroki Shizuya
.
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems
45
--
58
Eli Biham
.
Cryptanalysis of Multiple Modes of Operation
59
--
72
Lars R. Knudsen
,
Xuejia Lai
,
Bart Preneel
.
Attacks on Fast Double Block Length Hash Functions