Journal: J. Cryptology

Volume 11, Issue 4

219 -- 234Volker Müller. Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two
235 -- 251Sean Murphy. An Analysis of SAFER
253 -- 271Hans Dobbertin. Cryptanalysis of MD4
273 -- 287Phillip Rogaway, Don Coppersmith. A Software-Optimized Encryption Algorithm

Volume 11, Issue 3

147 -- 159Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen. Zero-Knowledge Authentication Scheme with Secret Key Exchange
161 -- 185Antoine Joux, Jacques Stern. Lattice Reduction: A Toolbox for the Cryptanalyst
187 -- 208Cynthia Dwork, Moni Naor. An Efficient Existentially Unforgeable Signature Scheme and Its Applications
209 -- 218Ivan Damgård, Lars R. Knudsen. Two-Key Triple Encryption

Volume 11, Issue 2

75 -- 86Jovan Dj. Golic. On Matroid Characterization of Ideal Secret Sharing Schemes
87 -- 108Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung. Perfect Zero-Knowledge Arguments for ::::NP:::: Using Any One-Way Permutation
109 -- 124Renate Scheidler. A Public-Key Cryptosystem Using Purely Cubic Fields
125 -- 140Claus-Peter Schnorr, Serge Vaudenay. The Black-Box Model for Cryptographic Primitives
141 -- 145R. Balasubramanian, Neal Koblitz. The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm

Volume 11, Issue 1

1 -- 27Joe Kilian, Erez Petrank. An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions
29 -- 43Kouichi Sakurai, Hiroki Shizuya. A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems
45 -- 58Eli Biham. Cryptanalysis of Multiple Modes of Operation
59 -- 72Lars R. Knudsen, Xuejia Lai, Bart Preneel. Attacks on Fast Double Block Length Hash Functions