researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
14
, Issue
4
225
--
230
Thomas Scanlon
.
Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
231
--
253
Kaoru Kurosawa
,
Thomas Johansson
,
Douglas R. Stinson
.
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications
255
--
293
Arjen K. Lenstra
,
Eric R. Verheul
.
Selecting Cryptographic Key Sizes
Volume
14
, Issue
3
153
--
176
Daniel V. Bailey
,
Christof Paar
.
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
177
--
195
Mikael Goldmann
,
Mats Näslund
,
Alexander Russell
.
Complexity Bounds on General Hard-Core Predicates
197
--
210
Thomas Jakobsen
,
Lars R. Knudsen
.
Attacks on Block Ciphers of Low Algebraic Degree
211
--
223
Amos Fiat
,
Tamir Tassa
.
Dynamic Traitor Tracing
Volume
14
, Issue
2
77
--
85
Don Coppersmith
.
Weakness in Quaternion Signatures
87
--
100
Serge Vaudenay
.
Cryptanalysis of the Chor - Rivest Cryptosystem
101
--
119
Dan Boneh
,
Richard A. DeMillo
,
Richard J. Lipton
.
On the Importance of Eliminating Errors in Cryptographic Computations
121
--
135
Yongge Wang
,
Yvo Desmedt
.
Secure Communication in Multicast Channels: The Answer to Franklin and Wright s Question
137
--
150
Dingfeng Ye
,
Zongduo Dai
,
Kwok-Yan Lam
.
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions
Volume
14
, Issue
1
1
--
15
Andrew Klapper
.
On the Existence of Secure Keystream Generators
17
--
35
Joe Kilian
,
Phillip Rogaway
.
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)
37
--
74
Giovanni Di Crescenzo
,
Yuval Ishai
,
Rafail Ostrovsky
.
Universal Service-Providers for Private Information Retrieval