Journal: J. Cryptology

Volume 14, Issue 4

225 -- 230Thomas Scanlon. Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
231 -- 253Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson. Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications
255 -- 293Arjen K. Lenstra, Eric R. Verheul. Selecting Cryptographic Key Sizes

Volume 14, Issue 3

153 -- 176Daniel V. Bailey, Christof Paar. Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
177 -- 195Mikael Goldmann, Mats Näslund, Alexander Russell. Complexity Bounds on General Hard-Core Predicates
197 -- 210Thomas Jakobsen, Lars R. Knudsen. Attacks on Block Ciphers of Low Algebraic Degree
211 -- 223Amos Fiat, Tamir Tassa. Dynamic Traitor Tracing

Volume 14, Issue 2

77 -- 85Don Coppersmith. Weakness in Quaternion Signatures
87 -- 100Serge Vaudenay. Cryptanalysis of the Chor - Rivest Cryptosystem
101 -- 119Dan Boneh, Richard A. DeMillo, Richard J. Lipton. On the Importance of Eliminating Errors in Cryptographic Computations
121 -- 135Yongge Wang, Yvo Desmedt. Secure Communication in Multicast Channels: The Answer to Franklin and Wright s Question
137 -- 150Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions

Volume 14, Issue 1

1 -- 15Andrew Klapper. On the Existence of Secure Keystream Generators
17 -- 35Joe Kilian, Phillip Rogaway. How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)
37 -- 74Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky. Universal Service-Providers for Private Information Retrieval