researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
18
, Issue
4
291
--
311
Eli Biham
,
Alex Biryukov
,
Adi Shamir
.
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
313
--
335
Adrian Kent
.
Secure Classical Bit Commitment Using Fixed Capacity Communication Channels
337
--
355
Joachim von zur Gathen
,
Michael Nöcker
.
Polynomial and Normal Bases for Finite Fields
357
--
373
Roberto Maria Avanzi
.
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography
375
--
389
Lars R. Knudsen
,
Chris J. Mitchell
.
Partial Key Recovery Attack Against RMAC
391
--
414
Carlo Blundo
,
Paolo D Arco
.
Analysis and Design of Distributed Key Distribution Centers
Volume
18
, Issue
3
187
--
189
Ran Canetti
.
Preface
191
--
217
Jeffrey Considine
,
Matthias Fitzi
,
Matthew K. Franklin
,
Leonid A. Levin
,
Ueli M. Maurer
,
David Metcalf
.
Byzantine Agreement Given Partial Broadcast
219
--
246
Christian Cachin
,
Klaus Kursawe
,
Victor Shoup
.
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography
247
--
287
Shafi Goldwasser
,
Yehuda Lindell
.
Secure Multi-Party Computation without Agreement
Volume
18
, Issue
2
79
--
89
Régis Dupont
,
Andreas Enge
,
François Morain
.
Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields
91
--
110
Rosario Gennaro
.
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem
111
--
131
John Black
,
Phillip Rogaway
.
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
133
--
165
Hoi-Kwong Lo
,
H. F. Chau
,
M. Ardehali
.
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
167
--
183
Tamir Tassa
.
Low Bandwidth Dynamic Traitor Tracing Schemes
Volume
18
, Issue
1
1
--
35
Moni Naor
,
Benny Pinkas
.
Computationally Secure Oblivious Transfer
37
--
61
Matthias Fitzi
,
Juan A. Garay
,
Ueli M. Maurer
,
Rafail Ostrovsky
.
Minimal Complete Primitives for Secure Multi-Party Computation
63
--
76
Henri Cohen
.
Analysis of the Sliding Window Powering Algorithm