researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
2
, Issue
3
115
--
130
R. Forre
.
Methods and Instruments for Designing S-Boxes
131
--
143
Michael Walker
.
Information-Theoretic Bounds for Authentication Schemes
145
--
154
Sean Murphy
.
The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts
155
--
170
Chris J. Mitchell
.
Enumerating Boolean Functions of Cryptographic Significance
Volume
2
, Issue
2
63
--
76
Joan Boyar
,
S. A. Kurtz
,
Mark W. Krentel
.
A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs
77
--
104
Gustavus J. Simmons
.
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration
105
--
112
Harald Niederreiter
.
A Combinatorial Approach to Probabilistic Results on the Linear Complexity Profile of Random Sequences
Volume
2
, Issue
1
1
--
12
MartÃn Abadi
,
Joan Feigenbaum
.
Secure Circuit Evaluation
13
--
22
K. Nishimura
,
M. Sibuya
.
Probability To Meet in the Middle
23
--
49
Douglas R. Stinson
.
The Combinatorics of Authentication and Secrecy Codes
51
--
59
Li Gong
,
D. J. Wheeler
.
A Matrix Key-Distribution Scheme