Journal: J. Cryptology

Volume 2, Issue 3

115 -- 130R. Forre. Methods and Instruments for Designing S-Boxes
131 -- 143Michael Walker. Information-Theoretic Bounds for Authentication Schemes
145 -- 154Sean Murphy. The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts
155 -- 170Chris J. Mitchell. Enumerating Boolean Functions of Cryptographic Significance

Volume 2, Issue 2

63 -- 76Joan Boyar, S. A. Kurtz, Mark W. Krentel. A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs
77 -- 104Gustavus J. Simmons. A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration
105 -- 112Harald Niederreiter. A Combinatorial Approach to Probabilistic Results on the Linear Complexity Profile of Random Sequences

Volume 2, Issue 1

1 -- 12Martín Abadi, Joan Feigenbaum. Secure Circuit Evaluation
13 -- 22K. Nishimura, M. Sibuya. Probability To Meet in the Middle
23 -- 49Douglas R. Stinson. The Combinatorics of Authentication and Secrecy Codes
51 -- 59Li Gong, D. J. Wheeler. A Matrix Key-Distribution Scheme