Journal: J. Cryptology

Volume 5, Issue 3

153 -- 166Ernest F. Brickell, Douglas R. Stinson. Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
167 -- 183Spyros S. Magliveras, Nasir D. Memon. Algebraic Properties of Cryptosystem PGM
185 -- 191S. J. Phillips, N. C. Phillips. Strongly Ideal Secret Sharing Schemes
193 -- 207Zong-Duo Dai. Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials

Volume 5, Issue 2

89 -- 105Ueli M. Maurer. A Universal Statistical Test for Random Bit Generators
107 -- 131S. Lloyd. Counting Binary Functions with Certain Cryptographic Properties
133 -- 137J. Georgiades. Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels
139 -- 150John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry. A Cubic RSA Code Equivalent to Factorization

Volume 5, Issue 1

3 -- 28Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin. Experimental Quantum Cryptography
29 -- 39Ernest F. Brickell, Kevin S. McCurley. An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
41 -- 52Jan-Hendrik Evertse, Eugène van Heyst. Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures?
53 -- 66Ueli M. Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
67 -- 86Willi Meier, Othmar Staffelbach. Correlation Properties of Combiners with Memory in Stream Ciphers