researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
5
, Issue
3
153
--
166
Ernest F. Brickell
,
Douglas R. Stinson
.
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
167
--
183
Spyros S. Magliveras
,
Nasir D. Memon
.
Algebraic Properties of Cryptosystem PGM
185
--
191
S. J. Phillips
,
N. C. Phillips
.
Strongly Ideal Secret Sharing Schemes
193
--
207
Zong-Duo Dai
.
Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials
Volume
5
, Issue
2
89
--
105
Ueli M. Maurer
.
A Universal Statistical Test for Random Bit Generators
107
--
131
S. Lloyd
.
Counting Binary Functions with Certain Cryptographic Properties
133
--
137
J. Georgiades
.
Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels
139
--
150
John H. Loxton
,
David S. P. Khoo
,
Gregory J. Bird
,
Jennifer Seberry
.
A Cubic RSA Code Equivalent to Factorization
Volume
5
, Issue
1
3
--
28
Charles H. Bennett
,
François Bessette
,
Gilles Brassard
,
Louis Salvail
,
John A. Smolin
.
Experimental Quantum Cryptography
29
--
39
Ernest F. Brickell
,
Kevin S. McCurley
.
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
41
--
52
Jan-Hendrik Evertse
,
Eugène van Heyst
.
Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures?
53
--
66
Ueli M. Maurer
.
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
67
--
86
Willi Meier
,
Othmar Staffelbach
.
Correlation Properties of Combiners with Memory in Stream Ciphers