researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
7
, Issue
4
201
--
212
Minghua Qu
,
Scott A. Vanstone
.
Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance
213
--
227
Luke O Connor
,
Andrew Klapper
.
Algebraic Nonlinearity and Its Applications to Cryptography
229
--
246
Eli Biham
.
New Types of Cryptanalytic Attacks Using Related Keys
Volume
7
, Issue
3
133
--
151
Luke O Connor
.
An Analysis of a Class of Algorithms for S-Box Construction
153
--
170
Shang-Hua Teng
.
Functional Inversion and Communication Complexity
171
--
199
Renate Scheidler
,
Johannes Buchmann
,
Hugh C. Williams
.
A Key-Exchange Protocol Using Real Quadratic Fields
Volume
7
, Issue
2
69
--
77
Gustavus J. Simmons
.
Proof of Soundness (Integrity) of Cryptographic Protocols
79
--
130
Richard A. Kemmerer
,
Catherine Meadows
,
Jonathan K. Millen
.
Three System for Cryptographic Protocol Analysis
Volume
7
, Issue
1
1
--
32
Oded Goldreich
,
Yair Oren
.
Definitions and Properties of Zero-Knowledge Proof Systems
33
--
51
Andrew Klapper
.
The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
53
--
60
Benny Chor
,
Mihály Geréb-Graus
,
Eyal Kushilevitz
.
On the Structure of the Privacy Hierarchy
61
--
65
Sean Murphy
,
Kenneth G. Paterson
,
Peter R. Wild
.
A Weak Cipher that Generates the Symmetric Group