Journal: J. Cryptology

Volume 7, Issue 4

201 -- 212Minghua Qu, Scott A. Vanstone. Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance
213 -- 227Luke O Connor, Andrew Klapper. Algebraic Nonlinearity and Its Applications to Cryptography
229 -- 246Eli Biham. New Types of Cryptanalytic Attacks Using Related Keys

Volume 7, Issue 3

133 -- 151Luke O Connor. An Analysis of a Class of Algorithms for S-Box Construction
153 -- 170Shang-Hua Teng. Functional Inversion and Communication Complexity
171 -- 199Renate Scheidler, Johannes Buchmann, Hugh C. Williams. A Key-Exchange Protocol Using Real Quadratic Fields

Volume 7, Issue 2

69 -- 77Gustavus J. Simmons. Proof of Soundness (Integrity) of Cryptographic Protocols
79 -- 130Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen. Three System for Cryptographic Protocol Analysis

Volume 7, Issue 1

1 -- 32Oded Goldreich, Yair Oren. Definitions and Properties of Zero-Knowledge Proof Systems
33 -- 51Andrew Klapper. The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
53 -- 60Benny Chor, Mihály Geréb-Graus, Eyal Kushilevitz. On the Structure of the Privacy Hierarchy
61 -- 65Sean Murphy, Kenneth G. Paterson, Peter R. Wild. A Weak Cipher that Generates the Symmetric Group