Journal: J. Cryptology

Volume 8, Issue 4

177 -- 188Dingyi Pei. Information-Theoretic Bounds for Authentication Codes and Block Designs
189 -- 200Martin E. Dyer, Trevor I. Fenner, Alan M. Frieze, Andrew Thomason. On Key Storage in Secure Networks
201 -- 222Ivan Damgård. Practical and Provably Secure Release of a Secret and Exchange of Signatures

Volume 8, Issue 3

115 -- 122Yi Xian Yang, Baoan Guo. Further Enumerating Boolean Functions of Cryptographic Significance
123 -- 155Ueli M. Maurer. Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters
157 -- 166Simon R. Blackburn, Sean Murphy, Jacques Stern. The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings
167 -- 173Douglas R. Stinson, James L. Massey. An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions

Volume 8, Issue 2

67 -- 86Luke O Connor. On the Distribution of Characteristics in Bijective Mappings
87 -- 100Alexander Russell. Necessary and Sufficient Condtions for Collision-Free Hashing
101 -- 114Scott A. Vanstone, Robert J. Zuccherato. Short RSA Keys and Their Generation

Volume 8, Issue 1

1 -- 25Donald W. Davies, Sean Murphy. Pairs and Triplets of DES S-Boxes
27 -- 37Kaisa Nyberg, Lars R. Knudsen. Provable Security Against a Differential Attack
39 -- 64Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro. Graph Decompositions and Secret Sharing Schemes