researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Volume
Volume
8
, Issue
4
177
--
188
Dingyi Pei
.
Information-Theoretic Bounds for Authentication Codes and Block Designs
189
--
200
Martin E. Dyer
,
Trevor I. Fenner
,
Alan M. Frieze
,
Andrew Thomason
.
On Key Storage in Secure Networks
201
--
222
Ivan Damgård
.
Practical and Provably Secure Release of a Secret and Exchange of Signatures
Volume
8
, Issue
3
115
--
122
Yi Xian Yang
,
Baoan Guo
.
Further Enumerating Boolean Functions of Cryptographic Significance
123
--
155
Ueli M. Maurer
.
Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters
157
--
166
Simon R. Blackburn
,
Sean Murphy
,
Jacques Stern
.
The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings
167
--
173
Douglas R. Stinson
,
James L. Massey
.
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions
Volume
8
, Issue
2
67
--
86
Luke O Connor
.
On the Distribution of Characteristics in Bijective Mappings
87
--
100
Alexander Russell
.
Necessary and Sufficient Condtions for Collision-Free Hashing
101
--
114
Scott A. Vanstone
,
Robert J. Zuccherato
.
Short RSA Keys and Their Generation
Volume
8
, Issue
1
1
--
25
Donald W. Davies
,
Sean Murphy
.
Pairs and Triplets of DES S-Boxes
27
--
37
Kaisa Nyberg
,
Lars R. Knudsen
.
Provable Security Against a Differential Attack
39
--
64
Carlo Blundo
,
Alfredo De Santis
,
Douglas R. Stinson
,
Ugo Vaccaro
.
Graph Decompositions and Secret Sharing Schemes