


default search action
Journal of Cryptology, Volume 1
Volume 1, Number 1, 1988
- Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:

Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). 3-36 - Douglas R. Stinson:

Some Constructions and Bounds for Authentication Codes. 37-52 - Pierre Beauchemin, Gilles Brassard, Claude Crépeau, Claude Goutier, Carl Pomerance:

The Generation of Random Numbers that Are Probably Prime. 53-64 - David Chaum:

The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. 65-75
Volume 1, Number 2, 1988
- Uriel Feige, Amos Fiat, Adi Shamir:

Zero-Knowledge Proofs of Identity. 77-94 - Kevin S. McCurley

:
A Key Distribution System Equivalent to Factoring. 95-105 - Johannes Buchmann, Hugh C. Williams:

A Key-Exchange System Based on Imaginary Quadratic Fields. 107-118 - Douglas R. Stinson:

A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. 119-127 - Pierre Beauchemin, Gilles Brassard:

A Generalization of Hellman's Extension to Shannon's Approach to Cryptography. 129-131 - Martin Tompa, Heather Woll:

How to Share a Secret with Cheaters. 133-138
Volume 1, Number 3, 1989
- Neal Koblitz:

Hyperelliptic Cryptosystems. 139-150 - Michael Luby, Charles Rackoff:

A Study of Password Security. 151-158 - Willi Meier, Othmar Staffelbach:

Fast Correlation Attacks on Certain Stream Ciphers. 159-176 - Joan Boyar

:
Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits. 177-184 - Fred Piper, Michael Walker:

Linear Ciphers and Spreads. 185-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














