default search action
Journal of Cryptology, Volume 7
Volume 7, Number 1, 1994
- Oded Goldreich, Yair Oren:
Definitions and Properties of Zero-Knowledge Proof Systems. 1-32 - Andrew Klapper:
The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic. 33-51 - Benny Chor, Mihály Geréb-Graus, Eyal Kushilevitz:
On the Structure of the Privacy Hierarchy. 53-60 - Sean Murphy, Kenneth G. Paterson, Peter R. Wild:
A Weak Cipher that Generates the Symmetric Group. 61-65
Volume 7, Number 2, 1994
- Gustavus J. Simmons:
Proof of Soundness (Integrity) of Cryptographic Protocols. 69-77 - Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. 79-130
Volume 7, Number 3, 1994
- Luke O'Connor:
An Analysis of a Class of Algorithms for S-Box Construction. 133-151 - Shang-Hua Teng:
Functional Inversion and Communication Complexity. 153-170 - Renate Scheidler, Johannes Buchmann, Hugh C. Williams:
A Key-Exchange Protocol Using Real Quadratic Fields. 171-199
Volume 7, Number 4, 1994
- Minghua Qu, Scott A. Vanstone:
Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance. 201-212 - Luke O'Connor, Andrew Klapper:
Algebraic Nonlinearity and Its Applications to Cryptography. 213-227 - Eli Biham:
New Types of Cryptanalytic Attacks Using Related Keys. 229-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.