default search action
Journal of Cryptology, Volume 3
Volume 3, Number 1, 1990
- Philippe Godlewski, Chris J. Mitchell:
Key-Minimal Crytosystems for Unconditional Secrecy. 1-25 - Carlisle M. Adams, Stafford E. Tavares:
The Structured Design of Cryptographically Good S-Boxes. 27-41 - Ralph C. Merkle:
A Fast Software One-Way Hash Function. 43-58
Volume 3, Number 2, 1991
- Gordon B. Agnew, Ronald C. Mullin, I. M. Onyszchuk, Scott A. Vanstone:
An Implementation for a Fast Public-Key Cryptosystem. 63-79 - Klaus Gaarder, Einar Snekkenes:
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. 81-98 - Stuart Haber, W. Scott Stornetta:
How to Time-Stamp a Digital Document. 99-111 - Stephen M. Matyas:
Key Processing with Control Vectors. 113-136 - J. Pastor:
CRYPTOPOST - A Cryptographic Application to Mail Processing. 137-146
Volume 3, Number 3, 1991
- Hendrik W. Lenstra Jr.:
On the Chor-Rivest Knapsack Cryptosystem. 149-155 - Silvio Micali, Claus-Peter Schnorr:
Efficient, Perfect Polynomial Random Number Generators. 157-172 - Marijke De Soete:
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting. 173-186 - Burton S. Kaliski Jr.:
One-Way Permutations on Elliptic Curves. 187-199 - Jovan Dj. Golic, Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. 201-212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.