Search dblp for Publications

export results for "toc:db/journals/joc/joc10.bht:"

 download as .bib file

@article{DBLP:journals/joc/BeaverFKR97,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Joe Kilian and
                  Phillip Rogaway},
  title        = {Locally Random Reductions: Improvements and Applications},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {17--36},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900017},
  doi          = {10.1007/S001459900017},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamB97,
  author       = {Eli Biham and
                  Alex Biryukov},
  title        = {An Improvement of Davies' Attack on {DES}},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {195--206},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900027},
  doi          = {10.1007/S001459900027},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BihamB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CachinM97,
  author       = {Christian Cachin and
                  Ueli M. Maurer},
  title        = {Linking Information Reconciliation and Privacy Amplification},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {97--110},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900023},
  doi          = {10.1007/S001459900023},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CachinM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Coppersmith97,
  author       = {Don Coppersmith},
  title        = {Small Solutions to Polynomial Equations, and Low Exponent {RSA} Vulnerabilities},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {4},
  pages        = {233--260},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900030},
  doi          = {10.1007/S001459900030},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Coppersmith97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoppersmithSV97,
  author       = {Don Coppersmith and
                  Jacques Stern and
                  Serge Vaudenay},
  title        = {The Security of the Birational Permutation Signature Schemes},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {207--221},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900028},
  doi          = {10.1007/S001459900028},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CoppersmithSV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Csirmaz97,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {The Size of a Share Must Be Large},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {4},
  pages        = {223--231},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900029},
  doi          = {10.1007/S001459900029},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Csirmaz97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardPP97,
  author       = {Ivan Damg{\aa}rd and
                  Torben P. Pedersen and
                  Birgit Pfitzmann},
  title        = {On the Existence of Statistically Hiding Bit Commitment Schemes and
                  Fail-Stop Signatures},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {163--194},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900026},
  doi          = {10.1007/S001459900026},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardPP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dobbertin97,
  author       = {Hans Dobbertin},
  title        = {{RIPEMD} with Two-Round Compress Function is Not Collision-Free},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {51--70},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900019},
  doi          = {10.1007/S001459900019},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dobbertin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/EvenM97,
  author       = {Shimon Even and
                  Yishay Mansour},
  title        = {A Construction of a Cipher from a Single Pseudorandom Permutation},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {151--162},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900025},
  doi          = {10.1007/S001459900025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/EvenM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Fiat97,
  author       = {Amos Fiat},
  title        = {Batch {RSA}},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {75--88},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900021},
  doi          = {10.1007/S001459900021},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Fiat97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ItohOS97,
  author       = {Toshiya Itoh and
                  Yuji Ohta and
                  Hiroki Shizuya},
  title        = {A Language-Dependent Cryptographic Primitive},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {37--50},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900018},
  doi          = {10.1007/S001459900018},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ItohOS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JacksonMO97,
  author       = {Wen{-}Ai Jackson and
                  Keith M. Martin and
                  Christine M. O'Keefe},
  title        = {Mutually Trusted Authority-Free Secret Sharing Schemes},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {4},
  pages        = {261--289},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900031},
  doi          = {10.1007/S001459900031},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JacksonMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Kaliski97,
  author       = {Burton S. Kaliski Jr.},
  title        = {A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {71--72},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900020},
  doi          = {10.1007/S001459900020},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Kaliski97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KlapperG97,
  author       = {Andrew Klapper and
                  Mark Goresky},
  title        = {Feedback Shift Registers, 2-Adic Span, and Combiners with Memory},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {111--147},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900024},
  doi          = {10.1007/S001459900024},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KlapperG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Rooij97,
  author       = {Peter de Rooij},
  title        = {On Schnorr's Preprocessing for Digital Signature Schemes},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {1--16},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900016},
  doi          = {10.1007/S001459900016},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Rooij97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/YacobiB97,
  author       = {Yacov Yacobi and
                  Michael J. Beller},
  title        = {Batch Diffie-Hellman Key Agreement Systems},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {89--96},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900022},
  doi          = {10.1007/S001459900022},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/YacobiB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics