Search dblp for Publications

export results for "toc:db/journals/joc/joc14.bht:"

 download as .bib file

@article{DBLP:journals/joc/BaileyP01,
  author       = {Daniel V. Bailey and
                  Christof Paar},
  title        = {Efficient Arithmetic in Finite Field Extensions with Application in
                  Elliptic Curve Cryptography},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {153--176},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010012},
  doi          = {10.1007/S001450010012},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaileyP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BonehDL01,
  author       = {Dan Boneh and
                  Richard A. DeMillo and
                  Richard J. Lipton},
  title        = {On the Importance of Eliminating Errors in Cryptographic Computations},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {101--119},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010016},
  doi          = {10.1007/S001450010016},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BonehDL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Coppersmith01,
  author       = {Don Coppersmith},
  title        = {Weakness in Quaternion Signatures},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {77--85},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010006},
  doi          = {10.1007/S001450010006},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Coppersmith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CrescenzoIO01,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {Universal Service-Providers for Private Information Retrieval},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {37--74},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010008},
  doi          = {10.1007/S001450010008},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CrescenzoIO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FiatT01,
  author       = {Amos Fiat and
                  Tamir Tassa},
  title        = {Dynamic Traitor Tracing},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {211--223},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0006-7},
  doi          = {10.1007/S00145-001-0006-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FiatT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GoldmannNR01,
  author       = {Mikael Goldmann and
                  Mats N{\"{a}}slund and
                  Alexander Russell},
  title        = {Complexity Bounds on General Hard-Core Predicates},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {177--195},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0007-6},
  doi          = {10.1007/S00145-001-0007-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/GoldmannNR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JakobsenK01,
  author       = {Thomas Jakobsen and
                  Lars R. Knudsen},
  title        = {Attacks on Block Ciphers of Low Algebraic Degree},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {197--210},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0003-x},
  doi          = {10.1007/S00145-001-0003-X},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JakobsenK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KilianR01,
  author       = {Joe Kilian and
                  Phillip Rogaway},
  title        = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of
                  {DESX)}},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {17--35},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010015},
  doi          = {10.1007/S001450010015},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KilianR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Klapper01,
  author       = {Andrew Klapper},
  title        = {On the Existence of Secure Keystream Generators},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {1--15},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010014},
  doi          = {10.1007/S001450010014},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Klapper01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KurosawaJS01,
  author       = {Kaoru Kurosawa and
                  Thomas Johansson and
                  Douglas R. Stinson},
  title        = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {4},
  pages        = {231--253},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0010-y},
  doi          = {10.1007/S00145-001-0010-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LenstraV01,
  author       = {Arjen K. Lenstra and
                  Eric R. Verheul},
  title        = {Selecting Cryptographic Key Sizes},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {4},
  pages        = {255--293},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0009-4},
  doi          = {10.1007/S00145-001-0009-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LenstraV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Scanlon01,
  author       = {Thomas Scanlon},
  title        = {Public Key Cryptosystems Based on Drinfeld Modules Are Insecure},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {4},
  pages        = {225--230},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0004-9},
  doi          = {10.1007/S00145-001-0004-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Scanlon01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Vaudenay01,
  author       = {Serge Vaudenay},
  title        = {Cryptanalysis of the Chor - Rivest Cryptosystem},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {87--100},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010005},
  doi          = {10.1007/S001450010005},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Vaudenay01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/WangD01,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Secure Communication in Multicast Channels: The Answer to Franklin
                  and Wright's Question},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {121--135},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0002-y},
  doi          = {10.1007/S00145-001-0002-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/WangD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/YeDL01,
  author       = {Dingfeng Ye and
                  Zongduo Dai and
                  Kwok{-}Yan Lam},
  title        = {Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {137--150},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0001-z},
  doi          = {10.1007/S00145-001-0001-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/YeDL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics