Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc14.bht:"
@article{DBLP:journals/joc/BaileyP01, author = {Daniel V. Bailey and Christof Paar}, title = {Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {153--176}, year = {2001}, url = {https://doi.org/10.1007/s001450010012}, doi = {10.1007/S001450010012}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaileyP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BonehDL01, author = {Dan Boneh and Richard A. DeMillo and Richard J. Lipton}, title = {On the Importance of Eliminating Errors in Cryptographic Computations}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {101--119}, year = {2001}, url = {https://doi.org/10.1007/s001450010016}, doi = {10.1007/S001450010016}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BonehDL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Coppersmith01, author = {Don Coppersmith}, title = {Weakness in Quaternion Signatures}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {77--85}, year = {2001}, url = {https://doi.org/10.1007/s001450010006}, doi = {10.1007/S001450010006}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Coppersmith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CrescenzoIO01, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, title = {Universal Service-Providers for Private Information Retrieval}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {37--74}, year = {2001}, url = {https://doi.org/10.1007/s001450010008}, doi = {10.1007/S001450010008}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CrescenzoIO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FiatT01, author = {Amos Fiat and Tamir Tassa}, title = {Dynamic Traitor Tracing}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {211--223}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0006-7}, doi = {10.1007/S00145-001-0006-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FiatT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GoldmannNR01, author = {Mikael Goldmann and Mats N{\"{a}}slund and Alexander Russell}, title = {Complexity Bounds on General Hard-Core Predicates}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {177--195}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0007-6}, doi = {10.1007/S00145-001-0007-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/GoldmannNR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JakobsenK01, author = {Thomas Jakobsen and Lars R. Knudsen}, title = {Attacks on Block Ciphers of Low Algebraic Degree}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {197--210}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0003-x}, doi = {10.1007/S00145-001-0003-X}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JakobsenK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KilianR01, author = {Joe Kilian and Phillip Rogaway}, title = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of {DESX)}}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {17--35}, year = {2001}, url = {https://doi.org/10.1007/s001450010015}, doi = {10.1007/S001450010015}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KilianR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Klapper01, author = {Andrew Klapper}, title = {On the Existence of Secure Keystream Generators}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {1--15}, year = {2001}, url = {https://doi.org/10.1007/s001450010014}, doi = {10.1007/S001450010014}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Klapper01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KurosawaJS01, author = {Kaoru Kurosawa and Thomas Johansson and Douglas R. Stinson}, title = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications}, journal = {J. Cryptol.}, volume = {14}, number = {4}, pages = {231--253}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0010-y}, doi = {10.1007/S00145-001-0010-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LenstraV01, author = {Arjen K. Lenstra and Eric R. Verheul}, title = {Selecting Cryptographic Key Sizes}, journal = {J. Cryptol.}, volume = {14}, number = {4}, pages = {255--293}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0009-4}, doi = {10.1007/S00145-001-0009-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LenstraV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Scanlon01, author = {Thomas Scanlon}, title = {Public Key Cryptosystems Based on Drinfeld Modules Are Insecure}, journal = {J. Cryptol.}, volume = {14}, number = {4}, pages = {225--230}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0004-9}, doi = {10.1007/S00145-001-0004-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Scanlon01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Vaudenay01, author = {Serge Vaudenay}, title = {Cryptanalysis of the Chor - Rivest Cryptosystem}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {87--100}, year = {2001}, url = {https://doi.org/10.1007/s001450010005}, doi = {10.1007/S001450010005}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Vaudenay01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/WangD01, author = {Yongge Wang and Yvo Desmedt}, title = {Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {121--135}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0002-y}, doi = {10.1007/S00145-001-0002-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/WangD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/YeDL01, author = {Dingfeng Ye and Zongduo Dai and Kwok{-}Yan Lam}, title = {Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {137--150}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0001-z}, doi = {10.1007/S00145-001-0001-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/YeDL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.