


default search action
Journal of Cryptology, Volume 12
Volume 12, Number 1, 1999
- Paul C. van Oorschot

, Michael J. Wiener:
Parallel Collision Search with Cryptanalytic Applications. 1-28 - Moni Naor, Omer Reingold:

On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. 29-66 - Nigel P. Smart, Samir Siksek:

A Fast Diffie-Hellman Protocol in Genus 2. 67-73
Volume 12, Number 2, 1999
- Shai Halevi:

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. 77-89 - Phillip Rogaway:

Bucket Hashing and Its Application to Fast Message Authentication. 91-115 - Mihir Bellare, Ronald L. Rivest:

Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. 117-139 - Nigel P. Smart:

Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. 141-151
Volume 12, Number 3, 1999
- Carlo Blundo, Alfredo De Santis

, Kaoru Kurosawa, Wakaha Ogata
:
On a Fallacious Bound for Authentication Codes. 155-159 - Eli Biham:

Cryptanalysis of Triple Modes of Operation. 161-184 - Daniel J. Bernstein:

How to Stretch Random Functions: The Security of Protected Counter Sums. 185-192 - Nigel P. Smart:

The Discrete Logarithm Problem on Elliptic Curves of Trace One. 193-196 - Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya:

Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. 197-223
Volume 12, Number 4, 1999
- Kathleen A. S. Quinn:

Bounds for Key Distribution Patterns. 227-239 - Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater:

Chinese Remaindering Based Cryptosystems in the Presence of Faults. 241-245 - Victor Shoup:

On the Security of a Practical Identification Scheme. 247-260 - Carlo Blundo, Alfredo De Santis

, Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes. 261-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














