


default search action
Journal of Cryptology, Volume 15
Volume 15, Number 1, 2002
- Silvio Micali, Leonid Reyzin:

Improving the Exact Security of Digital Signature Schemes. 1-18 - Pierrick Gaudry, Florian Hess, Nigel P. Smart:

Constructive and Destructive Facets of Weil Descent on Elliptic Curves. 19-46 - Eli Biham, Lars R. Knudsen:

Cryptanalysis of the ANSI X9.52 CBCM Mode. 47-59 - Alexander A. Moldovyan, Nick A. Moldovyan:

A Cipher Based on Data-Dependent Permutations. 61-72
Volume 15, Number 2, 2002
- Victor Shoup, Rosario Gennaro:

Securing Threshold Cryptosystems against Chosen Ciphertext Attack. 75-96 - Moni Naor, Omer Reingold:

Constructing Pseudo-Random Permutations with a Prescribed Structure. 97-102 - Martín Abadi, Phillip Rogaway:

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). 103-127 - Steven D. Galbraith

:
Elliptic Curve Paillier Schemes. 129-138 - Anna M. Johnston, Peter Gemmell:

Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack. 139-148
Volume 15, Number 3, 2002
- Phong Q. Nguyen, Igor E. Shparlinski

:
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. 151-176 - Yehuda Lindell

, Benny Pinkas:
Privacy Preserving Data Mining. 177-206 - Lars R. Knudsen:

The Security of Feistel Ciphers with Six Rounds or Less. 207-222
Volume 15, Number 4, 2002
- Victor Shoup:

OAEP Reconsidered. 223-249 - Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham:

Paillier's Trapdoor Function Hides up to O(n) Bits. 251-269 - Mihir Bellare:

A Note on Negligible Functions. 271-284 - Spyros S. Magliveras, Douglas R. Stinson, Tran van Trung:

New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups. 285-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














