


default search action
Journal of Cryptology, Volume 5
Volume 5, Number 1, 1992
- Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin:

Experimental Quantum Cryptography. 3-28 - Ernest F. Brickell, Kevin S. McCurley

:
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. 29-39 - Jan-Hendrik Evertse, Eugène van Heyst:

Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures? 41-52 - Ueli M. Maurer:

Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. 53-66 - Willi Meier, Othmar Staffelbach:

Correlation Properties of Combiners with Memory in Stream Ciphers. 67-86
Volume 5, Number 2, 1992
- Ueli M. Maurer:

A Universal Statistical Test for Random Bit Generators. 89-105 - Sheelagh Lloyd:

Counting Binary Functions with Certain Cryptographic Properties. 107-131 - Jean Georgiades:

Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels. 133-137 - John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry:

A Cubic RSA Code Equivalent to Factorization. 139-150
Volume 5, Number 3, 1992
- Ernest F. Brickell, Douglas R. Stinson:

Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. 153-166 - Spyros S. Magliveras, Nasir D. Memon

:
Algebraic Properties of Cryptosystem PGM. 167-183 - S. J. Phillips, N. C. Phillips:

Strongly Ideal Secret Sharing Schemes. 185-191 - Zong-Duo Dai:

Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials. 193-207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














