Search dblp for Publications

export results for "toc:db/journals/joc/joc8.bht:"

 download as .bib file

@article{DBLP:journals/joc/BlackburnMS95,
  author       = {Simon R. Blackburn and
                  Sean Murphy and
                  Jacques Stern},
  title        = {The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {157--166},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202270},
  doi          = {10.1007/BF00202270},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlackburnMS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSSV95,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson and
                  Ugo Vaccaro},
  title        = {Graph Decompositions and Secret Sharing Schemes},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {39--64},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00204801},
  doi          = {10.1007/BF00204801},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSSV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Damgard95,
  author       = {Ivan Damg{\aa}rd},
  title        = {Practical and Provably Secure Release of a Secret and Exchange of
                  Signatures},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {201--222},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00191356},
  doi          = {10.1007/BF00191356},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Damgard95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DaviesM95,
  author       = {Donald W. Davies and
                  Sean Murphy},
  title        = {Pairs and Triplets of {DES} S-Boxes},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {1--25},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00204799},
  doi          = {10.1007/BF00204799},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DaviesM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DyerFFT95,
  author       = {Martin E. Dyer and
                  Trevor I. Fenner and
                  Alan M. Frieze and
                  Andrew Thomason},
  title        = {On Key Storage in Secure Networks},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {189--200},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00191355},
  doi          = {10.1007/BF00191355},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DyerFFT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Maurer95,
  author       = {Ueli M. Maurer},
  title        = {Fast Generation of Prime Numbers and Secure Public-Key Cryptographic
                  Parameters},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {123--155},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202269},
  doi          = {10.1007/BF00202269},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Maurer95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NybergK95,
  author       = {Kaisa Nyberg and
                  Lars R. Knudsen},
  title        = {Provable Security Against a Differential Attack},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {27--37},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00204800},
  doi          = {10.1007/BF00204800},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NybergK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/OConnor95,
  author       = {Luke O'Connor},
  title        = {On the Distribution of Characteristics in Bijective Mappings},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {67--86},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00190756},
  doi          = {10.1007/BF00190756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/OConnor95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Pei95,
  author       = {Dingyi Pei},
  title        = {Information-Theoretic Bounds for Authentication Codes and Block Designs},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {177--188},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00191354},
  doi          = {10.1007/BF00191354},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Pei95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Russell95,
  author       = {Alexander Russell},
  title        = {Necessary and Sufficient Condtions for Collision-Free Hashing},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {87--100},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00190757},
  doi          = {10.1007/BF00190757},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/Russell95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/StinsonM95,
  author       = {Douglas R. Stinson and
                  James L. Massey},
  title        = {An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear
                  Resilient Functions},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {167--173},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202271},
  doi          = {10.1007/BF00202271},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/StinsonM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/VanstoneZ95,
  author       = {Scott A. Vanstone and
                  Robert J. Zuccherato},
  title        = {Short {RSA} Keys and Their Generation},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {101--114},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00190758},
  doi          = {10.1007/BF00190758},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/VanstoneZ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/YangG95,
  author       = {Yixian Yang and
                  Baoan Guo},
  title        = {Further Enumerating Boolean Functions of Cryptographic Significance},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {115--122},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202268},
  doi          = {10.1007/BF00202268},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/YangG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics