Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc8.bht:"
@article{DBLP:journals/joc/BlackburnMS95, author = {Simon R. Blackburn and Sean Murphy and Jacques Stern}, title = {The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {157--166}, year = {1995}, url = {https://doi.org/10.1007/BF00202270}, doi = {10.1007/BF00202270}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlackburnMS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSSV95, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson and Ugo Vaccaro}, title = {Graph Decompositions and Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {39--64}, year = {1995}, url = {https://doi.org/10.1007/BF00204801}, doi = {10.1007/BF00204801}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSSV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Damgard95, author = {Ivan Damg{\aa}rd}, title = {Practical and Provably Secure Release of a Secret and Exchange of Signatures}, journal = {J. Cryptol.}, volume = {8}, number = {4}, pages = {201--222}, year = {1995}, url = {https://doi.org/10.1007/BF00191356}, doi = {10.1007/BF00191356}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Damgard95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DaviesM95, author = {Donald W. Davies and Sean Murphy}, title = {Pairs and Triplets of {DES} S-Boxes}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {1--25}, year = {1995}, url = {https://doi.org/10.1007/BF00204799}, doi = {10.1007/BF00204799}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DaviesM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DyerFFT95, author = {Martin E. Dyer and Trevor I. Fenner and Alan M. Frieze and Andrew Thomason}, title = {On Key Storage in Secure Networks}, journal = {J. Cryptol.}, volume = {8}, number = {4}, pages = {189--200}, year = {1995}, url = {https://doi.org/10.1007/BF00191355}, doi = {10.1007/BF00191355}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DyerFFT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Maurer95, author = {Ueli M. Maurer}, title = {Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {123--155}, year = {1995}, url = {https://doi.org/10.1007/BF00202269}, doi = {10.1007/BF00202269}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Maurer95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NybergK95, author = {Kaisa Nyberg and Lars R. Knudsen}, title = {Provable Security Against a Differential Attack}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {27--37}, year = {1995}, url = {https://doi.org/10.1007/BF00204800}, doi = {10.1007/BF00204800}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NybergK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/OConnor95, author = {Luke O'Connor}, title = {On the Distribution of Characteristics in Bijective Mappings}, journal = {J. Cryptol.}, volume = {8}, number = {2}, pages = {67--86}, year = {1995}, url = {https://doi.org/10.1007/BF00190756}, doi = {10.1007/BF00190756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/OConnor95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Pei95, author = {Dingyi Pei}, title = {Information-Theoretic Bounds for Authentication Codes and Block Designs}, journal = {J. Cryptol.}, volume = {8}, number = {4}, pages = {177--188}, year = {1995}, url = {https://doi.org/10.1007/BF00191354}, doi = {10.1007/BF00191354}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Pei95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Russell95, author = {Alexander Russell}, title = {Necessary and Sufficient Condtions for Collision-Free Hashing}, journal = {J. Cryptol.}, volume = {8}, number = {2}, pages = {87--100}, year = {1995}, url = {https://doi.org/10.1007/BF00190757}, doi = {10.1007/BF00190757}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/Russell95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/StinsonM95, author = {Douglas R. Stinson and James L. Massey}, title = {An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {167--173}, year = {1995}, url = {https://doi.org/10.1007/BF00202271}, doi = {10.1007/BF00202271}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/StinsonM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/VanstoneZ95, author = {Scott A. Vanstone and Robert J. Zuccherato}, title = {Short {RSA} Keys and Their Generation}, journal = {J. Cryptol.}, volume = {8}, number = {2}, pages = {101--114}, year = {1995}, url = {https://doi.org/10.1007/BF00190758}, doi = {10.1007/BF00190758}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/VanstoneZ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/YangG95, author = {Yixian Yang and Baoan Guo}, title = {Further Enumerating Boolean Functions of Cryptographic Significance}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {115--122}, year = {1995}, url = {https://doi.org/10.1007/BF00202268}, doi = {10.1007/BF00202268}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/YangG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.