


default search action
Journal of Cryptology, Volume 8
Volume 8, Number 1, 1995
- Donald W. Davies, Sean Murphy:

Pairs and Triplets of DES S-Boxes. 1-25 - Kaisa Nyberg, Lars R. Knudsen:

Provable Security Against a Differential Attack. 27-37 - Carlo Blundo, Alfredo De Santis

, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. 39-64
Volume 8, Number 2, 1995
- Luke O'Connor:

On the Distribution of Characteristics in Bijective Mappings. 67-86 - Alexander Russell

:
Necessary and Sufficient Condtions for Collision-Free Hashing. 87-100 - Scott A. Vanstone, Robert J. Zuccherato:

Short RSA Keys and Their Generation. 101-114
Volume 8, Number 3, 1995
- Yixian Yang, Baoan Guo:

Further Enumerating Boolean Functions of Cryptographic Significance. 115-122 - Ueli M. Maurer:

Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. 123-155 - Simon R. Blackburn, Sean Murphy, Jacques Stern:

The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings. 157-166 - Douglas R. Stinson, James L. Massey:

An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions. 167-173
Volume 8, Number 4, 1995
- Dingyi Pei:

Information-Theoretic Bounds for Authentication Codes and Block Designs. 177-188 - Martin E. Dyer

, Trevor I. Fenner, Alan M. Frieze, Andrew Thomason:
On Key Storage in Secure Networks. 189-200 - Ivan Damgård:

Practical and Provably Secure Release of a Secret and Exchange of Signatures. 201-222

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














