Substitution-permutation networks resistant to differential and linear cryptanalysisSecure implementation of identification systemsSecure Hardware Implementation of Nonlinear Functions in the Presence of GlitchesZero-Knowledge Proofs of IdentityThe cryptanalysis of FEAL-4 with 20 chosen plaintextsCryptanalysis of MD2Provable security against a differential attackEfficient signature generation by smart cardsSmall Solutions to Polynomial Equations, and Low Exponent RSA VulnerabilitiesNecessary and sufficient conditions for collision-free hashingDifferential cryptanalysis of DES-like cryptosystemsExperimental quantum cryptographyA One Round Protocol for Tripartite Diffie?HellmanInstant Ciphertext-Only Cryptanalysis of GSM Encrypted CommunicationAnother Look at "Provable Security"An improvement of Davies’ attack on DESThe Discrete Logarithm Problem on Elliptic Curves of Trace OneThe dining cryptographers problem: Unconditional sender and recipient untraceabilityRSA-OAEP Is Secure under the RSA AssumptionA fast software one-way hash functionOn key storage in secure networksA matrix key-distribution schemeParallel Collision Search with Cryptanalytic ApplicationsIs the Data Encryption Standard a group? (Results of cycling experiments on DES)A secure protocol for the oblivious transfer (extended abstract)How to time-stamp a digital documentOAEP ReconsideredQuantum Private Information Retrieval has Linear Communication ComplexityOn-line/off-line digital signaturesOn the Fly Authentication and Signature Schemes Based on Groups of Unknown OrderDifferential cryptanalysis of LuciferAn Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error EstimateBuses for Anonymous Message DeliveryOn the Tightness of Forward-Secure Signature ReductionsTrapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based AuthenticationThe One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature SchemeSecurity Arguments for Digital Signatures and Blind SignaturesSlender-Set Differential CryptanalysisOn-line Ciphers and the Hash-CBC ConstructionsSecurity Analysis of Randomize-Hash-then-Sign Digital Signatures
P1433
Q21587948-D05CBCEF-3EA4-4A15-9483-9D29D0C00F27Q21820687-AA44639C-01E2-4C77-B55E-B8267788DC77Q22022529-E08BE0F0-64BE-4732-8C50-D2D0D0CD208CQ27910307-CE113453-43FF-4B4D-AE1C-15D55E7BAFB1Q27980121-7881F1CD-3600-4395-96EC-C989410A882FQ28000398-8820B20B-C465-4443-9225-42B3EB77FA82Q29030766-92D7C2F8-B781-4958-AC96-5C873536582DQ29394991-E9C0BA86-0166-4DA6-A020-FF4661D613C7Q54136651-4CDBD343-41C6-44BA-907B-C00DBB6F902FQ54302698-C6E63CD0-7908-4757-A8B6-A4A8464B9243Q55868749-7E2E3CD3-960A-41ED-BD6E-D355474F71E7Q55882573-AFD0B14C-0194-4D26-B31B-072B01132775Q55952480-919CBB48-44A2-40B0-B0F9-27F84B3ED468Q55970031-B0EA0CD9-298E-4F86-863D-29BB8385FAF7Q56016960-AC12B877-5467-411E-A36F-B42DAE24C84EQ56041378-7ACD2B12-1C5B-413B-A1F0-30060334F3BBQ56047758-76373C8C-7FD7-4D0D-9C54-37D22F834775Q56172630-DBABB163-D61B-4846-8492-AD08F4F7289CQ56269076-FE06ED9E-4437-4EAF-88D3-08004766BD4FQ56270790-77BDA990-AE9E-4CAD-8D88-2A62F3EB8750Q56324040-FB0E4201-E78A-4E5C-837A-68F486FF3173Q56336173-A64F696F-A588-47A2-95FA-71F8537148A9Q56388136-C43515C9-FD84-4CAF-B778-1F027FA636BBQ56388146-AD1F9CFA-9878-440A-8A21-763FAA0BD9DDQ56417606-9BFFE63E-3254-4A9C-BB94-DB59E9F2A1B9Q56458908-12A1F248-1BE4-421D-AF9D-E46926575952Q56475229-6B58A7CC-2489-4DB4-82FC-CE46D962E010Q56475320-CF1A22C1-C757-4237-9882-3FCCEE64D32EQ56570666-3A20A4D1-EF40-48C7-8B7E-5BE1604DA803Q56589265-0B6C214D-5B47-4B46-86DD-34A07A9766E9Q56627616-8B7174B2-1EE8-42EE-AAB6-78E257577319Q56673774-6FE474FA-0D72-4485-842C-2B87390CDCAEQ56806116-B2E98E73-E830-4F59-ADDD-505F1094429CQ56920926-764B131C-A1C4-49D9-A11F-3F635857870DQ56921190-C92BCEB4-A2CE-423D-BF8F-686D16287242Q56921345-42FAF414-D3C7-4B3E-9F75-E8BFAB6C51CBQ56921502-1AFEA417-DF08-41C6-AE97-9E3FDCA9FEECQ56933149-308D7C07-4EB2-45F3-80B4-635BC35298AFQ56933158-BCCC40A8-7AA4-4F3C-86E4-E7A968170244Q56933169-CAD3BCED-47C7-471A-9BB8-DA2B621DE7C0
P1433
description
Wissenschaftliche Fachzeitschrift
@de
journal
@en
journal
@fr
revista científica
@es
rivista scientifica
@it
vědecký časopis
@cs
wetenschappelijk tijdschrift van Springer Science+Business Media
@nl
مجلة
@ar
वैज्ञानिक पत्रिका
@hi
英语期刊
@zh
name
Journal of Cryptology
@ast
Journal of Cryptology
@da
Journal of Cryptology
@de
Journal of Cryptology
@en
Journal of Cryptology
@es
Journal of Cryptology
@fi
Journal of Cryptology
@fo
Journal of Cryptology
@fr
Journal of Cryptology
@is
Journal of Cryptology
@it
type
label
Journal of Cryptology
@ast
Journal of Cryptology
@da
Journal of Cryptology
@de
Journal of Cryptology
@en
Journal of Cryptology
@es
Journal of Cryptology
@fi
Journal of Cryptology
@fo
Journal of Cryptology
@fr
Journal of Cryptology
@is
Journal of Cryptology
@it
altLabel
JoC
@de
JoC
@fr
prefLabel
Journal of Cryptology
@ast
Journal of Cryptology
@da
Journal of Cryptology
@de
Journal of Cryptology
@en
Journal of Cryptology
@es
Journal of Cryptology
@fi
Journal of Cryptology
@fo
Journal of Cryptology
@fr
Journal of Cryptology
@is
Journal of Cryptology
@it
P3181
P1156
P1277
P1476
Journal of Cryptology
@en