default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc10.bht:"
@article{DBLP:journals/joc/BeaverFKR97, author = {Donald Beaver and Joan Feigenbaum and Joe Kilian and Phillip Rogaway}, title = {Locally Random Reductions: Improvements and Applications}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {17--36}, year = {1997}, url = {https://doi.org/10.1007/s001459900017}, doi = {10.1007/S001459900017}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamB97, author = {Eli Biham and Alex Biryukov}, title = {An Improvement of Davies' Attack on {DES}}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {195--206}, year = {1997}, url = {https://doi.org/10.1007/s001459900027}, doi = {10.1007/S001459900027}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BihamB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CachinM97, author = {Christian Cachin and Ueli M. Maurer}, title = {Linking Information Reconciliation and Privacy Amplification}, journal = {J. Cryptol.}, volume = {10}, number = {2}, pages = {97--110}, year = {1997}, url = {https://doi.org/10.1007/s001459900023}, doi = {10.1007/S001459900023}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CachinM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Coppersmith97, author = {Don Coppersmith}, title = {Small Solutions to Polynomial Equations, and Low Exponent {RSA} Vulnerabilities}, journal = {J. Cryptol.}, volume = {10}, number = {4}, pages = {233--260}, year = {1997}, url = {https://doi.org/10.1007/s001459900030}, doi = {10.1007/S001459900030}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Coppersmith97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CoppersmithSV97, author = {Don Coppersmith and Jacques Stern and Serge Vaudenay}, title = {The Security of the Birational Permutation Signature Schemes}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {207--221}, year = {1997}, url = {https://doi.org/10.1007/s001459900028}, doi = {10.1007/S001459900028}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CoppersmithSV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Csirmaz97, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {The Size of a Share Must Be Large}, journal = {J. Cryptol.}, volume = {10}, number = {4}, pages = {223--231}, year = {1997}, url = {https://doi.org/10.1007/s001459900029}, doi = {10.1007/S001459900029}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Csirmaz97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardPP97, author = {Ivan Damg{\aa}rd and Torben P. Pedersen and Birgit Pfitzmann}, title = {On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {163--194}, year = {1997}, url = {https://doi.org/10.1007/s001459900026}, doi = {10.1007/S001459900026}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardPP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dobbertin97, author = {Hans Dobbertin}, title = {{RIPEMD} with Two-Round Compress Function is Not Collision-Free}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {51--70}, year = {1997}, url = {https://doi.org/10.1007/s001459900019}, doi = {10.1007/S001459900019}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dobbertin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/EvenM97, author = {Shimon Even and Yishay Mansour}, title = {A Construction of a Cipher from a Single Pseudorandom Permutation}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {151--162}, year = {1997}, url = {https://doi.org/10.1007/s001459900025}, doi = {10.1007/S001459900025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/EvenM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Fiat97, author = {Amos Fiat}, title = {Batch {RSA}}, journal = {J. Cryptol.}, volume = {10}, number = {2}, pages = {75--88}, year = {1997}, url = {https://doi.org/10.1007/s001459900021}, doi = {10.1007/S001459900021}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Fiat97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ItohOS97, author = {Toshiya Itoh and Yuji Ohta and Hiroki Shizuya}, title = {A Language-Dependent Cryptographic Primitive}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {37--50}, year = {1997}, url = {https://doi.org/10.1007/s001459900018}, doi = {10.1007/S001459900018}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ItohOS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JacksonMO97, author = {Wen{-}Ai Jackson and Keith M. Martin and Christine M. O'Keefe}, title = {Mutually Trusted Authority-Free Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {10}, number = {4}, pages = {261--289}, year = {1997}, url = {https://doi.org/10.1007/s001459900031}, doi = {10.1007/S001459900031}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JacksonMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Kaliski97, author = {Burton S. Kaliski Jr.}, title = {A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {71--72}, year = {1997}, url = {https://doi.org/10.1007/s001459900020}, doi = {10.1007/S001459900020}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Kaliski97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KlapperG97, author = {Andrew Klapper and Mark Goresky}, title = {Feedback Shift Registers, 2-Adic Span, and Combiners with Memory}, journal = {J. Cryptol.}, volume = {10}, number = {2}, pages = {111--147}, year = {1997}, url = {https://doi.org/10.1007/s001459900024}, doi = {10.1007/S001459900024}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KlapperG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Rooij97, author = {Peter de Rooij}, title = {On Schnorr's Preprocessing for Digital Signature Schemes}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {1--16}, year = {1997}, url = {https://doi.org/10.1007/s001459900016}, doi = {10.1007/S001459900016}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Rooij97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/YacobiB97, author = {Yacov Yacobi and Michael J. Beller}, title = {Batch Diffie-Hellman Key Agreement Systems}, journal = {J. Cryptol.}, volume = {10}, number = {2}, pages = {89--96}, year = {1997}, url = {https://doi.org/10.1007/s001459900022}, doi = {10.1007/S001459900022}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/YacobiB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.