What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 1991
Year
Venue
Title
1991
JOFC
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
Jovan Dj. Golic
Miodrag J. Mihaljevic
1991
JOFC
An Implementation for a Fast Public-Key Cryptosystem
Gordon B. Agnew
Ronald C. Mullin
I. M. Onyszchuk
Scott A. Vanstone
1991
JOFC
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol
Klaus Gaarder
Einar Snekkenes
1991
JOFC
Bit Commitment Using Pseudorandomness
Moni Naor
1991
JOFC
CRYPTOPOST - A Cryptographic Application to Mail Processing
J. Pastor
1991
JOFC
Differential Cryptanalysis of DES-like Cryptosystems
Eli Biham
Adi Shamir
1991
JOFC
Efficient Signature Generation by Smart Cards
Claus-Peter Schnorr
1991
JOFC
Efficient, Perfect Polynomial Random Number Generators
Silvio Micali
Claus-Peter Schnorr
1991
JOFC
Elliptic Curve Implementations of Zero-Knowledge Blobs
Neal Koblitz
1991
JOFC
How to Time-Stamp a Digital Document
Stuart Haber
W. Scott Stornetta
1991
JOFC
Key Processing with Control Vectors
Stephen M. Matyas
1991
JOFC
Local Randomness in Pseudorandom Sequences
Ueli Maurer
James L. Massey
1991
JOFC
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting
Marijke De Soete
1991
JOFC
On the Chor-Rivest Knapsack Cryptosystem
Hendrik W. Lenstra Jr.
1991
JOFC
On the Classification of Ideal Secret Sharing Schemes
Ernest F. Brickell
Daniel M. Davenport
1991
JOFC
One-Way Permutations on Elliptic Curves
Burton S. Kaliski Jr.
1991
JOFC
Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies
Joan Boyar
Katalin Friedl
Carsten Lund
1991
JOFC
Secure Implementations of Identification Systems
Samy Bengio
Gilles Brassard
Yvo Desmedt
Claude Goutier
Jean-Jacques Quisquater
1991
JOFC
Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
Donald Beaver