What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 1994
Year
Venue
Title
1994
JOFC
A Key-Exchange Protocol Using Real Quadratic Fields
Renate Scheidler
Johannes Buchmann
Hugh C. Williams
1994
JOFC
A Weak Cipher that Generates the Symmetric Group
Sean Murphy
Kenneth G. Paterson
Peter R. Wild
1994
JOFC
Algebraic Nonlinearity and Its Applications to Cryptography
Luke O'Connor
Andrew Klapper
1994
JOFC
An Analysis of a Class of Algorithms for S-Box Construction
Luke O'Connor
1994
JOFC
Definitions and Properties of Zero-Knowledge Proof Systems
Oded Goldreich
Yair Oren
1994
JOFC
Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance
Minghua Qu
Scott A. Vanstone
1994
JOFC
Functional Inversion and Communication Complexity
Shang-Hua Teng
1994
JOFC
New Types of Cryptanalytic Attacks Using Related Keys
Eli Biham
1994
JOFC
On the Structure of the Privacy Hierarchy
Benny Chor
Mihály Geréb-Graus
Eyal Kushilevitz
1994
JOFC
Proof of Soundness (Integrity) of Cryptographic Protocols
Gustavus J. Simmons
1994
JOFC
The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
Andrew Klapper
1994
JOFC
Three System for Cryptographic Protocol Analysis
Richard A. Kemmerer
Catherine Meadows
Jonathan K. Millen