Papers to appear in the Journal of Cryptology
(as of March 1999)
- Blundo, De Santis, Kurosawa and Ogata: On a Fallacious Bound for Authentication Codes.
- Quinn: Bounds for Key Distribution Patterns.
- Zbinden, Gisin, Huttner, Muller and Tittel: Practical Aspects of Quantum Cryptographic Key Distribution.
- Biham: Cryptanalysis of Triple Modes of Operation.
- Bernstein: How to Stretch Random Functions: The Security of Protected Counter Sums.
- Joye, Lenstra and Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults.
- Smart: The Discrete Logarithm Problem on Elliptic Curves of Trace One.
- Pointcheval and Stern: Security Arguments for Digital Signatures and Blind Signatures.
- Knudsen: A Detailed Analysis of SAFER K.
- Coppersmith and Shparlinksi: On Polynomial Approximation of the Discrete Logarithm and the Diffie-Hellman Mapping.
- Shoup: On the Security of a Practical Identification Scheme.
- Golic, Salmasizadeh and Dawson: Fast Correlation Attacks on the Summation Generator.
- Gennaro, Krawczyk and Rabin: RSA-Based Undeniable Signatures.
- Blundo, De Santis and Stinson: On the Contrast in Visual Cryptography Schemes.
- Coppersmith: Weakness in Quaternion Signatures.
- Burmester, Desmedt, Itoh, Sakurai and Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs of Languages.
- Fischlin and Schnorr: More RSA and Rabin Bits are More Secure.
- Franklin and Wright: Secure Communication over Echo Lines.
- Hirt and Maurer: Player Simulation and General Adversary Structures in Perfect Multi-Party Computation.
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR