Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:49-61 [Conf]

John O. Pliam Guesswork and Variation Distance as Measures of Cipher Security. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:62-77 [Conf]

Yuliang Zheng, Xian-Mo Zhang Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:92-105 [Conf]

Kazumaro Aoki Efficient Evaluation of Security against Generalized Interpolation Attack. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:135-146 [Conf]

Detlef Hühnlein Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:147-162 [Conf]