The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
1996, volume: 7, number: 1-2

  1. Thomas Beth, Whitfield Diffie
    Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:7-9 [Journal]
  2. Whitfield Diffie
    The National Security Establishment and the Development of Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:9-12 [Journal]
  3. Mary Fischer
    ``And Now For Something Completely Different'' (The Egyptologist and the Cryptographer: A Personal Reminiscence). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:13-15 [Journal]
  4. Thomas Beth
    Watching the Bhang Meter and Flying through Dirt. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:17-25 [Journal]
  5. Paul F. Syverson, Catherine Meadows
    A Formal Language for Cryptographic Protocol Requirements. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:27-59 [Journal]
  6. Kaisa Nyberg, Rainer A. Rueppel
    Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:61-81 [Journal]
  7. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes in Plaintext and Chosen-Content Attacks. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:83-99 [Journal]
  8. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
    Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
  9. Xian-Mo Zhang, Yuliang Zheng
    Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:111-134 [Journal]
  10. Dieter Gollmann, Yongfei Han, Chris J. Mitchell
    Redundant Integer Representations and Fast Exponentiation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:135-151 [Journal]
  11. Renate Scheidler, Andreas Stein, Hugh C. Williams
    Key-Exchange in Real Quadratic Congruence Function Fields. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:153-174 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002