Journals in DBLP
Inf. Comput. 1999, volume: 151, number: 1-2
Leonard M. Adleman , Ming-Deh A. Huang Function Field Sieve Method for Discrete Logarithms over Finite Fields. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:5-16 [Journal ] Jin-yi Cai , Thomas W. Cusick A Lattice-Based Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:17-31 [Journal ] Claude Carlet On Cryptographic Propagation Criteria for Boolean Functions. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:32-56 [Journal ] Hans Dobbertin Almost Perfect Nonlinear Power Functions on GF(2n): The Niho Case. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:57-72 [Journal ] Tor Helleseth , H. M. Martinsen Binary Sequences of Period 2m-1 with Large Linear Complexity. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:73-91 [Journal ] Ming-Deh A. Huang , Chaoping Xing Some Computational Problems of Cryptographic Significance Concerning Elliptic Curves over Rings. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:92-99 [Journal ] Thomas Johansson Further Results on Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:100-133 [Journal ] Takayasu Kaida , Satoshi Uehara , Kyoki Imamura An Algorithm for thek-Error Linear Complexity of Sequences over GF(pm ) with Period pn , pa Prime. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:134-147 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:151, n:1-2, pp:148-172 [Journal ]