|
Journals in DBLP
J. Cryptology 2006, volume: 19, number: 1
- Jan Denef, Frederik Vercauteren
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:1-25 [Journal]
- Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson
Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:27-66 [Journal]
- Jonathan Katz, Moti Yung
Characterization of Security Notions for Probabilistic Private-Key Encryption. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:67-95 [Journal]
- Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:97-114 [Journal]
- Edlyn Teske
An Elliptic Curve Trapdoor System. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:115-133 [Journal]
|