The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
2005, volume: 18, number: 4

  1. Eli Biham, Alex Biryukov, Adi Shamir
    Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:291-311 [Journal]
  2. Adrian Kent
    Secure Classical Bit Commitment Using Fixed Capacity Communication Channels. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:313-335 [Journal]
  3. Joachim von zur Gathen, Michael Nöcker
    Polynomial and Normal Bases for Finite Fields. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:337-355 [Journal]
  4. Roberto Maria Avanzi
    The Complexity of Certain Multi-Exponentiation Techniques in Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:357-373 [Journal]
  5. Lars R. Knudsen, Chris J. Mitchell
    Partial Key Recovery Attack Against RMAC. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:375-389 [Journal]
  6. Carlo Blundo, Paolo D'Arco
    Analysis and Design of Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:391-414 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002