Journals in DBLP
J. Cryptology 1988, volume: 1, number: 2
Uriel Feige , Amos Fiat , Adi Shamir Zero-Knowledge Proofs of Identity. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:77-94 [Journal ] Kevin S. McCurley A Key Distribution System Equivalent to Factoring. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:95-105 [Journal ] Johannes Buchmann , Hugh C. Williams A Key-Exchange System Based on Imaginary Quadratic Fields. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:107-118 [Journal ] Douglas R. Stinson A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:119-127 [Journal ] Pierre Beauchemin , Gilles Brassard A Generalization of Hellman's Extension to Shannon's Approach to Cryptography. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:129-131 [Journal ] Martin Tompa , Heather Woll How to Share a Secret with Cheaters. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:2, pp:133-138 [Journal ]