The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
1992, volume: 5, number: 1

  1. Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
    Experimental Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:3-28 [Journal]
  2. Ernest F. Brickell, Kevin S. McCurley
    An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:29-39 [Journal]
  3. Jan-Hendrik Evertse, Eugène van Heyst
    Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures? [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:41-52 [Journal]
  4. Ueli M. Maurer
    Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:53-66 [Journal]
  5. Willi Meier, Othmar Staffelbach
    Correlation Properties of Combiners with Memory in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:67-86 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002