The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
1999, volume: 12, number: 2

  1. Shai Halevi
    Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:77-89 [Journal]
  2. Phillip Rogaway
    Bucket Hashing and Its Application to Fast Message Authentication. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:91-115 [Journal]
  3. Mihir Bellare, Ronald L. Rivest
    Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:117-139 [Journal]
  4. Nigel P. Smart
    Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:141-151 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002