Shai Halevi Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:2, pp:77-89 [Journal]
Phillip Rogaway Bucket Hashing and Its Application to Fast Message Authentication. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:2, pp:91-115 [Journal]
Mihir Bellare, Ronald L. Rivest Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:2, pp:117-139 [Journal]
Nigel P. Smart Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:2, pp:141-151 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP