The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
1999, volume: 12, number: 3

  1. Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata
    On a Fallacious Bound for Authentication Codes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:155-159 [Journal]
  2. Eli Biham
    Cryptanalysis of Triple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:161-184 [Journal]
  3. Daniel J. Bernstein
    How to Stretch Random Functions: The Security of Protected Counter Sums. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:185-192 [Journal]
  4. Nigel P. Smart
    The Discrete Logarithm Problem on Elliptic Curves of Trace One. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:193-196 [Journal]
  5. Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
    Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:197-223 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002