The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
1989, volume: 1, number: 3

  1. Neal Koblitz
    Hyperelliptic Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:139-150 [Journal]
  2. Michael Luby, Charles Rackoff
    A Study of Password Security. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:151-158 [Journal]
  3. Willi Meier, Othmar Staffelbach
    Fast Correlation Attacks on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:159-176 [Journal]
  4. Joan Boyar
    Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:177-184 [Journal]
  5. Fred Piper, Michael Walker
    Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002