Journals in DBLP
J. Cryptology 1989, volume: 1, number: 3
Neal Koblitz Hyperelliptic Cryptosystems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1989, v:1, n:3, pp:139-150 [Journal ] Michael Luby , Charles Rackoff A Study of Password Security. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1989, v:1, n:3, pp:151-158 [Journal ] Willi Meier , Othmar Staffelbach Fast Correlation Attacks on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1989, v:1, n:3, pp:159-176 [Journal ] Joan Boyar Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1989, v:1, n:3, pp:177-184 [Journal ] Fred Piper , Michael Walker Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal ]