The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology
2006, volume: 19, number: 4

  1. Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury
    A Proof of the Security of Quantum Key Distribution. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:381-439 [Journal]
  2. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  3. Marc Girault, Guillaume Poupard, Jacques Stern
    On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:463-487 [Journal]
  4. Ivan Damgård, Gudmund Skovbjerg Frandsen
    An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:489-520 [Journal]
  5. Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
    Completeness in Two-Party Secure Computation: A Computational View. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:521-552 [Journal]
  6. Florian Luca, Igor Shparlinski
    Elliptic Curves with Low Embedding Degree. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:553-562 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002