The SCEAS System
Navigation Menu

Journals in DBLP

J. Cryptology (joc)

  1. J. Cryptology, 1988,volume: 1, number: 1 (4 articles)
  2. J. Cryptology, 1988,volume: 1, number: 2 (6 articles)
  3. J. Cryptology, 1989,volume: 1, number: 3 (5 articles)
  4. J. Cryptology, 1990,volume: 2, number: 1 (4 articles)
  5. J. Cryptology, 1990,volume: 2, number: 2 (3 articles)
  6. J. Cryptology, 1990,volume: 2, number: 3 (4 articles)
  7. J. Cryptology, 1990,volume: 3, number: 1 (3 articles)
  8. J. Cryptology, 1991,volume: 3, number: 2 (5 articles)
  9. J. Cryptology, 1991,volume: 3, number: 3 (5 articles)
  10. J. Cryptology, 1991,volume: 4, number: 1 (1 articles)
  11. J. Cryptology, 1991,volume: 4, number: 2 (4 articles)
  12. J. Cryptology, 1991,volume: 4, number: 3 (4 articles)
  13. J. Cryptology, 1992,volume: 5, number: 1 (5 articles)
  14. J. Cryptology, 1992,volume: 5, number: 2 (4 articles)
  15. J. Cryptology, 1992,volume: 5, number: 3 (4 articles)
  16. J. Cryptology, 1993,volume: 6, number: 1 (4 articles)
  17. J. Cryptology, 1993,volume: 6, number: 2 (3 articles)
  18. J. Cryptology, 1993,volume: 6, number: 3 (4 articles)
  19. J. Cryptology, 1993,volume: 6, number: 4 (3 articles)
  20. J. Cryptology, 1994,volume: 7, number: 1 (4 articles)
  21. J. Cryptology, 1994,volume: 7, number: 2 (2 articles)
  22. J. Cryptology, 1994,volume: 7, number: 3 (3 articles)
  23. J. Cryptology, 1994,volume: 7, number: 4 (3 articles)
  24. J. Cryptology, 1995,volume: 8, number: 1 (3 articles)
  25. J. Cryptology, 1995,volume: 8, number: 2 (3 articles)
  26. J. Cryptology, 1995,volume: 8, number: 3 (4 articles)
  27. J. Cryptology, 1995,volume: 8, number: 4 (3 articles)
  28. J. Cryptology, 1996,volume: 9, number: 1 (3 articles)
  29. J. Cryptology, 1996,volume: 9, number: 2 (3 articles)
  30. J. Cryptology, 1996,volume: 9, number: 3 (5 articles)
  31. J. Cryptology, 1996,volume: 9, number: 4 (4 articles)
  32. J. Cryptology, 1997,volume: 10, number: 1 (5 articles)
  33. J. Cryptology, 1997,volume: 10, number: 2 (4 articles)
  34. J. Cryptology, 1997,volume: 10, number: 3 (4 articles)
  35. J. Cryptology, 1997,volume: 10, number: 4 (3 articles)
  36. J. Cryptology, 1998,volume: 11, number: 1 (4 articles)
  37. J. Cryptology, 1998,volume: 11, number: 2 (5 articles)
  38. J. Cryptology, 1998,volume: 11, number: 3 (4 articles)
  39. J. Cryptology, 1998,volume: 11, number: 4 (4 articles)
  40. J. Cryptology, 1999,volume: 12, number: 1 (3 articles)
  41. J. Cryptology, 1999,volume: 12, number: 2 (4 articles)
  42. J. Cryptology, 1999,volume: 12, number: 3 (5 articles)
  43. J. Cryptology, 1999,volume: 12, number: 4 (4 articles)
  44. J. Cryptology, 2000,volume: 13, number: 1 (6 articles)
  45. J. Cryptology, 2000,volume: 13, number: 2 (5 articles)
  46. J. Cryptology, 2000,volume: 13, number: 3 (4 articles)
  47. J. Cryptology, 2000,volume: 13, number: 4 (5 articles)
  48. J. Cryptology, 2001,volume: 14, number: 1 (3 articles)
  49. J. Cryptology, 2001,volume: 14, number: 2 (5 articles)
  50. J. Cryptology, 2001,volume: 14, number: 3 (4 articles)
  51. J. Cryptology, 2001,volume: 14, number: 4 (3 articles)
  52. J. Cryptology, 2002,volume: 15, number: 1 (4 articles)
  53. J. Cryptology, 2002,volume: 15, number: 2 (5 articles)
  54. J. Cryptology, 2002,volume: 15, number: 3 (3 articles)
  55. J. Cryptology, 2002,volume: 15, number: 4 (4 articles)
  56. J. Cryptology, 2003,volume: 16, number: 1 (3 articles)
  57. J. Cryptology, 2003,volume: 16, number: 2 (3 articles)
  58. J. Cryptology, 2003,volume: 16, number: 3 (2 articles)
  59. J. Cryptology, 2003,volume: 16, number: 4 (4 articles)
  60. J. Cryptology, 2004,volume: 17, number: 1 (4 articles)
  61. J. Cryptology, 2004,volume: 17, number: 2 (3 articles)
  62. J. Cryptology, 2004,volume: 17, number: 3 (2 articles)
  63. J. Cryptology, 2004,volume: 17, number: 4 (6 articles)
  64. J. Cryptology, 2005,volume: 18, number: 1 (3 articles)
  65. J. Cryptology, 2005,volume: 18, number: 2 (5 articles)
  66. J. Cryptology, 2005,volume: 18, number: 3 (4 articles)
  67. J. Cryptology, 2005,volume: 18, number: 4 (6 articles)
  68. J. Cryptology, 2006,volume: 19, number: 1 (5 articles)
  69. J. Cryptology, 2006,volume: 19, number: 2 (3 articles)
  70. J. Cryptology, 2006,volume: 19, number: 3 (3 articles)
  71. J. Cryptology, 2006,volume: 19, number: 4 (6 articles)
  72. J. Cryptology, 2007,volume: 20, number: 1 (5 articles)
  73. J. Cryptology, 2007,volume: 20, number: 2 (4 articles)
  74. J. Cryptology, 2007,volume: 20, number: 3 (8 articles)
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002