Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 1988
Page
Title
3-36
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES)
37-52
Some Constructions and Bounds for Authentication Codes
53-64
The Generation of Random Numbers that Are Probably Prime
65-75
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
77-94
Zero-Knowledge Proofs of Identity
95-105
A Key Distribution System Equivalent to Factoring
107-118
A Key-Exchange System Based on Imaginary Quadratic Fields
119-127
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
129-131
A Generalization of Hellman's Extension to Shannon's Approach to Cryptography
133-138
How to Share a Secret with Cheaters