Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 1991
Page
Title
3-72
Differential Cryptanalysis of DES-like Cryptosystems
63-79
An Implementation for a Fast Public-Key Cryptosystem
75-122
Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
81-98
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol
99-111
How to Time-Stamp a Digital Document
113-136
Key Processing with Control Vectors
123-134
On the Classification of Ideal Secret Sharing Schemes
135-149
Local Randomness in Pseudorandom Sequences
137-146
CRYPTOPOST - A Cryptographic Application to Mail Processing
149-155
On the Chor-Rivest Knapsack Cryptosystem
151-158
Bit Commitment Using Pseudorandomness
157-172
Efficient, Perfect Polynomial Random Number Generators
161-174
Efficient Signature Generation by Smart Cards
173-186
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting
175-183
Secure Implementations of Identification Systems
185-206
Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies
187-199
One-Way Permutations on Elliptic Curves
201-212
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
207-213
Elliptic Curve Implementations of Zero-Knowledge Blobs