Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 1994
Page
Title
1-32
Definitions and Properties of Zero-Knowledge Proof Systems
33-51
The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
53-60
On the Structure of the Privacy Hierarchy
61-65
A Weak Cipher that Generates the Symmetric Group
69-77
Proof of Soundness (Integrity) of Cryptographic Protocols
79-130
Three System for Cryptographic Protocol Analysis
133-151
An Analysis of a Class of Algorithms for S-Box Construction
153-170
Functional Inversion and Communication Complexity
171-199
A Key-Exchange Protocol Using Real Quadratic Fields
201-212
Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance
213-227
Algebraic Nonlinearity and Its Applications to Cryptography
229-246
New Types of Cryptanalytic Attacks Using Related Keys