Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 1999
Page
Title
1-28
Parallel Collision Search with Cryptanalytic Applications
29-66
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
67-73
A Fast Diffie-Hellman Protocol in Genus 2
77-89
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver
91-115
Bucket Hashing and Its Application to Fast Message Authentication
117-139
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer
141-151
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
155-159
On a Fallacious Bound for Authentication Codes
161-184
Cryptanalysis of Triple Modes of Operation
185-192
How to Stretch Random Functions: The Security of Protected Counter Sums
193-196
The Discrete Logarithm Problem on Elliptic Curves of Trace One
197-223
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages
227-239
Bounds for Key Distribution Patterns
241-245
Chinese Remaindering Based Cryptosystems in the Presence of Faults
247-260
On the Security of a Practical Identification Scheme
261-289
On the Contrast in Visual Cryptography Schemes