Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications from Journal of Cryptology, 2001
Page
Title
1-15
On the Existence of Secure Keystream Generators
17-35
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)
37-74
Universal Service-Providers for Private Information Retrieval
77-85
Weakness in Quaternion Signatures
87-100
Cryptanalysis of the Chor - Rivest Cryptosystem
101-119
On the Importance of Eliminating Errors in Cryptographic Computations
121-135
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question
137-150
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions
153-176
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
177-195
Complexity Bounds on General Hard-Core Predicates
197-210
Attacks on Block Ciphers of Low Algebraic Degree
211-223
Dynamic Traitor Tracing
225-230
Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
231-253
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications
255-293
Selecting Cryptographic Key Sizes