nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Formal Language for Cryptographic Protocol Requirements
|
Syverson, Paul |
|
1996 |
7 |
1-2 |
p. 27-59 |
artikel |
2 |
"And Now For Something Completely Different" (The Egyptologist and the Cryptographer: A Personal Reminiscence)
|
Fischer, Mary |
|
1996 |
7 |
1-2 |
p. 13-15 |
artikel |
3 |
Authentication Codes in Plaintext and Chosen-Content Attacks
|
Safavi-Naini, R. |
|
1996 |
7 |
1-2 |
p. 83-99 |
artikel |
4 |
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes
|
Mitchell, C. J. |
|
1996 |
7 |
1-2 |
p. 101-110 |
artikel |
5 |
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors
|
Zhang, Xian-Mo |
|
1996 |
7 |
1-2 |
p. 111-134 |
artikel |
6 |
Foreword to this issue
|
|
|
1996 |
7 |
1-2 |
p. 7-8 |
artikel |
7 |
Key-Exchange in Real Quadratic Congruence Function Fields
|
Scheidler, R. |
|
1996 |
7 |
1-2 |
p. 153-174 |
artikel |
8 |
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
|
Nyberg, Kaisa |
|
1996 |
7 |
1-2 |
p. 61-81 |
artikel |
9 |
Redundant Integer Representations and Fast Exponentiation
|
Gollmann, Dieter |
|
1996 |
7 |
1-2 |
p. 135-151 |
artikel |
10 |
The National Security Establishment and the Development of Public-Key Cryptography
|
Diffie, Whitfield |
|
1996 |
7 |
1-2 |
p. 9-12 |
artikel |
11 |
Watching the Bhang Meter and Flying through Dirt
|
Beth, Thomas |
|
1996 |
7 |
1-2 |
p. 17-25 |
artikel |