default search action
Designs, Codes and Cryptography, Volume 7, 1996
Volume 7, Numbers 1-2, January 1996
- Thomas Beth, Whitfield Diffie:
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue. Des. Codes Cryptogr. 7(1-2): 7-9 (1996) - Whitfield Diffie:
The National Security Establishment and the Development of Public-Key Cryptography. 9-12 - Mary Fischer:
"And Now For Something Completely Different" (The Egyptologist and the Cryptographer: A Personal Reminiscence). 13-15 - Thomas Beth:
Watching the Bhang Meter and Flying through Dirt. 17-25 - Paul F. Syverson, Catherine Meadows:
A Formal Language for Cryptographic Protocol Requirements. 27-59 - Kaisa Nyberg, Rainer A. Rueppel:
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. 61-81 - Reihaneh Safavi-Naini, Leonid M. Tombak:
Authentication Codes in Plaintext and Chosen-Content Attacks. 83-99 - Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. 101-110 - Xian-Mo Zhang, Yuliang Zheng:
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. 111-134 - Dieter Gollmann, Yongfei Han, Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation. 135-151 - Renate Scheidler, Andreas Stein, Hugh C. Williams:
Key-Exchange in Real Quadratic Congruence Function Fields. 153-174
Volume 7, Number 3, March 1996
- Alexei E. Ashikhmin, Simon Litsyn:
Fast Decoding Algorithms for First Order Reed-Muller and Related Codes. 187-214 - Thierry P. Berger:
On the Automorphism Groups of Affine-Invariant Codes. 215-221 - T. Aaron Gulliver, Vijay K. Bhargava:
New Good Rage (m-1)/pm Ternary and Quaternary Quasi-Cyclic Codes. 223-233 - Marijn van Eupen, Noboru Hamada, Yoko Watamori:
The Nonexistence of Ternary [50, 5, 32] Codes. 235-237 - Rolf S. Rees, Douglas R. Stinson:
Combinatorial Characterizations of Authentication Codes II. 239-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.