What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from Journal of Cryptology 1999
Year
Venue
Title
1999
JOFC
A Fast Diffie-Hellman Protocol in Genus 2
Nigel P. Smart
Samir Siksek
1999
JOFC
Bounds for Key Distribution Patterns
Kathleen A. S. Quinn
1999
JOFC
Bucket Hashing and Its Application to Fast Message Authentication
Phillip Rogaway
1999
JOFC
Chinese Remaindering Based Cryptosystems in the Presence of Faults
Marc Joye
Arjen K. Lenstra
Jean-Jacques Quisquater
1999
JOFC
Cryptanalysis of Triple Modes of Operation
Eli Biham
1999
JOFC
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages
Mike Burmester
Yvo Desmedt
Toshiya Itoh
Kouichi Sakurai
Hiroki Shizuya
1999
JOFC
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver
Shai Halevi
1999
JOFC
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
Nigel P. Smart
1999
JOFC
How to Stretch Random Functions: The Security of Protected Counter Sums
Daniel J. Bernstein
1999
JOFC
On a Fallacious Bound for Authentication Codes
Carlo Blundo
Alfredo De Santis
Kaoru Kurosawa
Wakaha Ogata
1999
JOFC
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
Moni Naor
Omer Reingold
1999
JOFC
On the Contrast in Visual Cryptography Schemes
Carlo Blundo
Alfredo De Santis
Douglas R. Stinson
1999
JOFC
On the Security of a Practical Identification Scheme
Victor Shoup
1999
JOFC
Parallel Collision Search with Cryptanalytic Applications
Paul C. van Oorschot
Michael J. Wiener
1999
JOFC
The Discrete Logarithm Problem on Elliptic Curves of Trace One
Nigel P. Smart
1999
JOFC
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer
Mihir Bellare
Ronald L. Rivest