Experimental quantum cryptography Charles H. BennettFrançois BessetteJohn Smolin OriginalPaper Pages: 3 - 28
An interactive identification scheme based on discrete logarithms and factoring Ernest F. BrickellKevin S. McCurley OriginalPaper Pages: 29 - 39
Which new RSA-signatures can be computed from certain given RSA-signatures? Jan-Hendrik EvertseEugène van Heyst OriginalPaper Pages: 41 - 52
Conditionally-perfect secrecy and a provably-secure randomized cipher Ueli M. Maurer OriginalPaper Pages: 53 - 66
Correlation properties of combiners with memory in stream ciphers Willi MeierOthmar Staffelbach OriginalPaper Pages: 67 - 86