Skip to main content
Log in
Menu
Find a journal
Publish with us
Track your research
Search
Cart
Home
Journal of Cryptology
Volumes and issues
Volume 2, Issue 1
Journal of Cryptology
Publishing model
:
Hybrid
Submit your manuscript
(this opens in a new tab)
Back to overview
Editorial board
Aims and scope
Journal updates
Search all Journal of Cryptology articles
Volume 2, Issue 1
February 1990
Filter by
Volume:
All volumes
Volume 37 (2024)
Volume 36 (2023)
Volume 35 (2022)
Volume 34 (2021)
Volume 33 (2020)
Volume 32 (2019)
Volume 31 (2018)
Volume 30 (2017)
Volume 29 (2016)
Volume 28 (2015)
Volume 27 (2014)
Volume 26 (2013)
Volume 25 (2012)
Volume 24 (2011)
Volume 23 (2010)
Volume 22 (2009)
Volume 21 (2008)
Volume 20 (2007)
Volume 19 (2006)
Volume 18 (2005)
Volume 17 (2004)
Volume 16 (2003)
Volume 15 (2002)
Volume 14 (2001)
Volume 13 (2000)
Volume 12 (1999)
Volume 11 (1998)
Volume 10 (1997)
Volume 9 (1996)
Volume 8 (1995)
Volume 7 (1994)
Volume 6 (1993)
Volume 5 (1992)
Volume 4 (1991)
Volume 3 (1991)
Volume 2 (1990)
Volume 1 (1989)
Sort by
Date published:
New to old
Old to new
Update results
4 articles in this issue
Secure circuit evaluation
MartÃn Abadi
Joan Feigenbaum
OriginalPaper
Pages: 1 - 12
Probability to meet in the middle
Kazuo Nishimura
Masaaki Sibuya
OriginalPaper
Pages: 13 - 22
The combinatorics of authentication and secrecy codes
D. R. Stinson
OriginalPaper
Pages: 23 - 49
A matrix key-distribution scheme
Li Gong
David J. Wheeler
OriginalPaper
Pages: 51 - 59
Search
Search by keyword or author
Search
Navigation
Find a journal
Publish with us
Track your research