Skip to search formSkip to main contentSkip to account menu

Journal of Cryptology

The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Electronic coupons have been accepted as a useful means in e-commerce. Multi-coupons are a special type of coupons, which are… 
2008
2008
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show… 
2008
2008
Blind signature scheme, an important cryptographic primitive, is useful in protocols that guarantee the anonymity of the… 
2008
2008
Based on Schnorr algorithm, by adopting ID code and time-limit approaches, propose two multisignature schemes which can prevent… 
Highly Cited
2007
Highly Cited
2007
2007
2007
The main application of stream ciphers is online-encryption of arbitrarily long data. Many practically used and intensively… 
Highly Cited
2004
Highly Cited
2004
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a… 
2003
2003
Zero-knowledge proof systems are interactive protocols that enable one party, called the prover, to convince another party… 
2000
2000
We propose secret-key cryptosystems MISTY1 andMISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable…