Journal of Cryptology
Table of Contents
This index was compiled by Kevin McCurley. It is not guaranteed to be
completely accurate. Please send email to
if you find any errors. It was last updated on Monday, July 31, 2000 at 1:54.
- Jump to Volume 1
- Jump to Volume 2
- Jump to Volume 3
- Jump to Volume 4
- Jump to Volume 5
- Jump to Volume 6
- Jump to Volume 7
- Jump to Volume 8
- Jump to Volume 9
- Jump to Volume 10
- Jump to Volume 11
- Jump to Volume 12
- Jump to Volume 13
Volume 1
Volume 1, Number 1, 1988
- Editorial
- E. F. Brickell
- Pages 1-2
- Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES)
- B. S. Kaliski, R. L. Rivest and A. T. Sherman
- Pages 3-36
- Some Constructions and Bounds for Authentication Codes
- D. R. Stinson
- Pages 37-52
- The Generation of Random Numbers that Are Probably Prime
- P. Beauchemin, G. Brassard, C. Crepeau, C. Goutier and C. Pomerance
- Pages 53-64
- The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
- D. Chaum
- Pages 65-75
Volume 1, Number 2, 1988
- Zero-Knowledge Proofs of Identity
- U. Feige, A. Fiat and A. Shamir
- Pages 77-94
- A Key Distribution System Equivalent to Factoring
- K. S. McCurley
- Pages 95-105
- A Key-Exchange System Based on Imaginary Quadratic Fields
- J. A. Buchmann and H. C. Williams
- Pages 107-118
- A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
- D. R. Stinson
- Pages 119-127
- A Generalization of Hellman's Extension to Shannon's Approach to Cryptography
- P. Beauchemin and G. Brassard
- Pages 129-131
- How to Share a Secret with Cheaters
- M. Tompa and H. Woll
- Pages 133-138
Volume 1, Number 3, 1989
- Hyperelliptic Cryptosystems
- N. Koblitz
- Pages 139-150
- A Study of Password Security
- M. Luby and C. Rackoff
- Pages 151-158
- Fast Correlation Attacks on Certain Stream Ciphers
- W. Meier and O. Staffelbach
- Pages 159-176
- Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits
- J. F. Boyar
- Pages 177-184
- Linear Ciphers and Spreads
- F. Piper and M. Walker
- Pages 185-188
Volume 2
Volume 2, Number 1, 1990
- Secure Circuit Evaluation
- M. Abadi and J. Feigenbaum
- Pages 1-12
- Probability To Meet in the Middle
- K. Nishimura and M. Sibuya
- Pages 13-22
- The Combinatorics of Authentication and Secrecy Codes
- D. R. Stinson
- Pages 23-49
- A Matrix Key-Distribution Scheme
- Li Gong and D. J. Wheeler
- Pages 51-59
Volume 2, Number 2, 1990
- A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs
- J. F. Boyar, S. A. Kurtz and M. W. Krentel
- Pages 63-76
- A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration
- G. J. Simmons
- Pages 77-104
- A Combinatorial Approach to Probabilistic Results on the Linear Complexity Profile of Random Sequences
- H. Niedderreiter
- Pages 105-112
Volume 2, Number 3, 1990
- Methods and Instruments for Designing S-Boxes
- R. Forre
- Pages 115-130
- Information-Theoretic Bounds for Authentication Schemes
- M. Walker
- Pages 131-143
- The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts
- S. Murphy
- Pages 145-154
- Enumerating Boolean Functions of Cryptographic Significance
- C. Mitchell
- Pages 155-170
Volume 3
Volume 3, Number 1, 1990
- Key-Minimal Crytosystems for Unconditional Secrecy
- P. Godlewski and C. Mitchell
- Pages 1-25
- The Structured Design of Cryptographically Good S-Boxes
- C. Adams and S. E. Tavares
- Pages 27-41
- A Fast Software One-Way Hash Function
- R. C. Merkle
- Pages 43-58
Volume 3, Number 2, 1991
- Guest Editor's Introduction
- T. A. Berson and R. A. Rueppel
- Pages 61-62
- An Implementation for a Fast Public-Key Cryptosystem
- G. B. Agnew , R. C. Mullin , I. M. Onyszchuk and S. A. Vanstone
- Pages 63-79
- Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol
- K. Gaarder and E. Snekkenes
- Pages 81-98
- How to Time-Stamp a Digital Document
- S. Haber and W. S. Stornetta
- Pages 99-111
- Key Processing with Control Vectors
- S. M. Matyas
- Pages 113-136
- CRYPTOPOST (TM) - A Cryptographic Application to Mail Processing
- J. Pastor
- Pages 137-146
Volume 3, Number 3, 1991
- On the Chor-Rivest Knapsack Cryptosystem
- H. W. Lenstra, Jr.
- Pages 149-155
- Efficient, Perfect Polynomial Random Number Generators
- S. Micali and C.-P. Schnorr
- Pages 157-172
- New Bounds and Constructions for Authentication/Secrecy Codes with Splitting
- M. De Soete
- Pages 173-186
- One-Way Permutations on Elliptic Curves
- B. S. Kaliski
- Pages 187-199
- A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
- J. Dj. Golic and M. J. Mihaljevic
- Pages 201-212
Volume 4
Volume 4, Number 1, 1991
- Editorial Introduction
- E. F. Brickell
- Page 1
- Differential Cryptanalysis of DES-like Cryptosystems
- E. Biham and A. Shamir
- Pages 3-72
Volume 4, Number 2, 1991
- Guest Editor's Introduction
- J. Feigenbaum
- Page 73
- Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
- D. Beaver
- Pages 75-122
- On the Classification of Ideal Secret Sharing Schemes
- E. F. Brickell and D. M. Davenport
- Pages 123-134
- Local Randomness in Pseudorandom Sequences
- U. M. Maurer and J. L. Massey
- Pages 135-149
- Bit Commitment Using Pseudorandomness
- M. Naor
- Pages 151-158
Volume 4, Number 3, 1991
- Efficient Signature Generation by Smart Cards
- C.-P. Schnorr
- Pages 161-174
- Secure Implementations of Identification Systems
- S. Bengio, G. Brassard, Y. G. Desmedt, C. Goutier and J.-J. Quisquater
- Pages 175-183
- Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies
- J. F. Boyar, K. Friedl and C. Lund
- Pages 185-206
- Elliptic Curve Implementations of Zero-Knowledge Blobs
- N. Koblitz
- Pages 207-213
Volume 5
Volume 5, Number 1, 1992
- Preface
- I. B. Damgard
- Page 1
- Experimental Quantum Cryptography
- C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin
- Pages 3-28
- An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
- E. F. Brickell and K. S. McCurley
- Pages 29-39
- Which New RSA-Signatures Can be Computed from Certain Given RSA-Signatures?
- J.-H. Evertse and E. van Heyst
- Pages 41-52
- Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
- U. M. Maurer
- Pages 53-66
- Correlation Properties of Combiners with Memory in Stream Ciphers
- W. Meier and O. Staffelbach
- Pages 67-86
Volume 5, Number 2, 1992
- A Universal Statistical Test for Random Bit Generators
- U. M. Maurer
- Pages 89-105
- Counting Binary Functions with Certain Cryptographic Properties
- S. Lloyd
- Pages 107-131
- Some Remarks on the Security of the Identification Scheme Based on Permuted Kernels
- J. Georgiades
- Pages 133-137
- A Cubic RSA Code Equivalent to Factorization
- J. H. Loxton, D. S. P. Khoo, G. J. Bird and J. Seberry
- Pages 139-150
Volume 5, Number 3, 1992
- Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
- E. F. Brickell and D. R. Stinson
- Pages 153-166
- Algebraic Properties of Cryptosystem PGM
- S. S Magliveras and N. D. Memon
- Pages 167-183
- Strongly Ideal Secret Sharing Schemes
- S. J. Phillips and N. C. Phillips
- Pages 185-191
- Binary Sequences Derived from ML-Sequences over Rings, I: Periods of Minimal Polynomials
- Zong-Duo Dai
- Pages 193-207
Volume 6
Volume 6, Number 1, 1993
- Editor's Note
- G. Brassard
- Page 1
- Arithmetic Operations in {GF}$(2^m)$
- G. B. Agnew, T. Beth, R. C. Mullin and S. A. Vanstone
- Pages 3-13
- Multiple Assignment Scheme for Sharing Secret
- M. Ito, A. Saio and T. Nishizeki
- Pages 15-20
- A Uniform-Complexity Treatment of Encryption and Zero-Knowledge
- O. Goldreich
- Pages 21-53
- Cascade Ciphers: The Importance of Being First
- U. M. Maurer and J. L. Massey
- Pages 55-61
Volume 6, Number 2, 1993
- On the Communication Complexity of Zero-Knowledge Proofs
- J. F. Boyar, C. Lund and R. Peralta
- Pages 65-85
- Secret Sharing Over Infinite Domains
- B. Chor and E. Kushilevitz
- Pages 87-95
- A Perfect Zero-Knowledge Proof System for a Problem Equivalent to the Discrete Logarithm
- O. Goldreich and E. Kushilevitz
- Pages 97-116
Volume 6, Number 3, 1993
- Universal Tests for Nonuniform Distributions
- A. W. Schrift and A. Shamir
- Pages 119-133
- A Lower Bound on Authentication After Having Observed a Sequence of Messages
- U. Rosenbaum
- Pages 135-156
- On the Size of Shares for Secret Sharing Schemes
- R. M. Capocelli, A. DeSantis, L. Gargano and U. Vaccaro
- Pages 157-167
- Modifications to the Number Field Sieve
- D. Coppersmith
- Pages 169-180
Volume 6, Number 4, 1993
- A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm
- G. Orton, L. Peppard and S. E. Tavares
- Pages 183-208
- Elliptic Curve Cryptosystems and Their Implementations
- A. J. Menezes and S. A. Vanstone
- Pages 209-224
- User Impersonation in Key Certification Schemes
- A. K. Lenstra and Y. Yacobi
- Pages 225-232
Volume 7
Volume 7, Number 1, 1994
- Definitions and Properties of Zero-Knowledge Proof Systems
- O. Goldreich and Y. Oren
- Pages 1-32
- The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
- A. Klapper
- Pages 33-51
- On the Structure of the Privacy Hierarchy
- B. Chor, M. Gereb-Graus and E. Kushilevitz
- Pages 53-60
- A Weak Cipher that Generates the Symmetric Group
- S. Murphy, K. Paterson and P. Wild
- Pages 61-65
Volume 7, Number 2, 1994
- Proof of Soundness (Integrity) of Cryptographic Protocols
- G. J. Simmons
- Pages 69-77
- Three System for Cryptographic Protocol Analysis
- R. Kemmerer, C. Meadows and J. Millen
- Pages 79-130
Volume 7, Number 3, 1994
- An Analysis of a Class of Algorithms for S-Box Construction
- L. O'Connor
- Pages 133-151
- Functional Inversion and Communication Complexity
- Shang-Hua Teng
- Pages 153-170
- A Key-Exchange Protocol Using Real Quadratic Fields
- R. Scheidler, J. A. Buchmann and H. C. Williams
- Pages 171-199
Volume 7, Number 4, 1994
- Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance
- Minghua Qu and S. A. Vanstone
- Pages 201-212
- Algebraic Nonlinearity and Its Applications to Cryptography
- L. O'Connor and A. Klapper
- Pages 213-227
- New Types of Cryptanalytic Attacks Using Related Keys
- E. Biham
- Pages 229-246
Volume 8
Volume 8, Number 1, 1995
- Pairs and Triplets of DES S-Boxes
- D. Davies and S. Murphy
- Pages 1-25
- Provable Security Against a Differential Attack
- K. Nyberg and L. R. Knudsen
- Pages 27-37
- Graph Decompositions and Secret Sharing Schemes
- C. Blundo, A. DeSantis, D. R. Stinson and U. Vaccaro
- Pages 39-64
Volume 8, Number 2, 1995
- On the Distribution of Characteristics in Bijective Mappings
- L. O'Connor
- Pages 67-86
- Necessary and Sufficient Condtions for Collision-Free Hashing
- A. Russell
- Pages 87-100
- Short RSA Keys and Their Generation
- S. A. Vanstone and R. J. Zuccherato
- Pages 101-114
Volume 8, Number 3, 1995
- Further Enumerating Boolean Functions of Cryptographic Significance
- Yi Xian Yang and Baoan Guo
- Pages 115-122
- Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters
- U. M. Maurer
- Pages 123-155
- The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings
- S. Blackburn, S. Murphy and J. Stern
- Pages 157-166
- An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions
- D. R. Stinson and J. L. Massey
- Pages 167-173
Volume 8, Number 4, 1995
- Information-Theoretic Bounds for Authentication Codes and Block Designs
- Dingyi Pei
- Pages 177-188
- On Key Storage in Secure Networks
- Martin Dyer, Trevor Fenner, Alan Frieze and Andrew Thomason
- Pages 189-200
- Practical and Provably Secure Release of a Secret and Exchange of Signatures
- I. B. Damgard
- Pages 201-222
Volume 9
Volume 9, Number 1, 1996
- Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
- H. M. Heys and S. E. Tavares
- Pages 1-19
- Differential Cryptanalysis of Lucifer
- I. Ben-Aroya and E. Biham
- Pages 21-34
- On-Line/Off-Line Digital Signatures
- S. Even, O. Goldreich and S. Micali
- Pages 35-67
Volume 9, Number 2, 1996
- Bounds on Secret Key Exchange Using a Random Deal of Cards
- M. J. Fischer and R. N. Wright
- Pages 71-99
- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity
- T. Itoh, M. Hoshi and S. Tsujii
- Pages 101-109
- Correlation Properties of a General Binary Combiner with Memory
- J. Dj. Golic
- Pages 111-126
Volume 9, Number 3, 1996
- Guest Editor's Introduction
- C. Crepeau
- Pages 127--128
- The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge
- A. De Santis and G. Persiano
- Pages 129--148
- Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation
- M. Bellare and M. Yung
- Pages 149--166
- How to Construct Constant-Round Zero-Knowledge Proof Systems for NP
- O. Goldreich and A. Kahan
- Pages 167--190
- A Secure Protocol for the Oblivious Transfer (Extended Abstract)
- M. J. Fischer, S. Micali and C. Rackoff
- Pages 191--195
Volume 9, Number 4, 1996
- Efficient Cryptographic Schemes Provably as Secure as Subset Sum
- R. Impagliazzo and M. Naor
- Pages 199-216
- Joint Encryption and Message-Efficient Secure Computation
- M. Franklin and S. Haber
- Pages 217-232
- Ideal Secret Sharing Schemes with Multiple Secrets
- W.-A. Jackson, K. M. Martin and C. M. O'Keefe
- Pages 233-250
- Pseudorandom Generators and the Frequency of Simplicity
- Y. Han and L. A. Hemaspaandra
- Pages 251-261
Volume 10
Volume 10, Number 1, 1997
- On Schnorr's Preprocessing for Digital Signature Schemes
- P. de Rooij
- Pages 1--16
- Locally Random Reductions: Improvements and Applications
- D. Beaver, J. Feigenbaum, J. Kilian and P. Rogaway
- Pages 17--36
- A Language-Dependent Cryptographic Primitive
- T. Itoh, Y. Ohta and H. Shizuya
- Pages 37--50
- RIPEMD with Two-Round Compress Function is Not Collision-Free
- H. Dobbertin
- Pages 51--70
- A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem
- B. S. Kaliski
- Pages 71--72
Volume 10, Number 2, 1997
- Batch RSA
- A. Fiat
- Pages 75--88
- Batch Diffie-Hellman Key Agreement Systems
- Y. Yacobi and M. J. Beller
- Pages 89--96
- Linking Information Reconciliation and Privacy Amplification
- C. Cachin and U. M. Maurer
- Pages 97--110
- Feedback Shift Registers, 2-Adic Span, and Combiners with Memory
- A. Klapper and M. Goresky
- Pages 111-147
Volume 10, Number 3, 1997
- A Construction of a Cipher from a Single Pseudorandom Permutation
- S. Even and Y. Mansour
- Pages 151-162
- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
- I. B. Damgard, T. P. Pedersen and B. Pfitzmann
- Pages 163-194
- An Improvement of Davies' Attack on DES
- E. Biham and A. Biryukov
- Pages 195-206
- The Security of the Birational Permutation Signature Schemes
- D. Coppersmith, J. Stern and S. Vaudenay
- Pages 207-221
Volume 10, Number 4, 1997
- The Size of a Share Must Be Large
- L. Csirmaz
- Pages 223-231
- Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
- D. Coppersmith
- Pages 233-260
- Mutually Trusted Authority-Free Secret Sharing Schemes
- W.-A. Jackson, K.M. Martin and C.M. O'Keefe
- Pages 261-289
Volume 11
Volume 11, Number 1, 1998
- An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions
- J. Kilian and E. Petrank
- Pages 1-27
- A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems
- K. Sakurai and H. Shizuya
- Pages 29-43
- Cryptanalysis of Multiple Modes of Operation
- E. Biham
- Pages 45-58
- Attacks on Fast Double Block Length Hash Functions
- L. R. Knudsen, X. Lai and B. Preneel
- Pages 59-72
Volume 11, Number 2, 1998
- On Matroid Characterization of Ideal Secret Sharing Schemes
- J. Dj. Golic
- Pages 75-86
- Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation
- M. Naor, R. Ostrovsky, R. Venkatesan and M. Yung
- Pages 87-108
- A Public-Key Cryptosystem Using Purely Cubic Fields
- R. Scheidler
- Pages 109-124
- The Black-Box Model for Cryptographic Primitives
- C. P. Schnorr and S. Vaudenay
- Pages 125-140
- The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes-Okamoto-Vanstone Algorithm
- R. Balasubramanian and N. Koblitz
- Pages 141-145
Volume 11, Number 3, 1998
- Zero-Knowledge Authentication Scheme with Secret Key Exchange
- J. Brandt, I. Damgaard, P. Landrock and T. Pedersen
- Pages 147-159
- Lattice Reduction: A Toolbox for the Cryptanalyst
- A. Joux and J. Stern
- Pages 161-185
- An Efficient Existentially Unforgeable Signature Scheme and Its Applications
- C. Dwork and M. Naor
- Pages 187-208
- Two-Key Triple Encryption
- I. Damgaard and L. R. Knudsen
- Pages 209-218
Volume 11, Number 4, 1998
- Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two
- V. Muller
- Pages 219-234
- An Analysis of SAFER
- S. Murphy
- Pages 235-251
- Cryptanalysis of MD4
- H. Dobbertin
- Pages 253-271
- A Software-Optimized Encryption Algorithm
- P. Rogaway and D. Coppersmith
- Pages 273-287
Volume 12
Volume 12, Number 1, 1999
- Parallel Collision Search with Cryptanalytic Applications
- P. C. van Oorschot and M. J. Wiener
- Pages 1-28
- On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
- M. Naor and O. Reingold
- Pages 29-66
- A Fast Diffie-Hellman Protocol in Genus 2
- N. P. Smart and S. Siksek
- Pages 67-73
Volume 12, Number 2, 1999
- Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver
- S. Halevi
- Pages 77-90
- Bucket Hashing and Its Application to Fast Message Authentication
- P. Rogaway
- Pages 91-116
- Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer
- M. Bellare and R. L. Rivest
- Pages 117-140
- Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
- N. P. Smart
- Pages 141-151
Volume 12, Number 3, 1999
- On a Fallacious Bound for Authentication Codes
- C. Blundo, A. De Santis, K. Kurosawa and W. Ogata
- Pages 155-161
- Cryptanalysis of Triple Modes of Operation
- E. Biham
- Pages 161-184
- How to Stretch Random Functions: The Security of Protected Counter Sums
- D. J. Bernstein
- Pages 185-192
- The Discrete Logarithm Problem on Elliptic Curves of Trace One
- N. P. Smart
- Pages 193-196
- Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages
- M. Burmester, Y. G. Desmedt, T. Itoh, K. Sakurai and H. Shizuya
- Pages 197-223
Volume 12, Number 4, 1999
- Bounds for Key Distribution Patterns
- K. A. S. Quinn
- Pages 227-240
- Chinese Remaindering Based Cryptosystems in the Presence of Faults
- M. Joye, A. K. Lenstra and J.-J. Quisquater
- Pages 241-246
- On the Security of a Practical Identification Scheme
- V. Shoup
- Pages 247-260
- On the Contrast in Visual Cryptography Schemes
- C. Blundo, A. De Santis and D. R. Stinson
- Pages 261-289
Volume 13
Volume 13, Number 1, 2000
- Preface to Special Issue on General Secure Multiparty Computation
- O. Goldreich
- Pages 1-8
- Secure Communication in Minimal Connectivity Models
- M. Franklin and R. N. Wright
- Pages 9-30
- Player Simulation and General Adversary Structures in Perfect Multiparty Computation
- M. Hirt and U. M. Maurer
- Pages 31-60
- Maintaining Authenticated Communication in the Presence of Break-Ins
- R. Canetti, S. Halevi and A. Herzberg
- Pages 61-106
- Randomness vs. Fault-Tolerance
- R. Canetti, E. Kushilevitz, R. Ostrovsky and A. Rosen
- Pages 107-142
- Security and Composition of Multiparty Cryptographic Protocols
- R. Canetti
- Pages 143-202
Volume 13, Number 2, 2000
- Practical Aspects of Quantum Cryptographic Key Distribution
- H. Zbinden, N. Gisin, B. Huttner, A. Muller and W. Tittle
- Pages 207-220
- Stronger Security Proofs for RSA and Rabin Bits
- R. Fischlin and C. P. Schnorr
- Pages 221-245
- Fast Correlation Attacks on the Summation Generator
- J. Dj. Golic, M. Salmasizadeh and E. Dawson
- Pages 245-262
- A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time
- S. Paulus and T. Takagi
- Pages 263-272
- Robust and Efficient Sharing of RSA Functions
- R. Gennaro, T. Rabin, S. Jarecki and H. Krawczyk
- Pages 273-300
The information at this site is
Copyright 1995-1998, International Association for Cryptologic Research.