| 985 | -- | 986 | Juan A. Garay, Rafail Ostrovsky. Special Issue: Algorithmic Tools in Cryptography |
| 987 | -- | 1013 | Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró. On the Information Ratio of Non-perfect Secret Sharing Schemes |
| 1014 | -- | 1051 | Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth. On Virtual Grey Box Obfuscation for General Circuits |
| 1052 | -- | 1101 | Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth. On the Impossibility of Cryptography with Tamperable Randomness |
| 1102 | -- | 1160 | Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza. Scalable Zero Knowledge Via Cycles of Elliptic Curves |
| 1161 | -- | 1195 | Itai Dinur, Gaëtan Leurent. Improved Generic Attacks Against Hash-Based MACs and HAIFA |
| 1196 | -- | 1232 | Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs. How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs |
| 1233 | -- | 1285 | Dan Boneh, Mark Zhandry. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation |
| 1286 | -- | 1317 | Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro. Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications |
| 1318 | -- | 1352 | San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld. Hardness of k-LWE and Applications in Traitor Tracing |
| 1353 | -- | 1373 | Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input |