287 | -- | 299 | Ian F. Blake, Alfred Menezes, Doug Stinson. Guest Editorial: Special Issue in Honor of Scott A. Vanstone |
301 | -- | 319 | Chuan Guo, Douglas R. Stinson, Tran van Trung. On tight bounds for binary frameproof codes |
321 | -- | 333 | Charles C. Lindner, Mariusz Meszka, Alexander Rosa. Almost 2-perfect 6-cycle systems |
335 | -- | 350 | Dirk Hachenberger. Primitive normal bases for quartic and cubic extensions: a geometric approach |
351 | -- | 356 | Ryoh Fuji-Hara. Perfect hash families of strength three with three rows from varieties on finite projective geometries |
357 | -- | 363 | Kevin T. Phelps. Enumeration of Kerdock codes of length 64 |
365 | -- | 374 | Dieter Jungnickel, Vladimir D. Tonchev. Maximal arcs and quasi-symmetric designs |
375 | -- | 400 | Thijs Laarhoven, Michele Mosca, Joop van de Pol. Finding shortest lattice vectors faster using quantum search |
401 | -- | 408 | Sonia Chiasson, Paul C. van Oorschot. Quantifying the security advantage of password expiration policies |
409 | -- | 426 | Dan Archdeacon, Jeffrey H. Dinitz, Diane M. Donovan, Emine Sule Yazici. Square integer Heffter arrays with empty cells |
427 | -- | 439 | Alice Silverberg, Yuri G. Zarhin. Isogenies of abelian varieties over finite fields |
441 | -- | 477 | Benoît Libert, Thomas Peters, Marc Joye, Moti Yung. Linearly homomorphic structure-preserving signatures and their applications |
479 | -- | 491 | Yeow Meng Chee, Charles J. Colbourn, Alan Chi Hung Ling, Hui Zhang 0004, Xiande Zhang. Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses |
493 | -- | 514 | Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe. High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers |
515 | -- | 539 | Eric L. Roettger, Hugh C. Williams, R. K. Guy. Some primality tests that eluded Lucas |
541 | -- | 552 | Jeffrey Hoffstein, Joseph H. Silverman. PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials |
553 | -- | 562 | Esther R. Lamken. The asymptotic existence of DR(v, k, k-1)-BIBDs |
563 | -- | 585 | Liang Feng Zhang, Reihaneh Safavi-Naini. Batch verifiable computation of outsourced functions |
587 | -- | 610 | Neal Koblitz, Alfred J. Menezes. The random oracle model: a twenty-year retrospective |
611 | -- | 631 | Elena Andreeva, Bart Mennink, Bart Preneel. Open problems in hash function security |
633 | -- | 651 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Reflections on slide with a twist attacks |
653 | -- | 662 | Gary McGuire, Emrah Sercan Yilmaz. Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2 |
663 | -- | 676 | Ueli Maurer. Zero-knowledge proofs of knowledge for group homomorphisms |
677 | -- | 712 | Gerhard Frey, Ernst Kani. Normal forms of hyperelliptic curves of genus 3 |
713 | -- | 724 | Peter Landrock. Power map permutations and the discrete log problem |
725 | -- | 771 | Tatsuaki Okamoto, Katsuyuki Takashima. Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption |