303 | -- | 349 | Jonathan Katz, Yehuda Lindell. Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs |
350 | -- | 391 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions |
392 | -- | 429 | Elad Barkan, Eli Biham, Nathan Keller. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication |
430 | -- | 457 | Yi Lu 0002, Serge Vaudenay. Cryptanalysis of an E0-like Combiner with Memory |
458 | -- | 468 | Francesco Matucci. Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson s Group |