1 | -- | 13 | Rahul Jain. Resource Requirements of Private Quantum Channels and Consequences for Oblivious Remote State Preparation |
14 | -- | 40 | S. Dov Gordon, Jonathan Katz. Partial Fairness in Secure Two-Party Computation |
41 | -- | 56 | Jonathan Katz. Which Languages Have 4-Round Zero-Knowledge Proofs? |
57 | -- | 115 | Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights |
116 | -- | 135 | Krzysztof Pietrzak, Douglas Wikström. Parallel Repetition of Computationally Sound Protocols Revisited |
136 | -- | 157 | Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede. A Practical Attack on KeeLoq |
158 | -- | 193 | Shai Halevi, Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer |