1 | -- | 28 | Orr Dunkelman, Nathan Keller, Adi Shamir. Slidex Attacks on the Even-Mansour Encryption Scheme |
29 | -- | 48 | Mihir Bellare, Dennis Hofheinz, Eike Kiltz. Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? |
49 | -- | 109 | Arpita Patra, Ashish Choudhury, C. Pandu Rangan. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation |
110 | -- | 160 | Eli Biham, Rafi Chen, Antoine Joux. Cryptanalysis of SHA-0 and Reduced SHA-1 |
161 | -- | 175 | Ämin Baumeler, Anne Broadbent. Quantum Private Information Retrieval has Linear Communication Complexity |
176 | -- | 208 | Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks. Confined Guessing: New Signatures From Standard Assumptions |