745 | -- | 768 | Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky. Almost-Everywhere Secure Computation with Edge Corruptions |
769 | -- | 795 | Gordon Procter, Carlos Cid. On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes |
796 | -- | 819 | James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta. Spreading Alerts Quietly and the Subgroup Escape Problem |
820 | -- | 843 | Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs |
844 | -- | 878 | Mihir Bellare. New Proofs for NMAC and HMAC: Security without Collision Resistance |
879 | -- | 898 | Thomas Peyrin. Collision Attack on Grindahl |