| 265 | -- | 323 | Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting |
| 324 | -- | 360 | Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt. Automated Analysis of Cryptographic Assumptions in Generic Group Models |
| 361 | -- | 392 | Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor. Hardness-Preserving Reductions via Cuckoo Hashing |
| 393 | -- | 434 | Susumu Kiyoshima. Non-black-box Simulation in the Fully Concurrent Setting, Revisited |
| 435 | -- | 458 | Florent Bernard, Patrick Haddad, Viktor Fischer, Jean Nicolai. From Physical to Stochastic Modeling of a TERO-Based TRNG |
| 459 | -- | 497 | Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou. (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens |
| 498 | -- | 546 | Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials |
| 547 | -- | 565 | Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé. Cryptanalysis of the CLT13 Multilinear Map |
| 566 | -- | 599 | Nils Fleischhacker, Tibor Jager, Dominique Schröder. On Tight Security Proofs for Schnorr Signatures |