| 601 | -- | 634 | Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail. Key Establishment à la Merkle in a Quantum World |
| 635 | -- | 689 | Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. On Black-Box Complexity of Universally Composable Security in the CRS Model |
| 690 | -- | 741 | Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas. Probabilistic Termination and Composability of Cryptographic Protocols |
| 742 | -- | 824 | Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou. Leakage Resilience from Program Obfuscation |
| 825 | -- | 866 | Mark Zhandry. The Magic of ELFs |
| 867 | -- | 894 | Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez. Koblitz Curves over Quadratic Fields |
| 895 | -- | 940 | Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda. Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes |
| 941 | -- | 972 | Dana Dachman-Soled, Chang Liu 0021, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin. Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness |
| 973 | -- | 1025 | Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi. Efficient Fully Structure-Preserving Signatures and Shrinking Commitments |
| 1026 | -- | 1069 | Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai. Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ |