36 | -- | 0 | Ted Krovetz, Phillip Rogaway. The Design and Evolution of OCB |
37 | -- | 0 | Benjamin Dowling, Marc Fischlin, Felix Günther 0001, Douglas Stebila. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol |
38 | -- | 0 | Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan. Unconditionally Secure Computation Against Low-Complexity Leakage |
39 | -- | 0 | Lior Rotem, Gil Segev 0001. Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier? |
40 | -- | 0 | Arpita Patra, Divya Ravi. On the Exact Round Complexity of Secure Three-Party Computation |
42 | -- | 0 | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings |
43 | -- | 0 | Amir Jafari, Shahram Khazaei. On Abelian and Homomorphic Secret Sharing Schemes |
44 | -- | 0 | Yehuda Lindell. Fast Secure Two-Party ECDSA Signing |
45 | -- | 0 | Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras. Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli |