381 | -- | 439 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury. A Proof of the Security of Quantum Key Distribution |
441 | -- | 462 | Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi. Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers |
463 | -- | 487 | Marc Girault, Guillaume Poupard, Jacques Stern. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order |
489 | -- | 520 | Ivan Damgård, Gudmund Skovbjerg Frandsen. An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate |
521 | -- | 552 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen. Completeness in Two-Party Secure Computation: A Computational View |
553 | -- | 562 | Florian Luca, Igor Shparlinski. Elliptic Curves with Low Embedding Degree |