557 | -- | 600 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao. Graph Coloring Applied to Secure Computation in Non-Abelian Groups |
601 | -- | 639 | David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis |
640 | -- | 679 | Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre. On-line Ciphers and the Hash-CBC Constructions |
680 | -- | 722 | Yehuda Lindell, Benny Pinkas. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer |
723 | -- | 747 | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen. Batch Verification of Short Signatures |
748 | -- | 779 | Praveen Gauravaram, Lars R. Knudsen. Security Analysis of Randomize-Hash-then-Sign Digital Signatures |