657 | -- | 696 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer. New Second-Preimage Attacks on Hash Functions |
697 | -- | 728 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes |
729 | -- | 774 | Xavier Boyen. Unconditionally Anonymous Ring and Mesh Signatures |
775 | -- | 805 | Eli Biham, Yaniv Carmeli, Adi Shamir. Bug Attacks |
806 | -- | 832 | Benjamin Smith. The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves |
833 | -- | 878 | Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions |
879 | -- | 926 | Gilad Asharov, Ran Canetti, Carmit Hazay. Toward a Game Theoretic View of Secure Computation |
927 | -- | 951 | Franck Landelle, Thomas Peyrin. Cryptanalysis of Full RIPEMD-128 |