A Proof of the Security of Quantum Key Distribution Eli BihamMichel BoyerVwani Roychowdhury OriginalPaper 24 April 2006 Pages: 381 - 439
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers Deukjo HongSeokhie HongOkyeon Yi OriginalPaper 20 September 2006 Pages: 441 - 462
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order Marc GiraultGuillaume PoupardJacques Stern OriginalPaper 25 September 2006 Pages: 463 - 487
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate Ivan Bjerre DamgardGudmund Skovbjerg Frandsen OriginalPaper 25 September 2006 Pages: 489 - 520
Completeness in Two-Party Secure Computation: A Computational View Danny HarnikMoni NaorAlon Rosen OriginalPaper 24 May 2006 Pages: 521 - 552
Elliptic Curves with Low Embedding Degree Florian LucaIgor E. Shparlinski OriginalPaper 20 September 2006 Pages: 553 - 562