On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits Oded Goldreich OriginalPaper 13 August 2009 Pages: 1 - 36
Efficient Cache Attacks on AES, and Countermeasures Eran TromerDag Arne OsvikAdi Shamir OriginalPaper 23 July 2009 Pages: 37 - 71
Cryptanalysis of MD2 Lars R. KnudsenJohn Erik MathiassenSøren S. Thomsen OriginalPaper 28 October 2009 Pages: 72 - 90
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack Yvo DesmedtRosario GennaroVictor Shoup OriginalPaper 11 September 2009 Pages: 91 - 120
Obfuscation for Cryptographic Purposes Dennis HofheinzJohn Malone-LeeMartijn Stam OriginalPaper 13 June 2009 Pages: 121 - 168