Secure Computation of the Median (and Other Elements of Specified Ranks) Gagan AggarwalNina MishraBenny Pinkas OriginalPaper 05 February 2010 Pages: 373 - 401
Parallel and Concurrent Security of the HB and HB+ Protocols Jonathan KatzJi Sun ShinAdam Smith OriginalPaper 17 February 2010 Pages: 402 - 421
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Carmit HazayYehuda Lindell OriginalPaper 18 November 2008 Pages: 422 - 456
Discrete Logarithm Problems with Auxiliary Inputs Jung Hee Cheon OriginalPaper 11 December 2009 Pages: 457 - 476
On the Efficient Generation of Prime-Order Elliptic Curves Elisavet KonstantinouAristides KontogeorgisChristos Zaroliagis OriginalPaper 31 March 2009 Pages: 477 - 503