Improved Practical Attacks on Round-Reduced Keccak Itai DinurOrr DunkelmanAdi Shamir OriginalPaper 29 December 2012 Pages: 183 - 209
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika BrakerskiGil Segev OriginalPaper 11 January 2013 Pages: 210 - 247
Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication Patrick LongaFrancesco Sica OriginalPaper 16 January 2013 Pages: 248 - 283
On the Amortized Complexity of Zero-Knowledge Protocols Ronald CramerIvan DamgårdMarcel Keller OriginalPaper 31 January 2013 Pages: 284 - 316
On Strong Simulation and Composable Point Obfuscation Nir BitanskyRan Canetti OriginalPaper 16 February 2013 Pages: 317 - 357
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit HazayTomas Toft OriginalPaper 14 March 2013 Pages: 358 - 395