Almost-Everywhere Secure Computation with Edge Corruptions Nishanth ChandranJuan A. GarayRafail Ostrovsky OriginalPaper 19 December 2013 Pages: 745 - 768
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes Gordon ProcterCarlos Cid OriginalPaper 12 September 2014 Pages: 769 - 795
Spreading Alerts Quietly and the Subgroup Escape Problem James AspnesZoë DiamadiRené Peralta OriginalPaper 24 October 2014 Pages: 796 - 819
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Craig GentryJens GrothAdam Smith OriginalPaper 18 April 2014 Pages: 820 - 843
New Proofs for NMAC and HMAC: Security without Collision Resistance Mihir Bellare OriginalPaper 10 June 2014 Pages: 844 - 878