From Private Simultaneous Messages to Zero-Information Arthur–Merlin Protocols and Back Benny ApplebaumPavel Raykov OriginalPaper 18 July 2016 Pages: 961 - 988
The Hunting of the SNARK Nir BitanskyRan CanettiEran Tromer OriginalPaper 03 October 2016 Pages: 989 - 1066
Information Theoretical Cryptogenography Sune K. Jakobsen OriginalPaper Open access 14 October 2016 Pages: 1067 - 1115
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces Charanjit S. JutlaArnab Roy OriginalPaper 12 October 2016 Pages: 1116 - 1156
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation Ran CohenYehuda Lindell OriginalPaper 23 September 2016 Pages: 1157 - 1186
Reproducible Circularly Secure Bit Encryption: Applications and Realizations Mohammad HajiabadiBruce M. Kapron OriginalPaper 29 November 2016 Pages: 1187 - 1237
Efficient Authentication from Hard Learning Problems Eike KiltzKrzysztof PietrzakAbhishek Jain OriginalPaper 09 December 2016 Pages: 1238 - 1275
Authenticated Confidential Channel Establishment and the Security of TLS-DHE Tibor JagerFlorian KohlarJörg Schwenk OriginalPaper 18 January 2017 Pages: 1276 - 1324