Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts Duong-Hieu PhanDavid PointchevalMario Strefler Regular Contribution 12 February 2013 Pages: 251 - 265
Less is more: relaxed yet composable security notions for key exchange C. BrzuskaM. FischlinS. C. Williams Regular Contribution 16 March 2013 Pages: 267 - 297
An optimistic fair exchange protocol with active intermediaries G. Draper-GilJ. ZhouM. F. Hinarejos Regular Contribution 19 March 2013 Pages: 299 - 318
Security policies enforcement using finite and pushdown edit automata Danièle BeauquierJoëlle CohenRuggero Lanotte Regular Contribution 26 March 2013 Pages: 319 - 336
A shuffle to achieve high efficiency through pre-computation and batch verification Kun Peng Regular Contribution 19 March 2013 Pages: 337 - 345