New Attacks on IDEA with at Least 6 Rounds Eli BihamOrr DunkelmanAdi Shamir OriginalPaper 16 November 2013 Pages: 209 - 239
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions Mahdi SajadiehMohammad DakhilalianPouyan Sepehrdad OriginalPaper 22 November 2013 Pages: 240 - 256
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool Mario LambergerFlorian MendelVincent Rijmen OriginalPaper 12 November 2013 Pages: 257 - 296
From Non-adaptive to Adaptive Pseudorandom Functions Itay BermanIftach Haitner OriginalPaper 23 November 2013 Pages: 297 - 311
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda LindellBenny Pinkas OriginalPaper 10 April 2014 Pages: 312 - 350
Computing on Authenticated Data Jae Hyun AhnDan BonehBrent Waters OriginalPaper 18 April 2014 Pages: 351 - 395