Securing Threshold Cryptosystems against Chosen Ciphertext Attack Victor ShoupRosario Gennaro OriginalPaper 23 July 2015 Pages: 75 - 96
Constructing Pseudo-Random Permutations with a Prescribed Structure Moni NaorOmer Reingold OriginalPaper 23 July 2015 Pages: 97 - 102
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* MartÃn AbadiPhillip Rogaway OriginalPaper 23 July 2015 Pages: 103 - 127
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack Anna M. JohnstonPeter S. Gemmell OriginalPaper 23 July 2015 Pages: 139 - 148