An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 Jan DenefFrederik Vercauteren OriginalPaper 23 February 2005 Pages: 1 - 25
Threshold Password-Authenticated Key Exchange Philip MacKenzieThomas ShrimptonMarkus Jakobsson OriginalPaper 02 August 2005 Pages: 27 - 66
Characterization of Security Notions for Probabilistic Private-Key Encryption Jonathan KatzMoti Yung OriginalPaper 03 May 2005 Pages: 67 - 95
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives Yan-Cheng ChangChun-Yuan HsiaoChi-Jen Lu OriginalPaper 02 August 2005 Pages: 97 - 114