Another Look at "Provable Security" Neal KoblitzAlfred J. Menezes OriginalPaper 30 November 2005 Pages: 3 - 37
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sebastien CoronAlexander May OriginalPaper 09 October 2006 Pages: 39 - 50
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems Rosario GennaroStanislaw JareckiTal Rabin OriginalPaper 24 May 2006 Pages: 51 - 83
Scalable Protocols for Authenticated Group Key Exchange Jonathan KatzMoti Yung OriginalPaper 25 September 2006 Pages: 85 - 113
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication Dario CatalanoDavid PointchevalThomas Pornin OriginalPaper 25 September 2006 Pages: 115 - 149