Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Phong Q. NguyenOded Regev OriginalPaper 11 November 2008 Pages: 139 - 160
A Proof of Security of Yao’s Protocol for Two-Party Computation Yehuda LindellBenny Pinkas OriginalPaper 09 December 2008 Pages: 161 - 188
Non-interactive Timestamping in the Bounded-Storage Model Tal MoranRonen ShaltielAmnon Ta-Shma OriginalPaper 10 January 2009 Pages: 189 - 226
Multipartite Secret Sharing by Bivariate Interpolation Tamir TassaNira Dyn OriginalPaper 30 July 2008 Pages: 227 - 258
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography M. BarbosaA. MossD. Page OriginalPaper 15 May 2008 Pages: 259 - 281