Efficient Set Operations in the Presence of Malicious Adversaries Carmit HazayKobbi Nissim OriginalPaper 01 March 2011 Pages: 383 - 433
Ideal Multipartite Secret Sharing Schemes Oriol FarràsJaume Martí-FarréCarles Padró OriginalPaper 31 March 2011 Pages: 434 - 463
Perfectly Balanced Boolean Functions and Golić Conjecture Stanislav V. Smyshlyaev OriginalPaper 02 April 2011 Pages: 464 - 483
Programmable Hash Functions and Their Applications Dennis HofheinzEike Kiltz OriginalPaper 29 April 2011 Pages: 484 - 527
Computational Indistinguishability Between Quantum States and Its Cryptographic Application Akinori KawachiTakeshi KoshibaTomoyuki Yamakami OriginalPaper 12 April 2011 Pages: 528 - 555