Graph Coloring Applied to Secure Computation in Non-Abelian Groups Yvo DesmedtJosef PieprzykAndrew Chi-Chih Yao OriginalPaper 06 September 2011 Pages: 557 - 600
Bonsai Trees, or How to Delegate a Lattice Basis David CashDennis HofheinzChris Peikert OriginalPaper 06 September 2011 Pages: 601 - 639
On-line Ciphers and the Hash-CBC Constructions M. BellareA. BoldyrevaC. Namprempre OriginalPaper 07 September 2011 Pages: 640 - 679
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer Yehuda LindellBenny Pinkas OriginalPaper 03 September 2011 Pages: 680 - 722
Batch Verification of Short Signatures Jan CamenischSusan HohenbergerMichael Østergaard Pedersen OriginalPaper 20 October 2011 Pages: 723 - 747
Security Analysis of Randomize-Hash-then-Sign Digital Signatures Praveen GauravaramLars R. Knudsen OriginalPaper 12 October 2011 Pages: 748 - 779