Slidex Attacks on the Even–Mansour Encryption Scheme Orr DunkelmanNathan KellerAdi Shamir OriginalPaper 20 November 2013 Pages: 1 - 28
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Mihir BellareDennis HofheinzEike Kiltz OriginalPaper 14 November 2013 Pages: 29 - 48
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation Arpita PatraAshish ChoudhuryC. Pandu Rangan OriginalPaper 11 December 2013 Pages: 49 - 109
Cryptanalysis of SHA-0 and Reduced SHA-1 Eli BihamRafi ChenAntoine Joux OriginalPaper 31 May 2014 Pages: 110 - 160
Quantum Private Information Retrieval has Linear Communication Complexity Ämin BaumelerAnne Broadbent OriginalPaper 17 April 2014 Pages: 161 - 175
Confined Guessing: New Signatures From Standard Assumptions Florian BöhlDennis HofheinzChristoph Striecks OriginalPaper 23 April 2014 Pages: 176 - 208