Automata Evaluation and Text Search Protocols with Simulation-Based Security Rosario GennaroCarmit HazayJeffrey S. Sorensen OriginalPaper 12 February 2015 Pages: 243 - 282
Limits on the Usefulness of Random Oracles Iftach HaitnerEran OmriHila Zarosim OriginalPaper 24 December 2014 Pages: 283 - 335
Secret-Sharing Schemes for Very Dense Graphs Amos BeimelOriol Farrà sYuval Mintz OriginalPaper 24 December 2014 Pages: 336 - 362
Structure-Preserving Signatures and Commitments to Group Elements Masayuki AbeGeorg FuchsbauerMiyako Ohkubo OriginalPaper 27 January 2015 Pages: 363 - 421
Signature Schemes Secure Against Hard-to-Invert Leakage Sebastian FaustCarmit HazayAngela Zottarel OriginalPaper 13 February 2015 Pages: 422 - 455
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries Yehuda Lindell OriginalPaper 28 February 2015 Pages: 456 - 490