| | Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities by Marc Stevens and Arjen Lenstra and Benne de Weger | | 1 |
| | Non-trivial black-box combiners for collision-resistant hash-functions dont exist by Krzysztof Pietrzak | | 23 |
| | The collision intractability of MDC-2 in the ideal-cipher model by John P. Steinberger | | 34 |
| | An efficient protocol for secure two-party computation in the presence of malicious adversaries by Yehuda Lindell and Benny Pinkas | | 52 |
| | Revisiting the efficiency of malicious two-party computation by David P. Woodruff | | 79 |
| | Efficient two-party secure computation on committed inputs by Stanislaw Jarecki and Vitaly Shmatikov | | 97 |
| | Universally composable multi-party computation using tamper-proof hardware by Jonathan Katz | | 115 |
| | Generic and practical resettable zero-knowledge in the bare public-key model by Moti Yung and Yunlei Zhao | | 129 |
| | Instance-dependent verifiable random functions and their application to simultaneous resettability by Yi Deng and Dongdai Lin | | 148 |
| | Conditional computational entropy, or toward separating pseudoentropy from compressibility by Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin | | 169 |
| | Zero knowledge and soundness are symmetric by Shien Jin Ony and Salil Vadhan | | 187 |
| | Mesh signatures by Xavier Boyen | | 210 |
| | The power of proofs-of-possession : securing multiparty signatures against rogue-key attacks by Thomas Ristenpart and Scott Yilek | | 228 |
| | Batch verification of short signatures by Jan Camenisch and Susan Hohenberger and Michael 0stergaard Pedersen | | 246 |
| | Cryptanalysis of SFLASH with slightly modified parameters by Vivien Dubois and Pierre-Alain Fouque and Jacques Stern | | 264 |
| | Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy by Hongjun Wu and Bart Preneel | | 276 |
| | Secure computation from random error correcting codes by Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan | | 291 |
| | Round-efficient secure computation in point-to-point networks by Jonathan Katz and Chiu-Yuen Koo | | 311 |
| | More... | | |