Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs Jonathan KatzYehuda Lindell OriginalPaper 28 September 2007 Pages: 303 - 349
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Michel AbdallaMihir BellareHaixia Shi OriginalPaper 14 September 2007 Pages: 350 - 391
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Elad BarkanEli BihamNathan Keller OriginalPaper 05 September 2007 Pages: 392 - 429
Cryptanalysis of an E0-like Combiner with Memory Yi LuSerge Vaudenay OriginalPaper 13 October 2007 Pages: 430 - 457
Cryptanalysis of the Shpilrain–Ushakov Protocol for Thompson’s Group Francesco Matucci OriginalPaper 13 October 2007 Pages: 458 - 468