## RSA 2009 Excellence in Mathematics Award

- Main page
- Overview
- Another look at "provable security"
- Another look at "provable security" II
- Another look at generic groups
- Another look at HMQV
- Another look at non-standard DL and DH problems
- Another look at automated theorem-proving
- Another look at automated theorem-proving II
- Another look at security definitions
- Another look at tightness
- Another look at tightness II
- Another look at HMAC
- Another look at 1-key nested MACs
- Another look at non-uniformity
- Another look at XCB
- Another look at normal approximations in cryptanalysis
- On the security of the WOTS-PRF signtature scheme NEW
- The uneasy relationship between mathematics and cryptography
- The brave new world of bodacious assumptions in cryptography
- ECC: The serpentine course of a paradigm shift
- Intractable problems in cryptography
- The random oracle model: A twenty-year retrospective
- Property preserving symmetric encryption revisited
- Miscellaneous

Free Web Counter