_id,doi,title
11476,10.1007/978-3-031-07085-3_28,CoCoA: Concurrent continuous group key agreement
10035,10.15479/at:ista:10035,On the adaptive security of graph-based games
10041,10.1007/978-3-030-84245-1_17,"Limits on the Adaptive Security of Yao’s Garbling"
10044,,"On treewidth, separators and Yao's garbling"
10048,,The cost of adaptivity in security games on graphs
10049,10.1109/sp40001.2021.00035,"Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement"
10408,10.1007/978-3-030-90456-2_8,Grafting key trees: Efficient key management for overlapping groups
10409,10.1007/978-3-030-90453-1_17,"On treewidth, separators and Yao’s garbling"
10410,10.1007/978-3-030-90453-1_19,The cost of adaptivity in security games on graphs
9826,10.1007/978-3-030-75539-3_17,Inverse-Sybil attacks in automated contact tracing
7411,10.1007/978-3-030-17656-3_10,Reversible proofs of sequential work
6430,10.1007/978-3-030-17259-6_11,Adaptively secure proxy re-encryption
193,10.1145/3196494.3196534,On the memory hardness of data independent password hashing functions
637,10.1007/978-3-319-63688-7_5,Be adaptive avoid overcommitting
