### Table 1: Highest Bids for Auction of Annexation Drone

"... In PAGE 5: ... t Consider an example, the eBay auction for the trading card Annexation Drone [1]. The highest bids of individual bidders are listed in Table1 . Suppose the bidders are non- strategic (note that this is simply an illustrative example, we do not have the data to determine whether the bidders are non-strategic or rational), privacy protection as in Case A, i.... In PAGE 5: ...e. the seller and only the seller has all the information of Table1 , and the seller has a total of four objects. Then he will ofier the card for $13 to les-litwin, $5.... In PAGE 7: ... Thus privacy protection provides beneflt to the higher bid- ders, and could even be disadvantageous to lower bidders. Consider the example of Table1 . Table 2 shows the data available to the seller in Case C.... ..."

### Table 3. Resistance to Cryptanalysis for Networks

1994

"... In PAGE 28: ... a36a38a37 . Summary of Results In Table3 , for SPNs of 8 rounds, we have summarized lower bounds on the values of a108 a40a39... In PAGE 29: ... Results are presented for networks using permutations from the set a115 and for networks using a linear transformation of the form of equation (23). Note that the analysis of Table3 is equally applicable to the decryption as well as the encryption network. (This is important since the decryption network may also be attacked using either cryptanalysis method.... ..."

### Table 3. Resistance to Cryptanalysis for Networks

1996

"... In PAGE 28: ... 8673. Summary of Results In Table3 , for SPNs of 8 rounds, we have summarized lower bounds on the values of 7868... In PAGE 29: ... Results are presented for networks using permutations from the set 5 and for networks using a linear transformation of the form of equation (23). Note that the analysis of Table3 is equally applicable to the decryption as well as the encryption network. (This is important since the decryption network may also be attacked using either cryptanalysis method.... ..."

Cited by 26

### Table 3: Cryptography Primitive Attacks

"... In PAGE 3: ...etection system (IDS). But other attacks such as DoS cannot be made stealth. Some attacks are non-cryptography related, and others are cryptography primitive attacks. Table3 shows cryptography primitive attacks and some examples. For the rest of the section, we present a survey of security attacks in MANET following the order of the protocol stacks.... ..."

### Table 1. Cryptography techniques in e-voting.

"... In PAGE 3: ... To achieve a receipt-freeness, they used schemes of [12] and [18]. Table1 shows cryptography techniques in e-voting system. 1) Benaloh et al.... ..."

### Table 7: Semantic rules for asymmetric cryptography.

2005

"... In PAGE 24: ... The additional rules for congruence are: ( m)0 0; ( n)( m)P ( m)( n)P; ( n)( m)P ( m)( n)P; ( m)(P j Q) P j ( m)Q, if m+; m 62 fn(P). The new reduction rules are in Table7 . The rule (A-Res) is quite standard.... ..."

Cited by 16

### Table 9: Analysis of new constructs for asymmetric cryptography.

2005

"... In PAGE 22: ... 8.2 Extensions to the Control Flow Analysis The additional rules for the control ow analysis are in Table9 and are very similar to the corresponding rules (2), (3) and (5) in Table 2. The only di er- ences occur in the rule for asymmetric decryption: the values V0, V 0 0 are actually a pair of public/private keys, required by the condition fV0; V 0 0g = fm+; m g, and the consequent check for 1 i j, that the values Vi are pointwise included in the values in #i.... ..."

Cited by 16

### Table 3 The sensitivity of the nominal luminance mechanism (Vl) and the individual luminance mechanisms as measured by flicker photometrya

2000

"... In PAGE 14: ... (A1) With data obtained for N]2 test patterns, the N equations of the form of (A1) may be solved to de- termine the chromoluminance direction of SEN. Table3 provides the values of SEN we determined for each of our three observers. References Brainard, D.... ..."

Cited by 2

### Table 1. Estimates of L/M Signal Ratio Derived from Flicker ERGa

"... In PAGE 5: ...as [2.81, 4.12]. Third, as has been pointed out previously, the deriva- tion of relative L/M signal ratio depends on the l-max value chosen for L and M cone spectra.59 Table1 pro- vides L/M signal ratios obtained with cone spectra de- rived from the Dawis nomogram by use of a variety of val- ues for L cone l-max for each observer. The L/M signal ratios vary considerably with L cone l-max, especially for JW.... ..."

### Table 1. Comparison of implementation results for symmetric key cryptanalysis

2006

"... In PAGE 10: ... 8. Precomputation time for half of the salts and for all salts as a function of the number of BEE2 modules Table1 compares our results with other hardware as well as software solutions. The only known hardware solution is [12] which attacked one 40-bit DES while our target was 25 56-bit DES blocks.... ..."

Cited by 1