### Table 2. Subgroup Membership Problems

2001

"... In PAGE 7: ... For other plausible applications of the subgroup membership problem, the reader is also referred to [12] in which the DDH assumption is applied to the cryptographic schemes which only known method to construct is to base on the QR assumption. We summarize the examples above in Table2 , however, the table is not exhaustive at all. Table 2.... ..."

Cited by 6

### Table 1: Efficiency comparison for ElGamal variants in terms of ciphertext size, where |g|, |mac|, and |M| are sizes for a group element, an authentication tag, and a plaintext, respectively. For concreteness, one can think of |mac| = 128. DBDH and square-DBDH means the decisional bilinear Diffie-Hellman assumption [14] and the decisional square bilinear Diffie-Hellman assumption [32], respectively. ciphertext size assumption security bilinear group

2006

"... In PAGE 15: ... This method does not require any additional assumption. 5 Comparison Here, we discuss comparison among ElGamal variants in terms of ciphertext size, and it is summarized in Table1 . So far, under the DDH assumption the Kurosawa-Desmedt scheme [33] is considered as the most efficient scheme, and its ciphertext overhead is two group elements and an authentication tag.... ..."

Cited by 2

### TABLE 12. Positive Examination Result for DDH Based on Training of Examiner and Method of Examination of the New- born, at an Intermediate (66 Months of Age), and at 12 Months of Age

### Table 3(a) Semi-empirical heats of formation with their respective enthalpy diVerences (DDH) between the three polymorphs of BIXGIY (All results in kcal mol21)

1998

### Table 2 Semi-empirical heats of formation and force Weld energies with their respective enthalpy (DDH) and energy (DE) diVerences between the two polymorphs of KAXXAI (All results in kcal mol21)

1998

"... In PAGE 6: ... 3.2 Conformational energy studies: semi-empirical, force Weld and ab initio energy calculations The semi-empirical heats of formation and force Weld energies along with the energy diVerences relative to the most stable form are shown for KAXXAI in Table2 . The equivalent results for BIXGIY and FPAMCA are given in Tables 3(a), 3(b) and 4, respectively.... ..."

### Table 4 Semi-empirical heats of formation and force Weld energies with their respective enthalpy (DDH) and energy (DE) diVerences between the two polymorphs of FPAMCA (All results in kcal mol21)

1998

### Table 3. Other Assumptions Item Assumption Source

1999

"... In PAGE 5: ... For this analysis the assumptions regarding post-patent years were obtained from the OTA (1993) report. Table3 details other cash flow assumptions. Table 3.... ..."

Cited by 2

### Table 1. Assumptions

1999

"... In PAGE 9: ... Table1 . Assumptions (Concluded) Assumption Item Year Value 18.... ..."

### Table 2: Assumptions

1994

"... In PAGE 5: ...2.1 Explanation of Assumptions Table2 apos;s assumptions simplify the problem and help in better understanding the model. With regard to these assumptions, the following points are worth noting: #0F In assumption 2, constant t pack implies #0Cxed packet size.... ..."

Cited by 6

### Table 1. Assumptions (Concluded)

1999

"... In PAGE 8: ... In particular, the assumptions shown in Table 1 were reviewed for validity along with the cost model output. Table1 . Assumptions Assumption Item Year Value 1.... ..."