|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 559 occurrences of 325 keywords
|
|
|
Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Craig Gentry |
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky |
Password-Authenticated Session-Key Generation on the Internet in the Plain Model. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Orr Dunkelman, Nathan Keller, Adi Shamir |
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert |
An Efficient and Parallel Gaussian Sampler for Lattices. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek |
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Katsuyuki Takashima |
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Eyal Kushilevitz, Anat Paskin |
Secure Multiparty Computation with Minimal Interaction. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai |
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup |
Credential Authenticated Identification and Key Exchange. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Niek J. Bouman, Serge Fehr |
Sampling in a Quantum Population, and Applications. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky |
Equivalence of Uniform Key Agreement and Composition Insecurity. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Guy N. Rothblum |
Securing Computation against Continuous Leakage. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Craig Gentry, Bryan Parno |
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz |
Additively Homomorphic Encryption with d-Operand Multiplications. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk |
Cryptographic Extraction and Key Derivation: The HKDF Scheme. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anindya De, Luca Trevisan, Madhur Tulsiani |
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Shafi Goldwasser |
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back). |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi |
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benny Pinkas, Tzachy Reinman |
Oblivious RAM Revisited. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Yael Tauman Kalai, Salil P. Vadhan |
Improved Delegation of Computation Using Fully Homomorphic Encryption. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Claudio Orlandi |
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Severin Winkler, Jürg Wullschleger |
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dominique Unruh, Jörn Müller-Quade |
Universally Composable Incoercibility. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ali Juma, Yevgeniy Vahlis |
Protecting Cryptographic Keys against Continual Leakage. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
Concurrent Non-Malleable Zero Knowledge Proofs. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wilko Henecka, Alexander May 0001, Alexander Meurer |
Correcting Errors in RSA Private Keys. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo |
Structure-Preserving Signatures and Commitments to Group Elements. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann |
Factorization of a 768-Bit RSA Modulus. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shweta Agrawal, Dan Boneh, Xavier Boyen |
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Peyrin |
Improved Differential Attacks for ECHO and Grøstl. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Shai Halevi, Vinod Vaikuntanathan |
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Eran Omri, Ilan Orlov |
Protocols for Multiparty Coin Toss with Dishonest Majority. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Viet Tung Hoang, Phillip Rogaway |
On Generalized Feistel Networks. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tal Rabin (eds.) |
Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti |
Collusion-Free Multiparty Computation in the Mediated Model. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vadim Lyubashevsky, Daniele Micciancio |
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky |
Position Based Cryptography. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ben Morris, Phillip Rogaway, Till Stegers |
How to Encipher Messages on a Small Domain. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yael Tauman Kalai, Ran Raz |
Probabilistically Checkable Arguments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Gil Segev 0001 |
Public-Key Cryptosystems Resilient to Key Leakage. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan |
The Round Complexity of Verifiable Secret Sharing Revisited. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz |
Cryptanalysis of C2. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
S-box recovery, Cryptomeria, block cipher, C2, key recovery, boomerang attack |
1 | Ueli M. Maurer, Stefano Tessaro |
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Céline Chevalier, David Pointcheval |
Smooth Projective Hashing for Conditionally Extractable Commitments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner |
Improving the Security of Quantum Protocols via Commit-and-Open. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Yevgeniy Dodis, Daniel Wichs |
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Eike Kiltz |
The Group of Signed Quadratic Residues and Applications. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security |
1 | Boaz Barak, Mohammad Mahmoody-Ghidary |
Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
1 | Yevgeniy Dodis, John P. Steinberger |
Message Authentication Codes from Unpredictable Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan |
Computational Differential Privacy. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikström |
On the Composition of Public-Coin Zero-Knowledge Protocols. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi (eds.) |
Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum, David Cash, Chris Peikert, Amit Sahai |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography |
1 | Daniel J. Bernstein |
Batch Binary Edwards. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
batch throughput, Karatsuba, Toom, binary Edwards curves, differential addition, complete addition formulas, elliptic curves, vectorization, Scalar multiplication, Diffie-Hellman |
1 | Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
Randomizable Proofs and Delegatable Anonymous Credentials. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos |
Privacy-Enhancing Auctions Using Rational Cryptography. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic |
Distinguisher and Related-Key Attack on the Full AES-256. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack |
1 | Thomas Icart |
How to Hash into Elliptic Curves. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Ivan Damgård |
On the Amortized Complexity of Zero-Knowledge Protocols. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gaëtan Leurent, Phong Q. Nguyen |
How Risky Is the Random-Oracle Model? |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
1 | Nadia Heninger, Hovav Shacham |
Reconstructing RSA Private Keys from Random Key Bits. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer |
Abstraction in Cryptography. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Linear Algebra with Sub-linear Zero-Knowledge Arguments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Sub-linear size zero-knowledge arguments, public-coin special honest verifier zero-knowledge, Pedersen commitments, linear algebra, circuit satisfiability |
1 | Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou |
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv |
1 | Adi Akavia |
Solving Hidden Number Problem with One Bit Oracle and Advice. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov, Yehuda Lindell |
Utility Dependence in Correct and Fair Rational Secret Sharing. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Susan Hohenberger, Brent Waters |
Short and Stateless Signatures from the RSA Assumption. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marc Stevens 0001, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger |
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
PlayStation 3, certificate, collision attack, MD5 |
1 | Ignacio Cascudo Pueyo, Hao Chen 0095, Ronald Cramer, Chaoping Xing |
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Abhi Shelat, Ivan Visconti |
Collusion-Free Protocols in the Mediated Model. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Secure Collusion Free, ZKPoK, Commitments, Mediated Communication |
1 | Krzysztof Pietrzak |
Compression from Collisions, or Why CRHF Combiners Have a Long Output. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Maximov, Dmitry Khovratovich |
New State Recovery Attack on RC4. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
state recovery attack, RC4, key recovery attack |
1 | Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Founding Cryptography on Oblivious Transfer - Efficiently. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
Improved Bounds on Security Reductions for Discrete Log Based Signatures. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Schnorr Signature Scheme, Provable Security, Random Oracle Model |
1 | Cynthia Dwork, Sergey Yekhanin |
New Efficient Attacks on Statistical Disclosure Control Mechanisms. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert, Vinod Vaikuntanathan |
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Boldyreva, Serge Fehr, Adam O'Neill |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Yaniv Carmeli, Adi Shamir |
Bug Attacks. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack |
1 | Yevgeniy Dodis, Victor Shoup, Shabsi Walfish |
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan |
Adaptive One-Way Functions and Applications. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Assumptions, Non-malleable Commitment, Non-malleable Zero-knowledge |
1 | David A. Wagner 0001 (eds.) |
Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret |
Cryptanalysis of MinRank. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Phillip Rogaway, John P. Steinberger |
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model |
1 | Thomas Eisenbarth 0001, Timo Kasper, Amir Moradi 0001, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Stam |
Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Payman Mohassel, Enav Weinreb |
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Eike Kiltz |
Programmable Hash Functions and Their Applications. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brett Hemenway, Rafail Ostrovsky |
Public-Key Locally-Decodable Codes. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Bounded Channel Model, Error Correcting Codes, Public Key Cryptography, Chinese Remainder Theorem, Private Information Retrieval, Locally Decodable Codes |
1 | Chris Peikert, Vinod Vaikuntanathan, Brent Waters |
A Framework for Efficient and Composable Oblivious Transfer. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cécile Delerablée, David Pointcheval |
Dynamic Threshold Public-Key Encryption. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
Circular-Secure Encryption from Decision Diffie-Hellman. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt |
Cryptanalysis of the GOST Hash Function. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, collision attack, preimage attack, second preimage attack |
Displaying result #101 - #200 of 1266 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|