|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 559 occurrences of 325 keywords
|
|
|
Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dan Boneh, Glenn Durfee, Nick Howgrave-Graham |
Factoring N = prq for Large r. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yonatan Aumann, Michael O. Rabin |
Information Theoretically Secure Communication in the Limited Storage Space Model. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Oded Goldreich 0001, Hugo Krawczyk |
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Amit Sahai, Salil P. Vadhan |
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi |
Towards Sound Approaches to Counteract Power-Analysis Attacks. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Adaptive Security for Threshold Cryptosystems. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Eli Gafni, Jessica Staddon, Yiqun Lisa Yin |
Efficient Methods for Integrating Traceability and Broadcast Encryption. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Palash Sarkar 0001 |
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Boolean Function, Stream Cipher, Nonlinearity, Balancedness, Correlation Immunity, Algebraic Degree |
1 | Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner 0001 |
Truncated Differentials and Skipjack. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Amos Fiat, Tamir Tassa |
Dynamic Traitor Training. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Matthew K. Franklin |
An Efficient Public Key Traitor Tracing Scheme. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Niv Gilboa |
Two Party RSA Key Generation. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Benny Pinkas |
Oblivious Transfer with Adaptive Queries. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. Kocher, Joshua Jaffe, Benjamin Jun |
Differential Power Analysis. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
cryptanalysis, differential power analysis, DPA, DES, SPA |
1 | Jee Hea An, Mihir Bellare |
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Johansson 0001, Fredrik Jönsson |
Fast Correlation Attacks Based on Turbo Code Techniques. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Stream ciphers, turbo codes, convolutional codes, iterative decoding, correlation attacks |
1 | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
Abuse-Free Optimistic Contract Signing. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Amit Sahai |
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai |
Cryptanalysis of "2 R" Schemes. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer |
Information-Theoretic Cryptography. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
information-theoretic primitive, generalized random oracle, Information theory, unconditional security, conditional independence |
1 | Phong Q. Nguyen, Jacques Stern |
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Victor Boyko |
On the Security Properties of OAEP as an All-or-Nothing Transform. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
all-or-nothing transforms, encryption modes, polynomial indistinguishability, random oracles, semantic security, exact security, OAEP |
1 | Ravi Kumar 0001, Sridhar Rajagopalan, Amit Sahai |
Coding Constructions for Blacklisting Problems without Computational Assumptions. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
error-correcting codes, copyrights protection, broadcast encryption, blacklisting |
1 | Eiichiro Fujisaki, Tatsuaki Okamoto |
Secure Integration of Asymmetric and Symmetric Encryption Schemes. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption |
1 | Masayuki Abe |
Robust Distributed Multiplicaton with out Interaction. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Distributed Multiplication, Cramer-Shoup Cryptosystem, Multi-Party Computation, Round Complexity |
1 | Mark Etzel, Sarvar Patel, Zulfikar Ramzan |
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Message authentication codes, Universal Hashing |
1 | Niv Gilboa, Yuval Ishai |
Compressing Cryptographic Resources. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Rafail Ostrovsky |
On Concurrent Zero-Knowledge with Pre-processing. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Sander, Amnon Ta-Shma |
Auditable, Anonymous Electronic Cash Extended Abstract. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
anonymity, electronic cash |
1 | Jean-Sébastien Coron, David Naccache, Julien P. Stern |
On the Security of RSA Padding. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen |
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Tal Malkin, Silvio Micali |
The All-or-Nothing Nature of Two-Party Secure Computation. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Wiener (eds.) |
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Radha Poovendran, John S. Baras |
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Florent Chabaud, Antoine Joux |
Differential Collisions in SHA-0. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson |
Time-Stamping with Binary Linking Schemes. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Tatsuaki Okamoto |
On Concrete Security Treatment of Signatures Derived from Identification. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk (eds.) |
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yonatan Aumann, Michael O. Rabin |
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Hada, Toshiaki Tanaka |
On the Existence of 3-Round Zero-Knowledge Protocols. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Zero-knowledge, interactive proof, Diffie-Hellman problem |
1 | Cynthia Dwork, Amit Sahai |
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier |
Building PRFs from PRPs. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security |
1 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
1 | Charanjit S. Jutla |
Generalized Birthday Arracks on Unbalanced Feistel Networks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
second moment method, Block ciphers, birthday attacks, pseudo-random permutations, Feistel networks |
1 | Moni Naor, Omer Reingold |
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
1 | Phong Q. Nguyen, Jacques Stern |
Cryptanalysis of the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
1 | Damian Weber, Thomas F. Denny |
The Solution of McCurley's Discrete Log Challenge. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Index Calculus, Lanczos, Discrete Logarithms, Number Field Sieve |
1 | Joe Kilian, Erez Petrank |
Identity Escrow. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Steven M. Bellovin |
Cryptography and the Internet. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tal Rabin |
A Simplified Approach to Threshold and Proactive RSA. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
proactive signatures, threshold and proactive RSA, RSA, threshold signatures |
1 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing |
1 | Ronald Cramer, Ivan Damgård |
Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Birgit Pfitzmann, Ronald L. Rivest |
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystem Modulo pkq. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm |
1 | Serge Vaudenay |
Cryptanalysis of the Chor-Rivest Cryptosystem. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Aviad Kipnis, Adi Shamir |
Cryptanalysis of the Oil & Vinegar Signature Scheme. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Shimoyama, Toshinobu Kaneko |
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Benny Pinkas |
Threshold Traitor Tracing. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz |
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve |
1 | Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan |
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
1 | Ronald Cramer, Victor Shoup |
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Sarvar Patel, Ganapathy S. Sundaram |
An Efficient Discrete Log Pseudo Random Generator. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, Rosario Gennaro |
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
1 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
1 | Daniel V. Bailey, Christof Paar |
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
fast arithmetic, pseudo-Mersenne primes, OEF, binomials, cryptographic implementation, finite fields, elliptic curves, hyperelliptic curves, modular reduction, Optimal Extension Fields |
1 | Louis Salvail |
Quantum Bit Commitment from a Physical Assumption. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Thomas A. Berson |
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem |
1 | Mikael Goldmann, Mats Näslund |
The Complexity of Computing Hard Core Predicates. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
small-depth circuit, one-way function, Pseudo-randomness |
1 | Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung |
Proactive RSA. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Eiichiro Fujisaki, Tatsuaki Okamoto |
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Christian Cachin, Ueli M. Maurer |
Unconditional Security Against Memory-Bounded Adversaries. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001 |
On the Foundations of Modern Cryptography. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
RSA-Based Undeniable Signatures. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen, Jacques Stern |
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
1 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Public-Key Cryptosystems from Lattice Reduction Problems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Lattice Reduction Problems, Public-Key Cryptosystems |
1 | Shlomi Dolev, Rafail Ostrovsky |
Efficient Anonymous Multicast and Reception (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Shafi Goldwasser, Daniele Micciancio |
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Pil Joong Lee |
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Pankaj Rohatgi |
How to Sign Digital Streams. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
1 | Gilles Brassard |
Quantum Information Processing: The Good, the Bad and the Ugly. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Benny Pinkas |
Visual Authentication and Identification. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Authentication, identification, visual cryptography |
1 | Ueli M. Maurer, Stefan Wolf 0001 |
Privacy Amplification Secure Against Active Adversaries. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement |
1 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystems Using N-Adic Expansion. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Buchmann 0001, Sachar Paulus |
A One Way Function Based on Ideal Arithmetic in Number Fields. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
number fields, shortest vectors in lattices, One way function |
1 | Mihir Bellare, Phillip Rogaway |
Collision-Resistant Hashing: Towards Making UOWHFs Practical. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Christof Paar |
Efficient Algorithms for Elliptic Curve Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung |
Keeping the SZK-Verifier Honest Unconditionally. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Burton S. Kaliski Jr. (eds.) |
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Plug and Play Encryption. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wagner 0001, Bruce Schneier, John Kelsey |
Cryptanalysis of the Cellular Encryption Algorithm. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
cellular telephone, Cryptanalysis, block ciphers |
1 | Jovan Dj. Golic, Renato Menicocci |
Edit Distance Correlation Attack on the Alternating Step Generator. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks |
1 | Daniel Bleichenbacher |
On the Security of the KMOV Public Key Cryptosystem. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Public-key Encryption Schemes, Computational Problems in Lattices |
1 | Lars R. Knudsen, Bart Preneel |
Fast and Secure Hashing Based on Codes. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 1266 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|