[Assignments] [Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]

Manual Assignments: List Interface

Use the list interface below to assign submissions to reviewers. When submitting this form, the server will only update its "scratch copy" of the assignments (namely, the copy that is only visible to the chair and not the reviewers). To make the assignments visible to reviewers, you need to check also the box next to the submit button. You can also use the matrix interface, or go back to the top assignment page where you have buttons to clear all assignments or reset the scratch assignments to the assignments that are currently visible to the reviewers.

You can have the software automatically compute an assignment of submissions to reviewers from the reviewer preferences by going to the Auto-Assignment page. Also, the the matrix interface below shows you the reviewers′ preferences, as well as any preference that you entered: the check-boxes themselves are colored green if you indicated a preference for the PC-member to review the submission or red if you indicated a preference that the PC-member do not review the submission.

For each submission you should provide a semi-colon-separated list of PC members that are assigned to review that submission. When listing PC members, you should provide the name of the PC member as recorded in the database. You can specify only a prefix of the name, as long as it is sufficient to uniquely identify a single member (e.g., if you have a committee member named Wawrzyniec C. Antroponimiczna, it may be enough to write "Waw"). For example, to assign Attila T. Hun and John Doe to review submission number 132, you may use the following line:
  1. The title of submission number 132

Current PC members:

David Beckham Fabio Cannavaro Angelos Charisteas Joy Fawcett
Danielle Fotopoulos Julie Foudy Stylianos Giannakopoulos Mia Hamm
Devvyn Hawkins Angela Hucles Jena Kluegel Amy LePeilbet
Paolo Maldini Antonios Nikopolidis Michael Owen Francesco Totti
Zinedine Zidane

List of submissions

  1. On Obfuscating Point Functions


  2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs


  3. Cryptanalysis of Hiji-bij-bij (HBB)


  4. Benes and Butterfly schemes revisited


  5. A sufficient condition for key-privacy


  6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.


  7. The Misuse of RC4 in Microsoft Word and Excel


  8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004


  9. Mixing properties of triangular feedback shift registers


  10. Update on SHA-1


  11. An Improved Elegant Method to Re-initialize Hash Chains


  12. Efficient Certificateless Public Key Encryption


  13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols


  14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words


  15. Hierarchical Identity Based Encryption with Constant Size Ciphertext


  16. Narrow T-functions


  17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives


  18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys


  19. The Full Abstraction of the UC Framework


  20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols


  21. Partial Hiding in Public-Key Cryptography


  22. An Improved and Efficient Countermeasure against Power Analysis Attacks


  23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness


  24. On the Diffie-Hellman problem over $GL_{n}$


  25. Analysis of Affinely Equivalent Boolean Functions


  26. Techniques for random maskin in hardware


  27. Tag-KEM/DEM: A New Framework for Hybrid Encryption


  28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage


  29. A model and architecture for pseudo-random generation with applications to /dev/random


  30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves


  31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves


  32. On the Notion of Statistical Security in Simulatability Definitions


  33. A Flexible Framework for Secret Handshakes


  34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction


  35. Concurrent Composition of Secure Protocols in the Timing Model


  36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes


  37. Distinguishing Stream Ciphers with Convolutional Filters


  38. Unfairness of a protocol for certified delivery


  39. On the Security of a Group Signature Scheme with Strong Separability


  40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications


  41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption


  42. On the affine classification of cubic bent functions


  43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3


  44. New Approaches for Deniable Authentication


  45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme


  46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem


  47. Adversarial Model for Radio Frequency Identification


  48. David Chaum's Voter Verification using Encrypted Paper Receipts


  49. A Note on Shor's Quantum Algorithm for Prime Factorization


  50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems


  51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent


  52. Untraceability of Two Group Signature Schemes


  53. Key Derivation and Randomness Extraction


  54. Hierarchical Identity Based Encryption with Polynomially Many Levels


  55. More On Key Wrapping


Make these assignments visible to the reviewers

[Assignments] [Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]