[Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]

TEST 2007 Set Submission Status


Hover mouse over
bullets for history
None
7
Reject
4
Maybe Reject
10
Discuss
18
Maybe Accept
11
Accept
4

StatusNum NO RE MR DI MA AC Title
 •  Oct-19 17:51: NO => MA [MA] 1. On Obfuscating Point Functions
 •  Oct-23 11:59: NO => MR [MR] 2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs
      [NO] 3. Cryptanalysis of Hiji-bij-bij (HBB)
 •  Oct-23 11:59: NO => DI [DI] 4. Benes and Butterfly schemes revisited
 •  Oct-23 11:59: NO => DI [DI] 5. A sufficient condition for key-privacy
 •  Oct-23 11:59: NO => MA [MA] 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
      [NO] 7. The Misuse of RC4 in Microsoft Word and Excel
 •  Oct-23 11:59: NO => MR [MR] 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
 •  Oct-23 11:59: NO => MR [MR] 9. Mixing properties of triangular feedback shift registers
      [NO] 10. Update on SHA-1
 •  Oct-23 11:59: NO => AC [AC] 11. An Improved Elegant Method to Re-initialize Hash Chains
      [NO] 12. Efficient Certificateless Public Key Encryption
 •  Oct-19 17:47: NO => DI [DI] 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
 •  Oct-23 11:59: NO => DI [DI] 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
 •  Oct-23 11:59: NO => DI [DI] 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
      [NO] 16. Narrow T-functions
 •  Oct-23 11:59: NO => MR [MR] 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
 •  Oct-23 11:59: NO => MA [MA] 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
 •  Oct-23 11:59: NO => MA [MA] 19. The Full Abstraction of the UC Framework
      [NO] 20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols
 •  Oct-23 11:59: NO => AC [AC] 21. Partial Hiding in Public-Key Cryptography
 •  Oct-23 11:59: NO => DI [DI] 22. An Improved and Efficient Countermeasure against Power Analysis Attacks
 •  Oct-23 11:59: NO => DI [DI] 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
 •  Oct-23 11:59: NO => MR [MR] 24. On the Diffie-Hellman problem over $GL_{n}$
 •  Oct-23 11:59: NO => MA [MA] 25. Analysis of Affinely Equivalent Boolean Functions
 •  Oct-23 11:59: NO => RE [RE] 26. Techniques for random maskin in hardware
 •  Oct-23 11:59: NO => DI [DI] 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
 •  Oct-23 11:59: NO => DI [DI] 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
 •  Oct-23 11:59: NO => AC [AC] 29. A model and architecture for pseudo-random generation with applications to /dev/random
 •  Oct-23 11:59: NO => RE [RE] 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
 •  Oct-23 11:59: NO => DI [DI] 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
 •  Oct-23 11:59: NO => DI [DI] 32. On the Notion of Statistical Security in Simulatability Definitions
 •  Oct-23 11:59: NO => DI [DI] 33. A Flexible Framework for Secret Handshakes
 •  Oct-23 11:59: NO => MA [MA] 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction
 •  Oct-23 11:59: NO => MR [MR] 35. Concurrent Composition of Secure Protocols in the Timing Model
 •  Oct-23 11:59: NO => MR [MR] 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
 •  Oct-23 11:59: NO => MR [MR] 37. Distinguishing Stream Ciphers with Convolutional Filters
 •  Oct-23 11:59: NO => MR [MR] 38. Unfairness of a protocol for certified delivery
 •  Oct-23 11:59: NO => RE [RE] 39. On the Security of a Group Signature Scheme with Strong Separability
 •  Oct-23 11:59: NO => MA [MA] 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
 •  Oct-23 11:59: NO => AC [AC] 41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
 •  Oct-23 11:59: NO => DI [DI] 42. On the affine classification of cubic bent functions
 •  Oct-23 11:59: NO => DI [DI] 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
 •  Oct-23 11:59: NO => DI [DI] 44. New Approaches for Deniable Authentication
 •  Oct-23 11:59: NO => DI [DI] 45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
 •  Oct-23 11:59: NO => MA [MA] 46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem
 •  Oct-23 11:59: NO => MA [MA] 47. Adversarial Model for Radio Frequency Identification
 •  Oct-23 11:59: NO => MR [MR] 48. David Chaum's Voter Verification using Encrypted Paper Receipts
 •  Oct-23 11:59: NO => RE [RE] 49. A Note on Shor's Quantum Algorithm for Prime Factorization
 •  Oct-23 11:59: NO => DI [DI] 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
 •  Oct-23 11:59: NO => DI [DI] 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
 •  Oct-23 11:59: NO => MA [MA] 53. Untraceability of Two Group Signature Schemes
 •  Oct-23 11:59: NO => MA [MA] 54. Key Derivation and Randomness Extraction
      [NO] 101. One More Cup of Coffee

Complete Revision History

NumWhen What
2.Oct-23 11:59: NO => MR
4.Oct-23 11:59: NO => DI
5.Oct-23 11:59: NO => DI
6.Oct-23 11:59: NO => MA
8.Oct-23 11:59: NO => MR
9.Oct-23 11:59: NO => MR
11.Oct-23 11:59: NO => AC
14.Oct-23 11:59: NO => DI
15.Oct-23 11:59: NO => DI
17.Oct-23 11:59: NO => MR
18.Oct-23 11:59: NO => MA
19.Oct-23 11:59: NO => MA
21.Oct-23 11:59: NO => AC
22.Oct-23 11:59: NO => DI
23.Oct-23 11:59: NO => DI
24.Oct-23 11:59: NO => MR
25.Oct-23 11:59: NO => MA
26.Oct-23 11:59: NO => RE
27.Oct-23 11:59: NO => DI
28.Oct-23 11:59: NO => DI
29.Oct-23 11:59: NO => AC
30.Oct-23 11:59: NO => RE
31.Oct-23 11:59: NO => DI
32.Oct-23 11:59: NO => DI
33.Oct-23 11:59: NO => DI
34.Oct-23 11:59: NO => MA
35.Oct-23 11:59: NO => MR
36.Oct-23 11:59: NO => MR
37.Oct-23 11:59: NO => MR
38.Oct-23 11:59: NO => MR
39.Oct-23 11:59: NO => RE
40.Oct-23 11:59: NO => MA
41.Oct-23 11:59: NO => AC
42.Oct-23 11:59: NO => DI
43.Oct-23 11:59: NO => DI
44.Oct-23 11:59: NO => DI
45.Oct-23 11:59: NO => DI
46.Oct-23 11:59: NO => MA
47.Oct-23 11:59: NO => MA
48.Oct-23 11:59: NO => MR
49.Oct-23 11:59: NO => RE
50.Oct-23 11:59: NO => DI
51.Oct-23 11:59: NO => DI
53.Oct-23 11:59: NO => MA
54.Oct-23 11:59: NO => MA
1.Oct-19 17:51: NO => MA
13.Oct-19 17:47: NO => DI

[Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]