[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]

Submission List (by number)

Submissions assigned to Zinedine Zidane
download [Revise] 5. A sufficient condition for key-privacy
download [Review] 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc ...
download [Review] 10. Update on SHA-1
download [Review] 12. Efficient Certificateless Public Key Encryption
download [Revise] 16. Narrow T-functions
download [Review] 19. The Full Abstraction of the UC Framework
download [Review] 25. Analysis of Affinely Equivalent Boolean Functions
download [Review] 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
download [Review] 44. New Approaches for Deniable Authentication
download [Review] 47. Adversarial Model for Radio Frequency Identification

Other submissions
download [Review] 1. On Obfuscating Point Functions
download [Review] 2. Logcrypt: Forward Security and Public Verification for Secure Audit ...
download [Review] 3. Cryptanalysis of Hiji-bij-bij (HBB)
download [Review] 4. Benes and Butterfly schemes revisited
download [Review] 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
download [Review] 7. The Misuse of RC4 in Microsoft Word and Excel
download [Review] 9. Mixing properties of triangular feedback shift registers
download [Review] 11. An Improved Elegant Method to Re-initialize Hash Chains
download [Review] 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite k...
download [Review] 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyn...
download [Review] 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
download [Review] 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic...
download [Review] 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and ...
download [Review] 20. (De)Compositions of Cryptographic Schemes and their Applications to ...
download [Review] 21. Partial Hiding in Public-Key Cryptography
download [Review] 22. An Improved and Efficient Countermeasure against Power Analysis Atta...
download [Review] 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on ...
download [Review] 24. On the Diffie-Hellman problem over $GL_{n}$
download [Review] 26. Techniques for random maskin in hardware
download [Review] 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
download [Review] 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Dis...
download [Review] 29. A model and architecture for pseudo-random generation with applicati...
download [Review] 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
download [Review] 32. On the Notion of Statistical Security in Simulatability Definitions
download [Review] 33. A Flexible Framework for Secret Handshakes
download [Review] 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduct...
download [Review] 35. Concurrent Composition of Secure Protocols in the Timing Model
download [Review] 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
download [Review] 37. Distinguishing Stream Ciphers with Convolutional Filters
download [Review] 38. Unfairness of a protocol for certified delivery
download [Review] 39. On the Security of a Group Signature Scheme with Strong Separability
download [Review] 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Appli...
download [Review] 41. An Efficient Solution to The Millionaires Problem Based on Homomorph...
download [Review] 42. On the affine classification of cubic bent functions
download [Review] 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
download [Review] 45. Cryptanalysis of an anonymous wireless authentication and conference...
download [Review] 46. Cryptanalysis of two identification schemes based on an ID-based cry...
download [Review] 48. David Chaum's Voter Verification using Encrypted Paper Receipts
download [Review] 49. A Note on Shor's Quantum Algorithm for Prime Factorization
download [Review] 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard...
download [Review] 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
download [Review] 53. Untraceability of Two Group Signature Schemes
download [Review] 54. Key Derivation and Randomness Extraction
download [Review] 101. A sufficient condition for key-privacy

[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]