[Guidelines] [Review Home] [List submissions] [Change Password] [Documentation]

Submission List (by number)

Note: You can click on the eye icons on the left to add/remove submissions from your watch list

Submissions assigned to Mia Hamm
1. W [Discuss*] [Review] 1. On Obfuscating Point Functions 03/07 00:29[RE]
2. X [Discuss*] [Review] 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc ... 03/07 00:29[RE]
3. W [Discuss*] [Revise] 16. Narrow T-functions 03/07 00:29[MA]
4. W [Discuss*] [Revise] 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption 03/07 01:11[AC](4.5)
5. X [Discuss*] [Review] 29. A model and architecture for pseudo-random generation with applicati... 03/07 01:11[AC]
6. W [Discuss*] [Review] 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves 03/07 01:11[AC]
7. W [Discuss*] [Review] 33. A Flexible Framework for Secret Handshakes 03/07 00:29[RE]
8. W [Discuss*] [Review] 35. Concurrent Composition of Secure Protocols in the Timing Model 03/07 00:29[RE]
9. X [Discuss*] [Review] 53. Untraceability of Two Group Signature Schemes 03/07 00:29[RE]
10. W [Discuss*] [Review] 54. Key Derivation and Randomness Extraction 03/07 00:29[MR]

Other submissions
1. X [Discuss*] [Review] 2. Logcrypt: Forward Security and Public Verification for Secure Audit ... 03/07 00:29[RE]
2. X [Discuss*] [Review] 3. Cryptanalysis of Hiji-bij-bij (HBB) 03/07 00:29[MR]
3. X [Discuss ] [Review] 4. Benes and Butterfly schemes revisited 03/07 00:29[RE]
4. W [Discuss*] [Revise] 5. A sufficient condition for key-privacy 03/07 01:13[AC](4)
5. X [Discuss*] [Review] 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. 03/07 00:29[RE]
6. X [Discuss*] [Review] 7. The Misuse of RC4 in Microsoft Word and Excel 03/07 00:29[MA]
7. X [Discuss*] [Review] 9. Mixing properties of triangular feedback shift registers 03/07 00:29[AC]
8. X [Discuss*] [Review] 10. Update on SHA-1 03/07 01:11[AC]
9. X [Discuss*] [Review] 11. An Improved Elegant Method to Re-initialize Hash Chains 03/07 00:29[MA]
10. X [Discuss*] [Review] 12. Efficient Certificateless Public Key Encryption 03/07 00:29[DI]
11. X [Discuss*] [Review] 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite k... 03/07 00:29[RE]
12. X [Discuss*] [Review] 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyn... 03/07 00:29[RE]
13. X [Discuss*] [Review] 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext 03/07 00:29[DI]
14. X [Discuss*] [Review] 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic... 03/07 00:29[AC]
15. X [Discuss*] [Review] 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and ... 03/07 01:11[AC]
16. X [Discuss*] [Review] 19. The Full Abstraction of the UC Framework 03/07 00:29[MA]
17. X [Discuss*] [Review] 20. (De)Compositions of Cryptographic Schemes and their Applications to ... 03/07 00:29[DI]
18. X [Discuss*] [Review] 21. Partial Hiding in Public-Key Cryptography 03/07 00:29[MR]
19. X [Discuss*] [Review] 22. An Improved and Efficient Countermeasure against Power Analysis Atta... 03/07 00:29[RE]
20. X [Discuss*] [Review] 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on ... 03/07 00:29[RE]
21. X [Discuss*] [Review] 24. On the Diffie-Hellman problem over $GL_{n}$ 03/07 00:29[MR]
22. X [Discuss*] [Review] 25. Analysis of Affinely Equivalent Boolean Functions 03/07 00:29[DI]
23. X [Discuss*] [Review] 26. Techniques for random maskin in hardware 03/07 00:29[MA]
24. X [Discuss*] [Review] 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Dis... 03/07 01:11[AC]
25. X [Discuss*] [Review] 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves 03/07 01:11[AC]
26. X [Discuss*] [Review] 32. On the Notion of Statistical Security in Simulatability Definitions 03/07 00:29[RE]
27. X [Discuss*] [Review] 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduct... 03/07 00:29[RE]
28. X [Discuss*] [Review] 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes 03/07 00:29[MR]
29. X [Discuss*] [Review] 37. Distinguishing Stream Ciphers with Convolutional Filters 03/07 00:29[DI]
30. X [Discuss*] [Review] 38. Unfairness of a protocol for certified delivery 03/07 00:29[MA]
31. X [Discuss*] [Review] 39. On the Security of a Group Signature Scheme with Strong Separability 03/07 00:29[DI]
32. X [Discuss*] [Review] 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Appli... 03/07 00:29[DI]
33. X [Discuss*] [Review] 41. An Efficient Solution to The Millionaires Problem Based on Homomorph... 03/07 00:29[RE]
34. X [Discuss*] [Review] 42. On the affine classification of cubic bent functions 03/07 00:29[RE]
35. X [Discuss*] [Review] 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 03/07 00:29[RE]
36. X [Discuss*] [Review] 44. New Approaches for Deniable Authentication 03/07 00:29[DI]
37. X [Discuss*] [Review] 45. Cryptanalysis of an anonymous wireless authentication and conference... 03/07 00:29[MA]
38. X [Discuss*] [Review] 46. Cryptanalysis of two identification schemes based on an ID-based cry... 03/07 01:11[AC]
39. X [Discuss*] [Review] 47. Adversarial Model for Radio Frequency Identification 03/07 00:29[AC]
40. X [Discuss*] [Review] 48. David Chaum's Voter Verification using Encrypted Paper Receipts 03/07 00:29[MA]
41. X [Discuss*] [Review] 49. A Note on Shor's Quantum Algorithm for Prime Factorization 03/07 00:29[MR]
42. X [Discuss*] [Review] 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard... 03/07 00:29[RE]
43. X [Discuss*] [Review] 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent 03/07 00:29[RE]
44. X [Discuss*] [Review] 101. A sufficient condition for key-privacy 03/07 00:29[MR]

Legend: [NO], [RE], [MR], [DI], [MA], [AC]: Status marks (None, [Maybe-]Reject, Discuss, [Maybe-]Accept)
[Review], [Revise], [Revise]: Submit a new/revised report about a submissoin
[Discuss ], [Discuss*]: See reports and discussion boards (all read / some unread)

[Guidelines] [Review Home] [List submissions] [Change Password] [Documentation]