[Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]

TEST 2007 Set Submission Status

None
0
Reject
19
Maybe Reject
7
Discuss
9
Maybe Accept
8
Accept
11

StatusNum NO RE MR DI MA AC Title
[RE] 1. On Obfuscating Point Functions
[RE] 2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs
[MR] 3. Cryptanalysis of Hiji-bij-bij (HBB)
[RE] 4. Benes and Butterfly schemes revisited
[DI] 5. A sufficient condition for key-privacy
[RE] 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
[MA] 7. The Misuse of RC4 in Microsoft Word and Excel
[RE] 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
[AC] 9. Mixing properties of triangular feedback shift registers
[AC] 10. Update on SHA-1
[MA] 11. An Improved Elegant Method to Re-initialize Hash Chains
[DI] 12. Efficient Certificateless Public Key Encryption
[RE] 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
[RE] 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
[DI] 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
[MA] 16. Narrow T-functions
[AC] 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
[AC] 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
[MA] 19. The Full Abstraction of the UC Framework
[DI] 20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols
[MR] 21. Partial Hiding in Public-Key Cryptography
[RE] 22. An Improved and Efficient Countermeasure against Power Analysis Attacks
[RE] 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
[MR] 24. On the Diffie-Hellman problem over $GL_{n}$
[DI] 25. Analysis of Affinely Equivalent Boolean Functions
[MA] 26. Techniques for random maskin in hardware
[AC] 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
[AC] 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
[AC] 29. A model and architecture for pseudo-random generation with applications to /dev/random
[AC] 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
[AC] 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
[RE] 32. On the Notion of Statistical Security in Simulatability Definitions
[RE] 33. A Flexible Framework for Secret Handshakes
[RE] 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction
[RE] 35. Concurrent Composition of Secure Protocols in the Timing Model
[MR] 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
[DI] 37. Distinguishing Stream Ciphers with Convolutional Filters
[MA] 38. Unfairness of a protocol for certified delivery
[DI] 39. On the Security of a Group Signature Scheme with Strong Separability
[DI] 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
[RE] 41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
[RE] 42. On the affine classification of cubic bent functions
[RE] 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
[DI] 44. New Approaches for Deniable Authentication
[MA] 45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
[AC] 46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem
[AC] 47. Adversarial Model for Radio Frequency Identification
[MA] 48. David Chaum's Voter Verification using Encrypted Paper Receipts
[MR] 49. A Note on Shor's Quantum Algorithm for Prime Factorization
[RE] 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
[RE] 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
[RE] 53. Untraceability of Two Group Signature Schemes
[MR] 54. Key Derivation and Randomness Extraction
[MR] 101. A sufficient condition for key-privacy

[Administer] [Review] [Log file] [Change password] [Documentation] [Undo/Redo]