None 0 |
Reject 19 |
Maybe Reject 7 |
Discuss 9 |
Maybe Accept 8 |
Accept 11 |
Status | Num | NO | RE | MR | DI | MA | AC | Title |
---|---|---|---|---|---|---|---|---|
![]() |
1. | On Obfuscating Point Functions | ||||||
![]() |
2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | ||||||
![]() |
3. | Cryptanalysis of Hiji-bij-bij (HBB) | ||||||
![]() |
4. | Benes and Butterfly schemes revisited | ||||||
![]() |
5. | A sufficient condition for key-privacy | ||||||
![]() |
6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | ||||||
![]() |
7. | The Misuse of RC4 in Microsoft Word and Excel | ||||||
![]() |
8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | ||||||
![]() |
9. | Mixing properties of triangular feedback shift registers | ||||||
![]() |
10. | Update on SHA-1 | ||||||
![]() |
11. | An Improved Elegant Method to Re-initialize Hash Chains | ||||||
![]() |
12. | Efficient Certificateless Public Key Encryption | ||||||
![]() |
13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | ||||||
![]() |
14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | ||||||
![]() |
15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | ||||||
![]() |
16. | Narrow T-functions | ||||||
![]() |
17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | ||||||
![]() |
18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | ||||||
![]() |
19. | The Full Abstraction of the UC Framework | ||||||
![]() |
20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | ||||||
![]() |
21. | Partial Hiding in Public-Key Cryptography | ||||||
![]() |
22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | ||||||
![]() |
23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | ||||||
![]() |
24. | On the Diffie-Hellman problem over $GL_{n}$ | ||||||
![]() |
25. | Analysis of Affinely Equivalent Boolean Functions | ||||||
![]() |
26. | Techniques for random maskin in hardware | ||||||
![]() |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | ||||||
![]() |
28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | ||||||
![]() |
29. | A model and architecture for pseudo-random generation with applications to /dev/random | ||||||
![]() |
30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | ||||||
![]() |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | ||||||
![]() |
32. | On the Notion of Statistical Security in Simulatability Definitions | ||||||
![]() |
33. | A Flexible Framework for Secret Handshakes | ||||||
![]() |
34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | ||||||
![]() |
35. | Concurrent Composition of Secure Protocols in the Timing Model | ||||||
![]() |
36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | ||||||
![]() |
37. | Distinguishing Stream Ciphers with Convolutional Filters | ||||||
![]() |
38. | Unfairness of a protocol for certified delivery | ||||||
![]() |
39. | On the Security of a Group Signature Scheme with Strong Separability | ||||||
![]() |
40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | ||||||
![]() |
41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | ||||||
![]() |
42. | On the affine classification of cubic bent functions | ||||||
![]() |
43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | ||||||
![]() |
44. | New Approaches for Deniable Authentication | ||||||
![]() |
45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | ||||||
![]() |
46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | ||||||
![]() |
47. | Adversarial Model for Radio Frequency Identification | ||||||
![]() |
48. | David Chaum's Voter Verification using Encrypted Paper Receipts | ||||||
![]() |
49. | A Note on Shor's Quantum Algorithm for Prime Factorization | ||||||
![]() |
50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | ||||||
![]() |
51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | ||||||
![]() |
53. | Untraceability of Two Group Signature Schemes | ||||||
![]() |
54. | Key Derivation and Randomness Extraction | ||||||
![]() |
101. | A sufficient condition for key-privacy |