[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]

Review Preferences for Zinedine Zidane

Please indicate your reviewing preferences. For each submisssion you can specify one of the following options:

     0 I have a conflict of interests with this submission
     1 I do not want to review this submission
     2 I prefer not to review this submission (but can do it if I have to)
     3 No preferences (default): I can review this submission if need be
     4 I would like to review this submission
     5 This submission is one of my favorites to review


pref 0 1 2 3 4 5
2 1. On Obfuscating Point Functions
3 2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs
1 3. Cryptanalysis of Hiji-bij-bij (HBB)
3 4. Benes and Butterfly schemes revisited
5 5. A sufficient condition for key-privacy
1 6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
3 7. The Misuse of RC4 in Microsoft Word and Excel
2 8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
3 9. Mixing properties of triangular feedback shift registers
5 10. Update on SHA-1
3 11. An Improved Elegant Method to Re-initialize Hash Chains
1 12. Efficient Certificateless Public Key Encryption
3 13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
2 14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
2 15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
2 16. Narrow T-functions
3 17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
3 18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
4 19. The Full Abstraction of the UC Framework
3 20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols
4 21. Partial Hiding in Public-Key Cryptography
3 22. An Improved and Efficient Countermeasure against Power Analysis Attacks
3 23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
3 24. On the Diffie-Hellman problem over $GL_{n}$
5 25. Analysis of Affinely Equivalent Boolean Functions
3 26. Techniques for random maskin in hardware
2 27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
3 28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
3 29. A model and architecture for pseudo-random generation with applications to /dev/random
3 30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
2 31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
1 32. On the Notion of Statistical Security in Simulatability Definitions
2 33. A Flexible Framework for Secret Handshakes
3 34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction
3 35. Concurrent Composition of Secure Protocols in the Timing Model
3 36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
4 37. Distinguishing Stream Ciphers with Convolutional Filters
3 38. Unfairness of a protocol for certified delivery
2 39. On the Security of a Group Signature Scheme with Strong Separability
3 40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
1 41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
3 42. On the affine classification of cubic bent functions
3 43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
4 44. New Approaches for Deniable Authentication
3 45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
3 46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem
3 47. Adversarial Model for Radio Frequency Identification
1 48. David Chaum's Voter Verification using Encrypted Paper Receipts
3 49. A Note on Shor's Quantum Algorithm for Prime Factorization
2 50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
3 51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
4 53. Untraceability of Two Group Signature Schemes
4 54. Key Derivation and Randomness Extraction
3 101. A sufficient condition for key-privacy


[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]