rev'ed |
pref |
w.avg |
status |
watch |
|
3 |
(3.3) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
1. |
On Obfuscating Point Functions |
|
1 |
(5.7) |
![Status: accept [AC]](../common/AC.gif) |
|
2. |
Logcrypt: Forward Security and Public Verification for Secure Audit Logs |
|
1 |
(1.1) |
![Status: reject [RE]](../common/RE.gif) |
|
3. |
Cryptanalysis of Hiji-bij-bij (HBB) |
|
2 |
(4.2) |
![Status: accept [AC]](../common/AC.gif) |
|
4. |
Benes and Butterfly schemes revisited |
 |
2 |
(4) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
5. |
A sufficient condition for key-privacy |
|
2 |
(3.9) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
6. |
A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. |
|
3 |
(*) |
![Status: reject [RE]](../common/RE.gif) |
|
7. |
The Misuse of RC4 in Microsoft Word and Excel |
|
3 |
(4.6) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
8. |
Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 |
|
2 |
(5) |
![Status: accept [AC]](../common/AC.gif) |
|
9. |
Mixing properties of triangular feedback shift registers |
|
2 |
(3.7) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
10. |
Update on SHA-1 |
|
2 |
(2.1) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
11. |
An Improved Elegant Method to Re-initialize Hash Chains |
|
2 |
(5.1) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
12. |
Efficient Certificateless Public Key Encryption |
|
3 |
(5.5) |
![Status: accept [AC]](../common/AC.gif) |
|
13. |
Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols |
|
3 |
(3.3) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
14. |
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words |
|
3 |
(3.9) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
15. |
Hierarchical Identity Based Encryption with Constant Size Ciphertext |
 |
3 |
(4.1) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
16. |
Narrow T-functions |
|
2 |
(2.6) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
17. |
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives |
|
2 |
(3.4) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
18. |
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys |
|
1 |
(5.4) |
![Status: accept [AC]](../common/AC.gif) |
|
19. |
The Full Abstraction of the UC Framework |
|
1 |
(4) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
20. |
(De)Compositions of Cryptographic Schemes and their Applications to Protocols |
|
3 |
(3.2) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
21. |
Partial Hiding in Public-Key Cryptography |
|
1 |
(3.4) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
22. |
An Improved and Efficient Countermeasure against Power Analysis Attacks |
|
3 |
(2.3) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
23. |
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness |
|
2 |
(3.1) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
24. |
On the Diffie-Hellman problem over $GL_{n}$ |
|
2 |
(4.1) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
25. |
Analysis of Affinely Equivalent Boolean Functions |
|
3 |
(5.2) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
26. |
Techniques for random maskin in hardware |
 |
4 |
(4.8) |
![Status: accept [AC]](../common/AC.gif) |
|
27. |
Tag-KEM/DEM: A New Framework for Hybrid Encryption |
|
3 |
(4.1) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
28. |
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage |
|
3 |
(3.5) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
29. |
A model and architecture for pseudo-random generation with applications to /dev/random |
|
3 |
(2.9) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
30. |
Weak keys of pairing based Diffie Hellman schemes on elliptic curves |
|
3 |
(4.1) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
31. |
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves |
|
3 |
(2.7) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
32. |
On the Notion of Statistical Security in Simulatability Definitions |
|
3 |
(2.8) |
![Status: reject [RE]](../common/RE.gif) |
|
33. |
A Flexible Framework for Secret Handshakes |
|
3 |
(3.2) |
![Status: reject [RE]](../common/RE.gif) |
|
34. |
An Efficient CDH-based Signature Scheme With a Tight Security Reduction |
|
3 |
(3.8) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
35. |
Concurrent Composition of Secure Protocols in the Timing Model |
|
3 |
(4) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
36. |
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes |
|
4 |
(3.1) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
37. |
Distinguishing Stream Ciphers with Convolutional Filters |
|
3 |
(3.2) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
38. |
Unfairness of a protocol for certified delivery |
|
3 |
(4.2) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
39. |
On the Security of a Group Signature Scheme with Strong Separability |
|
3 |
(4.7) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
40. |
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications |
|
3 |
(2.6) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
41. |
An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption |
|
3 |
(3.8) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
42. |
On the affine classification of cubic bent functions |
|
2 |
(4.5) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
43. |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 |
|
2 |
(3.2) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
44. |
New Approaches for Deniable Authentication |
|
2 |
(4.7) |
![Status: accept [AC]](../common/AC.gif) |
|
45. |
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme |
|
2 |
(5.4) |
![Status: accept [AC]](../common/AC.gif) |
|
46. |
Cryptanalysis of two identification schemes based on an ID-based cryptosystem |
|
2 |
(4.5) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
47. |
Adversarial Model for Radio Frequency Identification |
|
2 |
(3.1) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
48. |
David Chaum's Voter Verification using Encrypted Paper Receipts |
|
2 |
(1.5) |
![Status: reject [RE]](../common/RE.gif) |
|
49. |
A Note on Shor's Quantum Algorithm for Prime Factorization |
|
1 |
(2.6) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
50. |
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems |
|
3 |
(3.7) |
![Status: reject [RE]](../common/RE.gif) |
|
51. |
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent |
|
4 |
(4.3) |
![Status: needs discussion [DI]](../common/DI.gif) |
|
53. |
Untraceability of Two Group Signature Schemes |
|
5 |
(4) |
![Status: maybe accept [MA]](../common/MA.gif) |
|
54. |
Key Derivation and Randomness Extraction |
|
3 |
(2.6) |
![Status: maybe reject [MR]](../common/MR.gif) |
|
101. |
A sufficient condition for key-privacy |