Use the matrix interface below to assign submissions to reviewers. When submitting this form, the server will only update its "sketch copy" of the assignments (namely, the copy that is only visible to the chair and not the reviewers). To make the assignments visible to reviewers, you need to check also the box next to the submit button. The matrix interface below shows you the reviewers′ preferences, as well as any preference that you entered: the check-boxes themselves are colored green if you indicated a preference for the PC-member to review the submission or red if you indicated a preference that the PC-member do not review the submission.
If Javascript is enabled in your browser, then the various sums are updated immediately when you check or clear any check-box. Remember, however, that you still must submit the form in order for these changes to be recorded by the server!!
You can go back to the main assignment page to reset all the assignments and start from scratch, or to upload a backup copy of the assignments that you stored on your local machine.
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
1 | 2 |
2 |
2 |
1 |
1 |
2 |
2 |
4 |
5 |
1 |
2 |
1 | On Obfuscating Point Functions | 3 | ||||||
2 | 2 |
4 |
4 |
1 |
5 |
1 |
4 |
2 | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | 3 | ||||||||||
3 | 2 |
4 |
4 |
4 |
1 |
2 |
1 |
4 |
1 |
1 |
3 | Cryptanalysis of Hiji-bij-bij (HBB) | 3 | |||||||
4 | 2 |
2 |
4 |
2 |
4 |
0 |
1 |
2 |
1 |
4 | Benes and Butterfly schemes revisited | 3 | ||||||||
5 | 2 |
4 |
2 |
1 |
4 |
2 |
2 |
1 |
5 |
1 |
4 |
5 |
5 | A sufficient condition for key-privacy | 3 | |||||
6 | 2 |
4 |
1 |
1 |
5 |
5 |
2 |
1 |
2 |
2 |
2 |
5 |
5 |
2 |
5 |
1 |
6 | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | 3 | |
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
7 | 2 |
5 |
5 |
4 |
2 |
0 |
7 | The Misuse of RC4 in Microsoft Word and Excel | 4 | |||||||||||
8 | 2 |
0 |
2 |
2 |
2 |
1 |
2 |
8 | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | 3 | ||||||||||
9 | 4 |
4 |
2 |
2 |
5 |
4 |
1 |
2 |
9 | Mixing properties of triangular feedback shift registers | 3 | |||||||||
10 | 5 |
4 |
0 |
4 |
2 |
2 |
1 |
5 |
1 |
1 |
4 |
5 |
10 | Update on SHA-1 | 3 | |||||
11 | 5 |
1 |
2 |
2 |
4 |
2 |
2 |
1 |
11 | An Improved Elegant Method to Re-initialize Hash Chains | 3 | |||||||||
12 | 1 |
2 |
2 |
2 |
2 |
1 |
2 |
0 |
2 |
1 |
2 |
1 |
12 | Efficient Certificateless Public Key Encryption | 3 | |||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
13 | 1 |
2 |
2 |
4 |
1 |
13 | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | 3 | ||||||||||||
14 | 4 |
4 |
4 |
2 |
2 |
2 |
2 |
1 |
1 |
1 |
2 |
14 | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | 3 | ||||||
15 | 4 |
2 |
4 |
2 |
4 |
2 |
2 |
2 |
1 |
1 |
2 |
15 | Hierarchical Identity Based Encryption with Constant Size Ciphertext | 3 | ||||||
16 | 2 |
2 |
2 |
2 |
2 |
1 |
2 |
4 |
1 |
1 |
2 |
16 | Narrow T-functions | 3 | ||||||
17 | 2 |
2 |
5 |
4 |
4 |
2 |
2 |
17 | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | 3 | ||||||||||
18 | 4 |
2 |
2 |
1 |
4 |
2 |
1 |
0 |
4 |
2 |
18 | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | 3 | |||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
19 | 1 |
4 |
4 |
1 |
2 |
1 |
1 |
4 |
2 |
4 |
19 | The Full Abstraction of the UC Framework | 3 | |||||||
20 | 1 |
4 |
1 |
2 |
2 |
4 |
4 |
2 |
20 | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | 3 | |||||||||
21 | 2 |
2 |
4 |
4 |
4 |
2 |
5 |
4 |
2 |
4 |
21 | Partial Hiding in Public-Key Cryptography | 4 | |||||||
22 | 4 |
1 |
1 |
4 |
1 |
4 |
4 |
22 | An Improved and Efficient Countermeasure against Power Analysis Attacks | 3 | ||||||||||
23 | 4 |
2 |
5 |
2 |
2 |
5 |
23 | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | 3 | |||||||||||
24 | 2 |
4 |
1 |
1 |
4 |
2 |
2 |
4 |
5 |
5 |
24 | On the Diffie-Hellman problem over $GL_{n}$ | 3 | |||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
25 | 2 |
2 |
1 |
1 |
2 |
2 |
1 |
5 |
25 | Analysis of Affinely Equivalent Boolean Functions | 3 | |||||||||
26 | 5 |
2 |
4 |
4 |
1 |
1 |
2 |
0 |
2 |
1 |
2 |
26 | Techniques for random maskin in hardware | 3 | ||||||
27 | 1 |
2 |
5 |
1 |
1 |
4 |
5 |
2 |
2 |
1 |
4 |
0 |
2 |
1 |
2 |
27 | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 3 | ||
28 | 2 |
4 |
2 |
2 |
28 | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | 3 | |||||||||||||
29 | 1 |
2 |
2 |
1 |
2 |
2 |
29 | A model and architecture for pseudo-random generation with applications to /dev/random | 3 | |||||||||||
30 | 4 |
4 |
2 |
1 |
2 |
2 |
30 | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | 3 | |||||||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
31 | 1 |
2 |
5 |
2 |
2 |
31 | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | 3 | ||||||||||||
32 | 2 |
1 |
1 |
4 |
2 |
2 |
2 |
1 |
32 | On the Notion of Statistical Security in Simulatability Definitions | 3 | |||||||||
33 | 5 |
0 |
1 |
2 |
1 |
2 |
2 |
33 | A Flexible Framework for Secret Handshakes | 3 | ||||||||||
34 | 4 |
4 |
2 |
4 |
2 |
34 | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | 3 | ||||||||||||
35 | 4 |
4 |
2 |
2 |
4 |
1 |
35 | Concurrent Composition of Secure Protocols in the Timing Model | 3 | |||||||||||
36 | 1 |
4 |
0 |
4 |
5 |
2 |
2 |
2 |
4 |
4 |
36 | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | 3 | |||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
37 | 5 |
4 |
4 |
4 |
4 |
5 |
4 |
4 |
37 | Distinguishing Stream Ciphers with Convolutional Filters | 3 | |||||||||
38 | 2 |
4 |
2 |
4 |
1 |
2 |
38 | Unfairness of a protocol for certified delivery | 3 | |||||||||||
39 | 5 |
2 |
4 |
2 |
4 |
2 |
1 |
2 |
2 |
39 | On the Security of a Group Signature Scheme with Strong Separability | 3 | ||||||||
40 | 4 |
2 |
4 |
40 | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | 3 | ||||||||||||||
41 | 4 |
4 |
2 |
4 |
2 |
0 |
1 |
41 | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | 4 | ||||||||||
42 | 1 |
4 |
1 |
5 |
1 |
4 |
2 |
4 |
42 | On the affine classification of cubic bent functions | 3 | |||||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
43 | 2 |
1 |
2 |
4 |
2 |
2 |
2 |
1 |
4 |
43 | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | 3 | ||||||||
44 | 2 |
2 |
2 |
2 |
4 |
4 |
44 | New Approaches for Deniable Authentication | 3 | |||||||||||
45 | 4 |
2 |
4 |
5 |
2 |
2 |
4 |
5 |
45 | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | 3 | |||||||||
46 | 4 |
2 |
2 |
2 |
4 |
5 |
1 |
2 |
5 |
46 | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | 3 | ||||||||
47 | 2 |
4 |
2 |
2 |
5 |
1 |
1 |
47 | Adversarial Model for Radio Frequency Identification | 3 | ||||||||||
48 | 4 |
4 |
4 |
1 |
2 |
2 |
4 |
2 |
5 |
1 |
1 |
48 | David Chaum's Voter Verification using Encrypted Paper Receipts | 3 | ||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
49 | 5 |
2 |
5 |
2 |
2 |
4 |
5 |
2 |
2 |
2 |
1 |
1 |
49 | A Note on Shor's Quantum Algorithm for Prime Factorization | 3 | |||||
50 | 2 |
5 |
4 |
4 |
1 |
1 |
1 |
2 |
1 |
4 |
1 |
1 |
0 |
5 |
2 |
50 | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | 3 | ||
51 | 4 |
2 |
4 |
4 |
2 |
1 |
4 |
2 |
2 |
51 | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | 3 | ||||||||
53 | 1 |
2 |
2 |
5 |
2 |
2 |
4 |
2 |
2 |
2 |
4 |
5 |
4 |
53 | Untraceability of Two Group Signature Schemes | 3 | ||||
54 | 4 |
4 |
1 |
2 |
2 |
2 |
1 |
5 |
0 |
4 |
4 |
4 |
54 | Key Derivation and Randomness Extraction | 4 | |||||
101 | 101 | Hierarchical Identity Based Encryption with Polynomially Many Levels | 3 | |||||||||||||||||
Num | David Beckham |
Fabio Cannava |
Angelos Charist |
Joy Fawcett |
Daniell Fotopou |
Julie Foudy |
Stylian Giannak |
Mia Hamm |
Devvyn Hawkins |
Angela Hucles |
Jena Kluegel |
Amy LePeilb |
Paolo Maldini |
Antonio Nikopol |
Michael Owen |
Frances Totti |
Zinedin Zidane |
Num | Title | # |
# | 10(90) | 10(90) | 10(70) | 10(80) | 10(90) | 10(90) | 10(89) | 10(75) | 10(80) | 10(78) | 10(90) | 10(100) | 10(70) | 10(80) | 10(86) | 10(89) | 10(89) | |||
104 | 1 |
104 | More On Key Wrapping | 4 | ||||||||||||||||
Ignore this check-box: there is something wrong with your browser if you see it.