None 7 |
Reject 4 |
Maybe Reject 10 |
Discuss 18 |
Maybe Accept 11 |
Accept 4 |
Status | Num | NO | RE | MR | DI | MA | AC | Title |
---|---|---|---|---|---|---|---|---|
• Oct-19 17:51: NO => MA | 1. | On Obfuscating Point Functions | ||||||
• Oct-23 11:59: NO => MR | 2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | ||||||
3. | Cryptanalysis of Hiji-bij-bij (HBB) | |||||||
• Oct-23 11:59: NO => DI | 4. | Benes and Butterfly schemes revisited | ||||||
• Oct-23 11:59: NO => DI | 5. | A sufficient condition for key-privacy | ||||||
• Oct-23 11:59: NO => MA | 6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | ||||||
7. | The Misuse of RC4 in Microsoft Word and Excel | |||||||
• Oct-23 11:59: NO => MR | 8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | ||||||
• Oct-23 11:59: NO => MR | 9. | Mixing properties of triangular feedback shift registers | ||||||
10. | Update on SHA-1 | |||||||
• Oct-23 11:59: NO => AC | 11. | An Improved Elegant Method to Re-initialize Hash Chains | ||||||
12. | Efficient Certificateless Public Key Encryption | |||||||
• Oct-19 17:47: NO => DI | 13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | ||||||
• Oct-23 11:59: NO => DI | 14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | ||||||
• Oct-23 11:59: NO => DI | 15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | ||||||
16. | Narrow T-functions | |||||||
• Oct-23 11:59: NO => MR | 17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | ||||||
• Oct-23 11:59: NO => MA | 18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | ||||||
• Oct-23 11:59: NO => MA | 19. | The Full Abstraction of the UC Framework | ||||||
20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | |||||||
• Oct-23 11:59: NO => AC | 21. | Partial Hiding in Public-Key Cryptography | ||||||
• Oct-23 11:59: NO => DI | 22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | ||||||
• Oct-23 11:59: NO => DI | 23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | ||||||
• Oct-23 11:59: NO => MR | 24. | On the Diffie-Hellman problem over $GL_{n}$ | ||||||
• Oct-23 11:59: NO => MA | 25. | Analysis of Affinely Equivalent Boolean Functions | ||||||
• Oct-23 11:59: NO => RE | 26. | Techniques for random maskin in hardware | ||||||
• Oct-23 11:59: NO => DI | 27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | ||||||
• Oct-23 11:59: NO => DI | 28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | ||||||
• Oct-23 11:59: NO => AC | 29. | A model and architecture for pseudo-random generation with applications to /dev/random | ||||||
• Oct-23 11:59: NO => RE | 30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | ||||||
• Oct-23 11:59: NO => DI | 31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | ||||||
• Oct-23 11:59: NO => DI | 32. | On the Notion of Statistical Security in Simulatability Definitions | ||||||
• Oct-23 11:59: NO => DI | 33. | A Flexible Framework for Secret Handshakes | ||||||
• Oct-23 11:59: NO => MA | 34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | ||||||
• Oct-23 11:59: NO => MR | 35. | Concurrent Composition of Secure Protocols in the Timing Model | ||||||
• Oct-23 11:59: NO => MR | 36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | ||||||
• Oct-23 11:59: NO => MR | 37. | Distinguishing Stream Ciphers with Convolutional Filters | ||||||
• Oct-23 11:59: NO => MR | 38. | Unfairness of a protocol for certified delivery | ||||||
• Oct-23 11:59: NO => RE | 39. | On the Security of a Group Signature Scheme with Strong Separability | ||||||
• Oct-23 11:59: NO => MA | 40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | ||||||
• Oct-23 11:59: NO => AC | 41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | ||||||
• Oct-23 11:59: NO => DI | 42. | On the affine classification of cubic bent functions | ||||||
• Oct-23 11:59: NO => DI | 43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | ||||||
• Oct-23 11:59: NO => DI | 44. | New Approaches for Deniable Authentication | ||||||
• Oct-23 11:59: NO => DI | 45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | ||||||
• Oct-23 11:59: NO => MA | 46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | ||||||
• Oct-23 11:59: NO => MA | 47. | Adversarial Model for Radio Frequency Identification | ||||||
• Oct-23 11:59: NO => MR | 48. | David Chaum's Voter Verification using Encrypted Paper Receipts | ||||||
• Oct-23 11:59: NO => RE | 49. | A Note on Shor's Quantum Algorithm for Prime Factorization | ||||||
• Oct-23 11:59: NO => DI | 50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | ||||||
• Oct-23 11:59: NO => DI | 51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | ||||||
• Oct-23 11:59: NO => MA | 53. | Untraceability of Two Group Signature Schemes | ||||||
• Oct-23 11:59: NO => MA | 54. | Key Derivation and Randomness Extraction | ||||||
101. | One More Cup of Coffee |
Num | When | What |
---|---|---|
2. | Oct-23 11:59: | NO => MR |
4. | Oct-23 11:59: | NO => DI |
5. | Oct-23 11:59: | NO => DI |
6. | Oct-23 11:59: | NO => MA |
8. | Oct-23 11:59: | NO => MR |
9. | Oct-23 11:59: | NO => MR |
11. | Oct-23 11:59: | NO => AC |
14. | Oct-23 11:59: | NO => DI |
15. | Oct-23 11:59: | NO => DI |
17. | Oct-23 11:59: | NO => MR |
18. | Oct-23 11:59: | NO => MA |
19. | Oct-23 11:59: | NO => MA |
21. | Oct-23 11:59: | NO => AC |
22. | Oct-23 11:59: | NO => DI |
23. | Oct-23 11:59: | NO => DI |
24. | Oct-23 11:59: | NO => MR |
25. | Oct-23 11:59: | NO => MA |
26. | Oct-23 11:59: | NO => RE |
27. | Oct-23 11:59: | NO => DI |
28. | Oct-23 11:59: | NO => DI |
29. | Oct-23 11:59: | NO => AC |
30. | Oct-23 11:59: | NO => RE |
31. | Oct-23 11:59: | NO => DI |
32. | Oct-23 11:59: | NO => DI |
33. | Oct-23 11:59: | NO => DI |
34. | Oct-23 11:59: | NO => MA |
35. | Oct-23 11:59: | NO => MR |
36. | Oct-23 11:59: | NO => MR |
37. | Oct-23 11:59: | NO => MR |
38. | Oct-23 11:59: | NO => MR |
39. | Oct-23 11:59: | NO => RE |
40. | Oct-23 11:59: | NO => MA |
41. | Oct-23 11:59: | NO => AC |
42. | Oct-23 11:59: | NO => DI |
43. | Oct-23 11:59: | NO => DI |
44. | Oct-23 11:59: | NO => DI |
45. | Oct-23 11:59: | NO => DI |
46. | Oct-23 11:59: | NO => MA |
47. | Oct-23 11:59: | NO => MA |
48. | Oct-23 11:59: | NO => MR |
49. | Oct-23 11:59: | NO => RE |
50. | Oct-23 11:59: | NO => DI |
51. | Oct-23 11:59: | NO => DI |
53. | Oct-23 11:59: | NO => MA |
54. | Oct-23 11:59: | NO => MA |
1. | Oct-19 17:51: | NO => MA |
13. | Oct-19 17:47: | NO => DI |