None 7 |
Reject 4 |
Maybe Reject 10 |
Discuss 18 |
Maybe Accept 11 |
Accept 4 |
Status | Num | NO | RE | MR | DI | MA | AC | Title |
---|---|---|---|---|---|---|---|---|
• Oct-19 17:51: NO => MA ![]() |
1. | On Obfuscating Point Functions | ||||||
• Oct-23 11:59: NO => MR ![]() |
2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | ||||||
![]() |
3. | Cryptanalysis of Hiji-bij-bij (HBB) | ||||||
• Oct-23 11:59: NO => DI ![]() |
4. | Benes and Butterfly schemes revisited | ||||||
• Oct-23 11:59: NO => DI ![]() |
5. | A sufficient condition for key-privacy | ||||||
• Oct-23 11:59: NO => MA ![]() |
6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | ||||||
![]() |
7. | The Misuse of RC4 in Microsoft Word and Excel | ||||||
• Oct-23 11:59: NO => MR ![]() |
8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | ||||||
• Oct-23 11:59: NO => MR ![]() |
9. | Mixing properties of triangular feedback shift registers | ||||||
![]() |
10. | Update on SHA-1 | ||||||
• Oct-23 11:59: NO => AC ![]() |
11. | An Improved Elegant Method to Re-initialize Hash Chains | ||||||
![]() |
12. | Efficient Certificateless Public Key Encryption | ||||||
• Oct-19 17:47: NO => DI ![]() |
13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | ||||||
• Oct-23 11:59: NO => DI ![]() |
14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | ||||||
• Oct-23 11:59: NO => DI ![]() |
15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | ||||||
![]() |
16. | Narrow T-functions | ||||||
• Oct-23 11:59: NO => MR ![]() |
17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | ||||||
• Oct-23 11:59: NO => MA ![]() |
18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | ||||||
• Oct-23 11:59: NO => MA ![]() |
19. | The Full Abstraction of the UC Framework | ||||||
![]() |
20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | ||||||
• Oct-23 11:59: NO => AC ![]() |
21. | Partial Hiding in Public-Key Cryptography | ||||||
• Oct-23 11:59: NO => DI ![]() |
22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | ||||||
• Oct-23 11:59: NO => DI ![]() |
23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | ||||||
• Oct-23 11:59: NO => MR ![]() |
24. | On the Diffie-Hellman problem over $GL_{n}$ | ||||||
• Oct-23 11:59: NO => MA ![]() |
25. | Analysis of Affinely Equivalent Boolean Functions | ||||||
• Oct-23 11:59: NO => RE ![]() |
26. | Techniques for random maskin in hardware | ||||||
• Oct-23 11:59: NO => DI ![]() |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | ||||||
• Oct-23 11:59: NO => DI ![]() |
28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | ||||||
• Oct-23 11:59: NO => AC ![]() |
29. | A model and architecture for pseudo-random generation with applications to /dev/random | ||||||
• Oct-23 11:59: NO => RE ![]() |
30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | ||||||
• Oct-23 11:59: NO => DI ![]() |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | ||||||
• Oct-23 11:59: NO => DI ![]() |
32. | On the Notion of Statistical Security in Simulatability Definitions | ||||||
• Oct-23 11:59: NO => DI ![]() |
33. | A Flexible Framework for Secret Handshakes | ||||||
• Oct-23 11:59: NO => MA ![]() |
34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | ||||||
• Oct-23 11:59: NO => MR ![]() |
35. | Concurrent Composition of Secure Protocols in the Timing Model | ||||||
• Oct-23 11:59: NO => MR ![]() |
36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | ||||||
• Oct-23 11:59: NO => MR ![]() |
37. | Distinguishing Stream Ciphers with Convolutional Filters | ||||||
• Oct-23 11:59: NO => MR ![]() |
38. | Unfairness of a protocol for certified delivery | ||||||
• Oct-23 11:59: NO => RE ![]() |
39. | On the Security of a Group Signature Scheme with Strong Separability | ||||||
• Oct-23 11:59: NO => MA ![]() |
40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | ||||||
• Oct-23 11:59: NO => AC ![]() |
41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | ||||||
• Oct-23 11:59: NO => DI ![]() |
42. | On the affine classification of cubic bent functions | ||||||
• Oct-23 11:59: NO => DI ![]() |
43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | ||||||
• Oct-23 11:59: NO => DI ![]() |
44. | New Approaches for Deniable Authentication | ||||||
• Oct-23 11:59: NO => DI ![]() |
45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | ||||||
• Oct-23 11:59: NO => MA ![]() |
46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | ||||||
• Oct-23 11:59: NO => MA ![]() |
47. | Adversarial Model for Radio Frequency Identification | ||||||
• Oct-23 11:59: NO => MR ![]() |
48. | David Chaum's Voter Verification using Encrypted Paper Receipts | ||||||
• Oct-23 11:59: NO => RE ![]() |
49. | A Note on Shor's Quantum Algorithm for Prime Factorization | ||||||
• Oct-23 11:59: NO => DI ![]() |
50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | ||||||
• Oct-23 11:59: NO => DI ![]() |
51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | ||||||
• Oct-23 11:59: NO => MA ![]() |
53. | Untraceability of Two Group Signature Schemes | ||||||
• Oct-23 11:59: NO => MA ![]() |
54. | Key Derivation and Randomness Extraction | ||||||
![]() |
101. | One More Cup of Coffee |
Num | When | What |
---|---|---|
2. | Oct-23 11:59: | NO => MR |
4. | Oct-23 11:59: | NO => DI |
5. | Oct-23 11:59: | NO => DI |
6. | Oct-23 11:59: | NO => MA |
8. | Oct-23 11:59: | NO => MR |
9. | Oct-23 11:59: | NO => MR |
11. | Oct-23 11:59: | NO => AC |
14. | Oct-23 11:59: | NO => DI |
15. | Oct-23 11:59: | NO => DI |
17. | Oct-23 11:59: | NO => MR |
18. | Oct-23 11:59: | NO => MA |
19. | Oct-23 11:59: | NO => MA |
21. | Oct-23 11:59: | NO => AC |
22. | Oct-23 11:59: | NO => DI |
23. | Oct-23 11:59: | NO => DI |
24. | Oct-23 11:59: | NO => MR |
25. | Oct-23 11:59: | NO => MA |
26. | Oct-23 11:59: | NO => RE |
27. | Oct-23 11:59: | NO => DI |
28. | Oct-23 11:59: | NO => DI |
29. | Oct-23 11:59: | NO => AC |
30. | Oct-23 11:59: | NO => RE |
31. | Oct-23 11:59: | NO => DI |
32. | Oct-23 11:59: | NO => DI |
33. | Oct-23 11:59: | NO => DI |
34. | Oct-23 11:59: | NO => MA |
35. | Oct-23 11:59: | NO => MR |
36. | Oct-23 11:59: | NO => MR |
37. | Oct-23 11:59: | NO => MR |
38. | Oct-23 11:59: | NO => MR |
39. | Oct-23 11:59: | NO => RE |
40. | Oct-23 11:59: | NO => MA |
41. | Oct-23 11:59: | NO => AC |
42. | Oct-23 11:59: | NO => DI |
43. | Oct-23 11:59: | NO => DI |
44. | Oct-23 11:59: | NO => DI |
45. | Oct-23 11:59: | NO => DI |
46. | Oct-23 11:59: | NO => MA |
47. | Oct-23 11:59: | NO => MA |
48. | Oct-23 11:59: | NO => MR |
49. | Oct-23 11:59: | NO => RE |
50. | Oct-23 11:59: | NO => DI |
51. | Oct-23 11:59: | NO => DI |
53. | Oct-23 11:59: | NO => MA |
54. | Oct-23 11:59: | NO => MA |
1. | Oct-19 17:51: | NO => MA |
13. | Oct-19 17:47: | NO => DI |