| None 7 |
Reject 4 |
Maybe Reject 10 |
Discuss 18 |
Maybe Accept 11 |
Accept 4 |
| Status | Num | NO | RE | MR | DI | MA | AC | Title |
|---|---|---|---|---|---|---|---|---|
• Oct-19 17:51: NO => MA ![]() |
1. | On Obfuscating Point Functions | ||||||
• Oct-23 11:59: NO => MR ![]() |
2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | ||||||
![]() |
3. | Cryptanalysis of Hiji-bij-bij (HBB) | ||||||
• Oct-23 11:59: NO => DI ![]() |
4. | Benes and Butterfly schemes revisited | ||||||
• Oct-23 11:59: NO => DI ![]() |
5. | A sufficient condition for key-privacy | ||||||
• Oct-23 11:59: NO => MA ![]() |
6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | ||||||
![]() |
7. | The Misuse of RC4 in Microsoft Word and Excel | ||||||
• Oct-23 11:59: NO => MR ![]() |
8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | ||||||
• Oct-23 11:59: NO => MR ![]() |
9. | Mixing properties of triangular feedback shift registers | ||||||
![]() |
10. | Update on SHA-1 | ||||||
• Oct-23 11:59: NO => AC ![]() |
11. | An Improved Elegant Method to Re-initialize Hash Chains | ||||||
![]() |
12. | Efficient Certificateless Public Key Encryption | ||||||
• Oct-19 17:47: NO => DI ![]() |
13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | ||||||
• Oct-23 11:59: NO => DI ![]() |
14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | ||||||
• Oct-23 11:59: NO => DI ![]() |
15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | ||||||
![]() |
16. | Narrow T-functions | ||||||
• Oct-23 11:59: NO => MR ![]() |
17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | ||||||
• Oct-23 11:59: NO => MA ![]() |
18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | ||||||
• Oct-23 11:59: NO => MA ![]() |
19. | The Full Abstraction of the UC Framework | ||||||
![]() |
20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | ||||||
• Oct-23 11:59: NO => AC ![]() |
21. | Partial Hiding in Public-Key Cryptography | ||||||
• Oct-23 11:59: NO => DI ![]() |
22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | ||||||
• Oct-23 11:59: NO => DI ![]() |
23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | ||||||
• Oct-23 11:59: NO => MR ![]() |
24. | On the Diffie-Hellman problem over $GL_{n}$ | ||||||
• Oct-23 11:59: NO => MA ![]() |
25. | Analysis of Affinely Equivalent Boolean Functions | ||||||
• Oct-23 11:59: NO => RE ![]() |
26. | Techniques for random maskin in hardware | ||||||
• Oct-23 11:59: NO => DI ![]() |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | ||||||
• Oct-23 11:59: NO => DI ![]() |
28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | ||||||
• Oct-23 11:59: NO => AC ![]() |
29. | A model and architecture for pseudo-random generation with applications to /dev/random | ||||||
• Oct-23 11:59: NO => RE ![]() |
30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | ||||||
• Oct-23 11:59: NO => DI ![]() |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | ||||||
• Oct-23 11:59: NO => DI ![]() |
32. | On the Notion of Statistical Security in Simulatability Definitions | ||||||
• Oct-23 11:59: NO => DI ![]() |
33. | A Flexible Framework for Secret Handshakes | ||||||
• Oct-23 11:59: NO => MA ![]() |
34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | ||||||
• Oct-23 11:59: NO => MR ![]() |
35. | Concurrent Composition of Secure Protocols in the Timing Model | ||||||
• Oct-23 11:59: NO => MR ![]() |
36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | ||||||
• Oct-23 11:59: NO => MR ![]() |
37. | Distinguishing Stream Ciphers with Convolutional Filters | ||||||
• Oct-23 11:59: NO => MR ![]() |
38. | Unfairness of a protocol for certified delivery | ||||||
• Oct-23 11:59: NO => RE ![]() |
39. | On the Security of a Group Signature Scheme with Strong Separability | ||||||
• Oct-23 11:59: NO => MA ![]() |
40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | ||||||
• Oct-23 11:59: NO => AC ![]() |
41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | ||||||
• Oct-23 11:59: NO => DI ![]() |
42. | On the affine classification of cubic bent functions | ||||||
• Oct-23 11:59: NO => DI ![]() |
43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | ||||||
• Oct-23 11:59: NO => DI ![]() |
44. | New Approaches for Deniable Authentication | ||||||
• Oct-23 11:59: NO => DI ![]() |
45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | ||||||
• Oct-23 11:59: NO => MA ![]() |
46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | ||||||
• Oct-23 11:59: NO => MA ![]() |
47. | Adversarial Model for Radio Frequency Identification | ||||||
• Oct-23 11:59: NO => MR ![]() |
48. | David Chaum's Voter Verification using Encrypted Paper Receipts | ||||||
• Oct-23 11:59: NO => RE ![]() |
49. | A Note on Shor's Quantum Algorithm for Prime Factorization | ||||||
• Oct-23 11:59: NO => DI ![]() |
50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | ||||||
• Oct-23 11:59: NO => DI ![]() |
51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | ||||||
• Oct-23 11:59: NO => MA ![]() |
53. | Untraceability of Two Group Signature Schemes | ||||||
• Oct-23 11:59: NO => MA ![]() |
54. | Key Derivation and Randomness Extraction | ||||||
![]() |
101. | One More Cup of Coffee |
| Num | When | What |
|---|---|---|
| 2. | Oct-23 11:59: | NO => MR |
| 4. | Oct-23 11:59: | NO => DI |
| 5. | Oct-23 11:59: | NO => DI |
| 6. | Oct-23 11:59: | NO => MA |
| 8. | Oct-23 11:59: | NO => MR |
| 9. | Oct-23 11:59: | NO => MR |
| 11. | Oct-23 11:59: | NO => AC |
| 14. | Oct-23 11:59: | NO => DI |
| 15. | Oct-23 11:59: | NO => DI |
| 17. | Oct-23 11:59: | NO => MR |
| 18. | Oct-23 11:59: | NO => MA |
| 19. | Oct-23 11:59: | NO => MA |
| 21. | Oct-23 11:59: | NO => AC |
| 22. | Oct-23 11:59: | NO => DI |
| 23. | Oct-23 11:59: | NO => DI |
| 24. | Oct-23 11:59: | NO => MR |
| 25. | Oct-23 11:59: | NO => MA |
| 26. | Oct-23 11:59: | NO => RE |
| 27. | Oct-23 11:59: | NO => DI |
| 28. | Oct-23 11:59: | NO => DI |
| 29. | Oct-23 11:59: | NO => AC |
| 30. | Oct-23 11:59: | NO => RE |
| 31. | Oct-23 11:59: | NO => DI |
| 32. | Oct-23 11:59: | NO => DI |
| 33. | Oct-23 11:59: | NO => DI |
| 34. | Oct-23 11:59: | NO => MA |
| 35. | Oct-23 11:59: | NO => MR |
| 36. | Oct-23 11:59: | NO => MR |
| 37. | Oct-23 11:59: | NO => MR |
| 38. | Oct-23 11:59: | NO => MR |
| 39. | Oct-23 11:59: | NO => RE |
| 40. | Oct-23 11:59: | NO => MA |
| 41. | Oct-23 11:59: | NO => AC |
| 42. | Oct-23 11:59: | NO => DI |
| 43. | Oct-23 11:59: | NO => DI |
| 44. | Oct-23 11:59: | NO => DI |
| 45. | Oct-23 11:59: | NO => DI |
| 46. | Oct-23 11:59: | NO => MA |
| 47. | Oct-23 11:59: | NO => MA |
| 48. | Oct-23 11:59: | NO => MR |
| 49. | Oct-23 11:59: | NO => RE |
| 50. | Oct-23 11:59: | NO => DI |
| 51. | Oct-23 11:59: | NO => DI |
| 53. | Oct-23 11:59: | NO => MA |
| 54. | Oct-23 11:59: | NO => MA |
| 1. | Oct-19 17:51: | NO => MA |
| 13. | Oct-19 17:47: | NO => DI |