|
|
1. | On Obfuscating Point Functions | 03/07 00:29 | ![]() | |
|
|
5. | A sufficient condition for key-privacy | 03/07 00:29 | ![]() | (4) |
|
|
16. | Narrow T-functions | 03/07 00:29 | ![]() | |
|
|
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 03/07 00:29 | ![]() | (4.8) |
|
|
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | 03/07 00:29 | ![]() | |
|
|
33. | A Flexible Framework for Secret Handshakes | 03/07 00:29 | ![]() | |
|
|
35. | Concurrent Composition of Secure Protocols in the Timing Model | 03/07 00:29 | ![]() | |
|
|
54. | Key Derivation and Randomness Extraction | 03/07 00:29 | ![]() |
| Some other links: o Download submissions in one file o Work with watch list o Work with scorecard files o See results of completed votes o Change password o List all reviews and discussions in html or ascii o Old versions of reviews... |
| Legend: | , , , , , :
Status marks (None, [Maybe-]Reject, Discuss, [Maybe-]Accept) |
,
,
:
Submit a new/revised report about a submissoin |
|
,
:
See reports and discussion boards (all read / some unread) |