![]() |
![]() ![]() |
1. | On Obfuscating Point Functions | 03/07 00:29 | ![]() | |
![]() |
![]() ![]() |
5. | A sufficient condition for key-privacy | 03/07 00:29 | ![]() | (4) |
![]() |
![]() ![]() |
16. | Narrow T-functions | 03/07 00:29 | ![]() | |
![]() |
![]() ![]() |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 03/07 00:29 | ![]() | (4.8) |
![]() |
![]() ![]() |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | 03/07 00:29 | ![]() | |
![]() |
![]() ![]() |
33. | A Flexible Framework for Secret Handshakes | 03/07 00:29 | ![]() | |
![]() |
![]() ![]() |
35. | Concurrent Composition of Secure Protocols in the Timing Model | 03/07 00:29 | ![]() | |
![]() |
![]() ![]() |
54. | Key Derivation and Randomness Extraction | 03/07 00:29 | ![]() |
Some other links: o Download submissions in one file o Work with watch list o Work with scorecard files o See results of completed votes o Change password o List all reviews and discussions in html or ascii o Old versions of reviews... |
Legend: | ![]() ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |
|
![]() ![]() |