1![]() |
![]() |
1. | On Obfuscating Point Functions |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
2 | ![]() |
2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
3 | ![]() |
3. | Cryptanalysis of Hiji-bij-bij (HBB) |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
4 | ![]() |
4. | Benes and Butterfly schemes revisited |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
5![]() |
![]() |
5. | A sufficient condition for key-privacy |
Average 4 |
Weighted 4 |
Max-Min 0 |
![]() |
Jul 3 01:13 |
Joy Fawcett |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 3 00:46 |
Mia Hamm |
Score 4 |
Confidence 3 |
Technical 3 |
Editorial 2 |
Suitability 3 |
Jul 2 23:25 |
Zinedine Zidane (Some One) |
Score 4 |
Confidence 3 |
Technical 3 |
Editorial 2 |
Suitability 3 |
Jul 2 23:07 |
6 | ![]() |
6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
7 | ![]() |
7. | The Misuse of RC4 in Microsoft Word and Excel |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
8 | ![]() |
8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
9 | ![]() |
9. | Mixing properties of triangular feedback shift registers |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
10 | ![]() |
10. | Update on SHA-1 |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
11 | ![]() |
11. | An Improved Elegant Method to Re-initialize Hash Chains |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
12 | ![]() |
12. | Efficient Certificateless Public Key Encryption |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
13 | ![]() |
13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
14 | ![]() |
14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
15 | ![]() |
15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
16![]() |
![]() |
16. | Narrow T-functions |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
Mia Hamm |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:21 |
Zinedine Zidane |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:11 |
17 | ![]() |
17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
18 | ![]() |
18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
19 | ![]() |
19. | The Full Abstraction of the UC Framework |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
20 | ![]() |
20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
21 | ![]() |
21. | Partial Hiding in Public-Key Cryptography |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
22 | ![]() |
22. | An Improved and Efficient Countermeasure against Power Analysis Attacks |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
23 | ![]() |
23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
24 | ![]() |
24. | On the Diffie-Hellman problem over $GL_{n}$ |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
25 | ![]() |
25. | Analysis of Affinely Equivalent Boolean Functions |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
26 | ![]() |
26. | Techniques for random maskin in hardware |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
27![]() |
![]() |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption |
Average 4.5 |
Weighted 4.8 |
Max-Min 3 |
![]() |
Jul 3 01:11 |
Joy Fawcett |
Score 6 |
Confidence 3 |
Technical 2 |
Editorial 2 |
Suitability 2 |
Jul 2 23:18 |
Mia Hamm |
Score 3 |
Confidence 2 |
Technical 1 |
Editorial 2 |
Suitability 3 |
Jul 2 23:22 |
28 | ![]() |
28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
29 | ![]() |
29. | A model and architecture for pseudo-random generation with applications to /dev/random |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
30 | ![]() |
30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
31![]() |
![]() |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
32 | ![]() |
32. | On the Notion of Statistical Security in Simulatability Definitions |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
33![]() |
![]() |
33. | A Flexible Framework for Secret Handshakes |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
34 | ![]() |
34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
35![]() |
![]() |
35. | Concurrent Composition of Secure Protocols in the Timing Model |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
36 | ![]() |
36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
37 | ![]() |
37. | Distinguishing Stream Ciphers with Convolutional Filters |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
38 | ![]() |
38. | Unfairness of a protocol for certified delivery |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
39 | ![]() |
39. | On the Security of a Group Signature Scheme with Strong Separability |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
40 | ![]() |
40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
41 | ![]() |
41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
42 | ![]() |
42. | On the affine classification of cubic bent functions |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
43 | ![]() |
43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
44 | ![]() |
44. | New Approaches for Deniable Authentication |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
45 | ![]() |
45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
46 | ![]() |
46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 01:11 |
47 | ![]() |
47. | Adversarial Model for Radio Frequency Identification |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
48 | ![]() |
48. | David Chaum's Voter Verification using Encrypted Paper Receipts |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
49 | ![]() |
49. | A Note on Shor's Quantum Algorithm for Prime Factorization |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
Joy Fawcett |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:19 |
50 | ![]() |
50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
51 | ![]() |
51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
52 | ![]() |
53. | Untraceability of Two Group Signature Schemes |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
53![]() |
![]() |
54. | Key Derivation and Randomness Extraction |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |
54 | ![]() |
101. | A sufficient condition for key-privacy |
Average * |
Weighted * |
Max-Min * |
![]() |
Jul 3 00:29 |