| 1  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 1. | On Obfuscating Point Functions | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 2 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 3 | ![See reports and discussion board [Discuss ]](../common/Discuss1.gif)  | 3. | Cryptanalysis of Hiji-bij-bij (HBB) | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| 4 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 4. | Benes and Butterfly schemes revisited | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 5  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 5. | A sufficient condition for key-privacy | Average 4 | Weighted 4 | Max-Min 0 | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:13 | 
| Joy Fawcett | Score * | Confidence * | Technical * | Editorial * | Suitability * | Jul 3 00:46 | 
| Mia Hamm | Score 4 | Confidence 3 | Technical 3 | Editorial 2 | Suitability 3 | Jul 2 23:25 | 
| Zinedine Zidane (Some One) | Score 4 | Confidence 3 | Technical 3 | Editorial 2 | Suitability 3 | Jul 2 23:07 | 
| 6 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 7 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 7. | The Misuse of RC4 in Microsoft Word and Excel | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 8 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 9 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 9. | Mixing properties of triangular feedback shift registers | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 00:29 | 
| 10 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 10. | Update on SHA-1 | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 11 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 11. | An Improved Elegant Method to Re-initialize Hash Chains | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 12 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 12. | Efficient Certificateless Public Key Encryption | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 13 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 14 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 15 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 16  | ![See reports and discussion board [Discuss ]](../common/Discuss1.gif)  | 16. | Narrow T-functions | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| Mia Hamm | Score * | Confidence * | Technical * | Editorial * | Suitability * | Jul 2 23:21 | 
| Zinedine Zidane | Score * | Confidence * | Technical * | Editorial * | Suitability * | Jul 2 23:11 | 
| 17 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 00:29 | 
| 18 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 19 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 19. | The Full Abstraction of the UC Framework | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 20 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 21 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 21. | Partial Hiding in Public-Key Cryptography | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| 22 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 23 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 24 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 24. | On the Diffie-Hellman problem over $GL_{n}$ | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| 25 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 25. | Analysis of Affinely Equivalent Boolean Functions | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 26 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 26. | Techniques for random maskin in hardware | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 27  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | Average 4.5 | Weighted 4.8 | Max-Min 3 | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| Joy Fawcett | Score 6 | Confidence 3 | Technical 2 | Editorial 2 | Suitability 2 | Jul 2 23:18 | 
| Mia Hamm | Score 3 | Confidence 2 | Technical 1 | Editorial 2 | Suitability 3 | Jul 2 23:22 | 
| 28 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 29 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 29. | A model and architecture for pseudo-random generation with applications to /dev/random | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 30 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 31  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 32 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 32. | On the Notion of Statistical Security in Simulatability Definitions | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 33  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 33. | A Flexible Framework for Secret Handshakes | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 34 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 35  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 35. | Concurrent Composition of Secure Protocols in the Timing Model | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 36 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| 37 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 37. | Distinguishing Stream Ciphers with Convolutional Filters | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 38 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 38. | Unfairness of a protocol for certified delivery | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 39 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 39. | On the Security of a Group Signature Scheme with Strong Separability | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 40 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 41 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 42 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 42. | On the affine classification of cubic bent functions | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 43 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 44 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 44. | New Approaches for Deniable Authentication | Average * | Weighted * | Max-Min * | ![Status: needs discussion [DI]](../common/DI.gif) | Jul 3 00:29 | 
| 45 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 46 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 01:11 | 
| 47 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 47. | Adversarial Model for Radio Frequency Identification | Average * | Weighted * | Max-Min * | ![Status: accept [AC]](../common/AC.gif) | Jul 3 00:29 | 
| 48 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 48. | David Chaum's Voter Verification using Encrypted Paper Receipts | Average * | Weighted * | Max-Min * | ![Status: maybe accept [MA]](../common/MA.gif) | Jul 3 00:29 | 
| 49 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 49. | A Note on Shor's Quantum Algorithm for Prime Factorization | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| Joy Fawcett | Score * | Confidence * | Technical * | Editorial * | Suitability * | Jul 2 23:19 | 
| 50 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 51 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 52 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 53. | Untraceability of Two Group Signature Schemes | Average * | Weighted * | Max-Min * | ![Status: reject [RE]](../common/RE.gif) | Jul 3 00:29 | 
| 53  | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 54. | Key Derivation and Randomness Extraction | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 | 
| 54 | ![See reports and discussion board (some new items) [Discuss*]](../common/Discuss2.gif)  | 101. | A sufficient condition for key-privacy | Average * | Weighted * | Max-Min * | ![Status: maybe reject [MR]](../common/MR.gif) | Jul 3 00:29 |