1 |
1. | On Obfuscating Point Functions |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
2 | 2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
3 | 3. | Cryptanalysis of Hiji-bij-bij (HBB) |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
4 | 4. | Benes and Butterfly schemes revisited |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
5 |
5. | A sufficient condition for key-privacy |
Average 4 |
Weighted 4 |
Max-Min 0 |
Jul 3 01:13 |
Joy Fawcett |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 3 00:46 |
Mia Hamm |
Score 4 |
Confidence 3 |
Technical 3 |
Editorial 2 |
Suitability 3 |
Jul 2 23:25 |
Zinedine Zidane (Some One) |
Score 4 |
Confidence 3 |
Technical 3 |
Editorial 2 |
Suitability 3 |
Jul 2 23:07 |
6 | 6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
7 | 7. | The Misuse of RC4 in Microsoft Word and Excel |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
8 | 8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
9 | 9. | Mixing properties of triangular feedback shift registers |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
10 | 10. | Update on SHA-1 |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
11 | 11. | An Improved Elegant Method to Re-initialize Hash Chains |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
12 | 12. | Efficient Certificateless Public Key Encryption |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
13 | 13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
14 | 14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
15 | 15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
16 |
16. | Narrow T-functions |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
Mia Hamm |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:21 |
Zinedine Zidane |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:11 |
17 | 17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
18 | 18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
19 | 19. | The Full Abstraction of the UC Framework |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
20 | 20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
21 | 21. | Partial Hiding in Public-Key Cryptography |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
22 | 22. | An Improved and Efficient Countermeasure against Power Analysis Attacks |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
23 | 23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
24 | 24. | On the Diffie-Hellman problem over $GL_{n}$ |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
25 | 25. | Analysis of Affinely Equivalent Boolean Functions |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
26 | 26. | Techniques for random maskin in hardware |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
27 |
27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption |
Average 4.5 |
Weighted 4.8 |
Max-Min 3 |
Jul 3 01:11 |
Joy Fawcett |
Score 6 |
Confidence 3 |
Technical 2 |
Editorial 2 |
Suitability 2 |
Jul 2 23:18 |
Mia Hamm |
Score 3 |
Confidence 2 |
Technical 1 |
Editorial 2 |
Suitability 3 |
Jul 2 23:22 |
28 | 28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
29 | 29. | A model and architecture for pseudo-random generation with applications to /dev/random |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
30 | 30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
31 |
31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
32 | 32. | On the Notion of Statistical Security in Simulatability Definitions |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
33 |
33. | A Flexible Framework for Secret Handshakes |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
34 | 34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
35 |
35. | Concurrent Composition of Secure Protocols in the Timing Model |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
36 | 36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
37 | 37. | Distinguishing Stream Ciphers with Convolutional Filters |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
38 | 38. | Unfairness of a protocol for certified delivery |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
39 | 39. | On the Security of a Group Signature Scheme with Strong Separability |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
40 | 40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
41 | 41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
42 | 42. | On the affine classification of cubic bent functions |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
43 | 43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
44 | 44. | New Approaches for Deniable Authentication |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
45 | 45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
46 | 46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem |
Average * |
Weighted * |
Max-Min * |
Jul 3 01:11 |
47 | 47. | Adversarial Model for Radio Frequency Identification |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
48 | 48. | David Chaum's Voter Verification using Encrypted Paper Receipts |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
49 | 49. | A Note on Shor's Quantum Algorithm for Prime Factorization |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
Joy Fawcett |
Score * |
Confidence * |
Technical * |
Editorial * |
Suitability * |
Jul 2 23:19 |
50 | 50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
51 | 51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
52 | 53. | Untraceability of Two Group Signature Schemes |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
53 |
54. | Key Derivation and Randomness Extraction |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |
54 | 101. | A sufficient condition for key-privacy |
Average * |
Weighted * |
Max-Min * |
Jul 3 00:29 |