|   | ![Write a report about this submission [Review]](../common/Review.gif)  | 1. | On Obfuscating Point Functions | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 2. | Logcrypt: Forward Security and Public Verification for Secure Audit ... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 3. | Cryptanalysis of Hiji-bij-bij (HBB) | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 4. | Benes and Butterfly schemes revisited | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 7. | The Misuse of RC4 in Microsoft Word and Excel | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 9. | Mixing properties of triangular feedback shift registers | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 11. | An Improved Elegant Method to Re-initialize Hash Chains | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite k... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyn... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and ... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 20. | (De)Compositions of Cryptographic Schemes and their Applications to ... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 21. | Partial Hiding in Public-Key Cryptography | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 22. | An Improved and Efficient Countermeasure against Power Analysis Atta... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on ... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 24. | On the Diffie-Hellman problem over $GL_{n}$ | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 26. | Techniques for random maskin in hardware | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Dis... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 29. | A model and architecture for pseudo-random generation with applicati... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 32. | On the Notion of Statistical Security in Simulatability Definitions | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 33. | A Flexible Framework for Secret Handshakes | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduct... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 35. | Concurrent Composition of Secure Protocols in the Timing Model | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 37. | Distinguishing Stream Ciphers with Convolutional Filters | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 38. | Unfairness of a protocol for certified delivery | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 39. | On the Security of a Group Signature Scheme with Strong Separability | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Appli... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 41. | An Efficient Solution to The Millionaires Problem Based on Homomorph... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 42. | On the affine classification of cubic bent functions | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 45. | Cryptanalysis of an anonymous wireless authentication and conference... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 46. | Cryptanalysis of two identification schemes based on an ID-based cry... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 48. | David Chaum's Voter Verification using Encrypted Paper Receipts | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 49. | A Note on Shor's Quantum  Algorithm for Prime Factorization | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard... | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 53. | Untraceability of Two Group Signature Schemes | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 54. | Key Derivation and Randomness Extraction | 
    |   | ![Write a report about this submission [Review]](../common/Review.gif)  | 101. | A sufficient condition for key-privacy |