CryptoDB is now in maintenance mode. I had hoped that it would eventually
be a central repository for metadata about IACR publications, but very
little progress has been made toward integrating systems, so
CryptoDB will lag somewhat in the collection of data. A
history of changes will be updated when data
is added.
| Year | Title | Venue |
| 2006 | New Proofs for NMAC and HMAC: Security Without Collision-Resistance | crypto |
| 2012 | New Attacks on Keccak-224 and Keccak-256 | fse |
| 2012 | Recursive Diffusion Layers for Block Ciphers and Hash Functions | fse |
| 2012 | Improved Rebound Attack on the Finalist Grøstl | fse |
| 2012 | Zero Correlation Linear Cryptanalysis with Reduced Data Complexity | fse |
| 2012 | On the (In)Security of IDEA in Various Hashing Modes | fse |
| 2012 | New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | fse |
| 2012 | Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes | fse |
| 2012 | A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract) | fse |
| 2012 | Lapin: An Efficient Authentication Protocol Based on Ring-LPN | fse |
| 2012 | Differential Propagation Analysis of Keccak | fse |
| 2012 | Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family | fse |
| 2012 | The Security of Ciphertext Stealing | fse |
| 2012 | UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX | fse |
| 2012 | (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | fse |
| 2012 | Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 | fse |
| 2012 | Practical Cryptanalysis of ARMADILLO2 | fse |
| 2012 | Unaligned Rebound Attack: Application to Keccak | fse |
| 2012 | A Model for Structure Attacks, with Applications to PRESENT and Serpent | fse |
| 2012 | Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication | fse |
| 2012 | Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers | fse |
| 2012 | ElimLin Algorithm Revisited | fse |
| 2012 | McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes | fse |
| 2012 | "Provable" Security against Differential and Linear Cryptanalysis | fse |
| 2012 | Improved Attacks on Full GOST | fse |
| 2012 | Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 | fse |
| 2012 | Higher-Order Masking Schemes for S-Boxes | fse |
| 2012 | Fully Secure Unbounded Inner-Product and Attribute-Based Encryption | asiacrypt |
| 2012 | Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note | asiacrypt |
| 2012 | Understanding Adaptivity: Random Systems Revisited | asiacrypt |
| 2012 | Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication | asiacrypt |
| 2012 | Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) | asiacrypt |
| 2012 | Some Mathematical Mysteries in Lattices | asiacrypt |
| 2012 | Pairing-Based Cryptography: Past, Present, and Future | asiacrypt |
| 2012 | Optimal Reductions of Some Decisional Problems to the Rank Problem | asiacrypt |
| 2012 | Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic | asiacrypt |
| 2012 | Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures | asiacrypt |
| 2012 | Generic Related-Key Attacks for HMAC | asiacrypt |
| 2012 | Calling Out Cheaters: Covert Security with Public Verifiability | asiacrypt |
| 2012 | Computing on Authenticated Data: New Privacy Definitions and Constructions | asiacrypt |
| 2012 | IND-CCA Secure Cryptography Based on a Variant of the LPN Problem | asiacrypt |
| 2012 | Provable Security of the Knudsen-Preneel Compression Functions | asiacrypt |
| 2012 | An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher | asiacrypt |
| 2012 | Analysis of Differential Attacks in ARX Constructions | asiacrypt |
| 2012 | The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions | asiacrypt |
| 2012 | Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks | asiacrypt |
| 2012 | Dual Form Signatures: An Approach for Proving Security from Static Assumptions | asiacrypt |
| 2012 | On the (Im)possibility of Projecting Property in Prime-Order Setting | asiacrypt |
| 2012 | Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract) | asiacrypt |
| 2012 | RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures | asiacrypt |
| 2012 | Differential Attacks against Stream Cipher ZUC | asiacrypt |
| 2012 | ECM at Work | asiacrypt |
| 2012 | Certifying RSA | asiacrypt |
| 2012 | A Mix-Net from Any CCA2 Secure Cryptosystem | asiacrypt |
| 2012 | Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise | asiacrypt |
| 2012 | Signature Schemes Secure against Hard-to-Invert Leakage | asiacrypt |
| 2012 | How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios | asiacrypt |
| 2012 | On Polynomial Systems Arising from a Weil Descent | asiacrypt |
| 2012 | Integral and Multidimensional Linear Distinguishers with Correlation Zero | asiacrypt |
| 2012 | Differential Analysis of the LED Block Cipher | asiacrypt |
| 2012 | The Five-Card Trick Can Be Done with Four Cards | asiacrypt |
| 2012 | Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings | asiacrypt |
| 2012 | A Unified Framework for UC from Only OT | asiacrypt |
| 2012 | PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract | asiacrypt |
| 2012 | Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings | asiacrypt |
| 2012 | Optimal Collision Security in Double Block Length Hashing with Single Length Key | asiacrypt |
| 2012 | A Coding-Theoretic Approach to Recovering Noisy RSA Keys | asiacrypt |
| 2012 | Theory and Practice of a Leakage Resilient Masking Scheme | asiacrypt |
| 2012 | Completeness for Symmetric Two-Party Functionalities - Revisited | asiacrypt |
| 2012 | 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound | asiacrypt |
| 2012 | Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing | asiacrypt |
| 2012 | Perfect Algebraic Immune Functions | asiacrypt |
| 2012 | Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions | asiacrypt |
| 2007 | Tackling Adaptive Corruptions in Multicast Encryption Protocols | tcc |
| 2008 | Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency | tcc |
| 2010 | Parallel Repetition Theorems for Interactive Arguments | tcc |
| 2011 | Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma | tcc |
| 2012 | Compiler Assisted Masking | ches |
| 2012 | Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents | ches |
| 2012 | NEON Crypto | ches |
| 2012 | Efficient Implementations of MQPKS on Constrained Devices | ches |
| 2012 | Practical Leakage-Resilient Symmetric Cryptography | ches |
| 2012 | Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | ches |
| 2012 | Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | ches |
| 2012 | Low-Latency Encryption - Is "Lightweight = Light + Wait"? | ches |
| 2012 | Breakthrough Silicon Scanning Discovers Backdoor in Military Chip | ches |
| 2012 | Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication | ches |
| 2012 | 3D Hardware Canaries | ches |
| 2012 | How Far Should Theory Be from Practice? - Evaluation of a Countermeasure | ches |
| 2012 | Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment | ches |
| 2012 | Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA | ches |
| 2012 | Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting | ches |
| 2012 | PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator | ches |
| 2012 | A Differential Fault Attack on the Grain Family of Stream Ciphers | ches |
| 2012 | Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs | ches |
| 2012 | PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon | ches |
| 2012 | Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation | ches |
| 2012 | Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model | ches |
| 2012 | Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings | ches |
| 2012 | Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware | ches |