International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
2014-07-29
03:52 [Event][New]ICCICS2014: The International Conference on Cyber-Crime Investigation and Cyber Securit[ expand ]
03:52 [Event][New]EECEA2014: The International Conference on Electrical, Electronics, Computer Engineeri[ expand ]


2014-07-27
09:57 [Job][New]Post-Doc, HASLab, INESC TEC, Braga, Portugal[ expand ]


2014-07-25
15:17 [Pub][ePrint]The Hunting of the SNARK, by Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer[ expand ]
15:17 [Pub][ePrint]Scan Based Side Channel Attack on Grain v1, by Sonu Kumar Jha[ expand ]
13:35 [Event][New]COST Action IC1306 - School on Cryptographic Attacks[ expand ]


2014-07-24
15:17 [Pub][ePrint]The Exact PRF-Security of NMAC and HMAC, by Peter Gazi and Krzysztof Pietrzak and Michal Rybár[ expand ]
15:17 [Pub][ePrint]Reducing Communication Overhead of the Subset Difference Scheme, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
15:17 [Pub][ePrint]Vernam Two, by Dan P. Milleville[ expand ]
15:17 [Pub][ePrint]Simple AEAD Hardware Interface (S{\\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]Security Analysis of Multilinear Maps over the Integers, by Hyung Tae Lee and Jae Hong Seo[ expand ]
15:17 [Pub][ePrint]A new public key system based on Polynomials over finite fields GF(2), by Gurgen Khachatrian[ expand ]
15:17 [Pub][ePrint]On the Optimality of Differential Fault Analyses on CLEFIA, by Juliane Krämer and Anke Stüber and Ágnes Kiss[ expand ]
15:17 [Pub][ePrint]How to manipulate curve standards: a white paper for the black hat, by Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\\\"ulsing and Tanja Lange and Ruben Niederhagen an[ expand ]
15:17 [Pub][ePrint]Deja Q: Using Dual Systems to Revisit q-Type Assumptions, by Melissa Chase and Sarah Meiklejohn[ expand ]


2014-07-23
00:17 [Pub][ePrint]Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter[ expand ]



2014-07-22
09:17 [Pub][ePrint]New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\\Sigma \\Pi$PKC, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai[ expand ]
09:17 [Pub][ePrint]Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz[ expand ]
01:45 [Event][New]FC '15: Financial Cryptography and Data Security 2015[ expand ]


2014-07-21
18:17 [Pub][ePrint]Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker[ expand ]
06:29 [Event][New]NWC: National Workshop on Cryptology[ expand ]


2014-07-19
18:17 [Pub][ePrint]A Security Definition for Multi Secret Sharing and a Scheme Based on LWE, by Massoud Hadian Dehkordi and Reza Ghasemi[ expand ]
06:16 [Job][New]Tenure Track Positions in Computer Eng, CS and IT, University of Washington, Tacoma[ expand ]


2014-07-18
21:17 [Pub][ePrint]Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA, by Aleksandar Kircanski[ expand ]
21:17 [Pub][ePrint]hHB: a Harder HB+ Protocol, by Ka Ahmad Khoureich[ expand ]
21:17 [Pub][ePrint]Performance Increasing Approaches For Binary Field Inversion, by Vladislav Kovtun and Maria Bulakh[ expand ]
21:17 [Pub][ePrint]An Investigation of Some Forward Security Properties for PEKS and IBE, by Qiang Tang[ expand ]
21:17 [Pub][ePrint]Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Double shielded Public Key Cryptosystems, by Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang[ expand ]
21:17 [Pub][ePrint]Round-Efficient Black-Box Construction of Composable Multi-Party Computation, by Susumu Kiyoshima[ expand ]
15:17 [Pub][ePrint]Securing Cloud Data in the New Attacker Model, by Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]General Statistically Secure Computation with Bounded-Resettable Hardware Tokens, by Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges[ expand ]
15:17 [Pub][ePrint]On Virtual Grey Box Obfuscation for General Circuits, by Nir Bitansky and Ran Caentti and Yael Tauman-Kalai and Omer Paneth[ expand ]
15:17 [Pub][ePrint]A Simpler Variant of Universally Composable Security for Standard Multiparty Computation, by Ran Canetti and Asaf Cohen and Yehuda Lindell[ expand ]
15:17 [Pub][ePrint]Efficient Record-Level Keyless Signatures for Audit Logs, by Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards[ expand ]
09:17 [Pub][ePrint]Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation, by Daniel Augot and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Function-Private Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Gil Segev[ expand ]
09:17 [Pub][ePrint]New Attacks on the RSA Cryptosystem, by Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig[ expand ]
09:17 [Pub][ePrint]Implicit factorization of unbalanced RSA moduli, by Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin[ expand ]
09:17 [Pub][ePrint]Authentication Schemes Based on Resilient Maps, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]
09:17 [Pub][ePrint]Anonymous and Publicly Linkable Reputation Systems, by Johannes Blömer and Jakob Juhnke and Christina Kolb[ expand ]
09:17 [Pub][ePrint]Solving closest vector instances using an approximate shortest independent vectors oracle, by Chengliang Tian and Wei Wei and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Secure Mutual Testing Strategy for Cryptographic SoCs, by Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]A Practical Second-Order Fault Attack against a Real-World Pairing Implementation, by Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert[ expand ]
09:17 [Pub][ePrint]On the Multi-output Filtering Model and Its Applications, by Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu[ expand ]
09:17 [Pub][ePrint]EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor, by Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto[ expand ]
09:17 [Pub][ePrint]Optimized Architecture for AES, by Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey[ expand ]
09:17 [Pub][ePrint]Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption, by Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang[ expand ]
09:17 [Pub][ePrint]A Secure Cloud-based NFC Mobile Payment Protocol , by pardis pourghomi and muhammad qasim saeed and george ghinea[ expand ]