International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15
2015-02-28
10:17 [Pub][ePrint]Trivial Nonce-Misusing Attack on Pure OMD, by Tomer Ashur and Bart Mennink[ expand ]
04:17 [Pub][ePrint]A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia, by Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma[ expand ]
04:17 [Pub][ePrint]Indistinguishability Obfuscation from Compact Functional Encryption, by Prabhanjan Ananth and Abhishek Jain[ expand ]
04:17 [Pub][ePrint]Silent Simon: A Threshold Implementation under 100 Slices, by Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth[ expand ]
01:17 [Pub][ePrint]Authenticated Network Time Synchronization, by Benjamin Dowling and Douglas Stebila and Greg Zaverucha[ expand ]
01:17 [Pub][ePrint]Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation, by Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer[ expand ]
01:17 [Pub][ePrint]Short Schnorr signatures require a hash function with more than just random-prefix resistance, by Daniel R. L. Brown[ expand ]
01:17 [Pub][ePrint]More PS and H-like bent functions, by C. Carlet[ expand ]
01:17 [Pub][ePrint]Post-Zeroizing Obfuscation: The case of Evasive Circuits, by Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry[ expand ]
01:17 [Pub][ePrint]Naturally Rehearsing Passwords, by Jeremiah Blocki and Manuel Blum and Anupam Datta[ expand ]
01:17 [Pub][ePrint]The Cryptographic Hardness of Random Local Functions -- Survey, by Benny Applebaum[ expand ]
01:17 [Pub][ePrint]Constant Size Ring Signature Without Random Oracle, by Priyanka Bose and Dipanjan Das and C. Pandu Rangan[ expand ]
01:17 [Pub][ePrint]Indistinguishability Obfuscation from Functional Encryption, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]New Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
01:17 [Pub][ePrint]Exploring the Resilience of Some Lightweight Ciphers Against Proled Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
01:17 [Pub][ePrint]Differential-Linear Cryptanalysis of ICEPOLE, by Tao Huang; Ivan Tjuawinata; Hongjun Wu[ expand ]


2015-02-27
22:17 [Pub][ePrint]Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE, by Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu[ expand ]
22:17 [Pub][ePrint]From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Ilan Komargodski and Gil Segev[ expand ]
22:17 [Pub][ePrint]Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, by Nuttapong Attrapadung and Shota Yamada[ expand ]
22:17 [Pub][ePrint]Building Lossy Trapdoor Functions from Lossy Encryption, by Brett Hemenway and Rafail Ostrovsky[ expand ]
22:17 [Pub][ePrint]On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining, by Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor[ expand ]
22:17 [Pub][ePrint]Circuits Resilient to Additive Attacks with Applications to Secure Computation, by Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer[ expand ]
22:17 [Pub][ePrint]Functional Encryption from (Small) Hardwae Tokens, by Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Inverting the Fnal exponentiation of Tate pairings on ordinary elliptic curves using faults, by Ronan Lashermes and Jacques Fournier and Louis Goubin[ expand ]
22:17 [Pub][ePrint]Bad directions in cryptographic hash functions, by Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen[ expand ]
22:17 [Pub][ePrint]Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons, by Tobias Pulls and Roel Peeters[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of HMAC/NMAC-Whirlpool, by Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu[ expand ]
22:17 [Pub][ePrint]On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs, by Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann[ expand ]
22:17 [Pub][ePrint]High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures, by Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage[ expand ]
22:17 [Pub][ePrint]New Attacks on Feistel Structures with Improved Memory Complexities, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Observations on the SIMON block cipher family, by Stefan Kölbl and Gregor Leander and Tyge Tiessen[ expand ]
22:17 [Pub][ePrint]Security of the AES with a Secret S-box, by Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen[ expand ]
22:17 [Pub][ePrint]Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs, by Erich Wenger and Paul Wolfger[ expand ]
22:17 [Pub][ePrint]Multi-Client Verifiable Computation with Stronger Security Guarantees, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method, by Céline Blondeau and Marine Minier[ expand ]
19:17 [Pub][ePrint]The Random Oracle Model: A Twenty-Year Retrospective, by Neal Koblitz and Alfred Menezes[ expand ]
19:17 [Pub][ePrint]Performance Analysis of Some Password Hashing Schemes, by Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya[ expand ]
19:17 [Pub][ePrint]A Practical Key Exchange for the Internet using Lattice Cryptography, by Vikram Singh[ expand ]
18:07 [Event][New]C&TC 2015: 5th International Symposium on Cloud Computing, Trusted Computing and Secu[ expand ]
18:06 [Job][New]Post-Doc, Ph.D., High Assurance Software Lab --- INESC TEC & Minho University[ expand ]
18:06 [Job][New]Research Fellow / Post-doc, Nanyang Technological University (NTU), Singapore[ expand ]
16:17 [Pub][ePrint]Multi-keyword Similarity Search Over Encrypted Cloud Data, by Mikhail Strizhov and Indrajit Ray[ expand ]
16:17 [Pub][ePrint]Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs, by Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. [ expand ]


2015-02-26
23:11 [Job][New]Research Associate, Technische Universitaet Muenchen; Instiute for Security in Information Technology; Munich; Germany[ expand ]
22:17 [Pub][ePrint]Generalizing Efficient Multiparty Computation, by Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp[ expand ]
19:17 [Pub][ePrint]From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions, by Pierre Karpman[ expand ]
19:17 [Pub][ePrint]Private Computation on Encrypted Genomic Data, by Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig[ expand ]
19:17 [Pub][ePrint]Homomorphic Computation of Edit Distance, by Jung Hee Cheon and Miran Kim and Kristin Lauter[ expand ]
19:17 [Pub][ePrint]On Lightweight Stream Ciphers with Shorter Internal States, by Frederik Armknecht and Vasily Mikhalev[ expand ]
19:17 [Pub][ePrint]How to Bootstrap Anonymous Communication, by Sune K. Jakobsen and Claudio Orlandi[ expand ]