International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
02:17 [Job][New]2 x Lectureships (equivalent to assistant professor) in Security of Cyber-Physical Systems, Security Lancaster Research Centre, Lancaster University, UK[ expand ]

16:17 [Pub][ePrint]Better Algorithms for LWE and LWR, by Alexandre Duc and Florian Tramèr and Serge Vaudenay[ expand ]
16:17 [Pub][ePrint]Richer Efficiency/Security Trade-offs in 2PC, by Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek[ expand ]
16:17 [Pub][ePrint]Non-committing encryption from $\\Phi$-hiding, by Brett Hemenway and Rafail Ostrovsky and Alon Rosen[ expand ]

19:17 [Pub][ePrint]Tight Bounds for Keyed Sponges and Truncated CBC, by Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro[ expand ]
19:17 [Pub][ePrint]Interactive Message-Locked Encryption and Secure Deduplication, by Mihir Bellare and Sriram Keelveedhi[ expand ]
19:17 [Pub][ePrint]Improved Meet-in-the-Middle Distinguisher on Feistel Schemes, by Li Lin, Wenling Wu[ expand ]
19:17 [Pub][ePrint]Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability, by Carla Ràfols[ expand ]
19:17 [Pub][ePrint]On Solving Lpn using BKW and Variants, by Sonia Bogos and Florian Tramer and Serge Vaudenay[ expand ]
19:17 [Pub][ePrint]On Obfuscation with Random Oracles, by Ran Canetti and Yael Tauman Kalai and Omer Paneth[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Encryption Scheme from DDH, by Guilhem Castagnos and Fabien Laguillaumie[ expand ]

10:17 [Pub][ePrint]On the concrete hardness of Learning with Errors, by Martin R. Albrecht and Rachel Player and Sam Scott[ expand ]
10:17 [Pub][ePrint]Reliable Information Extraction for Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
10:17 [Pub][ePrint]Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms, by Binanda Sengupta and Abhijit Das[ expand ]
10:17 [Pub][ePrint]Group Signature with Deniability: How to Disavow a Signature, by Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka[ expand ]

09:23 [Event][New]GenoPri'15: 2nd International Workshop on Genome Privacy and Security[ expand ]

12:56 [Job][New]Post-Doc, AIT Austrian Institute of Technology[ expand ]

10:17 [Pub][ePrint]High Performance Lattice-based CCA-secure Encryption, by Rachid El~Bansarkhani and Johannes Buchmann[ expand ]
10:17 [Pub][ePrint]Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP, by Artur Mariano and Thijs Laarhoven and Christian Bischof[ expand ]
10:17 [Pub][ePrint]Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN, by Zahra Ahmadian and Sahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref[ expand ]
10:17 [Pub][ePrint]Type-Based Verification of Electronic Voting Protocols, by Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling[ expand ]

15:33 [Event][New]IEEE CNS 2015: 3rd IEEE Conference on Communications and Network Security[ expand ]
15:32 [Event][New]ARES: 10th International Conference on Availability, Reliability and Security[ expand ]
15:31 [Event][New]ECC: Workshop on Elliptic Curve Cryptography Standards[ expand ]
10:17 [Pub][ePrint]Aggregate Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]

19:17 [Pub][ePrint]Aggregatable Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol, by Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza [ expand ]
19:17 [Pub][ePrint]Faster software for fast endomorphisms, by Billy Bob Brumley[ expand ]
19:17 [Pub][ePrint]Cryptographically Secure CRC for Lightweight Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
19:17 [Pub][ePrint]Suit up! Made-to-Measure Hardware Implementations of Ascon, by Hannes Gro{\\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\\\"o}fer[ expand ]
19:17 [Pub][ePrint]On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks, by Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel[ expand ]

22:17 [Pub][ePrint]Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF, by Zvika Brakerski and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF, by Zvika Brakerski and Vinod Vaikuntanthan[ expand ]
19:17 [Pub][ePrint]Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence, by Kai-Min Chung and Rafael Pass[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Ascon, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
19:17 [Pub][ePrint]Predicate Encryption for Circuits from LWE, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
19:17 [Pub][ePrint]Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$), by Jeremy Maitin-Shepard[ expand ]
19:17 [Pub][ePrint]On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption, by Adam Smith and Ye Zhang[ expand ]
19:17 [Pub][ePrint]A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
19:17 [Pub][ePrint]Obfuscating Circuits via Composite-Order Graded Encoding, by Benny Applebaum and Zvika Brakerski[ expand ]
03:30 [Job][New]Post-Doc, Ph.D. student, University of Massachusetts Amherst[ expand ]

11:58 [Event][New]SPRO 2015: International Workshop on Software Protection[ expand ]
11:56 [Job][New]Ph.D in Information Security, University of Surrey, Guildford (UK)[ expand ]
10:17 [Pub][ePrint]Non-Abelian Analogs of Lattice Rounding, by Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan[ expand ]
10:17 [Pub][ePrint]Multilinear Maps Using Ideal Lattices without Encodings of Zero, by Gu Chunsheng[ expand ]
10:17 [Pub][ePrint]TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems, by Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang[ expand ]
10:17 [Pub][ePrint]Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification, by Xin Li[ expand ]
10:17 [Pub][ePrint]Simpler Efficient Group Signatures from Lattices, by Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang[ expand ]
10:17 [Pub][ePrint]Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds, by Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Meh[ expand ]
10:17 [Pub][ePrint]A linear attack on Kahrobaei-Lam-Shpilrain key exchange protocol, by Jintai Ding, Alexei Miasnikov, Alexander Ushakov[ expand ]