International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15
00:17 [Pub][ePrint]Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas[ expand ]

21:17 [Pub][ePrint]Bootstrapping for HElib, by Shai Halevi and Victor Shoup[ expand ]
21:17 [Pub][ePrint]Recent Results in Scalable Multi-Party Computation, by Jared Saia and Mahdi Zamani[ expand ]
21:17 [Pub][ePrint]An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov[ expand ]
21:17 [Pub][ePrint]Dynamic Behavior of RS latches using FIB processing and probe connection, by Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto[ expand ]
21:17 [Pub][ePrint]Exponent Blinding May Not Prevent Timing Attacks on RSA, by Werner Schindler[ expand ]
21:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions, by Ilan Komargodski and Gil Segev and Eylon Yogev[ expand ]
21:17 [Pub][ePrint]Random Oracle Uninstantiability from Indistinguishability Obfuscation, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Bj\\\"orn Tackmann and Daniele Venturi[ expand ]
21:17 [Pub][ePrint]Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation, by Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti[ expand ]
21:17 [Pub][ePrint]How to Choose Interesting Points for Template Attack More Effectively?, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng[ expand ]
21:17 [Pub][ePrint]A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation, by Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou[ expand ]
21:17 [Pub][ePrint]Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -, by Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts[ expand ]
21:17 [Pub][ePrint]Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın[ expand ]
21:17 [Pub][ePrint]Differential Factors: Improved Attacks on SERPENT, by Cihangir Tezcan and Ferruh Özbudak[ expand ]
21:17 [Pub][ePrint]Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system, by SK Hafizul Islam, G. P. Biswas[ expand ]
21:17 [Pub][ePrint]Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao[ expand ]
21:17 [Pub][ePrint]Pseudonymous Secure Computation from Time-Lock Puzzles, by Jonathan Katz and Andrew Miller and Elaine Shi[ expand ]
21:17 [Pub][ePrint]Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware, by Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou[ expand ]
20:56 [Job][New]PhD student, Chalmers University of Technology, Sweden[ expand ]
18:17 [Pub][ePrint]Relating Undisturbed Bits to Other Properties of Substitution Boxes, by Rusydi H. Makarim and Cihangir Tezcan[ expand ]
18:17 [Pub][ePrint]Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs, by Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli[ expand ]
18:17 [Pub][ePrint]Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătă[ expand ]
18:17 [Pub][ePrint]Faster ECC over $\\mathbb{F}_{2^{521}-1}$, by Robert Granger and Michael Scott[ expand ]
18:17 [Pub][ePrint]Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang[ expand ]
18:17 [Pub][ePrint]BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita[ expand ]
15:17 [Pub][ePrint]Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, by Nicolas T. Courtois and Pinar Emi[ expand ]
15:17 [Pub][ePrint]Reflections on Slide with a Twist Attacks, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
13:45 [Event][New]IWSEC 2015: The 10th International Workshop on Security[ expand ]

06:17 [Pub][ePrint]Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Michael Walfish and Victor Vu[ expand ]
03:17 [Pub][ePrint]Adaptively Secure Two-party Computation From Indistinguishability Obfuscation , by Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya[ expand ]
03:17 [Pub][ePrint]Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Antigoni Polychroniadou[ expand ]

16:33 [Event][New]SECITC '15: 8th Int'l Conference on Security for Information Technology&Communications[ expand ]
16:33 [Job][New]Postdoctoral Researcher (Drone Security), University College Cork, Ireland[ expand ]
15:17 [Pub][ePrint]Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator, by Jun Xu, Lei Hu, Zhangjie Huang[ expand ]
15:17 [Pub][ePrint]Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Constrained PRFs for Unbounded Inputs, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa[ expand ]
15:17 [Pub][ePrint]SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, by Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]An Improved Transformation between HILL and Metric Conditional Pseudoentropy, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism, by David Galindo and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation, by Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman[ expand ]
12:17 [Pub][ePrint]Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi[ expand ]

17:13 [Event][New]CS2 2015: Second Workshop on Cryptography and Security in Computing Systems[ expand ]

18:17 [Pub][ePrint]Requirements for Standard Elliptic Curves, by Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze[ expand ]
16:50 [Job][New]Post-Doc, Commissariat à l\'Energie Atomique (French DoE), Paris area, France[ expand ]
16:02 [News]IACR webserver no longer supports SSLv2 and SSLv3[ expand ]