International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
2014-09-20
00:17 [Pub][ePrint]Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function, by Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
00:17 [Pub][ePrint]Dealer-Leakage Resilient Verifiable Secret Sharing, by Ruxandra F. Olimid[ expand ]
00:17 [Pub][ePrint]S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?, by Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedr[ expand ]
00:17 [Pub][ePrint]Augmented Learning with Errors: The Untapped Potential of the Error Term, by Rachid El Bansarkhani and Özgür Dagdelen and Johannes Buchmann[ expand ]
00:17 [Pub][ePrint]Resizable Tree-Based Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass[ expand ]
00:17 [Pub][ePrint]Secure modular password authentication for the web using channel bindings, by Mark Manulis and Douglas Stebila and Nick Denham[ expand ]
00:17 [Pub][ePrint]Differentially Private Linear Algebra in the Streaming Model, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Faster Binary-Field Multiplication and Faster Binary-Field MACs, by Daniel J. Bernstein and Tung Chou[ expand ]
00:17 [Pub][ePrint]Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol, by Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and[ expand ]
00:17 [Pub][ePrint]The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves, by Benjamin Smith[ expand ]
00:17 [Pub][ePrint]CIARP: A RISC Processor For Cryptography Applications, by Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi[ expand ]
00:17 [Pub][ePrint]Efficient Software Implementation of Ring-LWE Encryption, by Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede[ expand ]


2014-09-17
21:17 [Pub][ePrint]Protecting Encrypted Cookies from Compression Side-Channel Attacks, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
06:31 [Event][New]IoTPTS 2015: ASIACCS Workshop on IoT Privacy, Trust, and Security[ expand ]


2014-09-16
21:17 [Pub][ePrint]Crypto-analyses on \"secure and efficient privacy-preserving public auditing scheme for cloud storage\", by Yalin Chen and Jue-Sam Chou*[ expand ]
18:17 [Pub][ePrint]Differential Cryptanalysis of SipHash, by Christoph Dobraunig and Florian Mendel and Martin Schläffer[ expand ]
18:17 [Pub][ePrint]On Shor\'s Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers, by Zhengjun Cao and Zhenfu Cao[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Constrained Pseudorandom Functions, by Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters[ expand ]
18:17 [Pub][ePrint]Bivariate Polynomials Modulo Composites and their Applications, by Dan Boneh and Henry Corrigan-Gibbs[ expand ]
18:17 [Pub][ePrint]Square Span Programs with Applications to Succinct NIZK Arguments, by George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss[ expand ]
18:17 [Pub][ePrint]How to Split a Secret into Unknown Shares, by Ruxandra F. Olimid[ expand ]
18:17 [Pub][ePrint]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment, by Amir Moradi[ expand ]
18:17 [Pub][ePrint]Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment\', by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]
18:17 [Pub][ePrint]A comprehensive empirical comparison of parallel ListSieve and GaussSieve, by Artur Mariano and Ozgur Dagdelen and Christian Bischof[ expand ]
09:18 [Job][New]Research Fellowship Scheme, Queen’s University Belfast, UK[ expand ]
07:44 [Pub]Proceedings of CHES 2014 available online[ expand ]


2014-09-15
15:17 [Event][New]Eurocrypt 2015: Eurocrypt 2015[ expand ]
01:14 [Job][New]PhD Positions, Southern Illinois University Carbondale, USA[ expand ]


2014-09-12
09:17 [Pub][ePrint]Co-Location-Resistant Clouds, by Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd[ expand ]
09:17 [Pub][ePrint]Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks, by Mohammad Wazid[ expand ]



2014-09-11
09:17 [Pub][ePrint]New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\\mathbb{F}_2$, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle, by Yehuda Lindell[ expand ]
01:42 [Event][New]CPSS'15: 1st Cyber-Physical System Security Workshop[ expand ]


2014-09-10
16:02 [News]President\'s message 9/2014[ expand ]
15:17 [PhD][New]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]
15:15 [PhD][New]Carolyn Whitnall: Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation[ expand ]


2014-09-09
09:17 [Pub][ePrint]A Note on Quantum Security for Post-Quantum Cryptography, by Fang Song[ expand ]
09:17 [Pub][ePrint]Formal Treatment of Privacy-Enhancing Credential Systems, by Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen[ expand ]
09:17 [Pub][ePrint]Analysis Of Variance and CPA in SCA, by Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philipp[ expand ]
09:17 [Pub][ePrint]The Feasibility of Outsourced Database Search in the Plain Model, by Carmit Hazay and Hila Zarosim[ expand ]
09:17 [Pub][ePrint]Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lu[ expand ]
03:15 [Job][New]Ph.D. student in Theoretical Computer Science, CWI / University of Amsterdam[ expand ]


2014-09-08
01:39 [PhD][Update]Robert Granger: On Small Degree Extension Fields in Cryptology[ expand ]



2014-09-05
21:17 [Pub][ePrint]Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version), by Christina Boura and Mar\\\'ia Naya-Plasencia and Valentin Suder[ expand ]
21:17 [Pub][ePrint]HIMMO security, by Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Domingo Gomez-Perez and Jaime Gutierrez[ expand ]
21:17 [Pub][ePrint]A Fully Homomorphic Encryption Scheme with Better Key Size, by Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song[ expand ]
21:17 [Pub][ePrint]Linearity Measures for MQ Cryptography, by Simona Samardjiska and Danilo Gligoroski[ expand ]
21:17 [Pub][ePrint]Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques, by Benoit Feix and Hugues Thiebeauld[ expand ]
21:17 [Pub][ePrint]An Practical Iterative Side Channel Cube Attack on AES-128/256, by Erfan Aghaee and Majid Rahimi and Hamed Yusefi[ expand ]