International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
19:19 [Event][New]ASK 2015: Asian Workshop on Symmetric Key Cryptography 2015 (School)[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of the Quadratic Zero-Testing of GGH, by Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi[ expand ]

18:17 [Pub][ePrint]Related-key Impossible Differential Analysis of Full Khudra, by Qianqian Yang and Lei Hu and Siwei Sun and Ling Song[ expand ]
18:17 [Pub][ePrint]Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?, by David Wong[ expand ]
18:17 [Pub][ePrint]Offline Witness Encryption, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
18:17 [Pub][ePrint]Multi-Variate High-Order Attacks of Shuffled Tables Recomputation, by Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA[ expand ]
18:17 [Pub][ePrint]DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte[ expand ]
18:17 [Pub][ePrint]Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes, by David Derler and Daniel Slamanig[ expand ]
18:17 [Pub][ePrint]On Linkability and Malleability in Self-blindable Credentials, by Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers[ expand ]
18:17 [Pub][ePrint]An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices, by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]

08:51 [Job][New]Research Scientists on Cyber-Physical Security, Institute for Infocomm Research, Singapore[ expand ]

21:17 [Pub][ePrint]On near prime-order elliptic curves with small embedding degrees, by Duc-Phong Le and Nadia El Mrabet and Chik How Tan[ expand ]
21:17 [Pub][ePrint]Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys, by Benjamin Wesolowski and Pascal Junod[ expand ]
18:17 [Pub][ePrint]Authentication Using Side-Channel Information, by Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata[ expand ]
18:17 [Pub][ePrint]Efficient Key Authentication Service for Secure End-to-end Communications, by Mohammad Etemad and Alptekin Küpçü[ expand ]
18:17 [Pub][ePrint]Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices, by David McCann, Kerstin Eder, Elisabeth Oswald[ expand ]
01:37 [Event][New]WISE 2015: Workshop on Implementation: Security and Evaluation[ expand ]

18:17 [Pub][ePrint]M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors, by Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and [ expand ]
18:17 [Pub][ePrint]Unique Signature with Short Output from CDH Assumption, by Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng[ expand ]
18:17 [Pub][ePrint]Reducing Multilinear Map Levels in Constrained PRFs and ABE, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
15:17 [Pub][ePrint]State-recovery analysis of Spritz, by Ralph Ankele and Stefan Koelbl and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation, by Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys, by Dario Catalano and Dario Fiore and Luca Nizzardo[ expand ]

21:17 [Pub][ePrint]The Emperor\'s New Password Creation Policies, by Ding Wang and Ping Wang[ expand ]
15:17 [Pub][ePrint]Efficient Fully Structure-Preserving Signatures for Large Messages, by Jens Groth[ expand ]
15:17 [Pub][ePrint]Efficient (ideal) lattice sieving using cross-polytope LSH, by Anja Becker and Thijs Laarhoven[ expand ]
13:25 [Job][New]Applied cryptographer, ID Quantique [ expand ]
13:24 [Job][Update]Ph.D. student, Ruhr University Bochum[ expand ]
13:24 [Job][New]Ph.D. student, Ruhr University Bochum[ expand ]

13:10 [Event][New]RWC2016: Real World Cryptography 2016[ expand ]

15:17 [Pub][ePrint]A general framework for building noise-free homomorphic cryptosystems, by Gérald Gavin[ expand ]
15:17 [Pub][ePrint]Extended Nested Dual System Groups, Revisited, by Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang[ expand ]
15:17 [Pub][ePrint]Efficiently Obfuscating Re-Encryption Program under DDH Assumption, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
03:56 [Event][New]Workshop on Tools for Asymmetric Cryptanalysis[ expand ]
03:56 [Event][New]ASIACCS 2016: The 11th ACM Asia Conference on Computer and Communications Security[ expand ]
03:56 [Event][New]ACNS 2016: 14th International Conference on Applied Cryptography and Network Security[ expand ]
03:55 [Event][New]Future Directions in Computing on Encrypted Data[ expand ]

23:22 [Event][New]PKC: Public Key Cryptography 2017[ expand ]
23:21 [Event][New]CHES: Cryptographic Hardware and Embedded Systems 2016[ expand ]
23:19 [Event][New]Asiacrypt: Asiacrypt 2017[ expand ]
23:17 [Event][New]Eurocrypt: Eurocrypt 2017[ expand ]

18:17 [Pub][ePrint]Improving the Big Mac Attack on Elliptic Curve Cryptography, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
18:17 [Pub][ePrint]cuHE: A Homomorphic Encryption Accelerator Library, by Wei Dai and Berk Sunar[ expand ]
18:17 [Pub][ePrint]Secure Multi-party Graph Computation, by Varsha Bhat and Harsimran Singh and Sudarshan Iyengar[ expand ]
18:17 [Pub][ePrint]Analysis of Keyless Massive MIMO-based Cryptosystem Security, by Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev[ expand ]
06:50 [Job][Update]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]
06:48 [Job][New]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]

18:17 [Pub][ePrint]On the Power of Hierarchical Identity-Based Encryption, by Mohammad Mahmoody and Ameer Mohammedy[ expand ]
18:17 [Pub][ePrint]CLKS: Certificateless Keyword Search on Encrypted Data, by Qingji Zheng and Xiangxue Li and Aytac Azgin[ expand ]
18:17 [Pub][ePrint]Revisiting Turning Online Cipher Off, by Ritam Bhaumik and Mridul Nandi[ expand ]