International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15
18:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]

21:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]
21:17 [Pub][ePrint]Obfuscation of Probabilistic Circuits and Applications, by Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan[ expand ]
21:17 [Pub][ePrint]Overview of the Candidates for the Password Hashing Competition -- And their Resistance against Garbage-Collector Attacks, by Stefan Lucks and Jakob Wenzel[ expand ]
21:17 [Pub][ePrint]Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective, by Joppe W. Bos and Michael Naehrig and Joop van de Pol[ expand ]
21:17 [Pub][ePrint]Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Protecting obfuscation against arithmetic attacks, by Eric Miles and Amit Sahai and Mor Weiss[ expand ]
18:17 [Pub][ePrint]CM55: special prime-field elliptic curves almost optimizing den Boer\'s reduction between Diffie-Hellman and discrete logs, by Daniel R. L. Brown[ expand ]
18:17 [Pub][ePrint]UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
16:08 [Event][New]DBSec 2015: 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]
16:02 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Corp, Arlington, VA[ expand ]
03:55 [News]Video of IACR Distinguished Lecture[ expand ]

18:38 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA- i_SW Corporation[ expand ]

17:20 [Event][New]CECC '15: 15th Central European Conference on Cryptology[ expand ]
06:17 [Pub][ePrint]Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES, by Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding[ expand ]

00:17 [Pub][ePrint]Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas[ expand ]

21:17 [Pub][ePrint]Bootstrapping for HElib, by Shai Halevi and Victor Shoup[ expand ]
21:17 [Pub][ePrint]Recent Results in Scalable Multi-Party Computation, by Jared Saia and Mahdi Zamani[ expand ]
21:17 [Pub][ePrint]An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov[ expand ]
21:17 [Pub][ePrint]Dynamic Behavior of RS latches using FIB processing and probe connection, by Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto[ expand ]
21:17 [Pub][ePrint]Exponent Blinding May Not Prevent Timing Attacks on RSA, by Werner Schindler[ expand ]
21:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions, by Ilan Komargodski and Gil Segev and Eylon Yogev[ expand ]
21:17 [Pub][ePrint]Random Oracle Uninstantiability from Indistinguishability Obfuscation, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Bj\\\"orn Tackmann and Daniele Venturi[ expand ]
21:17 [Pub][ePrint]Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation, by Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti[ expand ]
21:17 [Pub][ePrint]How to Choose Interesting Points for Template Attack More Effectively?, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng[ expand ]
21:17 [Pub][ePrint]A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation, by Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou[ expand ]
21:17 [Pub][ePrint]Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -, by Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts[ expand ]
21:17 [Pub][ePrint]Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın[ expand ]
21:17 [Pub][ePrint]Differential Factors: Improved Attacks on SERPENT, by Cihangir Tezcan and Ferruh Özbudak[ expand ]
21:17 [Pub][ePrint]Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system, by SK Hafizul Islam, G. P. Biswas[ expand ]
21:17 [Pub][ePrint]Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao[ expand ]
21:17 [Pub][ePrint]Pseudonymous Secure Computation from Time-Lock Puzzles, by Jonathan Katz and Andrew Miller and Elaine Shi[ expand ]
21:17 [Pub][ePrint]Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware, by Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou[ expand ]
20:56 [Job][New]PhD student, Chalmers University of Technology, Sweden[ expand ]
18:17 [Pub][ePrint]Relating Undisturbed Bits to Other Properties of Substitution Boxes, by Rusydi H. Makarim and Cihangir Tezcan[ expand ]
18:17 [Pub][ePrint]Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs, by Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli[ expand ]
18:17 [Pub][ePrint]Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătă[ expand ]
18:17 [Pub][ePrint]Faster ECC over $\\mathbb{F}_{2^{521}-1}$, by Robert Granger and Michael Scott[ expand ]
18:17 [Pub][ePrint]Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang[ expand ]
18:17 [Pub][ePrint]BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita[ expand ]
15:17 [Pub][ePrint]Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, by Nicolas T. Courtois and Pinar Emi[ expand ]
15:17 [Pub][ePrint]Reflections on Slide with a Twist Attacks, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
13:45 [Event][New]IWSEC 2015: The 10th International Workshop on Security[ expand ]

06:17 [Pub][ePrint]Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Michael Walfish and Victor Vu[ expand ]
03:17 [Pub][ePrint]Adaptively Secure Two-party Computation From Indistinguishability Obfuscation , by Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya[ expand ]
03:17 [Pub][ePrint]Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Antigoni Polychroniadou[ expand ]

16:33 [Event][New]SECITC '15: 8th Int'l Conference on Security for Information Technology&Communications[ expand ]
16:33 [Job][New]Postdoctoral Researcher (Drone Security), University College Cork, Ireland[ expand ]