International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15
2015-05-24
00:49 [Event][New]SPiCy: 1st Workshop on Security and Privacy in Cybermatics[ expand ]


2015-05-22
22:51 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 1 post), NXP Semiconductors, Leuven, Belgium[ expand ]
09:17 [Pub][ePrint]Scalable and private media consumption with Popcorn, by Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish[ expand ]
09:17 [Pub][ePrint]On Black-Box Complexity of Universally Composable Security in the CRS model, by Carmit Hazay and Muthuramakrishnan Venkitasubramaniam[ expand ]
09:17 [Pub][ePrint]Contention in Cryptoland: Obfuscation, Leakage and UCE, by Mihir Bellare, Igors Stepanovs and Stefano Tessaro[ expand ]


2015-05-21
21:17 [Pub][ePrint]How to detect unauthorised usage of a key, by Jiangshan Yu and Mark Ryan and Cas Cremers[ expand ]
21:17 [Pub][ePrint]Turning Online Ciphers Off, by Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam[ expand ]
21:17 [Pub][ePrint]More Rounds, Less Security?, by Jian Guo and J\\\'{e}r\\\'{e}my Jean and Nicky Mouha and Ivica Nikoli\\\'{c}[ expand ]
21:17 [Pub][ePrint]Improved security proofs in lattice-based cryptography: using the R\\\'enyi divergence rather than the statistical distance, by Shi Bai and Adeline Langlois and Tancr{\\`e}de Lepoint and Damien Stehl\[ expand ]
15:17 [Job][New]Lecturer, Royal Holloway, University of London[ expand ]
15:17 [Event][New]ECC 2015: Summer school of the 19th Workshop on Elliptic Curve Cryptography[ expand ]
09:17 [Pub][ePrint]Time-release Protocol from Bitcoin and Witness Encryption for SAT, by Jia Liu and Flavio Garcia and Mark Ryan[ expand ]


2015-05-20
21:17 [Pub][ePrint]Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers, by Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii[ expand ]
21:17 [Pub][ePrint]Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation, by Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede[ expand ]
21:17 [Pub][ePrint]A Provably Secure Group Signature Scheme from Code-Based Assumptions, by Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]


2015-05-19
21:17 [Pub][ePrint]How to Build Time-Lock Encryption, by Tibor Jager[ expand ]
21:17 [Pub][ePrint]Authentication Key Recovery in Galois/Counter Mode (GCM), by John Mattsson[ expand ]
21:17 [Pub][ePrint]XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, by Bart Mennink[ expand ]
21:17 [Pub][ePrint]Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences, by Eleonora Guerrini and Laurent Imbert and Théo Winterhalter[ expand ]
21:17 [Pub][ePrint]Fully Homomorphic Encryption without bootstrapping, by Masahiro Yagisawa[ expand ]
21:17 [Pub][ePrint]VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS, by Mehak Khurana and Meena Kumari[ expand ]
09:17 [Pub][ePrint]High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer, by Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orl[ expand ]
09:17 [Pub][ePrint]A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs, by Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott[ expand ]
09:17 [Pub][ePrint]On the power of Public-key Functional Encryption with Function Privacy, by Vincenzo Iovino and Qiang Tang and Karol Zebrowski[ expand ]
09:17 [Pub][ePrint]Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications, by Andrew Miller and Rob Jansen[ expand ]



2015-05-18
23:14 [Conf][Crypto]CRYPTO 2015 list of accepted papers[ expand ]
09:17 [Pub][ePrint]The Oblivious Machine - or: How to Put the C into MPC, by Marcel Keller[ expand ]
09:17 [Pub][ePrint]Practical Fully Homomorphic Encryption without Noise Reduction, by Dongxi Liu[ expand ]


2015-05-17
09:17 [Pub][ePrint]Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process, by Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang[ expand ]
09:17 [Pub][ePrint]Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation, by Hwajeong Seo and Zhe Liu and Howon Kim[ expand ]
09:17 [Pub][ePrint]Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies, by Florian Tschorsch and Björn Scheuermann[ expand ]


2015-05-15
16:28 [Event][New]TRUDEVICE: 4th Workshop on Secure Hardware and Security Evaluation[ expand ]
09:17 [Pub][ePrint]Multilinear Maps Using Random Matrix, by Gu Chunsheng[ expand ]
09:17 [Pub][ePrint]Accelerating SWHE based PIRs using GPUs, by Wei Dai, Yarkın Dor\\\"{o}z and Berk Sunar[ expand ]


2015-05-14
17:16 [Job][New]Senior Software / Principal - Security, Apcera - Hybrid Cloud Start-Up San Francisco, CA[ expand ]
17:15 [Job][New]Lecturer, University of Cape Town[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the multilinear map on the ideal lattices, by Jung Hee Cheon and Changmin Lee[ expand ]
15:17 [Pub][ePrint]Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab, by Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi[ expand ]
15:17 [Pub][ePrint]Improved Integral Cryptanalysis of Feistel Structures, by Bing Sun and Xin Hai and Lei Cheng and Zhichao Yang and Wenyu Zhang[ expand ]
15:17 [Pub][ePrint]A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS, by Sheena Sathyan and Shaji R S Professor[ expand ]
15:17 [Pub][ePrint]Generic Conversions from CPA to CCA secure Functional Encryption, by Mridul Nandi and Tapas Pandit[ expand ]
11:44 [Job][New]Research Associate in Information Assurance, University of Luxembourg[ expand ]



2015-05-13
22:09 [Event][New]WEWoRC: 6th Western European Workshop on Research in Cryptology[ expand ]
17:40 [Job][New]Post-Doc, Boston University, MIT, Northeastern, and UConn[ expand ]
12:17 [Pub][ePrint]Collateral damage of Facebook Apps: an enhanced privacy scoring model, by Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel[ expand ]
12:17 [Pub][ePrint]Secure Deduplication of Encrypted Data without Additional Independent Servers, by Jian Liu and N. Asokan and Benny Pinkas[ expand ]
12:17 [Pub][ePrint]A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO, by Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhui[ expand ]
09:17 [Pub][ePrint]An Optimization of Gu Map-1, by Yupu Hu and Huiwen Jia[ expand ]
09:17 [Pub][ePrint]Masks will Fall Off -- Higher-Order Optimal Distinguishers, by Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul[ expand ]
00:17 [Pub][ePrint]On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees, by Sihong Su and Xiaohu Tang[ expand ]