International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
18:00 [News]Call for IACR Cryptology School Proposals[ expand ]
15:09 [Event][New]RCD 2015: 3rd Romanian Cryptology Days Conference[ expand ]

05:08 [Pub][ePrint]ePrint surpasses 1000 papers in 2014[ expand ]
04:17 [Pub][ePrint]CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication, by Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Michael J. Freedman and Edward W. Felten[ expand ]
04:17 [Pub][ePrint]COFFE: Ciphertext Output Feedback Faithful Encryption, by Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel[ expand ]
04:17 [Pub][ePrint]Experiments in Encrypted and Searchable Network Audit Logs , by Bhanu Prakash Gopularam and Sashank Dara and Nalini N[ expand ]
04:17 [Pub][ePrint]Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE, by Xiaopeng Yang, Wenping Ma and Chengli Zhang[ expand ]
04:17 [Pub][ePrint]Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions, by Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri[ expand ]
04:17 [Pub][ePrint]First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA, by Yongdae Kim and Hyunsoo Yoon[ expand ]
04:17 [Pub][ePrint]Hierarchical deterministic Bitcoin wallets that tolerate key leakage, by Gus Gutoski and Douglas Stebila[ expand ]
04:17 [Pub][ePrint]Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM, by Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Sriniv[ expand ]
04:17 [Pub][ePrint]Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves, by Maike Massierer[ expand ]
04:17 [Pub][ePrint]Partial Garbling Schemes and Their Applications, by Yuval Ishai and Hoeteck Wee[ expand ]
04:17 [Pub][ePrint]Two novel applications of bilinear groups to ABE encryption, by Riccardo Longo and Chiara Marcolla and Massimiliano Sala[ expand ]
04:17 [Pub][ePrint]How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA, by Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer[ expand ]
04:17 [Pub][ePrint]Incentivized Outsourced Computation Resistant to Malicious Contractors, by Alptekin Kupcu[ expand ]
04:17 [Pub][ePrint]Constant Round Concurrent Zero-knowledge from Indistinguishability Obfuscation, by Kai-Min Chung and Huijia Lin and Rafael Pass[ expand ]
04:17 [Pub][ePrint]Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations, by Pille Pullonen and Sander Siim[ expand ]
04:17 [Pub][ePrint]Controlled Homomorphic Encryption: Definition and Construction, by Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti[ expand ]
04:17 [Pub][ePrint]Armadillo: a compilation chain for privacy preserving applications, by Sergiu Carpov and Paul Dubrulle and Renaud Sirdey[ expand ]
04:17 [Pub][ePrint]Cryptanalysis of Full PRIDE Block Cipher, by Yibin Dai and Shaozhen Chen[ expand ]
02:07 [PhD][Update]Vijayakrishnan Pasupathinathan: Hardware-based Identification and Authentication Systems[ expand ]
02:05 [PhD][Update]Mike Rosulek: The Structure of Secure Multi-Party Computation[ expand ]

19:53 [Job][New]Assistant Professor in Computer Science with Specialization in Computer Security, KTH Royal Institute of Technology[ expand ]
19:07 [Job][New]PhD Student, Worcester Polytechnic Institute, United States[ expand ]

17:15 [Job][New]Post-Doc, Université Libre de Bruxelles[ expand ]
06:09 [PhD][New]Sareh Emami: Security Analysis of Cryptographic Algorithms[ expand ]
06:07 [PhD][New]Anderson C. A. Nascimento: Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols[ expand ]
06:07 [PhD][New]Hideki Imai[ expand ]
06:04 [PhD][Update]Christophe Tartary: Authentication for Multicast Authentication[ expand ]

17:39 [Job][New]Postdoc, Microsoft Research[ expand ]

17:53 [Event][New]EUSIPCO: European Signal Processing Conference, Information Forensics and Security[ expand ]

18:59 [PhD][New]Josef Pieprzyk[ expand ]
18:58 [PhD][New]Md Mokammel Haque: Lattice-based Cryptanalysis for Secure Cryptosystems[ expand ]
18:57 [PhD][New]Miklos Santha[ expand ]
18:57 [PhD][Update]Henri Gilbert: Cryptanalyse des algorithmes de chiffrement symétrique[ expand ]
15:32 [Job][New]Ph.D. student and Post-Doc, University of Luxembourg[ expand ]
15:32 [Job][New]Postdoc, Saarland University, Germany[ expand ]
04:17 [Pub][ePrint]Related-Key Differential Attack on Round Reduced RECTANGLE-80, by Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma[ expand ]
04:17 [Pub][ePrint]Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement, by Bartosz Zoltak[ expand ]
04:17 [Pub][ePrint]Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel, by Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert[ expand ]
02:29 [PhD][New]Hassan Jameel Asghar: Design and Analysis of Human Identification Protocols[ expand ]
02:29 [PhD][New]Karine Heydemann[ expand ]
02:29 [PhD][Update]Nicolas Moro: Security of assembly programs against fault attacks on embedded processors[ expand ]

16:17 [Pub][ePrint]Publicly Verifiable Non-Interactive Arguments for Delegating Computation, by Omer Paneth and Guy N. Rothblum[ expand ]
16:17 [Pub][ePrint]A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors, by Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng[ expand ]
16:17 [Pub][ePrint]The Chaining Lemma and its application, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
16:17 [Pub][ePrint]Improved Differential Analysis of Block Cipher PRIDE, by Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma[ expand ]
16:17 [Pub][ePrint]Public Verification of Private Effort, by Giulia Alberini and Tal Moran and Alon Rosen[ expand ]
16:17 [Pub][ePrint]Outlier Privacy, by Edward Lui and Rafael Pass[ expand ]