International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15
06:17 [Pub][ePrint]Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Michael Walfish and Victor Vu[ expand ]
03:17 [Pub][ePrint]Adaptively Secure Two-party Computation From Indistinguishability Obfuscation , by Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya[ expand ]
03:17 [Pub][ePrint]Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Antigoni Polychroniadou[ expand ]

16:33 [Event][New]SECITC '15: 8th Int'l Conference on Security for Information Technology&Communications[ expand ]
16:33 [Job][New]Postdoctoral Researcher (Drone Security), University College Cork, Ireland[ expand ]
15:17 [Pub][ePrint]Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator, by Jun Xu, Lei Hu, Zhangjie Huang[ expand ]
15:17 [Pub][ePrint]Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Constrained PRFs for Unbounded Inputs, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa[ expand ]
15:17 [Pub][ePrint]SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, by Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]An Improved Transformation between HILL and Metric Conditional Pseudoentropy, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism, by David Galindo and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation, by Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman[ expand ]
12:17 [Pub][ePrint]Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi[ expand ]

17:13 [Event][New]CS2 2015: Second Workshop on Cryptography and Security in Computing Systems[ expand ]

18:17 [Pub][ePrint]Requirements for Standard Elliptic Curves, by Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze[ expand ]
16:50 [Job][New]Post-Doc, Commissariat à l\'Energie Atomique (French DoE), Paris area, France[ expand ]
16:02 [News]IACR webserver no longer supports SSLv2 and SSLv3[ expand ]
03:18 [Event][New]CHES 2015: Cryptographic Hardware and Embedded Systems[ expand ]

17:44 [Election]IACR 2014 Election: Vote now![ expand ]

20:00 [Event][New]IEEE S&P 2015: IEEE Symposium on Security and Privacy[ expand ]
09:05 [Job][New]PhD Student, RMIT University, Melbourne, Australia[ expand ]

14:16 [Job][New]Post-Doc Fully Homomorphic Encryption, University of Bristol[ expand ]
12:17 [Pub][ePrint]Tweaks and Keys for Block Ciphers: the TWEAKEY Framework, by Jérémy Jean and Ivica Nikolić and Thomas Peyrin[ expand ]
12:17 [Pub][ePrint]Adaptively Secure UC Constant Round Multi-Party Computation Protocols, by Ivan Damgaard and Antigoni Polychroniadou and Vanishree Rao[ expand ]
12:17 [Pub][ePrint]Additively Homomorphic UC commitments with Optimal Amortized Overhead, by Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti[ expand ]
12:17 [Pub][ePrint]Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor\'s Algorithm, by Zhengjun Cao and Zhenfu Cao and Lihua Liu[ expand ]
09:38 [Job][Update]Tenure-Track Faculty Positions, Shanghai Jiao Tong University, Shanghai, China[ expand ]
09:34 [Job][New]Post Doc, Université de Caen Basse-Normandie[ expand ]

15:17 [Forum][2013 Reports] 2013/235 by Ben.Smyth[ expand ]
03:17 [Pub][ePrint]Interactive Coding for Interactive Proofs, by Yevgeniy Dodis and Allison Bishop Lewko[ expand ]
03:17 [Pub][ePrint]Learning with Errors in the Exponent, by Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert[ expand ]
03:17 [Pub][ePrint]Towards Optimal Bounds for Implicit Factorization Problem, by Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin[ expand ]
03:17 [Pub][ePrint]Accountable Tracing Signatures, by Markulf Kohlweiss and Ian Miers[ expand ]
03:17 [Pub][ePrint]On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries, by Rafael Dowsley and Anderson C. A. Nascimento[ expand ]
03:17 [Pub][ePrint]Ballot secrecy with malicious bulletin boards, by Ben Smyth[ expand ]
03:17 [Pub][ePrint]Non-malleable Reductions and Applications, by Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski[ expand ]
03:17 [Pub][ePrint]Operational Signature Schemes, by Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schroeder[ expand ]
03:17 [Pub][ePrint]Riding on Asymmetry: Efficient ABE for Branching Programs, by Sergey Gorbunov and Dhinakaran Vinayagamurthy[ expand ]
00:17 [Pub][ePrint]Circulant Matrices and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Optimized Karatsuba Squaring on 8-bit AVR Processors, by Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim[ expand ]
00:17 [Pub][ePrint]FHE Bootstrapping in less than a second, by Léo Ducas and Daniele Micciancio[ expand ]
00:17 [Pub][ePrint]A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves, by Palash Sarkar and Shashank Singh[ expand ]
00:17 [Pub][ePrint]Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing, by Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina[ expand ]
00:17 [Pub][ePrint]Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, by Dario Catalano and Dario Fiore[ expand ]
00:17 [Pub][ePrint]Search-and-compute on Encrypted Data, by Jung Hee Cheon and Miran Kim and Myungsun Kim[ expand ]
00:17 [Pub][ePrint]A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems, by Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae[ expand ]
00:17 [Pub][ePrint]Simulation-Based Secure Functional Encryption in the Random Oracle Model, by Vincenzo Iovino and Karol Zebrowski[ expand ]