International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEJoCJobNewNewsPKCPhDPubReviewTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11
2013-01-12
10:17 [Pub][ePrint]Efficiently Outsourcing Multiparty Computation under Multiple Keys, by Andreas Peter and Erik Tews and Stefan Katzenbeisser[ expand ]
10:17 [Pub][ePrint]Tropical cryptography, by Dima Grigoriev and Vladimir Shpilrain[ expand ]
10:17 [Pub][ePrint]Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity., by James McLaughlin and John A. Clark[ expand ]
10:17 [Pub][ePrint]Simultaneous Resettable WI from One-way Functions, by Kai-Min Chung and Rafael Pass[ expand ]
10:17 [Pub][ePrint]Achieving Anonymity Against Major Face Recognition Algorithms, by Benedikt Driessen and Markus Dürmuth[ expand ]
10:17 [Pub][ePrint]Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security, by Kai-Min Chung and Rafael Pass and Karn Seth[ expand ]


2013-01-11
22:17 [Pub][ePrint]Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA, by Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Raba^a, Ammar Bouallegue and Faouzi Chekir[ expand ]
22:17 [Pub][ePrint]Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices, by Damien Stehlé and Ron Steinfeld[ expand ]
22:17 [Pub][ePrint]A Matrix Approach for Constructing Quadratic APN Functions, by Yuyin Yu and Mingsheng Wang and Yongqiang Li[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, by Qingfeng Cheng[ expand ]


2013-01-07
13:55 [Event][New]Asiacrypt: Asiacrypt 2013[ expand ]
13:54 [Event][New]Asiacrypt: Asiacrypt[ expand ]
13:23 [PhD][Update]Dries Schellekens: Design and Analysis of Trusted Computing Platforms[ expand ]
13:13 [PhD][New]Dries Schellekens: Design and Analysis of Trusted Computing Platforms[ expand ]
10:47 [PhD][New]Junko Takahashi: Security Evaluation of Side-Channel Resistance for Symmetric Ciphers Using Experimental and Theoretical Approaches[ expand ]
06:25 [Job][New]Research + Teaching Assistant / Ph.D. student, University of Applied Sciences Offenburg, Germany[ expand ]
06:15 [PhD][New]Yang Li: New Fault-Based Physical Attacks and Their Countermeasures[ expand ]
06:15 [PhD][New]Edoardo Persichetti: Improving the Efficiency of Code-Based Cryptography[ expand ]
06:14 [PhD][Update]Dwaine Clarke: Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]


2013-01-05
16:17 [Pub][ePrint]On Formal Expressions of BRW-polynomials, by Guillermo Morales-Luna[ expand ]


2013-01-04
22:17 [Pub][ePrint]Generalized (Identity-Based) Hash Proof System and Its Applications , by Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao[ expand ]
22:17 [Pub][ePrint]Shielding circuits with groups, by Eric Miles and Emanuele Viola[ expand ]



2013-01-03
15:11 [Job][New]Post-Doc, University of Twente, the Netherlands[ expand ]
15:03 [Event][New]PETS'13: Privacy Enhancing Technologies Symposium[ expand ]
15:03 [Event][New]WISTP '03: Seventh Workshop in Information Security Theory and Practices[ expand ]


2013-01-01
16:17 [Pub][ePrint]Defensive Leakage Camouflage, by E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin[ expand ]
16:17 [Pub][ePrint]Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond, by Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich[ expand ]
16:17 [Pub][ePrint]Non-Interactive Key Exchange, by Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson[ expand ]
16:17 [Pub][ePrint]Time-memory Trade-offs for Near-collisions, by Gaëtan Leurent[ expand ]
16:17 [Pub][ePrint]Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes, by Dalin Chu and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu[ expand ]
16:17 [Pub][ePrint]On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography, by Nir Bitansky and Omer Paneth[ expand ]


2012-12-28
19:17 [Pub][ePrint]A Coding-Theoretic Approach to Recovering Noisy RSA Keys, by Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn[ expand ]
19:17 [Pub][ePrint]On the Impossibility of Sender-Deniable Public Key Encryption, by Dana Dachman-Soled[ expand ]
19:17 [Pub][ePrint]Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting, by Marc Obrador and Paz Morillo and Sandra Guasch[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol, by Qingfeng Cheng[ expand ]


2012-12-27
19:17 [Pub][ePrint]Systematic Treatment of Remote Attestation, by Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik[ expand ]
19:17 [Pub][ePrint]On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis, by Farzaneh Abed and Eik List and Stefan Lucks[ expand ]
19:17 [Pub][ePrint]On the (In)security of Fischlin\'s Paradigm, by Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao[ expand ]
19:17 [Pub][ePrint]Faster index calculus for the medium prime case. Application to a 1175-bit finite field, by Antoine Joux[ expand ]
19:17 [Pub][ePrint]An ideal multi-secret sharing scheme based on minimal privileged coalitions , by Yun Song , Zhihui Li[ expand ]
19:17 [Pub][ePrint]Succinct Non-Interactive Arguments via Linear Interactive Proofs, by Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth[ expand ]
19:17 [Pub][ePrint]Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing, by Jan Camenisch and Anna Lysyanskaya and Gregory Neven[ expand ]
19:17 [Pub][ePrint]Attribute-Based Functional Encryption on Lattices, by Xavier Boyen[ expand ]
19:17 [Pub][ePrint]New Impossible Differential Attack on $\\text{SAFER}_{+}$ and $\\text{SAFER}_{++}$, by Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng[ expand ]
19:17 [Pub][ePrint]Sampling Discrete Gaussians Efficiently and Obliviously, by Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai[ expand ]
19:17 [Pub][ePrint]Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks, by Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis[ expand ]
19:17 [Pub][ePrint]Hardness Preserving Reductions via Cuckoo Hashing, by Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor[ expand ]



2012-12-23
16:51 [Job][New]6-month Internship on Baseband Modem security, Intel Corporation, Hillsboro, Oregon, USA[ expand ]
16:48 [Event][New]ACNS 2013: 11th International Conference on Applied Cryptography and Network Security[ expand ]
16:47 [Event][New]AReS 2013: Eighth International Conference on Availability, Reliability and Security[ expand ]