International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
00:17 [Pub][ePrint]Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter[ expand ]

09:17 [Pub][ePrint]New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\\Sigma \\Pi$PKC, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai[ expand ]
09:17 [Pub][ePrint]Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz[ expand ]
01:45 [Event][New]FC '15: Financial Cryptography and Data Security 2015[ expand ]

18:17 [Pub][ePrint]Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker[ expand ]
06:29 [Event][New]NWC: National Workshop on Cryptology[ expand ]

18:17 [Pub][ePrint]A Security Definition for Multi Secret Sharing and a Scheme Based on LWE, by Massoud Hadian Dehkordi and Reza Ghasemi[ expand ]
06:16 [Job][New]Tenure Track Positions in Computer Eng, CS and IT, University of Washington, Tacoma[ expand ]

21:17 [Pub][ePrint]Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA, by Aleksandar Kircanski[ expand ]
21:17 [Pub][ePrint]hHB: a Harder HB+ Protocol, by Ka Ahmad Khoureich[ expand ]
21:17 [Pub][ePrint]Performance Increasing Approaches For Binary Field Inversion, by Vladislav Kovtun and Maria Bulakh[ expand ]
21:17 [Pub][ePrint]An Investigation of Some Forward Security Properties for PEKS and IBE, by Qiang Tang[ expand ]
21:17 [Pub][ePrint]Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Double shielded Public Key Cryptosystems, by Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang[ expand ]
21:17 [Pub][ePrint]Round-Efficient Black-Box Construction of Composable Multi-Party Computation, by Susumu Kiyoshima[ expand ]
15:17 [Pub][ePrint]Securing Cloud Data in the New Attacker Model, by Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]General Statistically Secure Computation with Bounded-Resettable Hardware Tokens, by Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges[ expand ]
15:17 [Pub][ePrint]On Virtual Grey Box Obfuscation for General Circuits, by Nir Bitansky and Ran Caentti and Yael Tauman-Kalai and Omer Paneth[ expand ]
15:17 [Pub][ePrint]A Simpler Variant of Universally Composable Security for Standard Multiparty Computation, by Ran Canetti and Asaf Cohen and Yehuda Lindell[ expand ]
15:17 [Pub][ePrint]Efficient Record-Level Keyless Signatures for Audit Logs, by Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards[ expand ]
09:17 [Pub][ePrint]Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation, by Daniel Augot and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Function-Private Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Gil Segev[ expand ]
09:17 [Pub][ePrint]New Attacks on the RSA Cryptosystem, by Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig[ expand ]
09:17 [Pub][ePrint]Implicit factorization of unbalanced RSA moduli, by Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin[ expand ]
09:17 [Pub][ePrint]Authentication Schemes Based on Resilient Maps, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]
09:17 [Pub][ePrint]Anonymous and Publicly Linkable Reputation Systems, by Johannes Blömer and Jakob Juhnke and Christina Kolb[ expand ]
09:17 [Pub][ePrint]Solving closest vector instances using an approximate shortest independent vectors oracle, by Chengliang Tian and Wei Wei and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Secure Mutual Testing Strategy for Cryptographic SoCs, by Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]A Practical Second-Order Fault Attack against a Real-World Pairing Implementation, by Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert[ expand ]
09:17 [Pub][ePrint]On the Multi-output Filtering Model and Its Applications, by Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu[ expand ]
09:17 [Pub][ePrint]EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor, by Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto[ expand ]
09:17 [Pub][ePrint]Optimized Architecture for AES, by Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey[ expand ]
09:17 [Pub][ePrint]Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption, by Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang[ expand ]
09:17 [Pub][ePrint]A Secure Cloud-based NFC Mobile Payment Protocol , by pardis pourghomi and muhammad qasim saeed and george ghinea[ expand ]

15:25 [Job][New]30+ Open Positions in Crypto & Security, NXP Semiconductors[ expand ]

19:09 [Job][New]Lecturer and Reader (2 positions); PhD positions, The School of Informatics, University of Edinburgh, UK[ expand ]

16:55 [Job][Update]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
13:55 [Job][New]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
11:54 [Event][New]Security and Privacy in Unified Communications: Challenges and Solutions[ expand ]

13:32 [PhD][New]Chester Rebeiro: Analysis of Time Driven Cache Attacks on Block Ciphers[ expand ]

11:49 [Event][New]TrustED 2014: International Workshop on Trustworthy Embedded Devices[ expand ]

16:05 [Job][Update]Research Associate, University of New Brunswick, Fredericton, Canada[ expand ]
16:05 [Job][New]Research Associate, University of New Brunswick, Fredericton, Canada[ expand ]
15:17 [Job][New]Doctoral Researcher in the collaborative research center CROSSING, Technische Universität Darmstadt, Germany[ expand ]
15:16 [Job][New]Full-Time PhD Position in Cryptographic Protocol Design, University of Twente, The Netherlands[ expand ]
08:40 [Event][New]Cryptography Summer School[ expand ]
08:34 [Event][New]AsiaCCS'15: 10th ACM Symposium on Information, Computer and Communications Security[ expand ]
08:06 [Event][New]FSE 2015: 22nd International Workshop on Fast Software Encryption[ expand ]

18:17 [Pub][ePrint]Constrained Verifiable Random Functions, by Georg Fuchsbauer[ expand ]