International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
21:17 [Pub][ePrint]Protecting Encrypted Cookies from Compression Side-Channel Attacks, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
06:31 [Event][New]IoTPTS 2015: ASIACCS Workshop on IoT Privacy, Trust, and Security[ expand ]

21:17 [Pub][ePrint]Crypto-analyses on \"secure and efficient privacy-preserving public auditing scheme for cloud storage\", by Yalin Chen and Jue-Sam Chou*[ expand ]
18:17 [Pub][ePrint]Differential Cryptanalysis of SipHash, by Christoph Dobraunig and Florian Mendel and Martin Schläffer[ expand ]
18:17 [Pub][ePrint]On Shor\'s Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers, by Zhengjun Cao and Zhenfu Cao[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Constrained Pseudorandom Functions, by Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters[ expand ]
18:17 [Pub][ePrint]Bivariate Polynomials Modulo Composites and their Applications, by Dan Boneh and Henry Corrigan-Gibbs[ expand ]
18:17 [Pub][ePrint]Square Span Programs with Applications to Succinct NIZK Arguments, by George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss[ expand ]
18:17 [Pub][ePrint]How to Split a Secret into Unknown Shares, by Ruxandra F. Olimid[ expand ]
18:17 [Pub][ePrint]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment, by Amir Moradi[ expand ]
18:17 [Pub][ePrint]Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment\', by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]
18:17 [Pub][ePrint]A comprehensive empirical comparison of parallel ListSieve and GaussSieve, by Artur Mariano and Ozgur Dagdelen and Christian Bischof[ expand ]
09:18 [Job][New]Research Fellowship Scheme, Queen’s University Belfast, UK[ expand ]
07:44 [Pub]Proceedings of CHES 2014 available online[ expand ]

15:17 [Event][New]Eurocrypt 2015: Eurocrypt 2015[ expand ]
01:14 [Job][New]PhD Positions, Southern Illinois University Carbondale, USA[ expand ]

09:17 [Pub][ePrint]Co-Location-Resistant Clouds, by Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd[ expand ]
09:17 [Pub][ePrint]Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks, by Mohammad Wazid[ expand ]

09:17 [Pub][ePrint]New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\\mathbb{F}_2$, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle, by Yehuda Lindell[ expand ]
01:42 [Event][New]CPSS'15: 1st Cyber-Physical System Security Workshop[ expand ]

16:02 [News]President\'s message 9/2014[ expand ]
15:17 [PhD][New]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]
15:15 [PhD][New]Carolyn Whitnall: Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation[ expand ]

09:17 [Pub][ePrint]A Note on Quantum Security for Post-Quantum Cryptography, by Fang Song[ expand ]
09:17 [Pub][ePrint]Formal Treatment of Privacy-Enhancing Credential Systems, by Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen[ expand ]
09:17 [Pub][ePrint]Analysis Of Variance and CPA in SCA, by Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philipp[ expand ]
09:17 [Pub][ePrint]The Feasibility of Outsourced Database Search in the Plain Model, by Carmit Hazay and Hila Zarosim[ expand ]
09:17 [Pub][ePrint]Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lu[ expand ]
03:15 [Job][New]Ph.D. student in Theoretical Computer Science, CWI / University of Amsterdam[ expand ]

01:39 [PhD][Update]Robert Granger: On Small Degree Extension Fields in Cryptology[ expand ]

21:17 [Pub][ePrint]Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version), by Christina Boura and Mar\\\'ia Naya-Plasencia and Valentin Suder[ expand ]
21:17 [Pub][ePrint]HIMMO security, by Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Domingo Gomez-Perez and Jaime Gutierrez[ expand ]
21:17 [Pub][ePrint]A Fully Homomorphic Encryption Scheme with Better Key Size, by Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song[ expand ]
21:17 [Pub][ePrint]Linearity Measures for MQ Cryptography, by Simona Samardjiska and Danilo Gligoroski[ expand ]
21:17 [Pub][ePrint]Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques, by Benoit Feix and Hugues Thiebeauld[ expand ]
21:17 [Pub][ePrint]An Practical Iterative Side Channel Cube Attack on AES-128/256, by Erfan Aghaee and Majid Rahimi and Hamed Yusefi[ expand ]
21:17 [Pub][ePrint]Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures, by Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu[ expand ]

17:47 [Event][New]SCC '15: The Third International Workshop on Security in Cloud Computing[ expand ]
16:53 [Event][New]RWC2015: Real World Cryptography Workshop 2015[ expand ]
12:17 [Pub][ePrint]Security Proofs for the BLT Signature Scheme, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
12:17 [Pub][ePrint]Proof of Proximity of Knowledge, by Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Malicious Hashing: Eve\'s Variant of SHA-1, by Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
09:17 [Pub][ePrint]Optimal Proximity Proofs, by Ioana Boureanu and Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead, by Enrique Larraia[ expand ]
09:17 [Pub][ePrint]Integration of hardware tokens in the Idemix library, by Antonio de la Piedra[ expand ]
06:17 [Pub][ePrint]Efficient Interval Check in the Presence of Malicious Adversaries, by Genqiang Wu and Yeping He and Yi Lu and Liping Ding[ expand ]
06:17 [Pub][ePrint]Efficient Implementation of Keyless Signatures with Hash Sequence Authentication, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
06:17 [Pub][ePrint]Analytic Toolbox for White-Box Implementations: Limitation and Perspectives, by Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong[ expand ]