International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
17:43 [Job][New]Cryptography Security Analyst, UK Security Lab[ expand ]
17:42 [Job][New]Junior professorship with tenure track in computer algebra, University of Ulm, Germany[ expand ]
10:17 [Pub][ePrint]The Related-Key Security of Iterated Even-Mansour Ciphers, by Pooya Farshim and Gordon Procter[ expand ]
10:17 [Pub][ePrint]Balanced Encoding to Mitigate Power Analysis: A Case Study, by Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye[ expand ]

22:01 [Conf][AC]Asiacrypt proceedings available[ expand ]
21:00 [Job][New]Post-Doc, University of Luxembourg[ expand ]
19:17 [Pub][ePrint]Modified Alternating Step Generators with Non-Linear Scrambler, by Robert Wicik and Tomasz Rachwalik and Rafał Gliwa[ expand ]
19:17 [Pub][ePrint]Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, by Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda[ expand ]

23:51 [Job][New]PhD students and Postdoctoral Fellowships in Post-Quantum Cryptography, University of Waterloo[ expand ]
13:17 [Pub][ePrint]Simplification/complication of the basis of prime Boolean ideal, by Alexander Rostovtsev and Anna Shustrova[ expand ]
13:17 [Pub][ePrint]Lattice Point Enumeration on Block Reduced Bases, by Michael Walter[ expand ]
13:17 [Pub][ePrint]The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
13:17 [Pub][ePrint]On a new fast public key cryptosystem, by Samir Bouftass.[ expand ]
13:17 [Pub][ePrint]Boomerang Attack on Step-Reduced SHA-512, by Hongbo Yu, Dongxia Bai[ expand ]
13:17 [Pub][ePrint]EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes, by Georg Fuchsbauer and Christian Hanser and Daniel Slamanig[ expand ]

19:17 [Pub][ePrint]HaTCh: Hardware Trojan Catcher, by Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk[ expand ]
19:17 [Pub][ePrint]Public-Coin Differing-Inputs Obfuscation and Its Applications, by Yuval Ishai, Omkant Pandey, Amit Sahai[ expand ]
19:17 [Pub][ePrint]Garbled RAM From One-Way Functions, by Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro[ expand ]
19:17 [Pub][ePrint]Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
19:17 [Pub][ePrint]Security Analysis of an Authentication Scheme Using Smart Cards, by Gaurav Tiwari and Amit K. Awasthi and Neha Shukla[ expand ]
19:17 [Pub][ePrint]Trapdoor Computational Fuzzy Extractors, by Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas[ expand ]
19:17 [Pub][ePrint]Analysis of Lewko-Sahai-Waters Revocation System , by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]Outsourcing Secure Two-Party Computation as a Black Box, by Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler[ expand ]
19:17 [Pub][ePrint]Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, by Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia[ expand ]

18:10 [Election]IACR election 2014 results[ expand ]

23:09 [Event][New]RFIDsec 2015: 11th Workshop on RFID Security[ expand ]

15:53 [Job][New]PhD Studentship in Security/Privacy, University College London[ expand ]
15:52 [Job][New]Visiting Post-Doc or Ph.D. student, Aalto University School of Science, Helsinki, Finland[ expand ]

16:17 [Pub][ePrint]Efficient Generic Zero-Knowledge Proofs from Commitments, by Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias[ expand ]
16:17 [Pub][ePrint]Certificateless Proxy Re-Encryption Without Pairing, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
16:17 [Pub][ePrint]Bicliques with Minimal Data and Time Complexity for AES (Extended Version $\\star$), by Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya[ expand ]
16:17 [Pub][ePrint]Cryptanalysis of JAMBU, by Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang[ expand ]

17:11 [Event][New]Lightweight Cryptography Workshop 2015[ expand ]
10:17 [Pub][ePrint]Immunizing Multilinear Maps Against Zeroizing Attacks, by Dan Boneh and David J. Wu and Joe Zimmerman[ expand ]
10:17 [Pub][ePrint]Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero, by Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai[ expand ]
10:17 [Pub][ePrint]Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices, by Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois[ expand ]

10:17 [Pub][ePrint]Physical functions : the common factor of side-channel and fault attacks ?, by Bruno Robisson and Hélène Le Bouder[ expand ]
03:52 [Event][New]WiSec 2015: 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks[ expand ]

17:50 [Event][New]FSP 2015: The 2015 International Workshop on Future Security and Privacy[ expand ]
13:17 [Pub][ePrint]Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results, by Keita Emura and Takuya Hayashi[ expand ]
13:17 [Pub][ePrint]Indistinguishability Obfuscation for Turing Machines with Unbounded Memory, by Venkata Koppula and Allison Bishop Lewko and Brent Waters[ expand ]
13:17 [Pub][ePrint]Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields, by Antoine Joux and Cécile Pierrot[ expand ]
13:17 [Pub][ePrint]New Cryptosystem Using The CRT And The Jordan Normal Form, by Hemlata Nagesh and Birendra Kumar Sharma[ expand ]
13:17 [Pub][ePrint]Differential Analysis of Block Ciphers SIMON and SPECK, by Alex Biryukov and Arnab Roy and Vesselin Velichkov[ expand ]

18:03 [Job][New]Post-Doc (Research Fellow), University of Birmingham[ expand ]
18:03 [Job][New]PhD student, Swedish Institute of Computer Science, Security Lab and Lund University[ expand ]
07:17 [Pub][ePrint]Batch NFS, by Daniel J. Bernstein and Tanja Lange[ expand ]
07:17 [Pub][ePrint]Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, by Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert[ expand ]
07:17 [Pub][ePrint]Experimenting with Shuffle Block Cipher and SMT Solvers, by Martin Stanek[ expand ]
07:17 [Pub][ePrint]Web Tap Payment Authentication and Encryption With Zero Customer Effort, by Henry Ng[ expand ]