International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
2014-11-01
03:17 [Pub][ePrint]How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz[ expand ]
00:17 [Pub][ePrint]Falcon Codes: Fast, Authenticated LT Codes, by Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos[ expand ]


2014-10-31
16:43 [Event][New][Extension] SI Security and Privacy in Unified Communications[ expand ]
16:42 [Job][New]Principal Solution Specialist - Encryption, SafeNet [ expand ]
16:41 [Job][New]Post-Doc, Nanyang Technological University, Singapore[ expand ]
15:17 [Pub][ePrint]The Power of Negations in Cryptography, by Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen[ expand ]
00:17 [Pub][ePrint]A Practical Attack Against the HIVE Hidden Volume Encryption System, by Kenneth G. Paterson and Mario Strefler[ expand ]
00:17 [Pub][ePrint]Some Security Results of the RC4 + Stream Cipher, by Subhadeep Banik and Sonu Jha[ expand ]


2014-10-30
15:17 [Pub][ePrint]Side Channel Power Analysis of an AES-256 Bootloader, by Colin O\'Flynn and Zhizhang Chen[ expand ]
15:17 [Pub][ePrint]A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme, by Eduardo Morais and Ricardo Dahab[ expand ]
15:17 [Pub][ePrint]Leveled Fully Homomorphic Signatures from Standard Lattices, by Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Efficiently Making Secure Two-Party Computation Fair, by Handan Kılınç and Alptekin Küpçü[ expand ]
15:17 [Pub][ePrint]Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion, by Kerry A. McKay and Poorvi L. Vora[ expand ]
15:17 [Pub][ePrint]THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS, by Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan[ expand ]
15:17 [Pub][ePrint]Advanced Algebraic Attack on Trivium, by Frank Quedenfeld and Christopher Wolf[ expand ]
15:17 [Pub][ePrint]Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014, by Georg Fuchsbauer[ expand ]
15:17 [Pub][ePrint]Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity, by Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures, by Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings, by Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]Distance Lower Bounding, by Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi[ expand ]
15:17 [Pub][ePrint]Hardware Implementation of Secure Shamir\'s Secret Sharing Scheme , by Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky[ expand ]
15:17 [Pub][ePrint]Accountable Storage, by Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia[ expand ]
15:17 [Pub][ePrint]Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, by Omar Choudary and Markus G. Kuhn[ expand ]
15:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack , by Pei Luo and Yunsi Fei[ expand ]


2014-10-29
18:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]


2014-10-28
21:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]
21:17 [Pub][ePrint]Obfuscation of Probabilistic Circuits and Applications, by Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan[ expand ]
21:17 [Pub][ePrint]Overview of the Candidates for the Password Hashing Competition -- And their Resistance against Garbage-Collector Attacks, by Stefan Lucks and Jakob Wenzel[ expand ]
21:17 [Pub][ePrint]Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective, by Joppe W. Bos and Michael Naehrig and Joop van de Pol[ expand ]
21:17 [Pub][ePrint]Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Protecting obfuscation against arithmetic attacks, by Eric Miles and Amit Sahai and Mor Weiss[ expand ]
18:17 [Pub][ePrint]CM55: special prime-field elliptic curves almost optimizing den Boer\'s reduction between Diffie-Hellman and discrete logs, by Daniel R. L. Brown[ expand ]
18:17 [Pub][ePrint]UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
16:08 [Event][New]DBSec 2015: 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]
16:02 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Corp, Arlington, VA[ expand ]
03:55 [News]Video of IACR Distinguished Lecture[ expand ]



2014-10-27
18:38 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA- i_SW Corporation[ expand ]


2014-10-25
17:20 [Event][New]CECC '15: 15th Central European Conference on Cryptology[ expand ]
06:17 [Pub][ePrint]Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES, by Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding[ expand ]


2014-10-23
00:17 [Pub][ePrint]Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas[ expand ]


2014-10-22
21:17 [Pub][ePrint]Bootstrapping for HElib, by Shai Halevi and Victor Shoup[ expand ]
21:17 [Pub][ePrint]Recent Results in Scalable Multi-Party Computation, by Jared Saia and Mahdi Zamani[ expand ]
21:17 [Pub][ePrint]An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov[ expand ]
21:17 [Pub][ePrint]Dynamic Behavior of RS latches using FIB processing and probe connection, by Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto[ expand ]
21:17 [Pub][ePrint]Exponent Blinding May Not Prevent Timing Attacks on RSA, by Werner Schindler[ expand ]
21:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions, by Ilan Komargodski and Gil Segev and Eylon Yogev[ expand ]
21:17 [Pub][ePrint]Random Oracle Uninstantiability from Indistinguishability Obfuscation, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Bj\\\"orn Tackmann and Daniele Venturi[ expand ]
21:17 [Pub][ePrint]Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation, by Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti[ expand ]
21:17 [Pub][ePrint]How to Choose Interesting Points for Template Attack More Effectively?, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng[ expand ]