International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
13:17 [Pub][ePrint]On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks, by Benoît Cogliati and Yannick Seurin[ expand ]
13:17 [Pub][ePrint]A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, by Gregor Leander and Brice Minaud and Sondre Rønjom[ expand ]
13:17 [Pub][ePrint]An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting, by Susumu Kiyoshima[ expand ]
13:17 [Pub][ePrint]Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware, by Tobias Schneider and Amir Moradi and Tim Güneysu[ expand ]
13:17 [Pub][ePrint]A lightweight-friendly modifcation of GOST block cipher, by Andrey Dmukh and Denis Dygin and Grigory Marshalko[ expand ]
13:17 [Pub][ePrint]Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation, by Handan Kılınç and Alptekin Küpçü[ expand ]
13:17 [Pub][ePrint]CamlCrush: A PKCS\\#11 Filtering Proxy, by R. Benadjila and T. Calderon and M. Daubignard[ expand ]
08:06 [Event][New]ICISC 2015: 18th International Conference on Information Security and Cryptology[ expand ]

23:18 [Job][New]Assistant Professor, Kyushu University, Fukuoka (Japan)[ expand ]
23:18 [Job][New]Post-doctoral Researcher and Researcher positions, Microsoft Research, Redmond, Washington[ expand ]

23:16 [Event][New]C2SI-Berger2015: International Conference in Codes, Cryptology and Information Security[ expand ]
13:17 [Pub][ePrint]Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, by Yuval Yarom and Gefei Li and Damith C. Ranasinghe[ expand ]
13:17 [Pub][ePrint]More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries, by Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner[ expand ]
13:17 [Pub][ePrint]Verified Proofs of Higher-Order Masking, by Gilles Barthe and Sonia Bela\\\"id and Fran\\c{c}ois Dupressoir and Pierre-Alain Fouque and Benjamin Gr\\\'egoire and Pierre-Yves Strub[ expand ]
02:35 [Event][New]Cyber Security in the Critical Infrastructure: Advances and Future Direction[ expand ]
02:28 [Event][New]Cloud Cryptography: State of the Art and Recent Advances[ expand ]

23:57 [Job][New]1 PhD student, 2 Postdocs , Graz University of Technology[ expand ]
16:17 [Pub][ePrint]Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation, by Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam[ expand ]
16:17 [Pub][ePrint]Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems, by Berry Schoenmakers and Meilof Veeningen[ expand ]
16:17 [Pub][ePrint]Cold Boot Attacks in the Discrete Logarithm Setting, by Bertram Poettering and Dale L. Sibborn[ expand ]

02:17 [Job][New]2 x Lectureships (equivalent to assistant professor) in Security of Cyber-Physical Systems, Security Lancaster Research Centre, Lancaster University, UK[ expand ]

16:17 [Pub][ePrint]Better Algorithms for LWE and LWR, by Alexandre Duc and Florian Tramèr and Serge Vaudenay[ expand ]
16:17 [Pub][ePrint]Richer Efficiency/Security Trade-offs in 2PC, by Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek[ expand ]
16:17 [Pub][ePrint]Non-committing encryption from $\\Phi$-hiding, by Brett Hemenway and Rafail Ostrovsky and Alon Rosen[ expand ]

19:17 [Pub][ePrint]Tight Bounds for Keyed Sponges and Truncated CBC, by Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro[ expand ]
19:17 [Pub][ePrint]Interactive Message-Locked Encryption and Secure Deduplication, by Mihir Bellare and Sriram Keelveedhi[ expand ]
19:17 [Pub][ePrint]Improved Meet-in-the-Middle Distinguisher on Feistel Schemes, by Li Lin, Wenling Wu[ expand ]
19:17 [Pub][ePrint]Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability, by Carla Ràfols[ expand ]
19:17 [Pub][ePrint]On Solving Lpn using BKW and Variants, by Sonia Bogos and Florian Tramer and Serge Vaudenay[ expand ]
19:17 [Pub][ePrint]On Obfuscation with Random Oracles, by Ran Canetti and Yael Tauman Kalai and Omer Paneth[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Encryption Scheme from DDH, by Guilhem Castagnos and Fabien Laguillaumie[ expand ]

10:17 [Pub][ePrint]On the concrete hardness of Learning with Errors, by Martin R. Albrecht and Rachel Player and Sam Scott[ expand ]
10:17 [Pub][ePrint]Reliable Information Extraction for Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
10:17 [Pub][ePrint]Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms, by Binanda Sengupta and Abhijit Das[ expand ]
10:17 [Pub][ePrint]Group Signature with Deniability: How to Disavow a Signature, by Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka[ expand ]

09:23 [Event][New]GenoPri'15: 2nd International Workshop on Genome Privacy and Security[ expand ]

12:56 [Job][New]Post-Doc, AIT Austrian Institute of Technology[ expand ]

10:17 [Pub][ePrint]High Performance Lattice-based CCA-secure Encryption, by Rachid El~Bansarkhani and Johannes Buchmann[ expand ]
10:17 [Pub][ePrint]Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP, by Artur Mariano and Thijs Laarhoven and Christian Bischof[ expand ]
10:17 [Pub][ePrint]Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN, by Zahra Ahmadian and Sahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref[ expand ]
10:17 [Pub][ePrint]Type-Based Verification of Electronic Voting Protocols, by Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling[ expand ]

15:33 [Event][New]IEEE CNS 2015: 3rd IEEE Conference on Communications and Network Security[ expand ]
15:32 [Event][New]ARES: 10th International Conference on Availability, Reliability and Security[ expand ]
15:31 [Event][New]ECC: Workshop on Elliptic Curve Cryptography Standards[ expand ]
10:17 [Pub][ePrint]Aggregate Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]

19:17 [Pub][ePrint]Aggregatable Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol, by Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza [ expand ]
19:17 [Pub][ePrint]Faster software for fast endomorphisms, by Billy Bob Brumley[ expand ]
19:17 [Pub][ePrint]Cryptographically Secure CRC for Lightweight Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
19:17 [Pub][ePrint]Suit up! Made-to-Measure Hardware Implementations of Ascon, by Hannes Gro{\\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\\\"o}fer[ expand ]