International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14
23:42 [Election]IACR 2014 Election: Nominations open[ expand ]
21:17 [Pub][ePrint]Efficient Oblivious Parallel Array Reads and Writes for Secure Multiparty Computation, by Peeter Laud[ expand ]
21:17 [Pub][ePrint]Realizing two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger[ expand ]
21:17 [Pub][ePrint]An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency, by Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai[ expand ]
21:17 [Pub][ePrint]On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption, by Debrup Chakraborty and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs, by Daniel Genkin and Itamar Pipman and Eran Tromer[ expand ]
01:05 [Event][New]HOST '15: IEEE International Symposium on Hardware-Oriented Security and Trust[ expand ]

15:54 [Job][New]Postdoc position at the Center for the Theory of Interactive Computation (CTIC), Aarhus University[ expand ]
15:54 [Event][New]EEETEM2015: The International Conference on Electrical and Electronic Engineering Telec[ expand ]

02:17 [Event][New]DIPDMWC: The International Conference on Digital Information Processing, Data Mining[ expand ]

15:17 [Pub][ePrint]Pretty Understandable Democracy 2.0, by Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach[ expand ]

18:18 [Job][New]Security Architect, Nagravision, Cheseaux - Switzerland[ expand ]
00:17 [Pub][ePrint]Fully Secure Attribute Based Encryption from Multilinear Maps, by Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry[ expand ]
00:17 [Pub][ePrint]Privacy and Imperfect Randomness, by Yevgeniy Dodis and Yanqing Yao[ expand ]
00:17 [Pub][ePrint]Expressive and Secure Searchable Encryption in the Public Key Setting, by Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng[ expand ]
00:17 [Pub][ePrint]A Security Analysis of the Composition of ChaCha20 and Poly1305, by Gordon Procter[ expand ]
00:17 [Pub][ePrint]Nearly Practical and Privacy-Preserving Proofs on Authenticated Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
00:17 [Pub][ePrint]KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes, by Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao[ expand ]
00:17 [Pub][ePrint]The M3dcrypt Password Scheme, by Isaiah Makwakwa[ expand ]
00:17 [Pub][ePrint]THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER, by Mohammad Sadegh Nemati Nia, Ali Payandeh[ expand ]
00:17 [Pub][ePrint]Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender, by Florian Böhl and Simon Greiner and Patrik Scheidecker[ expand ]
00:17 [Pub][ePrint]Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe, by zhen Liu and Duncan S. Wong[ expand ]
00:17 [Pub][ePrint]Attribute-Based Encryption Optimized for Cloud Computing, by Máté Horváth[ expand ]
00:17 [Pub][ePrint]Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality, by Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ost[ expand ]
00:17 [Pub][ePrint](Nothing else) MATor(s): Monitoring the Anonymity of Tor\'s Path Selection, by Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi[ expand ]
00:17 [Pub][ePrint]Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation, by Shlomi Dolev and Niv Giboa and Ximing Li[ expand ]
00:17 [Pub][ePrint]Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation, by Craig Gentry[ expand ]

21:17 [Pub][ePrint]Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps, by Ferucio Laurentiu Tiplea and Constantin Catalin Dragan[ expand ]
21:17 [Pub][ePrint]Adding Controllable Linkability to Pairing-Based Group Signatures For Free, by Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer[ expand ]
21:17 [Pub][ePrint]A Multi-Function Provable Data Possession Scheme in Cloud Computing, by Xiaojun Yu and Qiaoyan Wen[ expand ]
21:17 [Pub][ePrint]On the Limits of Computational Fuzzy Extractors, by Kenji Yasunaga and Kosuke Yuzawa[ expand ]
21:17 [Pub][ePrint]SPOKE: Simple Password-Only Key Exchange in the Standard Model, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
21:17 [Pub][ePrint]Private Web Search with Constant Round Efficiency, by Heeyeon Joo and Myungsun Kim[ expand ]

15:17 [Pub][ePrint]Recursive Trees for Practical ORAM, by Tarik Moataz and Erik-Oliver Blass and Guevara Noubir[ expand ]
06:17 [Pub][ePrint]DTKI: a new formalized PKI with no trusted parties, by Jiangshan Yu and Vincent Cheval and Mark Ryan[ expand ]
06:17 [Pub][ePrint]A Cryptographic Study of Tokenization Systems, by Sandra D\\\'iaz-Santiago and Lil Mar\\\'ia Rodr\\\'iguez-Henr\\\'iquez and Debrup Chakraborty[ expand ]
06:17 [Pub][ePrint]Adaptive versus Static Security in the UC Model, by Ivan Damgård and Jesper Buus Nielsen[ expand ]

15:54 [Event][New]Inscrypt 2014: The 10th International Conference on Information Security and Cryptology[ expand ]

23:09 [Event][New]WCC 2015: The 9th International Workshop on Coding and Cryptography[ expand ]

17:28 [Event][New]CT-RSA 2015: RSA Conference 2015 Cryptographers' Track[ expand ]
16:59 [Job][New]Cryptography Engineer, Nagravision, Cheseaux - Switzerland[ expand ]
16:58 [Job][Update]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:58 [Job][New]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:57 [Event][New]EBECEGC2015: The International Conference on Electrical and Bio-medical Engineering, Cle[ expand ]

21:17 [Pub][ePrint]Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, by Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Garbled Circuits Without Privacy with Applications To Efficient Zero-Knowledge, by Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi[ expand ]
21:17 [Pub][ePrint]Strong Externalized Universal Composabilit / Generalized UC Revisited, by Jesper Buus Nielsen and Mario Strefler[ expand ]
21:17 [Pub][ePrint]Secure Fingerprint Identification of High Accuracy, by Marina Blanton and Siddharth Saraph[ expand ]
21:17 [Pub][ePrint]Scalable Zero Knowledge via Cycles of Elliptic Curves, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]

21:40 [Job][New]Ph.D. student, Department of Informatics, University of Bergen, Norway[ expand ]