International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
22:17 [Pub][ePrint]Comment on ``Realization of a scalable Shor algorithm\", by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]$\\Lambda \\circ \\lambda$: A Functional Library for Lattice Cryptography, by Eric Crockett and Chris Peikert[ expand ]
16:17 [Pub][ePrint]Midori: A Block Cipher for Low Energy (Extended Version), by Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni[ expand ]
13:17 [Pub][ePrint]A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE, by Zhigang Chen and Xinxia Song[ expand ]
10:17 [Pub][ePrint]Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions, by Olivier Blazy and Céline Chevalier and Damien Vergnaud[ expand ]
07:17 [Pub][ePrint]Lattice Attacks on the DGHV Homomorphic Encryption Scheme, by Abderrahmane Nitaj and Tajjeeddine Rachidi[ expand ]
04:17 [Pub][ePrint]libgroupsig: An extensible C library for group signatures, by Jesus Diaz and David Arroyo and Francisco B. Rodriguez[ expand ]
01:17 [Pub][ePrint]Collusion Resistant Aggregation from Convertible Tags, by Iraklis Leontiadis and Ming Li[ expand ]

22:17 [Pub][ePrint]An Inverse-free Single-Keyed Tweakable Enciphering Scheme, by Ritam Bhaumik and Mridul Nandi[ expand ]
19:17 [Pub][ePrint]An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
16:17 [Pub][ePrint]On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks, by Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata[ expand ]
13:17 [Pub][ePrint]Multi-Input Functional Encryption for Unbounded Arity Functions, by Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai[ expand ]
10:17 [Pub][ePrint]A New Factoring Attack on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng and Honggang Hu[ expand ]
10:16 [Job][New]Positions in Applied Cryptography (Based in Hong Kong), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
10:10 [Job][New]PhD student, University of Bristol, Cryptography Group, Side Channel Lab[ expand ]
07:17 [Pub][ePrint]Lightweight CRC-based Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
04:17 [Pub][ePrint]Secret Sharing Schemes with General Access Structures (Full version), by Jian Liu, Sihem Mesnager, and Lusheng Chen[ expand ]
01:17 [Pub][ePrint]Modular Inversion Hidden Number Problem- A Lattice Approach, by Pranjal Dutta[ expand ]

22:17 [Pub][ePrint]Amplifying Side Channels Through Performance Degradation, by Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom[ expand ]
09:25 [Event][New]School on Symmetric Cryptography[ expand ]
09:24 [Event][New]IWSEC'16: The 11th International Workshop on Security[ expand ]

22:17 [Forum][2014 Reports] 2015/1087 may not be secure by zzhang[ expand ]

22:17 [Pub][ePrint]Lucky Microseconds: A Timing Attack on Amazon\'s s2n Implementation of TLS, by Martin R. Albrecht and Kenneth G. Paterson[ expand ]
22:17 [Pub][ePrint]New directions in nearest neighbor searching with applications to lattice sieving, by Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven[ expand ]
10:17 [Pub][ePrint]Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups, by Mikhail Anokhin[ expand ]
05:16 [Event][New]School on Design for a Secure IoT[ expand ]
05:15 [Event][New]ArcticCrypt 2016[ expand ]

22:17 [Pub][ePrint]A Practical Oblivious Map Data Structure with Secure Deletion and History Independence, by Daniel S. Roche and Adam J. Aviv and Seung Geol Choi[ expand ]
22:17 [Pub][ePrint]Practical Order-Revealing Encryption with Limited Leakage, by Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu[ expand ]
16:17 [Pub][ePrint]A Linear Code and its Application into Secret Sharing, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]

01:17 [Pub][ePrint]On Basing Private Information Retrieval on NP-Hardness, by Tianren Liu and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]Gaussian Sampling Precision and Information Leakage in Lattice Cryptography, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, by Anamaria Costache and Nigel P. Smart[ expand ]
01:17 [Pub][ePrint]Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, by Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng[ expand ]
01:17 [Pub][ePrint]Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings, by Hao Chen[ expand ]
01:17 [Pub][ePrint]Unconditionally Secure Computation with Reduced Interaction, by Ivan Damg{\\aa}rd and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen[ expand ]
01:17 [Pub][ePrint]Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Shweta Agrawal and Benoit Libert and Damien Stehle[ expand ]
01:17 [Pub][ePrint]Spacemint: A Cryptocurrency Based on Proofs of Space, by Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gazi[ expand ]
01:17 [Pub][ePrint]Scalable and private media consumption with Popcorn, by Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish[ expand ]
01:17 [Pub][ePrint]Random Linear Code Based Public Key Encryption Scheme RLCE, by Yongge Wang[ expand ]
01:17 [Pub][ePrint]Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM, by Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs[ expand ]
01:17 [Pub][ePrint]Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
01:17 [Pub][ePrint]The BRUTUS Automatic Cryptanalytic Framework: Testing CAESAR Authenticated Encryption Candidates for Weaknesses, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications, by Ming Li and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]The Adjacency Graphs of Some Feedback Shift Registers, by Ming Li and Yupeng Jiang and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs, by Helger Lipmaa[ expand ]
01:17 [Pub][ePrint]Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, by Koji Nuida[ expand ]
01:17 [Pub][ePrint]Efficient Cryptosystems From $2^k$-th Power Residue Symbols, by Fabrice Benhamouda and Javier Herranz and Marc Joye and and Benoît Libert[ expand ]
01:17 [Pub][ePrint]SL2 homomorphic hash functions: Worst case to average case reduction and short collision search, by Ciaran Mullan and Boaz Tsaban[ expand ]
01:17 [Pub][ePrint]Secret Sharing, Rank Inequalities, and Information Inequalities, by Sebastia Martin and Carles Padro and An Yang[ expand ]