International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEJoCJobNewNewsPKCPhDPubReviewSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9
2013-05-14
17:31 [Job][New]Security Researcher , Intel Corporation, Guadalajara, Mexico[ expand ]
17:21 [Event][New]FOSAD13: 13th School on Foundations of Security Analysis and Design (w. CryptoForma)[ expand ]
17:20 [Event][New]LATIN 2014: 11th Latin American Theoretical Informatics Symposium[ expand ]


2013-05-10
12:59 [Event][New]DATE 2014: Design Automation and Test in Europe Conference[ expand ]


2013-05-09
13:02 [Job][New]6 Ph.D. Student scholarships in privacy, security and/or cryptography, Universitat Rovira i Virgili, Tarragona, Catalonia, Spain[ expand ]


2013-05-08
11:05 [Event][New]14th IMA Cryptography and Coding[ expand ]


2013-05-06
13:40 [Event][New]WISA '13: 14th International Workshop on Information Security Applications[ expand ]



2013-05-03
07:14 [Event][New]STM 2013: 9th International Workshop on Security and Trust Management[ expand ]
07:13 [Job][New]Ph.D. Scholarship , University of Wollongong, Wollongong, New South Wales, Australia[ expand ]


2013-04-29
20:25 [Job][New]PhD positions in Quantum and Postquantum Cryptography, University of Tartu, Estonia[ expand ]
15:18 [Pub][Software]A Generator for LWE and Ring-LWE Instances[ expand ]


2013-04-27
15:08 [Event][New]Number Theory, Geometry and Cryptography[ expand ]
15:08 [Event][New]CANS 2013: 12th International Conference on Cryptology and Network Security[ expand ]


2013-04-22
18:03 [Event][New]WEWoRC 2013: Western European Workshop on Research in Cryptology[ expand ]
13:51 [Job][New]two Ph.D. students, University of Luxembourg[ expand ]



2013-04-19
13:54 [Event][New]POST'14: 3rd Conference on Principles of Security and Trust[ expand ]
09:26 [Event][New]ARES-IND 2013: Industrial Track at the Eighth International ARES Conference[ expand ]
07:56 [Job][New]Associate Research Fellow, University of Wollongong, Wollongong, New South Wales, Australia[ expand ]


2013-04-17
09:55 [Event][New]FPS'2013: Foundation and Practice of Security[ expand ]


2013-04-16
09:12 [Event][New]crypt@b-it 2013[ expand ]


2013-04-15
13:10 [Job][New]Research Assistant/Software Development (multiple positions available), University of New Brunswick, Canada[ expand ]



2013-04-11
12:17 [Conf][EC]Early Bird Rgistration Notice[ expand ]
05:38 [Event][New]GeoCrypto 2013: Conference on Geometry and Cryptography[ expand ]


2013-04-10
17:47 [Job][New]Quantum Cryptography or Cryptography Engineer, Confidential Classfied Level 5 (Private Business)[ expand ]


2013-04-09
06:46 [Event][New]DPM'2013: 8th International Workshop on Data Privacy Management[ expand ]
04:25 [News]2013 IACR Fellows[ expand ]


2013-04-08
17:51 [Job][New]PostDoc Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg[ expand ]



2013-04-07
07:32 [Job][New]Postdoc, University of California San Diego (UCSD), La Jolla, California, USA[ expand ]


2013-04-05
13:54 [Event][New]Indocrypt 2013: 14th International Conference on Cryptology in India[ expand ]


2013-04-04
14:03 [Job][New]Associate Professors in Computer Science at Aarhus University, Department of Computer Science, Aarhus University, Denmark[ expand ]
14:02 [Job][New]PhD studentship in zero-knowledge proofs, University College London, UK, EU, EEA[ expand ]
05:25 [Job][New]Senior Lecturer, RMIT University, Melbourne, Australia[ expand ]


2013-04-03
12:35 [Event][New]SPACE 2013: Conference on Security, Privacy, and Applied Cryptography Engineering[ expand ]



2013-04-02
17:54 [Job][New]Post Doc, Applied Cryptography & Telecom Group, Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France[ expand ]
17:54 [Job][New]Post-Doc, Dept. of Computer Science, Aarhus University, Denmark[ expand ]
15:17 [Pub][ePrint]On the (Im)possibility of Projecting Property\\\\, by Jae Hong Seo[ expand ]
15:17 [Pub][ePrint]Security Analysis of Linearly Filtered NLFSRs, by Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett[ expand ]
15:17 [Pub][ePrint]A generalisation of Miller\'s algorithm and applications to pairing computations on abelian varieties, by David Lubicz and Damien Robert[ expand ]
15:17 [Pub][ePrint]Improved Differential Fault Analysis on ARIA using Small Number of Faults, by Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong[ expand ]
15:17 [Pub][ePrint]Power Analysis Attacks against FPGA Implementations of KLEIN, by Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong[ expand ]
15:17 [Pub][ePrint]Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes, by Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah[ expand ]
15:17 [Pub][ePrint]A family of 6-to-4-bit S-boxes with large linear branch number, by Daniel Loebenberger and Michael Nüsken[ expand ]
15:17 [Pub][ePrint]Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model, by Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo[ expand ]
12:17 [Pub][ePrint]The Vernam cipher is robust to small deviations from randomness, by Boris Ryabko[ expand ]


2013-04-01
15:17 [Pub][ePrint]Practical Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Collusion-Resistant Domain-Specific Pseudonymous Signatures, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
15:17 [Pub][ePrint]On the evaluation of modular polynomials, by Andrew V. Sutherland[ expand ]
15:17 [Pub][ePrint]A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\\Sigma\\Pi$PKC,Constructed Based on Maximum Length Code, by Masao KASAHARA[ expand ]
15:17 [Pub][ePrint]Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials, by Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of RC4(n,m) Stream Cipher, by Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld[ expand ]