International Association for Cryptologic Research
IACR logo

IACR Newsletter

The newsletter of the International Association for Cryptologic Research.

Vol. 25, No. 2, Autumn 2010, (Publication date: 3 October 2010).

Contents

Registration for Asiacrypt open

For Asiacrypt 2010, the registration is open now.
Asiacrypt 2010, December 5-9
Singapore
Early bird registration: Friday, November 5, 2010
Homepage: http://www.spms.ntu.edu.sg/Asiacrypt2010/

Message from the President

This year, the IACR has experimented with the co-location of workshops and conferences: PKC was held in Paris right before Eurocrypt at the French Riviera; Crypto and CHES were co-located at UCSB in the same week with a limited overlap and combined invited talks. The events benefited by an increased attendance and the feedback received was very positive. I believe that we should consider this in our planning of future events. The IACR Board welcomes your opinions and suggestions on this topic.

The ballots for the 2010 election have been sent out. Every third year, the IACR organizes a "big" election, as the terms of the four IACR Officers expire together with the terms of three Directors. I would like to strongly encourage you to cast your vote. After extensive consultation of internal and external experts, careful deliberations within the Board and detailed discussions at the Membership meetings at Eurocrypt and Crypto, it has been decided to adopt the Helios electronic voting system. While every voting system has its strength and weaknesses, a large majority was of the opinion that Helios presents a substantial improvement over the traditional method that relies on envelopes and the postal system. I would like to thank everyone who has contributed to the debate and to the deployment of the system. Even if the IACR has adopted Helios for its elections, the IACR maintains its position that the adoption of this system does not constitute an endorsement of this or other remote-voting systems for public-sector elections. I would like to use this occasion to encourage the cryptographic community to contribute to the improvement of Helios and other electronic voting systems.

Finally a big thank you to all many volunteers who have contributed to the IACR this year. It has been a great pleasure to work with all of you to develop our community.

Bart Preneel
IACR President

New Mobile Phone Security Algorithms - Public Evaluation Invited

A new set of cryptographic algorithms is being proposed for inclusion in the "4G" mobile standard called LTE (Long Term Evolution).

The algorithms are:

  • a stream cipher called ZUC, which is the core of both new LTE algorithms;
  • the LTE encryption algorithm called 128-EEA3, defined straightforwardly using ZUC;
  • the LTE integrity algorithm called 128-EIA3, designed as a Universal Hash Function using ZUC as its core.

The algorithms are here: http://gsmworld.com/our-work/programmes-and-initiatives/fraud-and-security/gsm_security_algorithms.htm. All of the algorithms were designed by DACAS, the Data Assurance and Communication Security Research Center of the Chinese Academy of Sciences. They have been evaluated by the algorithm standardisation group ETSI SAGE, and also by two other teams of well known cryptologists, and are believed to be strong and suitable for LTE.

Now the algorithms are open for public evaluation. Comments and analysis are invited, before a final decision is taken in (probably) January 2011 as to whether to include the new algorithms in the LTE standard. A discussion forum http://zucalg.forumotion.net/ has been created for this - please post any evaluation results there.

IACR Elections 2010 / Candidates

Candidates are permitted to run simultaneously for an Officer position and a Director position. A candidate who wins election as an Officer will be eliminated from consideration as a Director.

The candidates for each office below are listed in random order.

You can also find the full list of candidates including election statements on the IACR site.

President

  • Bart Preneel

Vice-President

  • Christian Cachin
  • Helena Handschuh

Treasurer

  • Greg Rose
  • Marcelo Kaihara

Secretary

  • James Hughes
  • Martijn Stam

Director

  • David Pointcheval
  • John Kelsey
  • Amit Sahai
  • Christof Paar
  • Mitsuru Matsui
  • Christian Cachin

2010 members of the IACR (generally people who attended an IACR conference or workshop in 2009) should receive a customized invitation to vote from system (at) heliosvoting.org sent to their email address of record with the IACR. Members may update their email addresses and other information by visiting the IACR membership service site. Questions about this election may be sent to election2010 (at) iacr.org.

This year, the election will be conducted electronically from October 1 through November 15 using the Helios cryptographically-verifiable election system. You find more about this on the IACR eVoting site, and also in the final report of the eVoting committee.

IACR Fellows 2011 Nomination

IACR has established the IACR Fellows Program to recognize outstanding IACR members for technical and professional contributions that:
  1. Advance the science, technology, and practice of cryptology and related fields;
  2. Promote the free exchange of ideas and information about cryptology and related fields;
  3. Develop and maintain the professional skill and integrity of individuals in the cryptologic community;
  4. Advance the standing of the cryptologic community in the wider scientific and technical world and promote fruitful relationships between the IACR and other scientific and technical organizations.

In general, two broad categories of accomplishment will be considered: technical contributions and distinguished service to the cryptologic community. Fellows are expected to be "model citizens" of the cryptologic community, and thus most of them will have demonstrated sustained and significant accomplishment in both categories, but a very small number may be chosen for unique and crucial accomplishment in one category only.

Fellows of 2010 were Andrew Clark, Ivan Damgård, Yvo Desmedt, Jean-Jacques Quisquater, and Andrew Yao.

We hope that you will consider devoting some of your time and effort to nominating or endorsing an IACR-Fellow candidate. Please note that you must be a member of the IACR in order to serve as a nominator or an endorser and that the candidate must also be an IACR member. Please verify membership by corresponding with the membership secretariat at . Nominations and endorsements for 2011 are due on December 31, 2010.

You find a list of all fellows and information about nomination and endorsement on the IACR website (Fellows).

IACR Publication Ethics Committee

At the August 2010 IACR Board Meeting an IACR Publications Ethis Committee was established. This Committee will consist of the following three members:

  • Chair: the IACR Vice President;
  • Board elected members: 2 members to be elected at the annual Eurocrypt IACR board meeting from the membership of the Board of the IACR.

The purpose of the ethics committee is to be the authority for establishing, interpreting, and enforcing ethical principles for the IACR. The IACR will publish guidelines about ethical behavior for its editors, program chairs, comittee members, and reviewers. The ethics committee will revise that document with the approval of the Board.

Any IACR member may bring a question or dispute regarding the guidelines to the attention of the Ethics Committee. The Committee establishes procedures for meeting and for discussing these issues and for responding.

The Committee may issue recommendations for resolving disputes, such as recusing reviewers or rejecting papers. Serious ethical violation may be reported to the IACR Board for extreme action, such as banning an author.

The Ethics Committee shall maintain copies of correspondence and minutes of meetings or discussions. The confidentiality of petitioners may be protected by omitting their names from published summaries.

Upcoming Events

IACR Conferences

  • Asiacrypt 2010, December 5-December 9, 2010, Singapore, Singapore.
  • Eurocrypt 2011, May 15-19, 2011, Tallinn, Estonia.
  • Crypto 2011, August 14-18, 2011, Santa Barbara, USA.
  • Asiacrypt 2011, December 4-8, 2011, Seoul, Korea.
  • Eurocrypt 2012, April 15-19, 2012, Cambridge, UK.
  • Crypto 2012 (tentative), August 19-23, Santa Barbara, USA.

IACR Workshops

Events in cooperation with IACR

Further events can be found here. You can also add your events or calls for special issues of journals there.

Service to members and the cryptographic community

Among others, IACR offers the following benefits:

  1. IACR Reading Room
  2. Open Positions
  3. ePrint
  4. IACR Archive

a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link

b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis.

c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.

d. The proceedings of some conferences past are made available by the IACR in an archive. The copyright for these papers is held by the IACR.

Reports on Past Events

Crypto 2010 August 15-19, Santa Barbara, CA, USA.

Crypto 2010 took place under the cerulean skies of Santa Barbara from August 15-19th. This year marked the 30th annual Crypto. Zulfikar Ramzan served as General Chair and Tal Rabin served as Program Committee Chair. The event was co-located with CHES, so decades of prior work on organizing the conference had to be abandoned. Still, the experiment of having these conferences partially overlap proved incredibly successful. Over 450 delegates attended Crypto 2010 - approximately 30% more than the previous year! Of these approximately 150 attended co-registered for CHES (to put this number into perspective, last year only 14 people attended both conferences).
The rump session (which was co-chaired by Dan Bernstein and Tanja Lange) drew a record-breaking number of attendees since the reception that preceded it was "joint work" with CHES. The beach barbecue was also done jointly with the two conferences and all CHES attendees were invited to the Crypto cafe immediately after.
Tal and program committee put together an outstanding scientific program. There were two invited presentations. The first was given by Shafi Goldwasser and Silvio Micali, celebrating the 25-year anniversary of Zero-Knowledge. Charlie Rackoff was also supposed to speak - but was not to be found. Nonetheless, Silvio and Shafi held the members of the audience (one of whom appeared to be a rather menacing looking gorilla) in rapt. It was clear from the gorilla's demeanor, though, that he had remarkably deep insights into the subject matter. The second invited talk was a panel with Ivan Damgård and David Naccache on whether theoretical cryptography is any good in practice. No primate sightings occurred during the discussion.
A very special thanks are due to Sally Vito and the UCSB conference services committee as well as the IACR Board for their hard work to make the conference a success.

CHES 2010, August 17-20, 2010, Santa Barbara, CA, USA.

This year's CHES Workshop, being the 11th one from its inception in 1999, was indeed special, because the very first time it was held in Santa Barbara, California, at the beautiful campus of University of California Santa Barbara, together with Crypto. The 2010 CHES Workshop General Chairs were Cetin Kaya Koc and Jean-Jacques Quisquater. Since it was a joint event many participants were registered for both conferences; the total number of CHES registrations was 361, of these 149 people also registered for Crypto.
Crypto registration started on Sunday (August 15), and continued during the week until Thursday (August 19) noon. The programs for Crypto and CHES are found here: Crypto Program and CHES Program The CHES Workshop started with registration on Tuesday (August 17) evening, coinciding with the Crypto Rump Session at the University Center Corwin Pavilion. This was the first joint event; CHES participants were invited to the Crypto Rump Session which was chaired (as usual!) by the inimitable Dan Bernstein and Tanja Lange. The second joint event was on Wednesday (August 19) at 4:10pm the invited talk session entitled "Is Theoretical Cryptography Any Good in Practice?". The speakers were Ivan Damgård and David Naccache, and the moderator was IACR President Bart Preneel. The third joint event was the well-known Crypto Beach Barbeque event on Wednesday (6pm, August 18) at the nearby Goleta Beach where the Crypto and CHES participants enjoyed the mild Santa Barbara weather and the breeze from the Pacific Ocean. CHES participants were also invited to Crypto Cafe at 8pm in the same night, which was the fourth and last joint event of Crypto and CHES. The next day at noon Crypto ended, while CHES session continued.
The highlight of CHES Workshop was the CHES Workshop Reception, Awards Dinner, at the Rump Session at the Four Seasons Biltmore Hotel, overlooking the Pacific Ocean on the south end of Santa Barbara. The Rump Session was chaired by Christof Paar and Cetin Kaya Koc, and a delicious dinner, desserts and California wine was served by the superb kitchen of the famed Biltmore hotel.
The program chairs of CHES Workshop were Francois-Xavier Standaert and Stefan Mangard. This was another strong year for CHES; there were a total of 108 papers were submitted, where 30 papers were accepted. The best paper award was given to Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin for their work "Public Key Perturbation of Randomized RSA Implementations".

Selected Areas in Cryptography (SAC 2010), August 12-13, 2010, Waterloo, Canada.

The 17th Workshop on Selected Areas in Cryptography (SAC 2010) was held at the University of Waterloo, in Waterloo, Ontario, Canada from August 12 to 13, 2010. There were 78 participants from 16 countries.
The workshop attracted 90 submissions of which the Program Committee selected 24 for presentation. Two invited talked completed the technical program. The first one, given by Keith Martin, was entitled "The Rise and Fall and Rise of Combinatorial Key Predistribution". The second one, given by Alexandra Boldyreva, was entitled "Search on Encrypted Data in the Symmetric-Key Setting". The accepted papers cover a wide range of topics in cryptography, including hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks as well as mathematical aspects. The proceedings will be published by Springer as a volume of the Lecture Notes in Computer Science series.
The conference organizers gratefully acknowledge the Department of Electrical and Computer Engineering and the David R. Cheriton School of Computer Science of the University of Waterloo, and Fields Institute for Research in Mathematical Science for their enthusiastic and generous financial support.
Co-chairs were Alex Biryukov, Guang Gong, and Douglas Stinson.

The First International Conference on Cryptology and Information Security (LatinCrypt 2010), August 8th-11th, 2010, Puebla, México.

LATINCRYPT 2010 was held in the city of Puebla, capital of the state of Puebla in Mexico, from August 8 to 11. The city of Puebla was named by UNESCO a World Heritage Site in 1987. The technical sessions took place at the Carolino building located in the heart of Puebla city historical center. The social program included usual lunches, coffee breaks and a tour to Puebla city by a double-decker bus (under a heavy rain). The Gala dinner was held at a traditional Mexican cantina. For more details on the social event, the curious reader can consult the following PDF.
LATINCRYPT 2010 was organized by CINVESTAV-IPN and Autonomous University of Puebla (BUAP) in cooperation with The International Association for Cryptologic Research (IACR). This was the first edition of the Latincrypt series of conferences that will be held biannually in Latin American venues.
The conference received 62 submissions from a total of 22 countries. After a careful review and discussion process, the Program Committee, chaired by Michel Abdalla and Paulo S. L. M. Barreto, selected 19 submissions for presentation at the conference. In addition to those 19 presentations, the program also included four invited talks. David Grawrock from Intel gave a talk titled "Trusting you computing device", Amit Sahai from UCLA spoke about "Rethinking Encryption", Orr Dunkelman from the Weizmann Institute of Science spoke on "The Hitchhiker's Guide to the SHA3 Competition" and finally, the talk by Eike Kiltz from CWI was titled "A brief history of OAEP and its roller-coaster ride". It is worth mentioning that the four LatinCrypt 2010 invited speakers were officially named "Puebla city Distinguished visitors" during an official act held on the afternoon of Monday August 9 at the City Hall building. The ceremony was preceded by the plenary Puebla City Council.
The full program and slides of the 19 presentations and 4 talks by the invited speakers are available at the LatinCrypt 2010 website.
The conference was attended by 85 registered participants (including 44 students) coming from 17 countries. The conference organizers are grateful to Intel for its generous support. The General Chair of the conference was Francisco Rodríguez-Henríquez.

International Conference on Security and Cryptography (SECRYPT 2010), July 26-28, 2010, Athens, Greece.

The International Conference on Security and Cryptography took place in Athens, Greece, from July 26 to 28 and it was hosted by the University of Piraeus.
SECRYPT 2010 was integrated in ICETE (International Conference on e-Business and Telecommunications) a joint conference combining six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security processing and multimedia applications, and wireless networks.
This year SECRYPT received 164 submissions, whereas the joint conference ICETE attracted in total 422 submissions from more than 46 countries. After a strict selection process, the SECRYPT program included 21 papers as full papers (12.8% of submissions) and 24 as short papers (14.6% of submissions). Additionally, 21 papers were accepted for poster presentation. This is a good example of the quality standards underlying this conference organization.
The best papers of SECRYPT will be invited to appear in a post-conference book that will be published by Springer-Verlag composed by a selection of papers from ICETE. In addition to the presentation sessions, SECRYPT 2010 included four outstanding keynote lectures, which are relevant to today’s lines of research and technical innovation. These talks were presented by internationally distinguished researchers, namely: Ian F. Akyildiz, Georgia Institute of Technology, U.S.A. "NANONETWORKS- A New Frontier in Communications", by Petar M. Djuric, Stony Brook University, U.S.A., "FROM NATURE TO METHODS AND BACK TO NATURE", by Stamatios Kartalopoulos, University of Oklahoma, U.S.A. "CHAOTIC QUANTUM CRYPTOGRAPHY- The Ultimate for Network Security" and by Nikolaos Bourbakis, Wright State University, U.S.A. "INFORMATION SECURITY- The SCAN - Secure Processor with Crypto-Biometrics Capabilities" who helped enhancing the overall quality of this conference with their contributions.
The papers were organized in 15 sessions covering areas such as Data and Application Security and Privacy, Access Control and Intrusion Detection, Network Security and Protocols, Cryptographic Techniques and Key Management, Information Assurance and Security in Information Systems and Software Engineering.
The organizing committee included the ICETE conference co-Chairs Prof. Mohammad S. Obaidat, Monmouth University, U.S.A. and Professor George Tsihrintzis, University of Piraeus, Greece and the SECRYPT program chairs Prof. Pierangela Samarati, Università degli Studi di Milano, Italy and Prof. Sokratis Katsikas, University of Piraeus, Greece. SECRYPT 2010 was sponsored by INSTICC (The Institute for Systems and Technologies of Information, Control and Communication) and technically co-sponsored by the IEEE Communications Society and the IEEE Systems, Man and Cybernetics Society. The conference was held in cooperation with IACR (The International Association for Cryptologic Research), ACM SIGSAC (Special Interest Group on Security, Audit and Control), ACM SIGMM (Special Interest Group on Multimedia), and IEICE (the Japanese Institute of Electronics, Information and Communication Engineers).
Regarding the best paper award, SECRYPT has recognized the paper, "FORCING OUT A CONFESSION - Threshold Discernible Ring Signatures" from Swarun Kumar, Indian Institute of Technology, India, Shivank Agrawal, Indian Institute of Technology, India, Ramarathnam Venkatesan, Microsoft Research, India, Satya Lokam, Microsoft Research, India and C. Pandu Rangan, Indian Institute of Technology, India as the best paper of the conference. As the best Student Paper Award, SECRYPT acknowledged the paper untitled "ANONYMOUS BUT AUTHORIZED TRANSACTIONS SUPPORTING SELECTIVE TRACEABILITY" by Daniel Slamanig, Carinthia University of Applied Sciences, Austria and Stefan Rass, Klagenfurt University, Austria as the best student paper presented at the conference.
After a successful 2010 edition in Greece, SECRYPT 2011 will be held in Seville, Spain from 18th to 21th July 2011. For more updated information, please visit the conference website.

Book Reviews

The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available! In general, new books will be added around January and July to these lists.

An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all reviews added since the last newsletter was sent out. You can access the full list via the following link.

  • M. Higgins: "Number Story: From Counting to Cryptography", 2008:
    Numbers are a fascinating and interesting subject, and what an interesting book Higgins has written about them! Mainly aimed at the non-technical reader, but also suitable for those more familiar with mathematics, the text is a grand overview of numbers and their history. Every chapter is filled with facts, anecdotes, examples and tricks that will keep the curiosity of the reader alive till the very last page.
    Review written by Paolo Palmieri (UCL Crypto Group, Universite catholique de Louvain, Belgium). (PDF)
    Publisher: Springer. ISBN: 978-1-84800-000-1 (Date: 2010-09-29)

  • Ross Anderson: "Security Engineering: A Guide to Building Dependable Distributed Systems" (2nd Edition), 2009:
    This book, as a whole or the relevant chapters and sections, is morally a must-read for anyone who is involved in the design or implementation of security relevant systems, or who is responsible for the operation or the management of such systems.
    Review written by Safuat Hamdy (Secorvo Security Consulting GmbH, Karlsruhe, Germany). (PDF)
    Publisher: Wiley. ISBN: 978-0-470-06852-6 (Date: 2010-08-12)

  • E. Damiani, C. A. Ardagna, and N. El Ioini: "Open Source Systems Security Certification", 2009:
    I recommend this book to everyone who is interested in the topic of security certification applied to open source systems. The authors provide detailed descriptions on the merits and pitfalls of the security certification process (e.g. Common Criteria, ICSA, etc.) in the context of dynamically changing open source software systems (e.g. the Linux kernel), as well as some in-depth case studies and open research challenges. The book is very well-structured and provides a good overview with lots of additional readings on all areas involved in this red-hot topic
    Review written by Meiko Jensen (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF)
    Publisher: Springer. ISBN: 978-0-387-77323-0 (Date: 2010-08-06)

  • Yan Zhang and Paris Kitsos: "Security in RFID and Sensor Networks", 2009:
    This 24-chapter long book consists of disjointed scientific papers that focus more towards implementation and feasibility, and thus the presented topics refer mostly to improvements that are scalable and implementable. The editors did a great job of putting these chapters together in a more-or-less logical order, and such that the topics share some common ground. I particularly liked the good amount of detail regarding RFID hardware and the feasibility of the constructions. A disadvantage of this book -- and a natural one in my opinion, given the diversity of the topics -- is the lack of depth and the somewhat implementation-based approach taken by most chapters. I was also surprised to see that very few chapters actually contain any formal definitions or models. Nevertheless, I would certainly recommend this book, particularly to those who are already familiar with theoretical de�nitions and models related to the cryptographic primitives and security notions that are paramount in RFID and sensor networks.
    Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF)
    Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-6839-9 (Date: 2010-07-21)

  • Jie Wang: "Computer Network Security", 2009:
    The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security.
    Review written by Mario Strefler (Ecole Normale Supérieure, Paris, France). (PDF)
    Publisher: Springer. ISBN: 978-3-540-79697-8 (Date: 2010-07-21)

  • H. Stichtenoth: "Algebraic Function Fields and Codes" (2nd Edition), 2008:
    Stichtenoth’s book is the canonical modern textbook for the �eld-theoretic formulation of the theory of curves over �nite �elds. The book is carefully written, develops the theory rigorously from �rst principles, and contains elegant algebraic proofs of a number of very important facts. The reader is required to have a solid background in algebra, hence the book is appropriate for beginning PhD students, or Masters students doing projects in the subject. The book is an excellent companion for students learning the theory of curves. For researchers in the �eld it is a convenient reference for proofs and de�nitions. I consult my copy of the �rst edition regularly.
    Review written by Steve Galbraith (University of Auckland, New Zealand). (PDF)
    Publisher: Springer. ISBN: 978-3-540-76877-7 (Date: 2010-06-18)

List of books for review

The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. New book reviews are posted continiously.

If you are interested in reviewing any other books from Taylor & Francis or Springer, please send me an eMail, too. I am pretty sure that I can organize this book. I did not try yet for other publishers, but the process is pretty straight forward, i.e. if you want to review a book from any other publisher, send me an eMail, too. However, it may take a while.

Reviewing Guidelines

So, what should a review look like? Keep in mind that your review should be helpful for the reader. So summarize its content and then give examples for very good and very bad parts. Give an overall conclusion (e.g. this book could be particular helpful for the following group, is over the top / too easy for...). If your review is longer than the book or shorter than the text on its back, something went wrong. Apart from that, there are not guidelines. Just start reviewing and assume you would be reading your review. Would you like it? So the key questions are:
  • What is this book about (summary)?
  • What is the book like (style)?
  • Would you recommend this book (if yes: for whom?)?
  • Would your review be helpful for yourself?
Prefered format is PDF, see previous reviews or our LaTeX-Template. In addition, I need a 3-10 line "teaser" which more or less summarizes the whole review. In addition, you can also look at other reviews to get an idea what to cover. When requesting a book, please do also include your surface address! After receiving the book, you have 2 month to complete the review.

If you have any further questions, please contact Axel Poschmann via books at iacr.org.

Available Books

Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name].

Go to titles from:

Springer
Below you find a selection of books from Springer. Further titles are available via Springer's website.
  1. Adjeroh: The Burrows-Wheeler Transform
  2. [done Gregory Kohring] Aigner: Proofs from THE BOOK
  3. [done Gregory Kohring] Aigner: Das BUCH der Beweise [German]
  4. [!!!2009-12-17 Abdelhak Azhari] Baigneres: A Classical Introduction to Cryptography Exercise Book
  5. [done Yesem Kurt Peker] Baldoni: Elementary Number Theory, Cryptography and Codes
  6. [done Wael Said Abd Elmageed Mohamed] Bard: Algebraic Cryptanalysis
  7. [done Denise Reinert] Bauer: Decrypted Secrets
  8. [done Denise Reinert] Bauer: Entzifferte Geheimnisse [German]
  9. [done Jannik Pewny] Bauer: Historische Notizen zur Informatik [German]
  10. [!!!2010-09-30 Sebastian Gajek] Bella: Formal Correctness of Security Protocols
  11. [!!!2010-02-28 Ludovic Perret] Bernstein: Post-Quantum Cryptography
  12. Biggs: Codes: An Introduction to Information Communication and Cryptography
  13. [done S.V.Nagaraj] Biskup: Security in Computing Systems
  14. Buchmann: Binary Quadratic Forms
  15. [done Mohamed Saied Emam Mohamed] Buchmann: Introduction to Cryptography
  16. Calmet: Mathematical Methods in Computer Science
  17. Camp: Economics of Identity Theft
  18. [done Olivier Blazy] Chen: Terrorism Informatics
  19. [done Lakshmi Kuppusamy] Choo: Secure Key Establishment
  20. [done Stanislav Bulygin] Cid: Algebraic Aspects of the Advanced Encryption Standard
  21. [done Cristina Onete] Cole: Networked RFID Systems and Lightweight Cryptography
  22. [done Meiko Jensen] Damiani: Open Source Systems Security Certification
  23. [done Seyyd Hasan Mirjalili] Delfs: Introduction to Cryptography
  24. [not yet published Safuat Hamdy] Desmedt: Secure Public Key Infrastructure
  25. [2010-06-21 S.V. Nagaraj] Dietzfelbinger: Primality Testing in Polynomial Time
  26. [done Albrecht Petzold] Ding: Multivariate Public Key Cryptosystems
  27. Di Pietro: Intrusion Detection Systems
  28. Fine: Number Theory
  29. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  30. [done Luigi Lo Iacono] Hafner: Security Engineering for Service-Oriented Architectures
  31. [done Cristina Onete] Henrici: RFID Security and Privacy
  32. [!2010-04-09 Paolo Palmieri] Higgins: Number Story
  33. Hoffstein: An Introduction to Mathematical Cryptography
  34. Hromkovic: Algorithmic Adventures
  35. [Marc Joye] Katz: Digital Signatures
  36. [done Kilian David] Kizza: Guide to Computer Network Security
  37. Koblitz: Random Curves
  38. [done Azzeddine Ramrami] Koç: Cryptographic Engineering
  39. Kuo: Precoding Techniques for Digital Communication Systems
  40. [!2010-09-30 Joerg Gerschuetz] Lee: Botnet Detection
  41. [done Andrew Waterhouse] Lemke: Embedded Security in Cars
  42. Li: An Introduction to Kolmogorov Complexity and Its Applications
  43. [!!2010-08-31 Arnaud Tisserand] Mangard: Power Analysis Attacks
  44. [done Eric Diehl] Mayes: Smart Cards, Tokens, Security and Applications
  45. Mehlhorn: Algorithms and Data Structures
  46. [!!2010-01-27 Ulrich Dürholz] Micheloni: Error Correction Codes for Non-Volatile Memories
  47. [done Luigi Lo Iacono] Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java
  48. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  49. [!2010-08-31 Luigi Lo Iacono] Paar: Understanding Cryptography - A Textbook for Students and Practioners
  50. Portnoy: Global Initiatives to Secure Cyberspace
  51. Robshaw: New Stream Cipher Designs
  52. Rodríguez-Henríquez: Cryptographic Algorithms on Reconfigurable Hardware
  53. Rosen: Concurrent Zero-Knowledge
  54. [done Rolf Oppliger] Rothe: Komplexitätstheorie und Kryptologie [German]
  55. [!2010-08-31 Eric Diehl] Rousseau: Mathematics and Technology
  56. Salomon: A Concise Introduction to Data Compression
  57. [done Stas Bulygin] Sala: Gröbner Bases, Coding, and Cryptography
  58. Sammes: Forensic Computing
  59. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  60. [!!!2010-01-30 Erik Tews] Schneier: Beyond Fear
  61. Schroeder: Number Theory in Science and Communication
  62. Shi: Transactions on Data Hiding and Multimedia Security III
  63. [done Jannik Pewny] Singh: Identifying Malicious Code Through Reverse Engineering
  64. [done Steven Galbraith] Stichtenoth: Algebraic Function Fields and Codes
  65. Stolfo: Insider Attack and Cyber Security
  66. [done Choudary Gorantla] Sun: Network-Aware Security for Group Communications
  67. Traynor: Security for Telecommunications Networks
  68. Tuyls: Security with Noisy Data
  69. Vadhan: A Study of Statistical Zero-Knowledge Proofs
  70. [done Jothi Rangasamy] Vaudenay: A Classical Introduction to Cryptography
  71. Vöcking: Taschenbuch der Algorithmen [German]
  72. [done Mario Strefler] Wang: Computer Network Security
  73. [done Joerg Gerschuetz] Yan: Primality Testing and Integer Factorization in Public-Key Cryptography
  74. [done Yuriy Aydarov] Yan: Cryptanalytic Attacks on RSA
  75. Yeung: Information Theory and Network Coding
Taylor & Francis
Below you find a selection of books from Taylor & Francis. Further titles are available via Taylor & Francis's website.
  1. Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices
  2. [done Eric Diehl] Avoine, Gildas: Computer System Security: Basic Concepts and Solved Exercises
  3. Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words
  4. [done S.V. Nagaraj] Boudriga, N.: Security of Mobile Communications
  5. Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications
  6. Chartrand, Gary: Chromatic Graph Theory
  7. Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography
  8. Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering
  9. [done Olivier Blazy] Elbirt, Adam J.: Understanding and Applying Cryptography and Data Security
  10. Erickson, Martin: Introduction to Number Theory
  11. Gross, Jonathan L.: Combinatorial Methods with Computer Applications
  12. Gould, Ronald J: Mathematics in Games, Sports, and Gambling
  13. [done Julia Borghoff] Hardy, Darel W.: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition
  14. Heubach, Silvia: Combinatorics of Compositions and Words
  15. [done Jannik Pewny] Hinek, M. Jason: Cryptanalysis of RSA and Its Variants
  16. Hsu, Lih-Hsing: Graph Theory and Interconnection Networks
  17. [done Olivier Blazy] Jacobson, Douglas: Introduction to Network Security
  18. Johnson, Norman: Handbook of Finite Translation Planes
  19. [!2010-10-03 Julia Borghoff] Joux, Antoine: Algorithmic Cryptanalysis
  20. [done Cristina Onete] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  21. [!2010-08-09 Ladan Mahabadi] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  22. Kirovski, D.: Multimedia Watermarking Techniques and Applications
  23. [done Cristina Onete] Kitsos, P.: Security in RFID and Sensor Networks
  24. Koolen, Jack: Applications of Group Theory to Combinatorics
  25. [done Jannik Pewny] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  26. [? 2009-08-24 Ladan Mahabadi] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  27. Lindner, Charles C.: Design Theory, Second Edition
  28. Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies
  29. Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems
  30. [done Francesco Sica] Mollin, Richard A.: Fundamental Number Theory with Applications, Second Edition
  31. Mollin, Richard A.: Advanced Number Theory with Applications
  32. [done Ken Radke] Mollin, Richard A.: Codes: The Guide to Secrecy From Ancient to Modern Times
  33. Newman, Robert C.: Computer Forensics: Evidence Collection and Management
  34. Paulsen, William: Abstract Algebra. An interactive Approach
  35. Peeva, Irena: Syzygies and Hilbert Functions
  36. Roberts, Fred: Applied Combinatorics, Second Edition
  37. Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations
  38. [!2010-09-30 Aka Bile Frederic Edoukou] Smith, Jonathan D. H.: Introduction to Abstract Algebra
  39. available from August 2010 Stanoyevitch, A.: Introduction to Cryptography with Mathematical Foundations and Computer Implementations
  40. Szabo, Sandor: Factoring Groups into Subsets
  41. [2010-04-13 Vincent Immler] Talukder, Asoke K.: Architecting Secure Software Systems
  42. [done Jannik Pewny] Valiente, Gabriel: Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R
  43. Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition
  44. [done Vincent Immler] Washington, Lawrence C.: Elliptic Curves: Number Theory and Cryptography, Second Edition
  45. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing
  46. Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
  47. Zhang, Y.: Security in Wireless Mesh Networks

Cryptology ePrint Archive: Top 20 Downloads in the last 6 month

This report includes all downloads from the ePrint archive between April 1 and September 30, 2010.
  1. 2004/314 ( PDF ) with 25342 downloads
    A Technical Comparison of IPSec and SSL
    AbdelNasir Alshamsi and Takamichi Saito
  2. 2007/120 ( PDF ) with 21906 downloads
    Breaking 104 bit WEP in less than 60 seconds
    Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
  3. 2010/006 ( PDF ) with 19742 downloads
    Factorization of a 768-bit RSA modulus
    Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
  4. 2010/332 ( PDF ) with 13871 downloads
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
    Aurelien Francillon and Boris Danev and Srdjan Capkun
  5. 2004/199 ( PDF ) with 6076 downloads
    Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
    Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
  6. 2010/337 ( PDF ) with 4212 downloads
    Practical-Titled Attack on AES-128 Using Chosen-Text Relations
    Vincent Rijmen
  7. 2004/203 ( PS PS.GZ PDF ) with 3989 downloads
    How to Cheat at Chess: A Security Analysis of the Internet Chess Club
    John Black and Martin Cochran and Ryan Gardner
  8. 2010/013 ( PDF ) with 3645 downloads
    A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
    Orr Dunkelman and Nathan Keller and Adi Shamir
  9. 2009/616 ( PS PS.GZ PDF ) with 3443 downloads
    Fully Homomorphic Encryption over the Integers
    Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
  10. 2009/223 ( PDF ) with 3391 downloads
    How To Find Weak Input Differences For MD5 Collision Attacks
    Tao Xie and Dengguo Feng
  11. 2006/262 ( PDF ) with 3161 downloads
    Logical Concepts in Cryptography
    Simon Kramer
  12. 2004/198 ( PDF ) with 2955 downloads
    Long Modular Multiplication for Cryptographic Applications
    Laszlo Hars
  13. 2010/251 ( PDF ) with 2901 downloads
    Modeling Attacks on Physical Unclonable Functions
    Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber
  14. 2010/290 ( PDF ) with 2895 downloads
    Intractable Problems in Cryptography
    Neal Koblitz and Alfred Menezes
  15. 2004/331 ( PDF ) with 2794 downloads
    Code-Based Game-Playing Proofs and the Security of Triple Encryption
    Mihir Bellare and Phillip Rogaway
  16. 2007/471 ( PDF ) with 2757 downloads
    Attacks on the WEP protocol
    Erik Tews
  17. 2005/095 ( PS PS.GZ PDF ) with 2691 downloads
    Security and Privacy Issues in E-passports
    Ari Juels and David Molnar and David Wagner
  18. 2005/388 ( PDF ) with 2690 downloads
    Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
    YongBin Zhou and DengGuo Feng
  19. 2006/105 ( PDF ) with 2663 downloads
    Tunnels in Hash Functions: MD5 Collisions Within a Minute
    Vlastimil Klima
  20. 2006/054 ( PDF ) with 2648 downloads
    How to Build a Low-Cost, Extended-Range RFID Skimmer
    Ilan Kirschenbaum and Avishai Wool


You may opt out of the newsletter either by editing your contact information and preferences here.

Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org.

IACR contact information. Current newsletter editor is Christopher Wolf.