International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=1286
Joan Feigenbaum
Crypto 1985
Dropbox - Link not found
https://iacr.org/conferences/asiacrypt2016/www.dropbox.com/s/9miflbapf7bdbdp/AC'16-ConfPhoto.html
Sign in 404 That file isn’t here anymore Someone might’ve deleted the file or disabled the link. Learn more Are you sure you want to unshare ? Once it's unshared, nobody else will be able to view it. Sign in or create an...
Dropbox - Link not found
https://iacr.org/conferences/asiacrypt2016/www.dropbox.com/s/9miflbapf7bdbdp/AC'16-ConfPhoto-2.html
Sign in 404 That file isn’t here anymore Someone might’ve deleted the file or disabled the link. Learn more Are you sure you want to unshare ? Once it's unshared, nobody else will be able to view it. Sign in or create an...
Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008)
https://iacr.org/workshops/ches/ches2008/accom.html
CHES Home CHES 2008 PROGRAM ACCEPTED PAPERS EXCURSION RUMP SESSION POSTERS STUDENT STIPENDS CALL FOR SPONSORS REGISTRATION ACCOMMODATIONS TRANSPORT VENUE & VISA CALL FOR PAPERS (PDF) AUTHOR INSTRUCTIONS PAPER SUBMISSION SYSTEM...
IACR Fellows Nomination
https://iacr.org/fellows/oldfellows.html
IACR Fellows Nomination Thank you for devoting your time and effort to nominating or endorsing an IACR-Fellow candidate. Please note that you must be a member of the IACR in order to serve as a nominator or an endorser and...
On Generating Solved Instances of Computational Problems
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=922
Martín Abadi Eric Allender Andrei Z. Broder Joan Feigenbaum Lane A. Hemachandra
Crypto 1988
Encrypting Messages for Incomplete Chains of Certificates
Eprint
https://eprint.iacr.org/2017/777
Sanjit Chatterjee Deepak Garg Aniket Kate Tobias Theobald
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptographic trust across parties...
received 15 Aug 2017
President's Message
https://iacr.org/newsletter/v18n2/president.html
President's Message There have been substantial changes that have swept through our field during my tenure as President of IACR for the last six years. The most startling is probably the growth of the Internet as a universal...
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract)
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=1016
Donald Beaver Joan Feigenbaum Victor Shoup
Crypto 1990
Joan Feigenbaum
Author
https://iacr.org/cryptodb/data/author.php?authorkey=281
Yale University
Editorial
https://iacr.org/newsletter/v21n3/editorial.html
Welcome to the 19th electronic issue of the IACR Newsletter! For someone working in the field of cryptology, it is impressive and reassuring to see how volume and quality of research this area has been steadily increasing over...
Minutes of the BoD Meeting at Crypto '98
https://iacr.org/newsletter/v16n3/minutes.c98.html
Minutes of the BoD Meeting at Crypto '98 Board of Directors Meeting CRYPTO '98 Santa Barbara 23 August 1998 The President, Kevin McCurley, called the meeting to order at 10:05AM. Present: McCurley, Berson, Cachin, Diffie,...
Minutes of the BoD Meeting at Crypto '98
https://iacr.org/newsletter/v16n2/minutes.c98.html
Minutes of the BoD Meeting at Crypto '98 Board of Directors Meeting CRYPTO '98 Santa Barbara 23 August 1998 The President, Kevin McCurley, called the meeting to order at 10:05AM. Present: McCurley, Berson, Cachin, Diffie,...
Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security
Eprint
https://eprint.iacr.org/2017/570
Anders P. K. Dalskov Claudio Orlandi
This paper presents an independent security review of a popular encrypted cloud storage service (ECS) SpiderOakONE. Contrary to previous work analyzing similar programs, we formally define a minimal security requirements for...
last revised 10 Jan 2018
TCC 2010
https://iacr.org/workshops/tcc2010/index.venue.html
Seventh IACR Theory of Cryptography Conference TCC 2010 February 9-11, 2010, ETH Zurich Zurich, Switzerland Home Call for Papers Program Registration Venue Pictures Location Coming to Zurich Public Transport Restaurants...
President's Message
https://iacr.org/newsletter/v21n3/president.html
President's Message Dear Colleagues, 2005 is a time of change for the Association. By the time you read this newsletter voting will be over in our 2004 election and we will be awaiting the results from the Returning Officer....
Accommodations
https://iacr.org/conferences/eurocrypt2006/accommodation.htm
The 25th International Cryptology Conference EUROCRYPT 2006 May 28 - June 1, 2006 Saint Petersburg , Russia Home Call for papers Accepted papers Program Rump session Visas Accommodation Travel Information Entertainment...
Unknown
https://iacr.org/conferences/crypto2013/rebuttal-2013.html
General instructions regarding the early review and response (rebuttal) process for CRYPTO 2013 This year authors will be given the opportunity to comment on the initial reviews written on their submissions. The main purpose...
Announcements
https://iacr.org/newsletter/v17n2/announce.html
Announcements NESSIE - Call for Cryptographic Primitives Version 2.2, 8 th March 2000 (Extract) NESSIE (New European Schemes for Signature, Integrity, and Encryption) is a project within the Information Societies Technology...
Announcements
https://iacr.org/newsletter/v17n3/announce.html
Announcements NESSIE - Call for Cryptographic Primitives Version 2.2, 8 th March 2000 (Extract) NESSIE (New European Schemes for Signature, Integrity, and Encryption) is a project within the Information Societies Technology...
Next ►