International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13
09:09 [Event][New]STM 2014: 10th International Workshop on Security and Trust Management[ expand ]

09:10 [Event][New]SSP: IEEE Symposium on Security and Privacy[ expand ]
09:09 [Event][New]AsiaJCIS 2014: 9th Asia Joint Conference on Information Security (AsiaJCIS 2014) 9th Asia[ expand ]
09:09 [Job][New]Full-Time PhD Position in Privacy-Preserving Data Mining, University of Twente, the Netherlands[ expand ]
09:08 [Job][New]Post-doctoral research fellow, Queensland University of Technology, Brisbane, Australia[ expand ]
09:08 [Job][New]Cryptographer, USMobile, Inc., North America[ expand ]

00:17 [Pub][ePrint]New Treatment of the BSW Sampling and Its Applications to Stream Ciphers, by Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi[ expand ]
00:17 [Pub][ePrint]Design of identity-based digital signature schemes using extended chaotic maps, by SK Hafizul Islam[ expand ]
00:17 [Pub][ePrint]Identity-based encryption and digital signature schemes using extended chaotic maps, by SK Hafizul Islam[ expand ]
00:17 [Pub][ePrint]Weak instances of composite order protocols, by Sorina Ionica and Malika Izabachène[ expand ]
00:17 [Pub][ePrint]Witness Encryption from Instance Independent Assumptions, by Craig Gentry and Allison Bishop Lewko and Brent Waters[ expand ]
00:17 [Pub][ePrint]Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm, by Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su[ expand ]

21:17 [Pub][ePrint]STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation, by Markku-Juhani O. Saarinen[ expand ]
21:17 [Pub][ePrint]Faster Maliciously Secure Two-Party Computation Using the GPU, by Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen[ expand ]
21:17 [Pub][ePrint]Chosen Ciphertext Security via Point Obfuscation, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
21:17 [Pub][ePrint]A low complexity bit-parallel Montgomery multiplier based on squaring for trinomials , by Yin Li and Yiyang Chen[ expand ]
21:17 [Pub][ePrint]Differential Fault Analysis on SIMON and SPECK ciphers, by Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay[ expand ]

18:17 [Pub][ePrint]ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption, by Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Sre[ expand ]
18:17 [Pub][ePrint]Dual System Groups and its Applications --- Compact HIBE and More, by Jie Chen and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Continuous After-the-fact Leakage-Resilient Key Exchange (full version), by Janaka Alawatugoda and Colin Boyd and Douglas Stebila[ expand ]
18:17 [Pub][ePrint]A Generic Scan Attack on Hardware based eStream Winners, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Differential Fault Analysis of MICKEY Family of Stream Ciphers, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Fault Analysis of Grain Family of Stream Ciphers, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Locally Decodable Codes for edit distance, by Rafail Ostrovsky and Anat Paskin-Cherniavsky[ expand ]
18:17 [Pub][ePrint]Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function, by Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
18:17 [Pub][ePrint]A realtime key recovery attack on the authenticated cipher FASER128, by Xiutao FENG and Fan ZHANG[ expand ]
18:17 [Pub][ePrint]Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem, by Bruce Kallick[ expand ]
18:17 [Pub][ePrint]Private and Dynamic Time-Series Data Aggregation with Trust Relaxation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva[ expand ]
18:17 [Pub][ePrint]Certification and Efficient Proofs of Committed Topology Graphs, by Thomas Gross[ expand ]
18:17 [Pub][ePrint]Enhanced Lattice-Based Signatures on Reconfigurable Hardware, by Thomas P\\\"oppelmann and L{\\\'e}o Ducas and Tim G\\\"uneysu[ expand ]
18:17 [Pub][ePrint]Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems, by Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng[ expand ]
18:17 [Pub][ePrint]Making RSA-PSS Provably Secure Against Non-Random Faults, by Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
18:17 [Pub][ePrint]Forgery on Stateless CMCC, by Guy Barwell[ expand ]
18:17 [Pub][ePrint]Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme, by Boaz Tsaban and Noam Lifshitz[ expand ]
18:17 [Pub][ePrint]Linear Extension Cube Attack on Stream Ciphers, by Liren Ding, Yongjuan Wang, Zhufeng Li[ expand ]
15:17 [Pub][ePrint]Fine grain Cross-VM Attacks on Xen and VMware are possible!, by Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar[ expand ]
15:17 [Pub][ePrint]Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange, by Ivan Pryvalov and Aniket Kate[ expand ]
03:07 [Event][New]ISC '14: Information Security Conference[ expand ]

09:17 [Pub][ePrint]Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme, by Kwangsu Lee and Dong Hoon Lee[ expand ]
09:17 [Pub][ePrint]A practical state recovery attack on the stream cipher Sablier v1, by Xiutao FENG and Fan ZHANG[ expand ]
06:17 [Pub][ePrint]bitcoin.BitMint: Reconciling Bitcoin with Central Banks, by Gideon Samid[ expand ]
06:17 [Pub][ePrint]Key Derivation From Noisy Sources With More Errors Than Entropy, by Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin[ expand ]
06:17 [Pub][ePrint]Zero-Knowledge Password Policy Checks and Verifier-Based PAKE, by Franziskus Kiefer and Mark Manulis[ expand ]
06:17 [Pub][ePrint]A New Way to Prevent UKS Attacks Using Trusted Computing, by Qianying Zhang and Shijun Zhao and Dengguo Feng[ expand ]

05:24 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]

09:17 [Pub][ePrint]Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries, by Martin Pettai and Peeter Laud[ expand ]
09:17 [Pub][ePrint]Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5, by Florian Legendre and Gilles Dequen and Michaël Krajecki[ expand ]

12:01 [Conf]Proceedings PKC 2014 online[ expand ]
11:07 [Event][New]SCN 2014: 9th Conference on Security and Cryptography for Networks[ expand ]
11:06 [Event][New]Indocrypt: 15th International Conference on Cryptology, Indocrypt[ expand ]