International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

[ 1 ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
05:24 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]

09:17 [Pub][ePrint]Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries, by Martin Pettai and Peeter Laud[ expand ]
09:17 [Pub][ePrint]Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5, by Florian Legendre and Gilles Dequen and Michaël Krajecki[ expand ]

12:01 [Conf]Proceedings PKC 2014 online[ expand ]
11:07 [Event][New]SCN 2014: 9th Conference on Security and Cryptography for Networks[ expand ]
11:06 [Event][New]Indocrypt: 15th International Conference on Cryptology, Indocrypt[ expand ]
06:19 [Job][New]PhD Student, PhD positions at CTIC, Aarhus University, Denmark, Northern Europe[ expand ]
06:19 [Job][New]Ph.D. Scholarship in Computer Science (3 years full time), University of Wollongong, Australia[ expand ]

21:17 [Pub][ePrint]High Parallel Complexity Graphs and Memory-Hard Functions, by Joel Alwen and Vladimir Serbinenko[ expand ]
21:17 [Pub][ePrint]SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs, by Aydin Aysu and Ege Gulcan and Patrick Schaumont[ expand ]

14:46 [Job][New]PhD scholarship, University of Auckland, New Zealand[ expand ]

15:05 [Event][New]M2MSec'14: First International Workshop on Security and Privacy in M2M Communications[ expand ]
10:55 [Job][New]Researcher in Boolean Functions, Reliable Communication Group, Department of Informatics, University of Bergen, Norway[ expand ]

18:17 [Pub][ePrint]Linear Sequential Circuit Approximation of Acterbahn Stream Cipher, by Shazia Afreen[ expand ]

15:32 [Job][New]Doctoral Student, Technische Universität Darmstadt, Germany[ expand ]

17:11 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography for Security & Pr[ expand ]
17:10 [Event][New]Workshop on Security and Privacy for Smart Connected Devices 2014[ expand ]

09:17 [Pub][ePrint]Efficient Fuzzy Search on Encrypted Data, by Alexandra Boldyreva and Nathan Chenette[ expand ]
09:17 [Pub][ePrint]Enhancing Oblivious RAM Performance Using Dynamic Prefetching, by Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas[ expand ]
09:17 [Pub][ePrint]Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, by Yark{\\i}n Dor\\\"{o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar[ expand ]
09:17 [Pub][ePrint]Bandwidth Efficient PIR from NTRU, by Yark{\\i}n Dor\\\"{o}z, Berk Sunar and Ghaith Hammouri[ expand ]
09:17 [Pub][ePrint]Self-Updatable Encryption with Short Public Parameters and Its Extensions, by Kwangsu Lee[ expand ]
09:17 [Pub][ePrint]Isogeny graphs with maximal real multiplication, by Sorina Ionica and Emmanuel Thomé[ expand ]
09:17 [Pub][ePrint]Investigating the Feasibility of LEAP+ in ZigBee Specification, by Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi[ expand ]
07:03 [Event][New]QCRYPT: 4th International Conference on Quantum Cryptography[ expand ]
07:03 [Event][New]Workshop on Cybersecurity in a Post-Quantum World[ expand ]

00:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]

21:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-Or and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]
21:17 [Pub][ePrint]CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks, by Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi[ expand ]
15:17 [Pub][ePrint]Weak-Key Analysis of POET, by Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser[ expand ]
00:17 [Pub][ePrint]Adaptively Secure Functional Encryption for Finitite Languages from DLIN Assumption, by Tapas Pandit and Rana Barua[ expand ]

09:17 [Pub][ePrint]Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices, by Henry Carter and Charles Lever and Patrick Traynor[ expand ]
09:17 [Pub][ePrint]Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64, by Léo Perrin and Dmitry Khovratovich[ expand ]
05:52 [Job][New]Summer Intern – Master\\\'s / Ph.D. student in Computer Science, Computer Engineering, or Applied Math, IBM Research – Almaden, 650 Harry Road, San Jose, CA 95120-6099, USA[ expand ]

15:17 [Pub][ePrint]Optimizing Obfuscation: Avoiding Barrington\'s Theorem, by Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations, by Toomas Krips and Jan Willemson[ expand ]
15:17 [Pub][ePrint]Total Break of Zorro using Linear and Differential Attacks, by Shahram Rasoolzadeh and Zahra Ahmadian and Mahmood Salmasizadeh and Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]Dynamic Searchable Encryption via Blind Storage, by Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter[ expand ]

18:08 [Event][New]SECRYPT 2014: 11th International Conference on Security and Cryptography[ expand ]
18:08 [Job][New]Research Scientist, RSA Laboratories, Cambridge, MA, USA[ expand ]
18:07 [Job][New]Internship, Security in Telecommunications, TU Berlin, Germany[ expand ]

18:17 [Pub][ePrint]A Practical Universal Forgery Attack against PAES-8, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]A Forgery Attack against PANDA-s, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]Implementation and improvement of the Partial Sum Attack on 6-round AES, by Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala[ expand ]
18:17 [Pub][ePrint]Attack On the Markov Problem, by James L. Adams[ expand ]
18:17 [Pub][ePrint]Squaring Algorithms with Delayed Carry Method and Efficient Parallelization, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]
18:17 [Pub][ePrint]Secret-Sharing for NP from Indistinguishability Obfuscation, by Ilan Komargodski and Moni Naor and Eylon Yogev[ expand ]
18:17 [Pub][ePrint]Remarks on the Pocklington and Padr\\\'o-S\\\'aez Cube Root Algorithm in $\\mathbb F_q$, by Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon[ expand ]
18:13 [Job][New]Doctoral Students (and Post-Doc), Technische Universität Darmstadt, Germany[ expand ]
17:17 [Event][New]RFIDsec'14 Asia: 2014 Workshop on RFID Security[ expand ]