International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 [ 10 ] 11 12 13 14 15 16 17
23:19 [Event][New]Asiacrypt: Asiacrypt 2017[ expand ]
23:17 [Event][New]Eurocrypt: Eurocrypt 2017[ expand ]

18:17 [Pub][ePrint]Improving the Big Mac Attack on Elliptic Curve Cryptography, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
18:17 [Pub][ePrint]cuHE: A Homomorphic Encryption Accelerator Library, by Wei Dai and Berk Sunar[ expand ]
18:17 [Pub][ePrint]Secure Multi-party Graph Computation, by Varsha Bhat and Harsimran Singh and Sudarshan Iyengar[ expand ]
18:17 [Pub][ePrint]Analysis of Keyless Massive MIMO-based Cryptosystem Security, by Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev[ expand ]
06:50 [Job][Update]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]
06:48 [Job][New]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]

18:17 [Pub][ePrint]On the Power of Hierarchical Identity-Based Encryption, by Mohammad Mahmoody and Ameer Mohammedy[ expand ]
18:17 [Pub][ePrint]CLKS: Certificateless Keyword Search on Encrypted Data, by Qingji Zheng and Xiangxue Li and Aytac Azgin[ expand ]
18:17 [Pub][ePrint]Revisiting Turning Online Cipher Off, by Ritam Bhaumik and Mridul Nandi[ expand ]
15:57 [Event][New]TCC 2016-A: Thirteenth Theory of Cryptography Conference[ expand ]

06:11 [Job][New]Research Assistant, Singapore University of Technology and Design (SUTD)[ expand ]

21:17 [Pub][ePrint]The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob, by Alex Biryukov and Léo Perrin and Aleksei Udovenko[ expand ]
18:17 [Pub][ePrint]Key-recovery attacks against the MAC algorithm Chaskey, by Chrysanthi Mavromati[ expand ]
18:17 [Pub][ePrint]Improved OR Composition of Sigma-Protocols, by Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti[ expand ]
18:17 [Pub][ePrint]New Techniques for Electronic Voting, by Alan Szepieniec and Bart Preneel[ expand ]
15:47 [Job][New]Research Scientist / Software Engineer, NEC Laboratories Europe, Heidelberg, Germany[ expand ]
15:47 [Job][New]Head of Security Product Management,[ expand ]
15:47 [Job][New] Ethical Hacker / Security Penetration Tester,[ expand ]
09:17 [Pub][ePrint]Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks, by Mihir Bellare and Joseph Jaeger and Daniel Kane[ expand ]
03:28 [Event][New]CPSS'16: 2nd ACM Cyber-Physical System Security Workshop (with ACM AsiaCCS'16)[ expand ]

03:17 [Pub][ePrint]Fair Distributed Computation of Reactive Functions, by Juan Garay and Björn Tackmann and Vassilis Zikas[ expand ]
03:17 [Pub][ePrint]Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures, by Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti[ expand ]
03:17 [Pub][ePrint]A classification of elliptic curves with respect to the GHS attack in odd characteristic, by Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao[ expand ]
03:17 [Pub][ePrint]Secure Multi-party Computation: How to Solve the Problem between Security Intelligence & Business Intelligence, by Sumit Chakraborty[ expand ]

16:19 [Job][New]Postdoc and PhD student in Cryptography (Mix-Nets), University of Tartu, Estonia[ expand ]
00:17 [Pub][ePrint]Statistical and Algebraic Properties of DES, by Stian Fauskanger and Igor Semaev[ expand ]

16:37 [Job][New]Post-Doc, University of Florida, Gainesville, FL, USA[ expand ]

21:17 [Pub][ePrint]Ciphertext-only attack on d*d Hill in O(d13^d), by Shahram Khazaei and Siavash Ahmadi[ expand ]
21:17 [Pub][ePrint]Scalar Blinding on Elliptic Curves based on Primes with Special Structure, by Scott Fluhrer[ expand ]
21:17 [Pub][ePrint]Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography, by Jihoon Cho, Kyu Young Choi, and Duk Jae Moon[ expand ]
21:17 [Pub][ePrint]Secure Binary Field Multiplication, by Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim[ expand ]
18:17 [Pub][ePrint]A Stateless Cryptographically-Secure Physical Unclonable Function, by Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas[ expand ]
18:17 [Pub][ePrint]What Security can we Achieve in 4-Rounds?, by Carmit Hazay and Muthuramakrishnan Venkitasubramaniam[ expand ]
18:17 [Pub][ePrint]Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack, by Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi[ expand ]
15:17 [Pub][ePrint]On weak and strong 2^k-bent Boolean functions, by Pantelimon Stanica[ expand ]
15:17 [Pub][ePrint]Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator, by Gangqiang Yang and Mark D. Aagaard and Guang Gong[ expand ]
15:17 [Pub][ePrint]Fast and Memory-Efficient Key Recovery in Side-Channel Attacks, by Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman[ expand ]
15:17 [Pub][ePrint]Safe-Errors on SPA Protected implementations with the Atomicity Technique, by Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache[ expand ]
15:17 [Pub][ePrint]Algorithmic Information Theory for Obfuscation Security, by Rabih Mohsen and Alexandre Miranda Pinto[ expand ]
15:17 [Pub][ePrint]Standard Security Does Not Imply Indistinguishability Under Selective Opening, by Dennis Hofheinz and Vanishree Rao and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]On the equivalence of obfuscation and multilinear maps, by Omer Paneth and Amit Sahai[ expand ]

16:10 [Event][New]InfoSec2015: The Second International Conference on Information Security and Cyber Foren[ expand ]
16:09 [Job][New]Postdoc / Interdisciplinary Coordinator, DFG-Research Training Group UbiCrypt, Ruhr-University Bochum[ expand ]
16:09 [Job][New]PhD, DFG-Research Training Group UbiCrypt, Ruhr-University Bochum[ expand ]
15:17 [Pub][ePrint]Cracking-Resistant Password Vaults using Natural Language Encoders, by Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart[ expand ]
15:17 [Pub][ePrint]Backtracking-Assisted Multiplication, by Houda Ferradi and R\\\'emi G\\\'eraud and Diana Maimut and David Naccache and Hang Zhou[ expand ]
15:17 [Pub][ePrint]Buying AES Design Resistance with Speed and Energy, by Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto[ expand ]
15:17 [Pub][ePrint]Double-Speed Barrett Moduli, by R\\\'emi G\\\'eraud and Diana Maimut and David Naccache[ expand ]

18:17 [Pub][ePrint]Threshold FlipThem: When the winner does not need to take all, by David Leslie and Chris Sherfield and Nigel P. Smart[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the Authenticated Encryption Algorithm COFFE, by Ivan Tjuawinata and Tao Huang and Hongjun Wu[ expand ]
15:17 [Pub][ePrint]Secure two-party computation in applied pi-calculus: models and verification, by Sergiu Bursuc[ expand ]
15:17 [Pub][ePrint]Twisted Hessian curves, by Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange[ expand ]

21:46 [News]Crypto proceedings available; new ePrint editor[ expand ]
18:17 [Pub][ePrint]Multilinear Maps from Obfuscation, by Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson[ expand ]
15:17 [Pub][ePrint]A Simple Scheme, for Strengthening Product-sum Type PKC, by Masao KASAHARA[ expand ]

15:17 [Pub][ePrint]Modular Inversion Hidden Number Problem -- Correction and Improvements, by Santanu Sarkar[ expand ]
15:17 [Pub][ePrint]Arithmetic Walsh Transform of Boolean Functions with Linear Structures, by Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong[ expand ]
15:17 [Pub][ePrint]Functional Encryption for Turing Machines, by Prabhanjan Ananth and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Efficient MDS Diffusion Layers Through Decomposition of Matrices, by S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo[ expand ]

21:17 [Pub][ePrint]Efficient MDS Diffusion Layers Through Decomposition of Matrices, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
21:17 [Pub][ePrint]Revisiting Prime Power RSA, by Santanu Sarkar[ expand ]
21:17 [Pub][ePrint]Distinguishing a truncated random permutation from a random function, by Shoni Gilboa and Shay Gueron[ expand ]
18:17 [Pub][ePrint]Non-Malleable Encryption: Simpler, Shorter, Stronger, by Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi[ expand ]
18:17 [Pub][ePrint]A SAT-based public key encryption scheme, by Sebastian E. Schmittner[ expand ]
16:59 [Event][New]ACISP '16: 21st Australasian Conference on Information Security and Privacy[ expand ]
15:17 [Pub][ePrint]A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles, by Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti[ expand ]

21:17 [Pub][ePrint]On the Hardness of Learning with Rounding over Small Modulus, by Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive, by Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar[ expand ]
17:17 [Job][New]Post-doc and PhD student positions available, New Jersey Institute of Technology (NJIT), metro New York City, USA[ expand ]
17:04 [Job][New]Assistant Professor, Radboud University, Nijmegen, The Netherlands[ expand ]
12:17 [Pub][ePrint]Dual EC: A Standardized Back Door, by Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen[ expand ]
12:17 [Pub][ePrint]Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, by Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng[ expand ]
12:17 [Pub][ePrint]Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version), by Victoria Fehr and Marc Fischlin[ expand ]
12:17 [Pub][ePrint]A Note on Generating Coset Representatives of $PGL_2(\\F_q)$ in $PGL_2(\\F_{q^2})$, by Jincheng Zhuang and Qi Cheng[ expand ]
12:17 [Pub][ePrint]Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design, by Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki[ expand ]
12:17 [Pub][ePrint]A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b, by Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language, by William Diehl[ expand ]
12:17 [Pub][ePrint]Investigating SRAM PUFs in large CPUs and GPUs, by Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen[ expand ]

12:17 [Pub][ePrint]Cryptanalysis of Gu\'s ideal multilinear map, by Alice Pellet-Mary and Damien Stehle[ expand ]
12:17 [Pub][ePrint]Ring-LWE Cryptography for the Number Theorist, by Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange[ expand ]
12:17 [Pub][ePrint]Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks, by Matthias Hamann and Matthias Krause[ expand ]
12:17 [Pub][ePrint]Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme, by Yandong Zheng, Hua Guo[ expand ]
12:17 [Pub][ePrint]TESLA: Tightly-Secure Efficient Signatures from Standard Lattices, by Erdem Alkim and Nina Bindel and Johannes Buchmann and \\\"Ozg\\\"ur Dagdelen[ expand ]
12:17 [Pub][ePrint]Related-Key Attack on Full-Round PICARO, by Anne Canteaut and Virginie Lallemand and Mar\\\'ia Naya-Plasencia[ expand ]
12:17 [Pub][ePrint]Differential Computation Analysis: Hiding your White-Box Designs is Not Enough, by Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen[ expand ]
12:17 [Pub][ePrint]On Constructing One-Way Permutations from Indistinguishability Obfuscation, by Gilad Asharov and Gil Segev[ expand ]
12:17 [Pub][ePrint]Fast Garbling of Circuits Under Standard Assumptions, by Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas[ expand ]
12:17 [Pub][ePrint]Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key, by Ryo Nishimaki and Daniel Wichs and Mark Zhandry[ expand ]
12:17 [Pub][ePrint]Affine Equivalence and its Application to Tightening Threshold Implementations, by Pascal Sasdrich and Amir Moradi and Tim Güneysu[ expand ]
12:17 [Pub][ePrint]A More Cautious Approach to Security Against Mass Surveillance, by Jean Paul Degabriele and Pooya Farshim and Bertram Poettering[ expand ]
12:17 [Pub][ePrint]Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation, by Huang Zhang and Fangguo zhang and Baodian Wei and Yusong Du[ expand ]
12:17 [Pub][ePrint]A 2^{70} Attack on the Full MISTY1, by Achiya Bar-On[ expand ]

17:47 [Job][New]Two PhD students in Computer Security, University College Cork, Ireland[ expand ]
13:32 [PhD][New]Dr. Ratna Dutta: Studies on Pairing-Based and Constant Round Dynamic Group Key Agreement Protocols[ expand ]
13:32 [PhD][New]Dr. Y. Sreenivasa Rao: Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings[ expand ]
13:31 [PhD][New]Saqib A. Kakvi: On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice[ expand ]

16:11 [Event][New]IFIP SEC 2016: 31th IFIP TC-11 SEC 2016 International InformationSecurity and Privacy Con[ expand ]

15:17 [Pub][ePrint]Faster ECC over F_{2^571} (feat. PMULL), by Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim[ expand ]
15:17 [Pub][ePrint]BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware, by Ege Gulcan and Aydin Aysu and Patrick Schaumont[ expand ]
15:17 [Pub][ePrint]Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions, by Benoit Libert and Thomas Peters and Moti Yung[ expand ]
15:17 [Pub][ePrint]A Matrix Decomposition Method for Optimal Normal Basis Multiplication, by Can K{\\i}z{\\i}lkale and \\\"{O}mer E\\v{g}ecio\\v{g}lu and \\c{C}etin Kaya Ko\\c{c}[ expand ]
15:17 [Pub][ePrint]On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes, by Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan[ expand ]
15:17 [Pub][ePrint]Predictable Arguments of Knowledge, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi[ expand ]
15:17 [Pub][ePrint]Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation, by Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang[ expand ]
15:17 [Pub][ePrint]Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO), by Kazuhiko Minematsu[ expand ]
15:17 [Pub][ePrint]New multilinear maps from ideal lattices, by Gu Chunsheng[ expand ]
15:17 [Pub][ePrint]Solving LWE via List Decoding, by Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang[ expand ]
15:17 [Pub][ePrint]Modern Cryptography Through the Lens of Secret Sharing, by Ilan Komargodski and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]On the Security of Extended Generalized Feistel Networks, by Manoj Kumar and Saibal K. Pal 1 and Anupama Panigrahi[ expand ]
15:17 [Pub][ePrint]Fully Homomorphic Encryption on Octonion Ring, by Masahiro Yagisawa[ expand ]
15:17 [Pub][ePrint]Compact Implementations of LEA Block Cipher for Low-End Microprocessors, by Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim[ expand ]
15:17 [Pub][ePrint]Same Value Analysis on Edwards Curves, by Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza[ expand ]
15:17 [Pub][ePrint]Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption, by Prabhanjan Ananth and Abhishek Jain and Amit Sahai[ expand ]
15:03 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 1 post), Ruhr-University Bochum[ expand ]

16:49 [Job][New]Assistant/Associate Professor, Hangzhou Normal University, China[ expand ]

09:17 [Pub][ePrint]Towards Provably-Secure Remote Memory Attestation, by Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware, by Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas[ expand ]
09:17 [Pub][ePrint]DPA, Bitslicing and Masking at 1 GHz, by Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Compositions of linear functions and applications to hashing, by Vladimir Shpilrain and Bianca Sosnovski[ expand ]
09:17 [Pub][ePrint]The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable, by Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman[ expand ]
09:17 [Pub][ePrint]A masked ring-LWE implementation, by Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Feistel Networks with Secret Round Functions, by Alex Biryukov and Gaëtan Leurent and Léo Perrin[ expand ]
09:17 [Pub][ePrint]Oblivious Substring Search with Updates, by Tarik Moataz and Erik-Oliver Blass[ expand ]
09:17 [Pub][ePrint]KDM-Security via Homomorphic Smooth Projective Hashing, by Hoeteck Wee[ expand ]

19:30 [Job][New]PhD student, Université Paris 7, France[ expand ]
09:17 [Pub][ePrint]Output-Compressing Randomized Encodings and Applications, by Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang[ expand ]
09:17 [Pub][ePrint]Consolidating masking schemes, by Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Efficient Asynchronous Accumulators for Distributed PKI, by Leonid Reyzin and Sophia Yakoubov[ expand ]
09:17 [Pub][ePrint]Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks, by Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding[ expand ]
09:17 [Pub][ePrint]Linear Cryptanalysis of Reduced-Round SIMECK Variants, by Nasour Bagheri[ expand ]

15:17 [Pub][ePrint]New Circular Security Counterexamples from Decision Linear and Learning with Errors, by Allison Bishop and Susan Hohenberger and Brent Waters[ expand ]
15:17 [Pub][ePrint]New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over $\\mathbb{F}_{2^m}$ and K(XVI)SE(2)PKC, based on cyclic code over $\\mathbb{F}_2$., by Masao KASAHARA[ expand ]
15:17 [Pub][ePrint]Light-hHB: A New Version of hHB with Improved Session Key Exchange, by Ka Ahmad Khoureich[ expand ]
15:17 [Pub][ePrint]On Limitations of the Fiat­-Shamir Transformation, by David Bernhard and Bogdan Warinschi[ expand ]
15:17 [Pub][ePrint]Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version), by Anne Canteaut and Sébastien Duval and Gaëtan Leurent[ expand ]
15:17 [Pub][ePrint]Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version), by Bernardo Ferreira and Jo\\~{a}o Rodrigues and Jo\\~{a}o Leit\\~{a}o and Henrique Domingos[ expand ]
15:17 [Pub][ePrint]Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception, by Luka Malisa and Kari Kostiainen and Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]Choosing Parameters for NTRUEncrypt, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang[ expand ]
15:17 [Pub][ePrint]Reconciling User Privacy and Implicit Authentication for Mobile Devices, by Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa[ expand ]
15:17 [Pub][ePrint]A Brief Comparison of Simon and Simeck, by Stefan Kölbl and Arnab Roy[ expand ]

18:11 [Pub][ePrint]Optimizing MAKWA on GPU and CPU, by Thomas Pornin[ expand ]
18:11 [Pub][ePrint]Linear Overhead Robust MPC with Honest Majority Using Preprocessing, by Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart[ expand ]
18:11 [Pub][ePrint]Indistinguishability Obfuscation: from Approximate to Exact, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
18:11 [Pub][ePrint]Point-Function Obfuscation: A Framework and Generic Constructions, by Mihir Bellare and Igors Stepanovs[ expand ]
18:11 [Pub][ePrint]Demystifying incentives in the consensus computer, by Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena[ expand ]
18:11 [Pub][ePrint]Differential Privacy in distribution and instance-based noise mechanisms, by Sébastien Canard and Baptiste Olivier[ expand ]
18:11 [Pub][ePrint]Four Neighbourhood Cellular Automata as Better Cryptographic Primitives, by Jimmy Jose and Dipanwita RoyChowdhury[ expand ]
18:11 [Pub][ePrint]FURISC: FHE Encrypted URISC Design, by Ayantika Chatterjee and Indranil Sengupta[ expand ]
18:11 [Pub][ePrint]Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa, by Subhamoy Maitra[ expand ]
18:11 [Pub][ePrint]On the Security of a Self-healing Group Key Distribution Scheme, by Yandong Zheng, Hua Guo[ expand ]
18:11 [Pub][ePrint]Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p), by Miguel Morales Sandoval and Arturo Diaz Perez[ expand ]
18:11 [Pub][ePrint]Cliptography: Clipping the Power of Kleptographic Attacks, by Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou[ expand ]
18:11 [Pub][ePrint]On the Complexity of Additively Homomorphic UC Commitments, by Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti[ expand ]
18:11 [Pub][ePrint]Foundations of Reactive Garbling Schemes, by Jesper Buus Nielsen and Samuel Ranellucci[ expand ]
18:11 [Pub][ePrint]Fast and Secure Linear Regression and Biometric Authentication with Security Update, by Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang[ expand ]
18:11 [Pub][ePrint]SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, by Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth[ expand ]
18:11 [Pub][ePrint]Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, by Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
18:11 [Pub][ePrint]How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack, by Daniel P. Martin and Jonathan F. O\'Connell and Elisabeth Oswald and Martijn Stam[ expand ]
18:11 [Pub][ePrint]Binary Field Multiplication on ARMv8, by Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim[ expand ]
18:11 [Pub][ePrint]Classical Cryptographic Protocols in a Quantum World, by Sean Hallgren and Adam Smith and Fang Song[ expand ]
18:11 [Pub][ePrint]Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment, by Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahm[ expand ]
18:11 [Pub][ePrint]On the discrete logarithm problem in finite fields of fixed characteristic, by Robert Granger and Thorsten Kleinjung and Jens Zumbr\\\"agel[ expand ]
18:11 [Pub][ePrint]A One-time Stegosystem and Applications to Efficient Covert Communication, by Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar[ expand ]
18:11 [Pub][ePrint]Security of Linear Secret-Sharing Schemes against Mass Surveillance, by Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci[ expand ]
18:11 [Pub][ePrint]Integral Cryptanalysis on Full MISTY1, by Yosuke Todo[ expand ]
18:11 [Pub][ePrint]ANONIZE: A Large-Scale Anonymous Survey System, by Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat[ expand ]
18:11 [Pub][ePrint]Indifferentiability of Confusion-Diffusion Networks, by Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger[ expand ]
18:11 [Pub][ePrint]Another Look at Normal Approximations in Cryptanalysis, by Subhabrata Samajder and Palash Sarkar[ expand ]

22:30 [Job][New]PhD Position on Consent Management in Emerging Mobile and Pervasive Computing Systems, Technische Universität Darmstadt, Germany.[ expand ]

16:24 [Event][New]INTRUST 2015: The 7th International Conference on Trusted Systems[ expand ]

18:03 [Job][New]Scientist or Post-Doc Position, AIT Austrian Institute of Technology, Vienna, Austria[ expand ]
18:02 [Event][New]Special issue on Recent Advances in Physical-Layer Security[ expand ]
18:02 [Event][New]Lightweight and Energy-Efficient Security Solutions for Mobile Computing De[ expand ]

15:16 [Event][New]CrossFyre: Intern. Workshop on Crypto, Robustness, and Provably Secure Schemes[ expand ]
15:13 [Job][New]EU Coordinator and Researcher in Cryptography and Computer Security, Simula Research Laboratory, Norway[ expand ]
15:13 [Job][New]Two PostDoc Positions in Software Security, TU Darmstadt[ expand ]
15:12 [Job][New]Research Scientist / Senior Researcher, NEC Laboratories Europe, Heidelberg, Germany[ expand ]
15:12 [Job][New]PhD Position in Side-Channel Analysis and Secure Implementation, Worcester Polytechnic Institute, USA[ expand ]

17:43 [News]IACR Response to Australia's Defence Trade Controls Act[ expand ]
00:17 [Forum][2015 Reports] Re: 2015/650 It looks like not secure by movax[ expand ]

18:17 [Pub][ePrint]Decaf: Eliminating cofactors through point compression, by Mike Hamburg[ expand ]
18:17 [Pub][ePrint]Function-Hiding Inner Product Encryption, by Allison Bishop and Abhishek Jain and Lucas Kowalczyk[ expand ]
18:17 [Pub][ePrint]Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data, by Peeter Laud and Alisa Pankova[ expand ]
18:17 [Pub][ePrint]Smart Security Management in Secure Devices, by Bruno Robisson, Michel Agoyan, Patrick Soquet, S\\\'ebastien Le Henaff, Franck Wajsb\\\"urt, Pirouz Bazargan-Sabet, Guillaume Phan[ expand ]
18:17 [Pub][ePrint]GMU Hardware API for Authenticated Ciphers, by Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj[ expand ]
18:17 [Pub][ePrint]The Fallacy of Composition of Oblivious RAM and Searchable Encryption, by Muhammad Naveed[ expand ]
18:17 [Pub][ePrint]De Bruijn Sequences from Nonlinear Feedback Shift Registers, by Ming Li and Dongdai Lin[ expand ]
18:17 [Pub][ePrint]Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques, by Huaifeng Chen and Xiaoyun Wang[ expand ]
18:17 [Pub][ePrint]Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption., by Romain Gay and Iordanis Kerenidis and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Secure Multi-Party Shuffling, by Mahnush Movahedi and Jared Saia and Mahdi Zamani[ expand ]
18:17 [Pub][ePrint]EdDSA for more curves, by Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang[ expand ]
18:17 [Pub][ePrint]Quantum Cryptanalysis of NTRU, by Scott Fluhrer[ expand ]
18:17 [Pub][ePrint]Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts, by Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou[ expand ]
18:17 [Pub][ePrint]Preprocessing-Based Verification of Multiparty Protocols with Honest Majority, by Peeter Laud and Alisa Pankova[ expand ]
09:17 [Forum][2015 Reports] Re: 2015/650 It looks like not secure by Oleksandr Kazymyrov[ expand ]
03:17 [Forum][2015 Reports] 2015/650 It looks like not secure by movax[ expand ]

18:42 [Job][New]Ph.D. student in Crypto-Finance, Cybersecurity and Privacy, University of Luxembourg[ expand ]
16:34 [Job][New]Ph.D., Hochschule Offenburg (University of Applied Sciences)[ expand ]
09:17 [Pub][ePrint]Analyzing the Efficiency of Biased-Fault Based Attacks, by Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont[ expand ]

16:39 [News]CRYPTO registration open, Journal of Cryptology delivery changes[ expand ]
15:17 [Pub][ePrint]Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves, by Ryutaroh Matsumoto[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of a modern rotor machine in a multicast setting, by Shane Kepley and David Russo and Rainer Steinwandt[ expand ]
09:17 [Pub][ePrint]A Hybrid Gaussian Sampler for Lattices over Rings, by Léo Ducas and Thomas Prest[ expand ]
09:17 [Pub][ePrint]Diversity and Transparency for ECC, by Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå[ expand ]
09:17 [Pub][ePrint]Single-Cycle Implementations of Block Ciphers, by Pieter Maene and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Randomizing the Montgomery Powering Ladder, by Duc-Phong Le \\and Chik How Tan \\and Michael Tunstall[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of a Markov Chain Based User Authentication Scheme, by Ruhul Amin and G.P. Biswas[ expand ]
09:17 [Pub][ePrint]An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves, by Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin[ expand ]
09:17 [Pub][ePrint]DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone, by Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng[ expand ]

18:16 [Job][New]Two permanent academic posts in Secure Systems at Surrey, University of Surrey[ expand ]
16:11 [Event][New]Passwords '15: The 9th International Conference on Passwords[ expand ]
16:10 [Event][New]CHAE: Challenges in Authenticated Encryption[ expand ]
09:17 [Pub][ePrint]Homomorphic Signature Schemes - A survey, by Giulia Traverso and Denise Demirel and Johannes Buchmann[ expand ]
03:17 [Pub][ePrint]Modelling ciphersuite and version negotiation in the TLS protocol, by Benjamin Dowling and Douglas Stebila[ expand ]
03:17 [Pub][ePrint]Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption, by Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller[ expand ]
03:17 [Pub][ePrint]A New Encryption Standard of Ukraine: The Kalyna Block Cipher, by Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksan[ expand ]
03:17 [Pub][ePrint]On the Hardness of Proving CCA-security of Signed ElGamal, by David Bernhard and Marc Fischlin and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]Adaptive Proofs of Knowledge in the Random Oracle Model, by David Bernhard and Marc Fischlin and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]Efficient ephemeral elliptic curve cryptographic keys, by Andrea Miele and Arjen K. Lenstra[ expand ]
03:17 [Pub][ePrint]Decomposition attack on SASASASAS, by Alex Biryukov and Dmitry Khovratovich[ expand ]
03:17 [Pub][ePrint]Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy, by Cl\\\'{e}mentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen[ expand ]
03:17 [Pub][ePrint]The Pythia PRF Service, by Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart[ expand ]

21:17 [Pub][ePrint]Short Accountable Ring Signatures Based on DDH, by Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit[ expand ]
21:17 [Pub][ePrint]A New Partial Key Exposure Attack on Multi-power RSA, by Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings, by Jing Li and Licheng Wang[ expand ]
21:17 [Pub][ePrint]Very-efficient simulatable flipping of many coins into a well, by Luís T. A. N. Brandão[ expand ]
21:17 [Pub][ePrint]Polynomial time reduction from approximate shortest vector problem to principle ideal probelm for lattices in cyclotomic rings, by Hao Chen[ expand ]
21:17 [Pub][ePrint]An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment, by Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta[ expand ]
21:17 [Pub][ePrint]A Novel Cyberspace-Oriented Access Control Model, by Fenghua Li and Yanchao Wang and Rongna Xie and Fangfang Shan and Jinbo Xiong[ expand ]
21:17 [Pub][ePrint]Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes, by Matthias Krause[ expand ]
21:17 [Pub][ePrint]Microcash: Efficient Off-Line Small Payments, by Chris Pavlovski and Colin Boyd[ expand ]
21:17 [Pub][ePrint]Phasing: Private Set Intersection using Permutation-based Hashing, by Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner[ expand ]
21:17 [Pub][ePrint]An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme, by Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models, by Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji[ expand ]
21:17 [Pub][ePrint]Accelerating Homomorphic Evaluation on Reconfigurable Hardware, by Thomas P\\\"oppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias[ expand ]
21:17 [Pub][ePrint]Unconditionally Secure Computation with Reduced Interaction, by Ivan Damgård and Jesper Buus Nielsen[ expand ]
21:17 [Pub][ePrint]BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme, by Véronique Cortier and Georg Fuchsbauer and David Galindo[ expand ]
21:17 [Pub][ePrint]An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme, by Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer[ expand ]
21:17 [Pub][ePrint]On Necessary Padding with IO, by Justin Holmgren[ expand ]
21:17 [Pub][ePrint]Practical Round-Optimal Blind Signatures in the Standard Model, by Georg Fuchsbauer and Christian Hanser and Daniel Slamanig[ expand ]
21:17 [Pub][ePrint]Ed448-Goldilocks, a new elliptic curve, by Mike Hamburg[ expand ]
21:17 [Pub][ePrint]Automated Analysis and Synthesis of Authenticated Encryption Schemes, by Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff[ expand ]
21:17 [Pub][ePrint]Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators, by Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand[ expand ]
21:17 [Pub][ePrint]Random Digit Representation of Integers, by Nicolas Méloni and M. Anwar Hasan[ expand ]
21:17 [Pub][ePrint]Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms, by Sarani Bhattacharya, Debdeep Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions, by Susumu Kiyoshima[ expand ]
21:17 [Pub][ePrint]Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits, by Seher Tutdere and Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities, by Juan Carlos Ku-Cauich Guillermo Morales-Luna Horacio Tapia-Recillas[ expand ]
21:17 [Pub][ePrint]Generalised tally-based decoders for traitor tracing and group testing, by Boris Skoric and Wouter de Groot[ expand ]
21:17 [Pub][ePrint]The leaking battery A privacy analysis of the HTML5 Battery Status API, by Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz[ expand ]
21:17 [Pub][ePrint]Security Analysis of Niu et al. Authentication and Ownership Management Protocol, by Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati[ expand ]
20:15 [Job][New]Post.doc., Norwegian University of Science and Technology (NTNU), Trondheim, Norway[ expand ]
18:17 [Pub][ePrint]Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem, by Fangguo Zhang[ expand ]
18:17 [Pub][ePrint]Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud, by Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei[ expand ]
18:17 [Pub][ePrint]The Simeck Family of Lightweight Block Ciphers, by Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong[ expand ]
16:29 [Job][New]Ph.D. scholarship, Institute of Computer Science, Polish Academy of Sciences, POLAND[ expand ]

21:24 [Event][New]FC '16: Financial Cryptography and Data Security 2016[ expand ]

21:17 [Pub][ePrint]A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0, by Shijun Zhao and Qianying Zhang[ expand ]
21:17 [Pub][ePrint]McBits: fast constant-time code-based cryptography, by Daniel J. Bernstein and Tung Chou and Peter Schwabe[ expand ]
21:17 [Pub][ePrint]Experimental Study of DIGIPASS GO3 and the Security of Authentication, by Igor Semaev[ expand ]
21:17 [Pub][ePrint]Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Benoit Libert and Damien Stehle[ expand ]
21:17 [Pub][ePrint]Netcoin - A Traceable P2P Electronic Cash System, by Hitesh Tewari and Eamon O Nuallain[ expand ]
21:17 [Pub][ePrint]Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM, by Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon[ expand ]
21:17 [Pub][ePrint]Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm, by Steven D. Galbraith and Ping Wang and Fangguo Zhang[ expand ]
21:17 [Pub][ePrint]Structure-Preserving Signatures from Standard Assumptions, Revisited, by Eike Kiltz and Jiaxin Pan and Hoeteck Wee[ expand ]
21:17 [Pub][ePrint]Complementary Dual Codes for Counter-measures to Side-Channel Attacks, by Claude Carlet and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers, by Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay[ expand ]
21:17 [Pub][ePrint]A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation, by Mei Wang, Zheng Yuan,Xiao Feng[ expand ]

23:21 [Event][New]ACNS'16: 14th International Conference on Applied Cryptography and Network Security[ expand ]

16:08 [Job][New]Two PhD Positions in Cryptography, University of Bristol[ expand ]

16:27 [Job][New]Ph.D. scholarship, University of Bergen[ expand ]

22:47 [Job][New]Postdoc, Cryptographic Algorithms Group, CISPA, Saarland University, Germany[ expand ]
22:47 [Job][New]Sr. SW Engineer – Security/Applied Cryptography Expert , Aspera - an IBM Company[ expand ]

03:55 [News]Open Letter to the Hon'ble President of India[ expand ]

18:17 [Pub][ePrint]Predictive Models for Min-Entropy Estimation, by John Kelsey and Kerry A. McKay and Meltem Sonmez Turan[ expand ]
18:17 [Pub][ePrint]The Chain Rule for HILL Pseudoentropy, Revisited, by Krzysztof Pietrzak and Maciej Skorski[ expand ]
18:17 [Pub][ePrint]Combining Differential Privacy and Secure Multiparty Computation, by Martin Pettai and Peeter Laud[ expand ]
18:17 [Pub][ePrint]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?, by Amir Moradi and Alexander Wild[ expand ]
18:17 [Pub][ePrint]Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations, by Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana[ expand ]
18:17 [Pub][ePrint]Differential Fault Intensity Analysis, by Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont[ expand ]
18:17 [Pub][ePrint]Disk Encryption: Do We Need to Preserve Length?, by Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar[ expand ]
18:17 [Pub][ePrint]A Physical Approach for Stochastic Modeling of TERO-based TRNG, by Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI[ expand ]
18:17 [Pub][ePrint]Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information, by Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and[ expand ]
18:17 [Pub][ePrint]How much randomness can be extracted from memoryless Shannon entropy sources?, by Maciej Skorski[ expand ]
18:17 [Pub][ePrint]TriviA: A Fast and Secure Authenticated Encryption Scheme, by Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi[ expand ]
18:17 [Pub][ePrint]Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath, by A.-M. Leventi-Peetz and J.-V. Peetz[ expand ]
18:17 [Pub][ePrint]An analysis of the $C$ class of bent functions, by Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic[ expand ]
18:17 [Pub][ePrint]SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System, by Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang[ expand ]
18:17 [Pub][ePrint]SIMON and SPECK: Block Ciphers for the Internet of Things, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
18:17 [Pub][ePrint]How to Securely Prolong the Computational Bindingness of Pedersen Commitments, by Denise Demirel and Jean Lancrenon[ expand ]
09:17 [Pub][ePrint]Secure Key Generation from Biased PUFs, by Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems[ expand ]
09:17 [Pub][ePrint]How Secure and Quick is QUIC? Provable Security and Performance Analyses, by Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru[ expand ]
09:17 [Pub][ePrint]Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation, by Christina Brzuska and Arno Mittelbach[ expand ]
09:17 [Pub][ePrint]Composable & Modular Anonymous Credentials: Definitions and Practical Constructions, by Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss[ expand ]

01:50 [News]FSE 2013 videos[ expand ]

20:10 [Event][New]CTISRM2016: The International Conference on Computing Technology, Information Security[ expand ]

21:17 [Pub][ePrint]A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation, by Mridul Nandi[ expand ]

18:17 [Pub][ePrint]Tampering with the Delivery of Blocks and Transactions in Bitcoin, by Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun[ expand ]
18:17 [Pub][ePrint]Twist Insecurity, by Manfred Lochter, Andreas Wiemers[ expand ]
18:17 [Pub][ePrint]The Carnac protocol -- or how to read the contents of a sealed envelope, by Michael Scott and Brian Spector[ expand ]
18:17 [Pub][ePrint]Known-key Distinguisher on Full PRESENT, by Céline Blondeau and Thomas Peyrin and Lei Wang[ expand ]
18:17 [Pub][ePrint]Fair and Robust Multi-Party Computation using a Global Transaction Ledger, by Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas[ expand ]
18:17 [Pub][ePrint]Last fall degree, HFE, and Weil descent attacks on ECDLP, by Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo[ expand ]
18:17 [Pub][ePrint]On Public Key Encryption from Noisy Codewords, by Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi[ expand ]
18:17 [Pub][ePrint]Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order, by Tobias Schneider and Amir Moradi and Tim Güneysu[ expand ]
18:17 [Pub][ePrint]Constant Communication Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass[ expand ]
18:17 [Pub][ePrint]Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version), by Bingke Ma and Bao Li and Rongl[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of Reduced-Round Whirlwind (Full Version), by Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li[ expand ]
03:17 [Pub][ePrint]Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes, by Henri Gilbert and Jérôme Plût and Joana Treger[ expand ]
03:17 [Pub][ePrint]A Framework for Identity-Based Encryption with Almost Tight Security, by Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada[ expand ]
03:17 [Pub][ePrint]FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime, by Craig Costello and Patrick Longa[ expand ]
03:17 [Pub][ePrint]Sanctum: Minimal RISC Extensions for Isolated Execution, by Victor Costan and Ilia Lebedev and Srinivas Devadas[ expand ]
03:17 [Pub][ePrint]Privacy in the Genomic Era, by Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang[ expand ]
03:17 [Pub][ePrint]PUA - Privacy and Unforgeability for Aggregation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva and Melek Önen[ expand ]
00:17 [Pub][ePrint]PUA - Privacy and Unforgeability for Aggregation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molvaa and Melek Onen ¨[ expand ]
00:17 [Pub][ePrint]SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip, by J. Longo and E. De Mulder and D. Page and M. Tunstall[ expand ]
00:17 [Pub][ePrint]Generic Construction of UC-Secure Oblivious Transfer, by Olivier Blazy and Céline Chevalier[ expand ]
00:17 [Pub][ePrint]Concurrent Secure Computation with Optimal Query Complexity, by Ran Canetti and Vipul Goyal and Abhishek Jain[ expand ]
00:17 [Pub][ePrint]Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting, by Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen[ expand ]

15:55 [Event][New]PKC: Public Key Cryptography[ expand ]
15:54 [Event][New]16th International Conference on Cryptology, Indocrypt (Indocrypt)[ expand ]

23:09 [Job][New]PhD student in Information Security and Cryptography, Chalmers University of Technology, Sweden[ expand ]
16:00 [Job][New]Postdoctoral researcher in Quantum Cryptography, University of Amsterdam[ expand ]
16:00 [Job][New]PhD candidate in Quantum Cryptography, University of Amsterdam[ expand ]
16:00 [Event][New]ICICS 2015: International Conference on Information and Communications Security[ expand ]
09:17 [Pub][ePrint]Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers, by Takanori Isobe and Kyoji Shibutani[ expand ]
09:17 [Pub][ePrint]Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates, by Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack, by Tapas Pandit and Sumit Kumar Pandey and Rana Barua[ expand ]
09:17 [Pub][ePrint]An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue[ expand ]

21:17 [Pub][ePrint]Round-Optimal Black-Box Two-Party Computation, by Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro[ expand ]
21:17 [Pub][ePrint]An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices, by Paul Kirchner and Pierre-Alain Fouque[ expand ]

17:11 [News]Deadline approaching for IACR School proposals[ expand ]

21:17 [Pub][ePrint]Quantum homomorphic encryption for circuits of low $T$-gate complexity, by Anne Broadbent and Stacey Jeffery[ expand ]
04:08 [Event][New]PRIVAGEN 2015: Privacy-Aware Computational Genomics 2015[ expand ]

21:17 [Forum][2014 Reports] 2015/468 FHE for plaintexts from Z_p, with prime p, do not work? by movax[ expand ]
17:37 [Event][New]PETS: Privacy Enhancing Technologies Symposium (PETS)[ expand ]
15:16 [Job][New]Doctoral Research Fellows, University of Passau[ expand ]
06:37 [Job][New]Post-Doc, Ruhr University Bochum[ expand ]
06:37 [Job][New]PhD Research Fellowship in Secure Networking Technologies, Norwegian University of Science and Technology (NTNU), Trondheim, Norway[ expand ]

14:44 [Event][New]CT-RSA'16: RSA Conference 2016 Cryptographer's Track[ expand ]

15:06 [Event][New]ICISSP 2016: 2nd International Conference on Information Systems Security and Privacy[ expand ]
00:17 [Pub][ePrint]Upending Stock Market Structure Using Secure Multi-Party Computation, by Charanjit S. Jutla[ expand ]
00:17 [Pub][ePrint]ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices, by Amir Hassani Karbasi, Reza Ebrahimi Atani[ expand ]
00:17 [Pub][ePrint]Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines, by Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz[ expand ]
00:17 [Pub][ePrint]Secure Computation of MIPS Machine Code, by Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz[ expand ]
00:17 [Pub][ePrint]Actively Secure OT Extension with Optimal Overhead, by Marcel Keller and Emmanuela Orsini and Peter Scholl[ expand ]
00:17 [Pub][ePrint]FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs, by Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing[ expand ]
00:17 [Pub][ePrint]Alternative cubics\' rules with an algebraic appeal, by Daniel R. L. Brown[ expand ]
00:17 [Pub][ePrint]Bloom Filters in Adversarial Environments, by Moni Naor and Eylon Yogev[ expand ]
00:17 [Pub][ePrint]Improved Side-Channel Analysis of Finite-Field Multiplication, by Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff[ expand ]
00:17 [Pub][ePrint]Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption, by Bart Mennink and Reza Reyhanitabar and Damian Vizár[ expand ]

12:17 [Pub][ePrint]Tweaking Even-Mansour Ciphers, by Benoît Cogliati and Rodolphe Lampe and Yannick Seurin[ expand ]
12:17 [Pub][ePrint]Pairing Based Mutual Healing in Wireless Sensor Networks, by Sarita Agrawal and Jay Patel and Manik Lal Das[ expand ]
12:17 [Pub][ePrint]Towards Easy Leakage Certification, by François Durvaux and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, by François Durvaux and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, by Vincent Grosso and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]Problems, solutions and experience of the first international student\'s Olympiad in cryptography, by Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel [ expand ]

22:34 [Event][New]LightSec 2015: Workshop on Lightweight Cryptography for Security & Privacy[ expand ]

15:44 [Event][New]C&TC 2015: 5th Int. Symposium on Cloud and Trusted Computing[ expand ]
03:32 [PhD][Update]Nishant Doshi: Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption[ expand ]
03:28 [PhD][New]Dai Yamamoto: Security Evaluation and Improvement of Physically Unclonable Functions[ expand ]
00:17 [Pub][ePrint]Related-Key Rectangle Attack on Round-reduced \\textit{Khudra} Block Cipher, by Xiaoshuang Ma and Kexin Qiao[ expand ]
00:17 [Pub][ePrint]PICO: An Ultra lightweight and Low power encryption design for pervasive computing, by GAURAV BANSOD , NARAYAN PISHAROTY AND ABHIJIT PATIL[ expand ]
00:17 [Pub][ePrint]Reproducible Circularly-Secure Bit Encryption: Applications and Realizations, by Mohammad Hajiabadi, Bruce M. Kapron[ expand ]
00:17 [Pub][ePrint]Practical Free-Start Collision Attacks on 76-step SHA-1, by Pierre Karpman and Thomas Peyrin and Marc Stevens[ expand ]
00:17 [Pub][ePrint]Power Analysis Attacks against IEEE 802.15.4 Nodes, by Colin O\'Flynn and Zhizhang Chen[ expand ]
00:17 [Pub][ePrint]Spacecoin: A Cryptocurrency Based on Proofs of Space, by Sunoo Park and Krzysztof Pietrzak and Jo\\\"el Alwen and Georg Fuchsbauer and Peter Gazi[ expand ]

22:58 [Job][New]PhD student , Universitat Pompeu Fabra, Barcelona, Spain[ expand ]

20:30 [Event][New]AFRICACRYPT 2016: International Conference on Cryptology, AFRICACRYPT 2016[ expand ]
09:17 [Pub][ePrint]Robust Profiling for DPA-Style Attacks, by Carolyn Whitnall and Elisabeth Oswald[ expand ]
09:17 [Pub][ePrint]Generic Key Recovery Attack on Feistel Scheme, by Takanori Isobe and Kyoji Shibutani[ expand ]
09:17 [Pub][ePrint]Short Randomizable Signatures, by David Pointcheval and Olivier Sanders[ expand ]
06:17 [Pub][ePrint]Secure Key Exchange Protocol based on Virtual Proof of Reality, by Yansong Gao[ expand ]
05:07 [Job][New]Call for Ph.D. Students - Cloud Security, The University of Auckland, New Zealand[ expand ]
05:07 [Job][New]Research Fellow/Postdoctoral Researcher - Cloud Security, The University of Auckland[ expand ]

16:05 [Event][New]Inscrypt 2015: 11th International Conference on Information Security and Cryptology[ expand ]