International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 [ 11 ] 12 13
2013-11-18
10:57 [Election]IACR 2013 Election Results[ expand ]
10:09 [Event][New]WISTP 2014: 8th Workshop in Information Security Theory and Practice[ expand ]


2013-11-17
04:17 [Pub][ePrint]A Meet-in-the-middle Attack on Round-Reduced mCrypton, by Yonglin Hao, Dongxia Bai[ expand ]
04:17 [Pub][ePrint]Improving security and efficiency for multi-authority access control system in cloud storage, by Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong[ expand ]
04:17 [Pub][ePrint]Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP, by Omkant Pandey and Manoj Prabhakaran and Amit Sahai[ expand ]
04:17 [Pub][ePrint]Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures, by Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele [ expand ]
04:17 [Pub][ePrint]On the Power of Rewinding Simulators in Functional Encryption, by Angelo De Caro and Vincenzo Iovino[ expand ]
04:17 [Pub][ePrint]Using Hamiltonian Totems as Passwords, by Herv\\\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache[ expand ]
04:17 [Pub][ePrint]Fully Deniable Mutual Authentication Protocol Based on RSA Signature, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Efficient CCA-secure Threshold Public-Key Encryption Scheme, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Plaintext Recovery Attacks Against WPA/TKIP, by Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt[ expand ]
04:17 [Pub][ePrint]Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks, by Jayaprakash Kar[ expand ]
04:17 [Pub][ePrint]Asymptotically Efficient Lattice-Based Digital Signatures, by Vadim Lyubashevsky and Daniele Miccicancio[ expand ]
04:17 [Pub][ePrint]Asynchronous MPC with t< n/2 Using Non-equivocation, by Michael Backes, Fabian Bendun, Ashish Choudhury and Aniket Kate[ expand ]
04:17 [Pub][ePrint]Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results, by Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumar[ expand ]
04:17 [Pub][ePrint]Privacy Preserving Unique Statistics in a Smart Grid, by Iraklis Leontiadis, Melek Önen, Refik Molva[ expand ]
04:17 [Pub][ePrint]Dipl.-Math., by Jürgen Müller[ expand ]
04:17 [Pub][ePrint]Fast Software Implementation of Binary Elliptic Curve Cryptography, by Manuel Bluhm and Shay Gueron[ expand ]
04:17 [Pub][ePrint]A Revocable Online-Offline Certificateless Signature Scheme without Pairing, by Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek [ expand ]
04:17 [Pub][ePrint]Practical Signatures from the Partial Fourier Recovery Problem, by Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte[ expand ]
01:17 [Pub][ePrint]An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II), by Gérald Gavin[ expand ]
01:17 [Pub][ePrint]NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS, by Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi[ expand ]


2013-11-15
10:45 [Event][New]CloudCom 2013: IEEE CloudCom 2013 (5th IEEE International Conference on Cloud Computing)[ expand ]


2013-11-14
19:17 [Pub][ePrint]On the Resilience and Uniqueness of CPA for Secure Broadcast, by Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
12:18 [Job][New]Tenure-track Assistant/Associate Professor, University of Connecticut, USA[ expand ]
07:17 [Pub][ePrint]Elliptic Curve Cryptography in Practice, by Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow[ expand ]
07:17 [Pub][ePrint]A Key Compromise Impersonation attack against Wang\'s Provably Secure Identity-based Key Agreement Protocol, by Maurizio Adriano Strangio[ expand ]
07:17 [Pub][ePrint]SSS-V2: Secure Similarity Search, by Hyun-A Park[ expand ]
07:17 [Pub][ePrint]Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez[ expand ]
07:17 [Pub][ePrint]TRS-80 With A Keccak Sponge Cake, by Jean-Marie Chauvet[ expand ]
07:17 [Pub][ePrint]Masking Tables---An Underestimated Security Risk, by Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald[ expand ]


2013-11-13
07:17 [Pub][ePrint]Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited, by Yongqiang Li and Mingsheng Wang and Yuyin Yu[ expand ]
07:17 [Pub][ePrint]Stamp \\& Extend -- Instant but Undeniable Timestamping based on Lazy Trees, by {\\L}ukasz Krzywiecki and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
07:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities, by Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai[ expand ]
07:17 [Pub][ePrint]Modified Alternating Step Generators, by Robert Wicik and Tomasz Rachwalik[ expand ]
07:17 [Pub][ePrint]Multi-Input Functional Encryption, by Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai[ expand ]



2013-11-11
13:47 [Event][New]LATINCRYPT 2014: Third International Conference on Cryptology and Information Security[ expand ]


2013-11-08
08:54 [Event][New]IWSEC 2013: The 8th International Workshop on Security (Poster Session)[ expand ]
08:50 [Job][New]Security Engineer, CloudFlare Inc., San Francisco, CA, USA, the Northern Hemisphere[ expand ]
08:48 [Job][New]Ph.D. Scholarships, University of Salerno, Italy[ expand ]


2013-11-07
07:17 [Pub][ePrint]Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack, by Chihong Joo and Aaram Yun[ expand ]
07:17 [Pub][ePrint]Mobile Transaction over NFC and GSM, by Muhammad Qasim Saeed and Pardis Pourghomi[ expand ]
07:17 [Pub][ePrint]Verifiable Set Operations over Outsourced Databases, by Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos[ expand ]
07:17 [Pub][ePrint]Amplifying Privacy in Privacy Amplification, by Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin[ expand ]
07:17 [Pub][ePrint]The Realm of the Pairings, by Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini[ expand ]
07:17 [Pub][ePrint]Deep Attacks of a Certificateless Signature Scheme, by Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li[ expand ]


2013-11-06
18:12 [Job][New]PhD studentships, Royal Holloway, University of London, UK[ expand ]
14:47 [Job][New]PhD student, SnT, University of Luxembourg, Luxembourg[ expand ]



2013-11-05
07:43 [Job][New]Professor (Open Rank), Worcester Polytechnic Institute, MA, USA, below Canada[ expand ]


2013-11-04
13:39 [Event][New]Joint MPIM and B-IT workshop on Number Theory and Cryptography[ expand ]
13:00 [Event][New]ASIACCS 2014: 9th ACM Symposium on Information, Computer and Communications Security[ expand ]
13:00 [Event][New]RFIDSec'14: The 10th Workshop on RFID Security[ expand ]
04:17 [Pub][ePrint]Outsourced Symmetric Private Information Retrieval, by Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]


2013-11-03
22:17 [Pub][ePrint]Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited, by Sandro Coretti and Ueli Maurer and Björn Tackmann[ expand ]
22:17 [Pub][ePrint]NTRU-KE: A Lattice-based Public Key Exchange Protocol, by Xinyu Lei and Xiaofeng Liao[ expand ]
22:17 [Pub][ePrint]NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
22:17 [Pub][ePrint]A Secure Obfuscator for Encrypted Blind Signature Functionality, by Xiao Feng and Zheng Yuan[ expand ]
19:17 [Pub][ePrint]Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir[ expand ]
19:17 [Pub][ePrint]Method to secure data in the cloud while preserving summary statistics, by Sanchita Barman, Bimal Roy[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Zorro, by Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang[ expand ]
19:17 [Pub][ePrint]PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage, by Daisuke Moriyama and Shin\'ichiro Matsuo and Moti Yung[ expand ]
19:17 [Pub][ePrint]Ambiguous One-Move Nominative Signature Without Random Oracles, by Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang[ expand ]
19:17 [Pub][ePrint]An Approach to Reduce Storage for Homomorphic Computations, by Jung Hee Cheon and Jinsu Kim[ expand ]
19:17 [Pub][ePrint]Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \\& Concurrent Quantum Attacks, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Key Derivation Without Entropy Waste, by Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]A reduction of semigroup DLP to classic DLP, by Matan Banin and Boaz Tsaban[ expand ]
19:17 [Pub][ePrint]How to Certify the Leakage of a Chip?, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon[ expand ]
19:17 [Pub][ePrint]Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation, by Clemens Heuberger and Michela Mazzoli[ expand ]
19:17 [Pub][ePrint]Adaptive Witness Encryption and Asymmetric Password-based Cryptography, by Mihir Bellare and Viet Tung Hoang[ expand ]
19:17 [Pub][ePrint]Limits of Extractability Assumptions with Distributional Auxiliary Input, by Elette Boyle and Rafael Pass[ expand ]


2013-10-30
09:30 [Job][New]CEO / General Manager, ESCRYPT Inc., Ann Arbor, USA, North America[ expand ]



2013-10-28
21:17 [Pub][ePrint]Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits, by Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Higher Order Masking of Look-up Tables, by Jean-Sebastien Coron[ expand ]
21:17 [Pub][ePrint]Bootstrapping Obfuscators via Fast Pseudorandom Functions, by Benny Applebaum[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks, by Xi-Jun Lin and Lin Sun[ expand ]
21:17 [Pub][ePrint]A More Efficient AES Threshold Implementation, by Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
21:17 [Pub][ePrint]Examination of a New Defense Mechanism: Honeywords, by Ziya Genc, Süleyman Kardas, and Mehmet Sabir Kiraz[ expand ]
21:17 [Pub][ePrint]AEGIS: A Fast Authenticated Encryption Algorithm, by Hongjun Wu and Bart Preneel[ expand ]
21:17 [Pub][ePrint]Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data, by Lichun Li and Anwitaman Datta[ expand ]
21:17 [Pub][ePrint]Secure Key Exchange and Sessions Without Credentials, by Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis[ expand ]
21:17 [Pub][ePrint]Faster Compact Diffie-Hellman: Endomorphisms on the x-line, by Craig Costello and Huseyin Hisil and Benjamin Smith[ expand ]
21:17 [Pub][ePrint]Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]


2013-10-24
18:17 [Pub][ePrint]Obfuscation ==> (IND-CPA Security =/=> Circular Security), by Antonio Marcedone and Claudio Orlandi[ expand ]
18:17 [Pub][ePrint]Differing-Inputs Obfuscation and Applications, by Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Unbalancing Pairing-Based Key Exchange Protocols, by Michael Scott[ expand ]
18:17 [Pub][ePrint]How to Compress (Reusable) Garbled Circuits, by Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy[ expand ]
18:17 [Pub][ePrint]New abstractions in applied pi-calculus and automated verification of protected executions, by Shiwei Xu and Sergiu Bursuc and Julian P. Murphy[ expand ]
18:17 [Pub][ePrint]Solving shortest and closest vector problems: The decomposition approach, by Anja Becker, Nicolas Gama and Antoine Joux[ expand ]
18:17 [Pub][ePrint]Fully Bideniable Public-Key Encryption, by Marcel Sebek[ expand ]
12:17 [Pub][ePrint]Separations in Circular Security for Arbitrary Length Key Cycles, by Venkata Koppula and Kim Ramchen and Brent Waters[ expand ]
12:17 [Pub][ePrint]Secret Key Cryptosystem based on Non-Systematic Polar Codes, by Reza Hooshmand[ expand ]
12:17 [Pub][ePrint]Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks, by Damien Vergnaud and David Xiao[ expand ]
12:17 [Pub][ePrint]A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme, by Dana Dachman-Soled[ expand ]
12:17 [Pub][ePrint]Formal verification of a software countermeasure against instruction skip attacks, by Karine Heydemann and Nicolas Moro and Emmanuelle Encrenaz and Bruno Robisson[ expand ]
12:17 [Pub][ePrint]Universally composable privacy preserving finite automata execution with low online and offline complexity, by Peeter Laud and Jan Willemson[ expand ]
12:17 [Pub][ePrint]Bounded Tamper Resilience: How to go beyond the Algebraic Barrier, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others, by Siwei Sun, Lei Hu, Peng Wang[ expand ]
09:17 [Pub][ePrint]A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher, by Tomer Ashur and Orr Dunkelman[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, by Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Traps to the BGJT-Algorithm for Discrete Logarithms, by Qi Cheng and Daqing Wan and Jincheng Zhuang[ expand ]
09:17 [Pub][ePrint]Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, by Benjamin Smith[ expand ]
09:17 [Pub][ePrint]Robust Pseudorandom Generators, by Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman[ expand ]
09:17 [Pub][ePrint]Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces, by Charanjit Jutla and Arnab Roy[ expand ]
09:17 [Pub][ePrint]Attribute-Based Encryption for Arithmetic Circuits, by Dan Boneh and Valeria Nikolaenko and Gil Segev[ expand ]
09:17 [Pub][ePrint]Obfuscation for Evasive Functions, by Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
09:17 [Pub][ePrint]A TPM Diffie-Hellman Oracle, by Tolga Acar and Lan Nguyen and Greg Zaverucha[ expand ]
09:17 [Pub][ePrint]An Offline Dictionary Attack against a Three-Party Key Exchange Protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
09:17 [Pub][ePrint]A Note on the Impossibility of Obfuscation with Auxiliary Input, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
09:17 [Pub][ePrint]TUC: Time-sensitive and Modular Analysis of Anonymous Communication, by Michael Backes and Praveen Manoharan and Esfandiar Mohammadi[ expand ]
09:17 [Pub][ePrint]Linear Cryptanalysis of Round Reduced Variants of SIMON, by Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya[ expand ]
09:17 [Pub][ePrint]Fine-Tuning Groth-Sahai Proofs, by Alex Escala and Jens Groth[ expand ]
09:17 [Pub][ePrint]Anonymous aggregation for lightweight multiparty computations, by Constantinos Patsakis[ expand ]
09:17 [Pub][ePrint]Discrete Logarithms and Mordell-Weil Groups , by Mohammad Sadek[ expand ]
04:41 [Event][New]PUFFIN: Physically Unclonable Functions Workshop[ expand ]
04:34 [Job][New]Security Consultant, ESCRYPT Inc., Ann Arbor[ expand ]
04:33 [Job][New]Lecturer, University College London, UK, EU[ expand ]


2013-10-22
09:36 [Event][New]Summer school on Design and security of crypto algorithms and devices[ expand ]
06:42 [Job][New]two Ph.D. positions, Worcester Polytechnic Institute[ expand ]
06:42 [Job][New]Ph.D. Research Training Group, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]


2013-10-21
06:49 [Job][New]Two faculty Positions in Computer Engineering, New York University Polytechnic School of Engineering, USA, North America[ expand ]
06:49 [Job][New]Junior Researcher, Senior Researcher, Charles University, Prague, Czech Republic[ expand ]
06:48 [Job][New]Assistant Professor, Charles University, Prague, Czech Republic[ expand ]