International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 [ 12 ] 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
04:17 [Pub][ePrint]Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures, by Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele [ expand ]
04:17 [Pub][ePrint]On the Power of Rewinding Simulators in Functional Encryption, by Angelo De Caro and Vincenzo Iovino[ expand ]
04:17 [Pub][ePrint]Using Hamiltonian Totems as Passwords, by Herv\\\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache[ expand ]
04:17 [Pub][ePrint]Fully Deniable Mutual Authentication Protocol Based on RSA Signature, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Efficient CCA-secure Threshold Public-Key Encryption Scheme, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Plaintext Recovery Attacks Against WPA/TKIP, by Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt[ expand ]
04:17 [Pub][ePrint]Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks, by Jayaprakash Kar[ expand ]
04:17 [Pub][ePrint]Asymptotically Efficient Lattice-Based Digital Signatures, by Vadim Lyubashevsky and Daniele Miccicancio[ expand ]
04:17 [Pub][ePrint]Asynchronous MPC with t< n/2 Using Non-equivocation, by Michael Backes, Fabian Bendun, Ashish Choudhury and Aniket Kate[ expand ]
04:17 [Pub][ePrint]Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results, by Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumar[ expand ]
04:17 [Pub][ePrint]Privacy Preserving Unique Statistics in a Smart Grid, by Iraklis Leontiadis, Melek Önen, Refik Molva[ expand ]
04:17 [Pub][ePrint]Dipl.-Math., by Jürgen Müller[ expand ]
04:17 [Pub][ePrint]Fast Software Implementation of Binary Elliptic Curve Cryptography, by Manuel Bluhm and Shay Gueron[ expand ]
04:17 [Pub][ePrint]A Revocable Online-Offline Certificateless Signature Scheme without Pairing, by Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek [ expand ]
04:17 [Pub][ePrint]Practical Signatures from the Partial Fourier Recovery Problem, by Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte[ expand ]
01:17 [Pub][ePrint]An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II), by Gérald Gavin[ expand ]

10:45 [Event][New]CloudCom 2013: IEEE CloudCom 2013 (5th IEEE International Conference on Cloud Computing)[ expand ]

19:17 [Pub][ePrint]On the Resilience and Uniqueness of CPA for Secure Broadcast, by Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
12:18 [Job][New]Tenure-track Assistant/Associate Professor, University of Connecticut, USA[ expand ]
07:17 [Pub][ePrint]Elliptic Curve Cryptography in Practice, by Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow[ expand ]
07:17 [Pub][ePrint]A Key Compromise Impersonation attack against Wang\'s Provably Secure Identity-based Key Agreement Protocol, by Maurizio Adriano Strangio[ expand ]
07:17 [Pub][ePrint]SSS-V2: Secure Similarity Search, by Hyun-A Park[ expand ]
07:17 [Pub][ePrint]Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez[ expand ]
07:17 [Pub][ePrint]TRS-80 With A Keccak Sponge Cake, by Jean-Marie Chauvet[ expand ]
07:17 [Pub][ePrint]Masking Tables---An Underestimated Security Risk, by Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald[ expand ]

07:17 [Pub][ePrint]Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited, by Yongqiang Li and Mingsheng Wang and Yuyin Yu[ expand ]
07:17 [Pub][ePrint]Stamp \\& Extend -- Instant but Undeniable Timestamping based on Lazy Trees, by {\\L}ukasz Krzywiecki and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
07:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities, by Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai[ expand ]
07:17 [Pub][ePrint]Modified Alternating Step Generators, by Robert Wicik and Tomasz Rachwalik[ expand ]
07:17 [Pub][ePrint]Multi-Input Functional Encryption, by Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai[ expand ]

13:47 [Event][New]LATINCRYPT 2014: Third International Conference on Cryptology and Information Security[ expand ]

08:54 [Event][New]IWSEC 2013: The 8th International Workshop on Security (Poster Session)[ expand ]
08:50 [Job][New]Security Engineer, CloudFlare Inc., San Francisco, CA, USA, the Northern Hemisphere[ expand ]
08:48 [Job][New]Ph.D. Scholarships, University of Salerno, Italy[ expand ]

07:17 [Pub][ePrint]Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack, by Chihong Joo and Aaram Yun[ expand ]
07:17 [Pub][ePrint]Mobile Transaction over NFC and GSM, by Muhammad Qasim Saeed and Pardis Pourghomi[ expand ]
07:17 [Pub][ePrint]Verifiable Set Operations over Outsourced Databases, by Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos[ expand ]
07:17 [Pub][ePrint]Amplifying Privacy in Privacy Amplification, by Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin[ expand ]
07:17 [Pub][ePrint]The Realm of the Pairings, by Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini[ expand ]
07:17 [Pub][ePrint]Deep Attacks of a Certificateless Signature Scheme, by Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li[ expand ]

18:12 [Job][New]PhD studentships, Royal Holloway, University of London, UK[ expand ]
14:47 [Job][New]PhD student, SnT, University of Luxembourg, Luxembourg[ expand ]

07:43 [Job][New]Professor (Open Rank), Worcester Polytechnic Institute, MA, USA, below Canada[ expand ]

13:39 [Event][New]Joint MPIM and B-IT workshop on Number Theory and Cryptography[ expand ]
13:00 [Event][New]ASIACCS 2014: 9th ACM Symposium on Information, Computer and Communications Security[ expand ]
13:00 [Event][New]RFIDSec'14: The 10th Workshop on RFID Security[ expand ]
04:17 [Pub][ePrint]Outsourced Symmetric Private Information Retrieval, by Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]

22:17 [Pub][ePrint]Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited, by Sandro Coretti and Ueli Maurer and Björn Tackmann[ expand ]
22:17 [Pub][ePrint]NTRU-KE: A Lattice-based Public Key Exchange Protocol, by Xinyu Lei and Xiaofeng Liao[ expand ]
22:17 [Pub][ePrint]NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
22:17 [Pub][ePrint]A Secure Obfuscator for Encrypted Blind Signature Functionality, by Xiao Feng and Zheng Yuan[ expand ]
19:17 [Pub][ePrint]Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir[ expand ]
19:17 [Pub][ePrint]Method to secure data in the cloud while preserving summary statistics, by Sanchita Barman, Bimal Roy[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Zorro, by Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang[ expand ]
19:17 [Pub][ePrint]PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage, by Daisuke Moriyama and Shin\'ichiro Matsuo and Moti Yung[ expand ]
19:17 [Pub][ePrint]Ambiguous One-Move Nominative Signature Without Random Oracles, by Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang[ expand ]
19:17 [Pub][ePrint]An Approach to Reduce Storage for Homomorphic Computations, by Jung Hee Cheon and Jinsu Kim[ expand ]
19:17 [Pub][ePrint]Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \\& Concurrent Quantum Attacks, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Key Derivation Without Entropy Waste, by Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]A reduction of semigroup DLP to classic DLP, by Matan Banin and Boaz Tsaban[ expand ]
19:17 [Pub][ePrint]How to Certify the Leakage of a Chip?, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon[ expand ]
19:17 [Pub][ePrint]Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation, by Clemens Heuberger and Michela Mazzoli[ expand ]
19:17 [Pub][ePrint]Adaptive Witness Encryption and Asymmetric Password-based Cryptography, by Mihir Bellare and Viet Tung Hoang[ expand ]
19:17 [Pub][ePrint]Limits of Extractability Assumptions with Distributional Auxiliary Input, by Elette Boyle and Rafael Pass[ expand ]

09:30 [Job][New]CEO / General Manager, ESCRYPT Inc., Ann Arbor, USA, North America[ expand ]

21:17 [Pub][ePrint]Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits, by Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Higher Order Masking of Look-up Tables, by Jean-Sebastien Coron[ expand ]
21:17 [Pub][ePrint]Bootstrapping Obfuscators via Fast Pseudorandom Functions, by Benny Applebaum[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks, by Xi-Jun Lin and Lin Sun[ expand ]
21:17 [Pub][ePrint]A More Efficient AES Threshold Implementation, by Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
21:17 [Pub][ePrint]Examination of a New Defense Mechanism: Honeywords, by Ziya Genc, Süleyman Kardas, and Mehmet Sabir Kiraz[ expand ]
21:17 [Pub][ePrint]AEGIS: A Fast Authenticated Encryption Algorithm, by Hongjun Wu and Bart Preneel[ expand ]
21:17 [Pub][ePrint]Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data, by Lichun Li and Anwitaman Datta[ expand ]
21:17 [Pub][ePrint]Secure Key Exchange and Sessions Without Credentials, by Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis[ expand ]
21:17 [Pub][ePrint]Faster Compact Diffie-Hellman: Endomorphisms on the x-line, by Craig Costello and Huseyin Hisil and Benjamin Smith[ expand ]
21:17 [Pub][ePrint]Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]

18:17 [Pub][ePrint]Obfuscation ==> (IND-CPA Security =/=> Circular Security), by Antonio Marcedone and Claudio Orlandi[ expand ]
18:17 [Pub][ePrint]Differing-Inputs Obfuscation and Applications, by Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Unbalancing Pairing-Based Key Exchange Protocols, by Michael Scott[ expand ]
18:17 [Pub][ePrint]How to Compress (Reusable) Garbled Circuits, by Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy[ expand ]
18:17 [Pub][ePrint]New abstractions in applied pi-calculus and automated verification of protected executions, by Shiwei Xu and Sergiu Bursuc and Julian P. Murphy[ expand ]
18:17 [Pub][ePrint]Solving shortest and closest vector problems: The decomposition approach, by Anja Becker, Nicolas Gama and Antoine Joux[ expand ]
18:17 [Pub][ePrint]Fully Bideniable Public-Key Encryption, by Marcel Sebek[ expand ]
12:17 [Pub][ePrint]Separations in Circular Security for Arbitrary Length Key Cycles, by Venkata Koppula and Kim Ramchen and Brent Waters[ expand ]
12:17 [Pub][ePrint]Secret Key Cryptosystem based on Non-Systematic Polar Codes, by Reza Hooshmand[ expand ]
12:17 [Pub][ePrint]Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks, by Damien Vergnaud and David Xiao[ expand ]
12:17 [Pub][ePrint]A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme, by Dana Dachman-Soled[ expand ]
12:17 [Pub][ePrint]Formal verification of a software countermeasure against instruction skip attacks, by Karine Heydemann and Nicolas Moro and Emmanuelle Encrenaz and Bruno Robisson[ expand ]
12:17 [Pub][ePrint]Universally composable privacy preserving finite automata execution with low online and offline complexity, by Peeter Laud and Jan Willemson[ expand ]
12:17 [Pub][ePrint]Bounded Tamper Resilience: How to go beyond the Algebraic Barrier, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others, by Siwei Sun, Lei Hu, Peng Wang[ expand ]
09:17 [Pub][ePrint]A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher, by Tomer Ashur and Orr Dunkelman[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, by Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Traps to the BGJT-Algorithm for Discrete Logarithms, by Qi Cheng and Daqing Wan and Jincheng Zhuang[ expand ]
09:17 [Pub][ePrint]Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, by Benjamin Smith[ expand ]
09:17 [Pub][ePrint]Robust Pseudorandom Generators, by Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman[ expand ]
09:17 [Pub][ePrint]Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces, by Charanjit Jutla and Arnab Roy[ expand ]
09:17 [Pub][ePrint]Attribute-Based Encryption for Arithmetic Circuits, by Dan Boneh and Valeria Nikolaenko and Gil Segev[ expand ]
09:17 [Pub][ePrint]Obfuscation for Evasive Functions, by Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
09:17 [Pub][ePrint]A TPM Diffie-Hellman Oracle, by Tolga Acar and Lan Nguyen and Greg Zaverucha[ expand ]
09:17 [Pub][ePrint]An Offline Dictionary Attack against a Three-Party Key Exchange Protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
09:17 [Pub][ePrint]A Note on the Impossibility of Obfuscation with Auxiliary Input, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
09:17 [Pub][ePrint]TUC: Time-sensitive and Modular Analysis of Anonymous Communication, by Michael Backes and Praveen Manoharan and Esfandiar Mohammadi[ expand ]
09:17 [Pub][ePrint]Linear Cryptanalysis of Round Reduced Variants of SIMON, by Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya[ expand ]
09:17 [Pub][ePrint]Fine-Tuning Groth-Sahai Proofs, by Alex Escala and Jens Groth[ expand ]
09:17 [Pub][ePrint]Anonymous aggregation for lightweight multiparty computations, by Constantinos Patsakis[ expand ]
09:17 [Pub][ePrint]Discrete Logarithms and Mordell-Weil Groups , by Mohammad Sadek[ expand ]
04:41 [Event][New]PUFFIN: Physically Unclonable Functions Workshop[ expand ]
04:34 [Job][New]Security Consultant, ESCRYPT Inc., Ann Arbor[ expand ]
04:33 [Job][New]Lecturer, University College London, UK, EU[ expand ]

09:36 [Event][New]Summer school on Design and security of crypto algorithms and devices[ expand ]
06:42 [Job][New]two Ph.D. positions, Worcester Polytechnic Institute[ expand ]
06:42 [Job][New]Ph.D. Research Training Group, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]

06:49 [Job][New]Two faculty Positions in Computer Engineering, New York University Polytechnic School of Engineering, USA, North America[ expand ]
06:49 [Job][New]Junior Researcher, Senior Researcher, Charles University, Prague, Czech Republic[ expand ]
06:48 [Job][New]Assistant Professor, Charles University, Prague, Czech Republic[ expand ]

05:18 [Job][New]Postdoc Fellowship (1 year), Norwegian University of Science and Technology (NTNU)[ expand ]

09:17 [Pub][ePrint]A provable secure anonymous proxy signature scheme without random oracles, by Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh[ expand ]
09:17 [Pub][ePrint]Parallel authenticated encryption with the duplex construction, by Pawel Morawiecki and Josef Pieprzyk[ expand ]
09:17 [Pub][ePrint]New Trapdoor Projection Maps for Composite-Order Bilinear Groups, by Sarah Meiklejohn and Hovav Shacham[ expand ]
09:17 [Pub][ePrint]Bias-based modeling and entropy analysis of PUFs, by Robbert van den Berg and Boris Skoric and Vincent van der Leest[ expand ]
09:17 [Pub][ePrint]Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version), by Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel[ expand ]
09:17 [Pub][ePrint]Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter, by Baodong Qin and Shengli Liu[ expand ]
09:17 [Pub][ePrint]RKA-KDM secure encryption from public-key encryption, by Florian Böhl and Gareth T. Davies and Dennis Hofheinz[ expand ]
09:17 [Pub][ePrint]Efficient Modular Arithmetic for SIMD Devices, by Wilke Trei[ expand ]
09:17 [Pub][ePrint]A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound, by Sanjit Chatterjee and Chethan Kamath[ expand ]
09:17 [Pub][ePrint]On Extractability Obfuscation, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]
09:17 [Pub][ePrint]Security Analysis of Password-Authenticated Key Retrieval, by SeongHan Shin and Kazukuni Kobara[ expand ]
09:17 [Pub][ePrint]Integral Distinguishers for Reduced-round Stribog, by Riham AlTawy and Amr M. Youssef[ expand ]
04:47 [Event][New]SEC 2014: 29th IFIP TC11 SEC 2014 Int Conf ICT Systems Security & Privacy Protection[ expand ]
04:46 [Event][New]CHES 2014: Cryptographic Hardware and Embedded Systems[ expand ]

16:30 [Job][New]Two PhD Positions, University of Bristol[ expand ]

13:03 [Job][New]Two Post-Docs, Nanyang Technological University, Singapore[ expand ]

18:17 [Pub][ePrint]A note on high-security general-purpose elliptic curves, by Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira[ expand ]
18:17 [Pub][ePrint]Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles, by Johannes Blömer and Gennadij Liske[ expand ]
15:17 [Pub][ePrint]FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession, by Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin K\\\"up\\c{c}\\\"u and \\\"Oznur \\\"Ozkasap[ expand ]
15:17 [Pub][ePrint]Elliptic and Hyperelliptic Curves: a Practical Security Analysis, by Joppe W. Bos and Craig Costello and Andrea Miele[ expand ]
15:17 [Pub][ePrint]There is no Indistinguishability Obfuscation in Pessiland, by Tal Moran and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation, by Dan Boneh and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Communication-Efficient MPC for General Adversary Structures, by Joshua Lampkins and Rafail Ostrovsky[ expand ]

22:35 [Job][New]PhD Scholarship, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]

14:17 [Job][New]Tenured, Tenure-track Faculty positions, Sejong University, Seoul, Korea[ expand ]
14:16 [Job][New]Researcher (postdoc) in Cryptography (or Quantum Crypto), Institute of Computer Science, University of Tartu, Estonia, EU[ expand ]

21:24 [Event][New]CECC14: Central European Conference on Cryptology[ expand ]

15:17 [Pub][ePrint]Differentially 4-Uniform Bijections by Permuting the Inverse Function, by Deng Tang and Claude Carlet and Xiaohu Tang[ expand ]
15:17 [Pub][ePrint]DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption, by Somindu C. Ramanna[ expand ]
15:17 [Pub][ePrint]Detection of Algebraic Manipulation in the Presence of Leakage, by Hadi Ahmadi and Reihaneh Safavi-Naini[ expand ]
15:17 [Pub][ePrint]SCARE of Secret Ciphers with SPN Structures, by Matthieu Rivain and Thomas Roche[ expand ]
15:17 [Pub][ePrint]Universal security; from bits and mips to pools, lakes -- and beyond, by Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé[ expand ]
15:17 [Pub][ePrint]Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
15:17 [Pub][ePrint]Four Measures of Nonlinearity, by Joan Boyar and Magnus Find and Rene Peralta[ expand ]

23:47 [Event][New]WiSec'14: The 7th ACM Conference on Security and Privacy[ expand ]
06:34 [Event][New]COSADE'14: Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
06:25 [Job][New]Two Postdoc Positions, Technical University of Denmark, DTU[ expand ]
06:25 [Job][New]Lecturer in Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]

21:17 [Pub][ePrint]Combined Modeling and Side Channel Attacks on Strong PUFs, by Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar[ expand ]
21:17 [Pub][ePrint]Protecting Obfuscation Against Algebraic Attacks, by Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
15:05 [Election]IACR Election & Referendum - Please Vote[ expand ]

18:17 [Pub][ePrint]Estimating Key Sizes For High Dimensional Lattice Based Systems, by Joop van de Pol and Nigel P. Smart[ expand ]
18:17 [Pub][ePrint]Secure Key Management in the Cloud, by Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter[ expand ]
18:17 [Pub][ePrint]Parallelizable Authenticated Encryption from Functions, by Kazuhiko Minematsu[ expand ]
18:17 [Pub][ePrint]Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud, by Jiawei Yuan and Shucheng Yu[ expand ]
18:17 [Pub][ePrint]Improved Linear Attacks on the Chinese Block Cipher Standard, by Mingjie Liu and Jiazhe Chen[ expand ]

18:17 [Pub][ePrint]Securing the Data in Big Data Security Analytics, by Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos[ expand ]

18:17 [Pub][ePrint]New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption, by Xiaolin Cao and Ciara Moore[ expand ]
18:17 [Pub][ePrint]Off-Path Hacking: The Illusion of Challenge-Response Authentication, by Yossi Gilad and Amir Herzberg and Haya Shulman[ expand ]
18:17 [Pub][ePrint]Decentralized Anonymous Credentials, by Christina Garman and Matthew Green and Ian Miers[ expand ]

15:17 [Pub][ePrint]Multi-LHL protocol, by Marika Mitrengová[ expand ]
15:17 [Pub][ePrint]Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications, by Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi[ expand ]
15:17 [Pub][ePrint]Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
15:17 [Pub][ePrint]Security Amplification against Meet-in-the-Middle Attacks Using Whitening, by Pierre-Alain Fouque and Pierre Karpman[ expand ]
15:17 [Pub][ePrint]Some results concerning global avalanche characteristics of two $q$-ary functions, by Brajesh Kumar Singh[ expand ]

03:17 [Pub][ePrint]Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction, by Xiaolin Cao, Ciara Moore, Maire O\'Neill, Elizabeth O\'Sullivan and Neil Hanle[ expand ]
03:17 [Pub][ePrint]Privacy and Verifiability in Voting Systems: Methods, Developments and Trends, by Hugo Jonker and Sjouke Mauw and Jun Pang[ expand ]
03:17 [Pub][ePrint]Is extracting data the same as possessing data?, by Douglas R. Stinson and Jalaj Upadhyay[ expand ]

06:33 [Job][New]Cryptographic Researcher, Security Innovation, Wilmington, MA, USA[ expand ]
06:33 [Job][New]Associate Professor, School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia[ expand ]
06:17 [Pub][ePrint]Recomputing with Permuted Operands: A Concurrent Error Detection Approach, by Xiaofei Guo and Ramesh Karri[ expand ]

07:41 [Event][New]ACNS'14: 12th International Conference on Applied Cryptography and Network Security[ expand ]
06:17 [Pub][ePrint]Sub-linear Blind Ring Signatures without Random Oracles, by Essam Ghadafi[ expand ]
06:17 [Pub][ePrint]Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful, by Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki[ expand ]
06:17 [Pub][ePrint]Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]Ultra Low-Power implementation of ECC on the ARM Cortex-M0+, by Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]How to Further Increase Leakage Exploitation Rate in Profiled Side-Channel Attacks?, by Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng[ expand ]
06:17 [Pub][ePrint]Cryptanalysis of Full RIPEMD-128, by Franck Landelle and Thomas Peyrin[ expand ]
06:17 [Pub][ePrint]Revocable quantum timed-release encryption, by Dominique Unruh[ expand ]
06:17 [Pub][ePrint]Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC., by Masao KAS[ expand ]
06:17 [Pub][ePrint]Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos, by Jörg Schwenk[ expand ]
03:17 [Pub][ePrint]Invariance-Based Concurrent Error Detection for Advanced Encryption Standard, by Xiaofei Guo and Ramesh Karri[ expand ]

14:26 [Job][New]Assistant Professor (Lecturer, Senior Lecturer), Ariel University, Israel[ expand ]

15:17 [Pub][ePrint]Two-round secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova[ expand ]
15:17 [Pub][ePrint]Improved Cryptanalysis of Reduced RIPEMD-160, by Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Factoring RSA keys from certified smart cards: Coppersmith in the wild, by Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Som[ expand ]
15:17 [Pub][ePrint]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version, by Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and Da[ expand ]
15:17 [Pub][ePrint]Efficient Pairings Computation on Jacobi Quartic Elliptic Curves, by Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa[ expand ]
15:17 [Pub][ePrint]On the Efficacy of Solving LWE by Reduction to Unique-SVP, by Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert[ expand ]

22:03 [Job][New]Tenure-track Assistant Professors , Florida State University, Tallahassee, Florida, Southern USA[ expand ]
13:32 [Job][New]Ph.D./Post-Docs, University of Haifa, Israel[ expand ]
13:32 [Job][New]MSc Student, University of Warsaw, Poland, European Union[ expand ]
13:32 [Job][New]PhD Student, University of Warsaw, Poland, European Union[ expand ]
13:31 [Job][New]Post-Doc, University of Warsaw, Poland, European Union[ expand ]
13:30 [Event][New]ACISP 2014: 19th Australasian Conference on Information Security and Privacy[ expand ]

00:17 [Pub][ePrint]Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study, by Michael Shantz and Edlyn Teske[ expand ]
00:17 [Pub][ePrint]Enhanced certificate transparency (how Johnny could encrypt), by Mark D. Ryan[ expand ]
00:17 [Pub][ePrint]A Local-Global Approach to Solving Ideal Lattice Problems, by Yuan Tian and Rongxin Sun and Xueyong Zhu[ expand ]
00:17 [Pub][ePrint]One-Sided Adaptively Secure Two-Party Computation, by Carmit Hazay and Arpita Patra[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of the Toorani-Falahati Hill Ciphers, by Liam Keliher and Anthony Z. Delaney[ expand ]
00:17 [Pub][ePrint]Analysis of the Rainbow Tradeoff Algorithm Used in Practice, by Jung Woo Kim and Jin Hong and Kunsoo Park[ expand ]
00:17 [Pub][ePrint]EyeDecrypt -- Private Interactions in Plain Sight, by Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis[ expand ]
00:17 [Pub][ePrint]Smashing MASH-1, by Vladimir Antipkin[ expand ]

13:27 [Event][New]DigitalSec: The International Conference on Digital Security and Forensics[ expand ]
09:17 [Pub][ePrint]SPHF-Friendly Non-Interactive Commitments, by Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval[ expand ]
03:17 [Pub][ePrint]ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments, by Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo[ expand ]
03:17 [Pub][ePrint]Generic related-key and induced chosen IV attacks using the method of key differentiation, by Enes Pasalic and Yongzhuang Wei[ expand ]
03:17 [Pub][ePrint]On Algebraic Immunity of $\\Tr(x^{-1})$ over $\\mathbb{F}_{2^n}, by Xiutao Feng[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of GOST R Hash Function, by Zongyue Wang, Hongbo Yu, Xiaoyun Wang[ expand ]
03:17 [Pub][ePrint]polynomial selection for the number field sieve in geometric view, by Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang[ expand ]
03:17 [Pub][ePrint]The Special Number Field Sieve in $\\F _{p^{n}}$, Application to Pairing-Friendly Constructions, by Antoine Joux and Cécile Pierrot[ expand ]
03:17 [Pub][ePrint]PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones, by Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma[ expand ]
03:17 [Pub][ePrint]Random Projections, Graph Sparsification, and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]On Measurable Side-Channel Leaks inside ASIC Design Primitives, by Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino[ expand ]
00:17 [Pub][ePrint]A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent, by Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov[ expand ]
00:17 [Pub][ePrint]Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique, by Luís T. A. N. Brandão[ expand ]
00:17 [Pub][ePrint]Extended Criterion for Absence of Fixed Points, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
00:17 [Pub][ePrint]Equivalence between MAC and PRF for Blockcipher based Constructions, by Nilanjan Datta and Mridul Nandi[ expand ]

12:24 [Job][New]PhD scholarship, TU Berlin and DLR and HRS ST, Germany, Europe[ expand ]
09:33 [Job][New]Professors (all ranks), Nazarbayev University, Kazakhstan[ expand ]
09:27 [Event][New]IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet The rapid[ expand ]

09:41 [Job][New]Assistant/Associate Professor, Texas Tech University, the Big State, USA[ expand ]

10:26 [PhD][New]C. Eric (Carl) Bach[ expand ]
10:25 [PhD][New][ expand ]

03:17 [Pub][ePrint]Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher, by Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay[ expand ]
03:17 [Pub][ePrint]Efficient General-Adversary Multi-Party Computation, by Martin Hirt and Daniel Tschudi[ expand ]
03:17 [Pub][ePrint]New Efficient Identity-Based Encryption From Factorization, by Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao[ expand ]
03:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of the Speck Family of Block Ciphers, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
03:17 [Pub][ePrint][ expand ]
03:17 [Pub][ePrint]Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]

02:34 [Event][New]Africacrypt 2014[ expand ]
02:31 [Job][Update]Lead Digital Currency Crypto Contractor, Currency Instruments, Illinois (USA)[ expand ]

17:47 [Job][New]Lead Digital Currency Crypto Engineer, Currency Instruments, Illinois (USA)[ expand ]

21:17 [Pub][ePrint]Non-Malleable Coding Against Bit-wise and Split-State Tampering, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Capacity of Non-Malleable Codes, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, by Zvika Brakerski and Guy N. Rothblum[ expand ]
21:17 [Pub][ePrint]Self-pairings on supersingular elliptic curves with embedding degree $three$, by Binglong Chen and Chang-An~Zhao[ expand ]
06:04 [Job][Update]Ph.D. student, DemTech/IT University of Copenhagen, Denmark[ expand ]
06:04 [Job][New]PhD position on Privacy Engineering, University of Ulm, Institute of Distributed Systems, Germany[ expand ]
06:04 [Job][New]Ph.D. student, DemTech/IT University of Copenhagen[ expand ]

15:17 [Pub][ePrint]Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis, by Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
15:17 [Pub][ePrint]Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time, by Ben Morris and Phillip Rogaway[ expand ]
15:17 [Pub][ePrint]A Constructive Approach to Functional Encryption, by Christian Matt and Ueli Maurer[ expand ]
15:17 [Pub][ePrint]Practical approaches to varying network size in combinatorial key predistribution schemes, by Kevin Henry and Maura B. Paterson and Douglas R. Stinson[ expand ]
15:17 [Pub][ePrint]Black-Box Obfuscation for d-CNFs, by Zvika Brakerski and Guy N. Rothblum[ expand ]
15:17 [Pub][ePrint]Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
15:17 [Pub][ePrint]Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design, by Ueli Maurer and Björn Tackmann and Sandro Coretti[ expand ]
15:17 [Pub][ePrint]Formally Proved Security of Assembly Code Against Leakage, by Pablo Rauzy and Sylvain Guilley and Zakaria Najm[ expand ]
15:17 [Pub][ePrint]Multi-Valued Byzantine Broadcast: the $t < n$ Case, by Martin Hirt and Pavel Raykov[ expand ]
15:17 [Pub][ePrint]More Efficient Oblivious Transfer and Extensions for Faster Secure Computation, by Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner[ expand ]
15:17 [Pub][ePrint]Puzzle Encryption Algorithm, by Gregory Alvarez and Charles Berenguer[ expand ]
15:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao, Xiaolei, Licheng Wang and Jun Shao[ expand ]
15:17 [Pub][ePrint]Equations System coming from Weil descent and subexponential attack for algebraic curve , by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Decomposition formula of the Jacobian group of plane curve, by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks, by Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang[ expand ]
15:17 [Pub][ePrint]TRS-80 with a grain of salt, by Jean-Marie Chauvet[ expand ]
13:32 [Event][New]Crypto 2014[ expand ]

20:48 [Job][New]Junior Professorship in Mobile Security, Ruhr-Universität Bochum, Germany[ expand ]
06:30 [Event][New]CS2-2014: First Workshop on Cryptography and Security in Computing Syste[ expand ]

21:47 [Job][New]UTRCI Research Scientist, Cyber-physical Systems Security , United Technologies Research Centre, Cork - Ireland[ expand ]
21:46 [Job][New]Ph.D.student, Hochschule Furtwangen University, Germany, EEA[ expand ]
21:43 [Event][New]SHA3: The 2014 SHA3 Workshop[ expand ]
15:17 [Pub][ePrint]Private Over-threshold Aggregation Protocols over Distributed Databases, by Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim[ expand ]
15:17 [Pub][ePrint]Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes, by Christian Hanser and Daniel Slamanig[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the SIMON Family of Block Ciphers, by Hoda A. Alkhzaimi and Martin M. Lauridsen[ expand ]
15:17 [Pub][ePrint]Searching for Nonlinear Feedback Shift Registers with Parallel Computing, by Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt[ expand ]
15:17 [Pub][ePrint]Lattice-Based FHE as Secure as PKE, by Zvika Brakerski and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]On the security of a password-only authenticated three-party key exchange protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
12:17 [Pub][ePrint]Rebound attacks on Stribog, by Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Practical Issues with TLS Client Certificate Authentication, by Arnis Parsovs[ expand ]
12:17 [Pub][ePrint]Inter-FSP Funds Transfer Protocol, by Amir Herzberg and Shay Nachmani[ expand ]
12:17 [Pub][ePrint]A Three-Level Sieve Algorithm for the Shortest Vector Problem, by Feng Zhang and Yanbin Pan and Gengran Hu[ expand ]
12:17 [Pub][ePrint]Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms, by Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede[ expand ]
12:17 [Pub][ePrint]Efficient Unobservable Anonymous Reporting against Strong Adversaries, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]Gossip Latin Square and The Meet-All Gossipers Problem, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves, by Takakazu Satoh[ expand ]
12:17 [Pub][ePrint]On the Limits of Provable Anonymity, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]The Parallel-Cut Meet-In-The-Middle Attack, by Ivica Nikolic, Lei Wang and Shuang Wu[ expand ]
09:17 [Pub][ePrint]How to Withstand Mobile Virus Attacks, Revisited, by Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky[ expand ]
09:17 [Pub][ePrint]Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption, by Somindu C. Ramanna and Palash Sarkar[ expand ]
09:17 [Pub][ePrint]The Spammed Code Offset Method, by Boris Skoric and Niels de Vreede[ expand ]
09:17 [Pub][ePrint]Differential Cryptanalysis of Reduced-Round Simon, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Catena: A Memory-Consuming Password Scrambler, by Christian Forler and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Threshold Secret Image Sharing, by Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren[ expand ]
09:17 [Pub][ePrint]White-Box Security Notions for Symmetric Encryption Schemes, by Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain[ expand ]
09:17 [Pub][ePrint]The Resistance of PRESENT-80 Against Related-Key Differential Attacks, by Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Multiple Limited-Birthday Distinguishers and Applications, by Jérémy Jean and María Naya-Plasencia and Thomas Peyrin[ expand ]

14:13 [Event][New]Practical Cryptography: Algorithms and Implementations using C++[ expand ]
14:12 [Event][New]Practical Cryptography: Algorithms & Implementations using C++[ expand ]
11:01 [Event][New]CfP: Special Issue Crypto: Discrete Structures / Side Channels[ expand ]
07:09 [Event][New]IJISS: International Journal of Information Security Science[ expand ]

22:42 [Service]Volunteer wanted to edit video[ expand ]

08:59 [Event][New]CARDIS 2013: Twelfth Smart Card Research and Advanced Application Conference[ expand ]

17:15 [Election]Nominations are Now Open[ expand ]

14:05 [PhD][New]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
14:02 [PhD][Update]Marina Samokhina: The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
08:51 [Event][New]ANTS XI: Algorithmic Number Theory Symposium XI[ expand ]
03:17 [Pub][ePrint]Locally Updatable and Locally Decodable Codes, by Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky[ expand ]

03:17 [Pub][ePrint]Montgomery Multiplication Using Vector Instructions, by Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]Universal Leaky Random Oracle Model, by Guangjun Fan and Yongbin Zhou and Dengguo Feng[ expand ]
03:17 [Pub][ePrint]Improvement of One Adaptive Oblivious Transfer Scheme , by Zhengjun Cao and Lihua Liu[ expand ]
03:17 [Pub][ePrint]MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials, by Melissa Chase and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol, by Changyu Dong and Liqun Chen and Zikai Wen[ expand ]
03:17 [Pub][ePrint]Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited, by Jia Xu and Jianying Zhou[ expand ]
03:17 [Pub][ePrint]Enforcing Language Semantics Using Proof-Carrying Data, by Stephen Chong and Eran Tromer and Jeffrey A. Vaughan[ expand ]

15:40 [Service]Free Access to IACR Publications at Springer[ expand ]
15:31 [News]Clarification on the new IACR publication and copyright policy[ expand ]
15:03 [Event][New]CT-RSA '14: Cryptographers' Track at the RSA Conference[ expand ]
15:00 [Job][Update]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]

08:59 [Job][New]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]
08:59 [Job][New]PhD students, Queensland University of Technology, Brisbane, Australia[ expand ]
08:59 [Job][Update]Post-Doc, University of Athens, Greece[ expand ]

21:17 [Pub][ePrint]Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences , by Jingguo Bi and Phong Q. Nguyen[ expand ]
21:17 [Pub][ePrint]Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT, by Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers, by Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick W[ expand ]
21:17 [Pub][ePrint]Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation, by Susan Hohenberger and Amit Sahai and Brent Waters[ expand ]
21:17 [Pub][ePrint]Multi-Key Searchable Encryption, by Raluca Ada Popa and Nickolai Zeldovich[ expand ]
21:17 [Pub][ePrint]SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge, by Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza[ expand ]
21:17 [Pub][ePrint]A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Improvement of One Anonymous Identity-Based Encryption, by Zhengjun Cao and Lihua Liu[ expand ]
21:17 [Pub][ePrint]A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves, by Reza Azarderakhsh and Koray Karabina[ expand ]
21:17 [Pub][ePrint]On secret sharing with nonlinear product reconstruction, by Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing[ expand ]

09:17 [Pub][ePrint]Proving TLS-attack related open biases of RC4, by Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]Type-Based Analysis of Protected Storage in the TPM (full version), by Jianxiong Shao and Dengguo Feng and Yu Qin}[ expand ]
09:17 [Pub][ePrint]Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups, by Ran Canetti and Vinod Vaikuntanathan[ expand ]
09:17 [Pub][ePrint]Limits on the Power of Cryptographic Cheap Talk, by Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen[ expand ]
09:17 [Pub][ePrint]Non-Malleable Codes from Two-Source Extractors, by Stefan Dziembowski and Tomasz Kazana and Maciej Obremski[ expand ]
09:17 [Pub][ePrint]Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme, by Zhengjun Cao and Hanyue Cao[ expand ]
09:17 [Pub][ePrint]Rational Protocol Design: Cryptography Against Incentive-driven Adversaries, by Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas[ expand ]
09:17 [Pub][ePrint]Revocable IBE Systems with Almost Constant-size Key Update, by Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Differential Fault Attack against Grain family with very few faults and minimal assumptions, by Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]A new class of semi-bent quadratic Boolean functions, by Chunming Tang and Yanfeng Qi[ expand ]
09:17 [Pub][ePrint]Cryptographically Enforced RBAC, by Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Improved OT Extension for Transferring Short Secrets, by Vladimir Kolesnikov and Ranjit Kumaresan[ expand ]
09:17 [Pub][ePrint]For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes, by Masoumeh Safkhani, Nasour Bagheri[ expand ]
09:17 [Pub][ePrint]An Efficient Scheme for Centralized Group Key Management in Collaborative Environments, by Constantinos Patsakis and Agusti Solanas[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency, by Kwangsu Lee and Dong Hoon Lee[ expand ]

15:17 [Pub][ePrint]A New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and Indranil Sengupta[ expand ]
15:17 [Pub][ePrint]Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification, by Jiawei Yuan and Shucheng Yu[ expand ]
15:17 [Pub][ePrint]A Variant of Coppersmith\'s Algorithm with Improved Complexity and Efficient Exhaustive Search, by Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun[ expand ]
15:17 [Pub][ePrint]Bounds in Shallows and in Miseries, by Céline Blondeau and Andrey Bogdanov and Gregor Leander[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012, by Yosuke Todo and Keita Xagawa[ expand ]
15:17 [Pub][ePrint]Efficient Multiparty Protocols via Log-Depth Threshold Formulae, by Gil Cohen, Ivan Bjerre Damg{\\aa}rd, Yuval Ishai, Jonas K\\\"{o}lker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum[ expand ]
15:17 [Pub][ePrint]Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks, by B. Skoric[ expand ]
15:17 [Pub][ePrint]Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach, by Stefan G. Weber[ expand ]
15:17 [Pub][ePrint]Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing, by Renaud Dubois and Margaux Dugardin and Aurore Guillevic[ expand ]
15:17 [Pub][ePrint]Distinguishing WPA, by Sourav Sen Gupta and Subhamoy Maitra and Willi Meier[ expand ]
15:17 [Pub][ePrint]Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition, by Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao[ expand ]
15:17 [Pub][ePrint]Handling Authentication and Detection Probability in Multi-tag RFID Environment, by Subhasish Dhal and Indranil Sengupta[ expand ]

11:28 [Event][New]SSPA2013: Smart Sensor Protocols and Algorithms 2013[ expand ]

18:27 [Event][New]Congress on privacy and surveillance[ expand ]

20:42 [Event][New]ISC 2013: Sixteenth Information Security Conference[ expand ]
06:58 [Event][New]Inscrypt'13: 9th China International Conference on Information Security and Cryptology[ expand ]

21:17 [Forum][IACR Publication Reform] Response to the invitation for comments by eoswald[ expand ]

11:10 [Event][New]TCC: Theory of Cryptography Conference[ expand ]

18:07 [News]Revisiting the IACR Publication Strategy: An Invitation for Comments[ expand ]
15:17 [Forum][IACR Publication Reform] Re: IACR publication reform - background material by nigel[ expand ]

19:50 [Job][New]Senior / Scientists, A*STAR, Data Storage Institute, Singapore[ expand ]

10:40 [Job][New]Computing Security Department Chair, Rochester Institute of Technology, Rochester, NY, USA[ expand ]
06:17 [Pub][ePrint]A note on verifying the APN property, by Pascale Charpin and Gohar M. Kyureghyan[ expand ]
06:17 [Pub][ePrint]Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications, by Zhengjun Cao[ expand ]
06:17 [Pub][ePrint]The Norwegian Internet Voting Protocol, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Partially blind password-based signatures using elliptic curves, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Obfuscating Conjunctions, by Zvika Brakerski and Guy N. Rothblum[ expand ]
06:17 [Pub][ePrint]Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]

15:17 [Pub][ePrint]Verifiable Delegation of Computation on Outsourced Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
15:17 [Pub][ePrint]How To Construct Extractable One-Way Functions Against Uniform Adversaries, by Nir Bitansky and Ran Canetti and Omer Paneth[ expand ]
15:17 [Pub][ePrint]Analysis of BLAKE2, by Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Efficient computation of addition-subtraction chains using generalized continued Fractions, by Amadou Tall and Ali Yassin Sanghare[ expand ]
08:05 [Job][New]Post-Doc, Telecom ParisTech, Communication and Electrical Engineering Department, Sophia-Antipolis, France[ expand ]
06:17 [Pub][ePrint]Practical & Provably Secure Distance-Bounding, by Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay[ expand ]
06:17 [Pub][ePrint]Towards A Practical JCJ / Civitas Implementation, by Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig[ expand ]
06:17 [Pub][ePrint]Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel, by Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref[ expand ]
06:17 [Pub][ePrint]Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data, by Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese[ expand ]

09:17 [Pub][ePrint]HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware, by Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu[ expand ]

06:17 [Pub][ePrint]Solving Terminal Revocation in EAC by Augmenting Terminal Authentication, by Rafik Chaabouni[ expand ]
06:17 [Pub][ePrint]Reset Indifferentiability and its Consequences, by Paul Baecher and Christina Brzuska and Arno MIttelbach[ expand ]

17:40 [Job][New]Post-Doc Positions, University of Bristol[ expand ]
17:39 [Job][New]Post-doc, LIX, École polytechnique, France[ expand ]
03:17 [Pub][ePrint]Exponentiating in Pairing Groups, by Joppe W. Bos and Craig Costello and Michael Naehrig[ expand ]
03:17 [Pub][ePrint]Deduction Soundness: Prove One, Get Five for Free, by Florian Böhl and Véronique Cortier and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]On the Security of Group-based Proxy Re-encryption Scheme, by Purushothama B R and B B Amberker[ expand ]

17:09 [Job][New]1 PhD student in Information Security, Chalmers University of Technology, Gothenburg, Sweden[ expand ]
15:17 [Pub][ePrint]Another Nail in the Coffin of White-Box AES Implementations, by Tancrède Lepoint and Matthieu Rivain[ expand ]
15:17 [Pub][ePrint]How to Use Indistinguishability Obfuscation: Deniable Encryption, and More, by Amit Sahai and Brent Waters[ expand ]

15:17 [Pub][ePrint]Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags, by Nasour Bagheri, Masoumeh Safkhani[ expand ]
15:17 [Pub][ePrint]Secure Channel Coding Schemes based on Polar Codes, by Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram[ expand ]
15:17 [Pub][ePrint]Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits, by Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters[ expand ]
15:17 [Pub][ePrint]Revisiting the BGE Attack on a White-Box AES Implementation, by Yoni De Mulder and Peter Roelse and Bart Preneel[ expand ]
15:17 [Pub][ePrint]A Note On the Storage Requirement for AKS Primality Testing Algorithm, by Zhengjun Cao[ expand ]
15:17 [Pub][ePrint]Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, by Yuval Yarom and Katrina Falkner[ expand ]
15:17 [Pub][ePrint]Dynamic Runtime Methods to Enhance Private Key Blinding, by Karine Gandolfi-Villegas and Nabil Hamzi[ expand ]
15:17 [Pub][ePrint]Weakness of $\\mbox{${\\mathbb F}$}_{3^{6 \\cdot 509}}$ for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr\\\'iguez-Henr\\\'iquez[ expand ]
15:17 [Pub][ePrint]Implementing Lightweight Block Ciphers on x86 Architectures, by Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin[ expand ]
15:17 [Pub][ePrint]Sequential message authentication code without random oracles, by Bin Wang and Xiaojing Hong[ expand ]
15:17 [Forum][2010 Reports] Re: 2010/251 PUF exaggeration by GeorgeBest[ expand ]
14:28 [Job][New]Post-doc in e-voting and related research topics, Newcastle University, UK[ expand ]
08:48 [Event][New]FSE'14: Fast Software Encryption 2014[ expand ]

00:17 [Pub][ePrint]Optimally Anonymous and Transferable Conditional E-cash, by Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu[ expand ]
00:17 [Pub][ePrint]On Fair Exchange, Fair Coins and Fair Sampling, by Shashank Agrawal and Manoj Prabhakaran[ expand ]

21:17 [Pub][ePrint]On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences, by Yongge Wang[ expand ]
21:17 [Pub][ePrint]Information Theoretic Security for Encryption Based on Conditional Renyi Entropies, by Mitsugu Iwamoto and Junji Shikata[ expand ]
21:17 [Pub][ePrint]Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID, by Peter Pessl and Michael Hutter[ expand ]
21:17 [Pub][ePrint]Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, by Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl[ expand ]

15:17 [Pub][ePrint]A Uniform Min-Max Theorem with Applications in Cryptography, by Salil Vadhan and Colin Jia Zheng[ expand ]
15:17 [Pub][ePrint]Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs --- Extended Version, by Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang[ expand ]

19:46 [Event][New]USENIX Security '13: 22nd USENIX Security Symposium[ expand ]
15:05 [Job][New]Ph.D. students, University of Luxembourg[ expand ]

13:52 [Job][New]Head of Card Authentication Services, Large, prestigious Bank in Manchester, England[ expand ]
13:51 [Job][Update]Head of Card Cryptography, Large, prestigious financial institution in the United Kingdom[ expand ]

06:17 [Pub][ePrint]Efficient Cryptosystems From $2^k$-th Power Residue Symbols, by Marc Joye and Benoit Libert[ expand ]
06:17 [Pub][ePrint]Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures, by Susan Hohenberger and Amit Sahai and Brent Waters[ expand ]
06:17 [Pub][ePrint]On Symmetric Encryption with Distinguishable Decryption Failures, by Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam[ expand ]
06:17 [Pub][ePrint]How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling, by Eric Brier and David Naccache and Li-yao Xia[ expand ]

21:17 [Pub][ePrint]Practical-Time Attacks Against Reduced Variants of MISTY1, by Orr Dunkelman and Nathan Keller[ expand ]
10:18 [Job][New]Scientific Assistant (m/f, E13 TV-G-U), Deutsche Telekom Chair, Goethe University Frankfurt, Germany, EEA[ expand ]
09:33 [Job][Update]Assistant/Associate Professors, University of Washington Tacoma, USA[ expand ]
09:32 [Event][New]VizSec '13: 10th Visualization for Cyber Security Workshop[ expand ]
09:31 [Event][New]DIPECC2013: The International Conference on Digital Information Processing, E-Business[ expand ]

17:43 [Job][New]Fully Funded PhD Student, Université Paris II Panthéon-Assas, PRES Sorbonne Universités, France, European Union[ expand ]

18:17 [Pub][ePrint]Security of the Misty Structure Beyond the Birthday Bound, by Jooyoung Lee[ expand ]
09:01 [Job][New]Post-Doc in System Security, University of Twente, The Netherlands[ expand ]

17:22 [Event][New]WAMPC: Workshop on Applied Multi-Party Computation[ expand ]
11:51 [PhD][Update]Alexander Meurer: A Coding-Theoretic Approach to Cryptanalysis[ expand ]
10:03 [PhD][New]Alexander Meurer: A Coding-Theoretic Approach to Cryptanalysis[ expand ]
09:17 [Pub][ePrint]DupLESS: Server-Aided Encryption for Deduplicated Storage, by Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart[ expand ]
09:17 [Pub][ePrint]Faster 128-EEA3 and 128-EIA3 Software, by Roberto Avanzi and Billy Bob Brumley[ expand ]
09:17 [Pub][ePrint]Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials, by Jiangtao Han and Haining Fan[ expand ]

21:17 [Pub][ePrint]Private Database Queries Using Somewhat Homomorphic Encryption, by Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu[ expand ]
21:17 [Pub][ePrint]Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results), by Valentina Banciu and Simon Hoerder and Dan Page[ expand ]
21:17 [Pub][ePrint]The Holey Grail: A special score function for non-binary traitor tracing, by B. Skoric and J.-J. Oosterwijk and J. Doumen[ expand ]
21:17 [Pub][ePrint]How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE, by Rikke Bendlin and Sara Krehbiel and Chris Peikert[ expand ]
21:17 [Pub][ePrint]Efficient Garbling from a Fixed-Key Blockcipher, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway[ expand ]
21:17 [Pub][ePrint]Break WEP Faster with Statistical Analysis, by Rafik Chaabouni[ expand ]
21:17 [Pub][ePrint]Instantiating Random Oracles via UCEs, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi[ expand ]
21:17 [Pub][ePrint]Locally Computable UOWHF with Linear Shrinkage, by Benny Applebaum and Yoni Moses[ expand ]
16:00 [Job][New]Assistant/Associate Professors, University of Washington Tacoma, USA, Earth[ expand ]

19:27 [PhD][Update]Viet Tung Hoang: Foundations of garbled circuits[ expand ]
19:11 [PhD][New]Viet Tung Hoang: Foundations of garbled circuits[ expand ]
19:10 [PhD][New]Phillip Rogaway: The Round Complexity of Secure Protocols[ expand ]
13:54 [PhD][New]Jeroen Doumen: Some Applications of Coding Theory in Cryptography[ expand ]
13:54 [PhD][New] H.C.A. van Tilborg[ expand ]
13:47 [Event][New]FC14: Financial Cryptography and Data Security 2014[ expand ]

20:20 [Conf]Report on ICITS[ expand ]
20:16 [PhD][New]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]
20:14 [PhD][New]David Peleg[ expand ]
20:14 [PhD][New]Avishai Wool: Quorum Systems for Distributed Control Protocols[ expand ]

09:17 [Forum][IACR Publication Reform] Re: Testable change by amitsahai[ expand ]

21:35 [Event][New]PKC 2014: 17th International Conference on Practice and Theory of Public-Key[ expand ]
15:35 [Event][New]TClouds '13: Workshop on Trustworthy Clouds[ expand ]
14:26 [Job][New]Senior Researcher (Postdoc, m/f, E14 TV-G-U), Deutsche Telekom Chair, Goethe University Frankfurt, Germany, EEA[ expand ]
14:02 [Job][New]Ph.D. Position in Applied Cryptography, University of Twente, The Netherlands[ expand ]
11:21 [Job][New]Research Assistant, TU Darmstadt, Germany, EEA[ expand ]
03:47 [Event][New]ISPEC '14: Information Security Practice & Experience Conference[ expand ]

09:30 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven, the Netherlands[ expand ]
09:04 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven, the Netherlands, Taaluni[ expand ]
09:03 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven[ expand ]

22:35 [Job][New]PhD studentship, University College London, United Kingdom, European Union[ expand ]
18:17 [Pub][ePrint]Highly Controlled, Fine-grained Delegation of Signing Capabilities, by Michael Backes and Sebastian Meiser and Dominique Schröder[ expand ]
18:17 [Pub][ePrint]Automated Security Proofs for Almost-Universal Hash for MAC verification, by Martin Gagné and Pascal Lafourcade and Yassine Lakhnech[ expand ]
18:17 [Pub][ePrint]Policy-Based Signatures, by Mihir Bellare and Georg Fuchsbauer[ expand ]
18:17 [Pub][ePrint]Moduar Form Aprroach to Solving Lattice Problems, by Yuan Tian, Xueyong Zhu, Rongxin Sun[ expand ]
18:17 [Pub][ePrint]Security Analysis of Lightweight Authentication Protocol from WISTP 2013, by Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan[ expand ]
18:17 [Pub][ePrint]Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI, by Yossi Gilad and Amir Herzberg[ expand ]
18:17 [Pub][ePrint]Order-Preserving Encryption Secure Beyond One-Wayness, by Tal Malkin and Isamu Teranishi and Moti Yung[ expand ]
18:17 [Pub][ePrint]Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited, by Nils Fleischhacker and Tibor Jager and Dominique Schröder[ expand ]
18:17 [Pub][ePrint]The Improved Cube Attack on Grain-v1, by Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang[ expand ]
18:17 [Pub][ePrint]Computational Fuzzy Extractors, by Benjamin Fuller and Xianrui Meng and Leonid Reyzin[ expand ]
18:17 [Pub][ePrint]Short collision search in arbitrary SL2 homomorphic hash functions, by Ciaran Mullan and Boaz Tsaban[ expand ]
18:17 [Pub][ePrint]A novel certificateless deniable authentication protocol, by Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li[ expand ]
16:43 [Job][New]Assistant Professor (tenure track), Technische Universiteit Eindhoven[ expand ]
16:36 [Event][New]PETShop'13: PETShop: Workshop on Language Support for Privacy Enhancing Technologies[ expand ]
12:35 [Event][New]RISC '13: The 5th International Workshop on RFID/IoT Security and Cryptography[ expand ]

16:47 [Event][New]SEC@SAC'14: 13th Computer Security track at the 29th ACM Symposium on Applied Computing[ expand ]
09:17 [Forum][IACR Publication Reform] Re: two-stage review process by cbw[ expand ]

21:17 [Forum][IACR Publication Reform] Re: two-stage review process by Orr[ expand ]
15:17 [Forum][IACR Publication Reform] Re: Testable change by cbw[ expand ]
12:17 [Forum][IACR Publication Reform] two-stage review process by Joan Daemen[ expand ]

21:17 [Forum][IACR Publication Reform] Re: Testable change by Orr[ expand ]

09:07 [Event][New]Indocrypt 2013: 14th International Conference on Cryptology in India[ expand ]

18:56 [PhD][Update]Enrico Thomae: About the Security of Multivariate Quadratic Public Key Schemes[ expand ]
12:17 [Pub][ePrint]New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields, by Chunming Tang, Yanfeng Qi, Maozhi Xu[ expand ]
12:17 [Pub][ePrint]The SIMON and SPECK Families of Lightweight Block Ciphers, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
12:17 [Pub][ePrint]Function-Private Subspace-Membership Encryption and Its Applications, by Dan Boneh and Ananth Raghunathan and Gil Segev[ expand ]
12:17 [Pub][ePrint]Efficient Two-Pass Anonymous Identity Authentication Using Smart Card, by Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4[ expand ]
12:17 [Pub][ePrint]Functional Signatures and Pseudorandom Functions, by Elette Boyle and Shafi Goldwasser and Ioana Ivan[ expand ]
12:17 [Pub][ePrint]A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic, by Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé[ expand ]
12:17 [Pub][ePrint]Attribute-Based Server-Aided Verfication Signature, by Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen[ expand ]
06:28 [PhD][New]Enrico Thomae: About the Security of Multivariate Quadratic Public Key Schemes[ expand ]

06:17 [Forum][General] Re: RSS feeds by cbw[ expand ]
06:17 [Forum][IACR Publication Reform] Automatic follow up by cbw[ expand ]

15:17 [Pub][ePrint]Attack on Liao and Hsiao\'s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol, by Roel Peeters and Jens Hermans[ expand ]
12:17 [Pub][ePrint]ASICS: Authenticated Key Exchange Security Incorporating Certification Systems, by Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila[ expand ]
12:17 [Pub][ePrint]Practical Secure Logging: Seekable Sequential Key Generators, by Giorgia Azzurra Marson and Bertram Poettering[ expand ]
12:17 [Forum][IACR Publication Reform] Testable change by amitsahai[ expand ]
09:43 [Event][New]EBW 2014: The 2nd International Conference on E-Technologies and Business on the Web[ expand ]
09:43 [Event][New]RWC 2014: Real World Cryptography Workshop 2014[ expand ]
09:17 [Pub][ePrint]Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption, by Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada[ expand ]
09:17 [Forum][IACR Publication Reform] Re: The speed of science: two case studies by hoerder[ expand ]
09:17 [Pub][ePrint]A Public Key Cryptoscheme Using the Bit-pair Method, by Shenghui Su and Maozhi Xu and Shuwang Lu[ expand ]
09:17 [Pub][ePrint]On the Practical Security of a Leakage Resilient Masking Scheme, by Emmanuel Prouff and Matthieu Rivain and Thomas Roche[ expand ]
09:17 [Pub][ePrint]Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\\mbox{AES}^{2}$, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model, by Yong Li and Zheng Yang[ expand ]
09:17 [Pub][ePrint]Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]Pickle: A HASH Design, by Lan Luo and Yalan Ye and Zehui Qu and Sharon Goldberg and Xan Du[ expand ]
00:17 [Forum][IACR Publication Reform] Re: The speed of science: two case studies by cbw[ expand ]

22:33 [Job][Update]PostDoc Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg[ expand ]
22:32 [Job][Update]Professor of Cyber Security, Tallinn University of Technology, Estonia[ expand ]
22:24 [Job][New]Professor of Cyber Security, Tallinn University of Technology, Estonia[ expand ]
21:19 [Pub][JoC][IACR Publication Reform] The speed of science: two case studies by djb[ expand ]
15:17 [Pub][ePrint]Sequential Aggregate Signatures Made Shorter, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
15:17 [Pub][ePrint]Lattice Signatures and Bimodal Gaussians, by Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky[ expand ]
15:17 [Pub][ePrint]To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC, by Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro[ expand ]
15:17 [Pub][ePrint]Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Gr{\\o}stl, by Bingke Ma and Bao Li and Ronglin Hao[ expand ]
15:17 [Pub][ePrint]A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes, by Jan-Jaap Oosterwijk and Boris \\v{S}kori\\\'c and Jeroen Doumen[ expand ]
15:17 [Pub][ePrint]Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions, by Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyohsi Takagi[ expand ]
15:17 [Pub][ePrint]Cryptographically Protected Prefixes for Location Privacy in IPv6, by Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain[ expand ]

01:51 [Job][New]Ph.D. student, Hochschule Furtwangen University, Germany, Euroepan Union[ expand ]

20:02 [PhD][Update][ expand ]
19:45 [Job][New]Scientific Assistant (m/f, E13 TV-G-U), Goethe University Frankfurt, Frankfurt am Main, Germany[ expand ]
15:26 [Job][New][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions, by François-Xavier Standaert and Olivier Pereira and Yu Yu[ expand ]
15:17 [Pub][ePrint]Block Ciphers that are Easier to Mask: How Far Can we Go?, by Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]A note on quantum related-key attacks, by Martin Roetteler and Rainer Steinwandt[ expand ]
15:17 [Pub][ePrint]An Algebraic Framework for Diffie-Hellman Assumptions, by Alex Escala and Gottfried Herold and Eike Kiltz and Carla R\\`afols and Jorge Villar[ expand ]
15:17 [Pub][ePrint]An Accurate Probabilistic Reliability Model for Silicon PUFs, by Roel Maes[ expand ]
15:17 [Pub][ePrint]NaCl on 8-Bit AVR Microcontrollers, by Michael Hutter and Peter Schwabe[ expand ]
15:17 [Pub][ePrint]A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN, by Majid Bayat, Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]Injective Encoding to Elliptic Curves, by Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Practical Bootstrapping in Quasilinear Time, by Jacob Alperin-Sheriff and Chris Peikert[ expand ]
15:17 [Pub][ePrint]Comments on Three Multi-Server Authentication Protocols, by Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3[ expand ]
15:17 [Pub][ePrint]Delegatable Pseudorandom Functions and Applications, by Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias[ expand ]
11:22 [Job][New]Senior Scientist Medical Security, Philips Research Europe, Netherlands-North Brabant-Eindhoven [ expand ]

21:17 [Pub][ePrint]A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC. -- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present da[ expand ]
21:17 [Pub][ePrint]A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor, by Shigeo MITSUNARI[ expand ]
21:17 [Pub][ePrint]Linearly Homomorphic Structure-Preserving Signatures and Their Applications, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]
21:17 [Pub][ePrint]Achieving the limits of the noisy-storage model using entanglement sampling, by Frédéric Dupuis and Omar Fawzi and Stephanie Wehner[ expand ]
21:17 [Pub][ePrint]Security in $O(2^n)$ for the Xor of Two Random Permutations\\\\ -- Proof with the standard $H$ technique--, by Jacques Patarin[ expand ]
21:17 [Pub][ePrint]On the Security of TLS-DH and TLS-RSA in the Standard Model, by Florian Kohlar and Sven Schäge and Jörg Schwenk[ expand ]
21:17 [Pub][ePrint]Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128, by Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin[ expand ]
21:17 [Pub][ePrint]Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model, by Zheng Yang[ expand ]
21:17 [Pub][ePrint]On the Achievability of Simulation-Based Security for Functional Encryption, by Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O\'Neill and Omer Paneth and Giuseppe Persiano[ expand ]
20:44 [PhD][New]Martin M. Lauridsen: Lightweight Cryptography[ expand ]
20:43 [PhD][New]Hao Chen[ expand ]
20:42 [PhD][New]Christian Rechberger[ expand ]
18:55 [Job][New]1 post-doc and 2 PhD posotions , University of Luxembourg[ expand ]
15:17 [Pub][ePrint]Time-Optimal Interactive Proofs for Circuit Evaluation, by Justin Thaler[ expand ]
15:17 [Pub][ePrint]Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions, by Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam[ expand ]
15:17 [Pub][ePrint]Counter-cryptanalysis, by Marc Stevens[ expand ]
15:17 [Pub][ePrint]The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE, by Dmitry Khovratovich and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Verifying computations with state, by Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish[ expand ]
15:17 [Pub][ePrint]New Attacks against Transformation-Based Privacy-Preserving Linear Programming, by Peeter Laud and Alisa Pankova[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions in the Multilinear Setting, by Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks[ expand ]
15:17 [Pub][ePrint]Profiling DPA: Efficacy and efficiency trade-offs, by Carolyn Whitnall and Elisabeth Oswald[ expand ]
15:17 [Pub][ePrint]Constrained Pseudorandom Functions and Their Applications, by Dan Boneh and Brent Waters[ expand ]
15:17 [Pub][ePrint]A heuristic for finding compatible differential paths with application to HAS-160, by Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Multi-file proofs of retrievability for cloud storage auditing, by Bin Wang and Xiaojing Hong[ expand ]
12:17 [Pub][ePrint]A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation, by Martin Hirt and Ueli Maurer and Christoph Lucas[ expand ]
05:27 [Event][New]GreHack 13: Symp on Research in Grey-Hat Hacking (Applied Cryptography & Cryptanalysis)[ expand ]

21:17 [Pub][ePrint]Limits of provable security for homomorphic encryption, by Andrej Bogdanov and Chin Ho Lee[ expand ]
21:17 [Pub][ePrint]Quantum one-time programs, by Anne Broadbent and Gus Gutoski and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices, by Xiang Xie and Rui Xue[ expand ]
21:17 [Pub][ePrint]Trapdoor Smooth Projective Hash Functions, by Fabrice Benhamouda and David Pointcheval[ expand ]
21:17 [Pub][ePrint]STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data, by Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Using Bleichenbacher\'s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA, by Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson[ expand ]
21:17 [Pub][ePrint]Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012, by Arnab Roy and Srinivas Vivek[ expand ]
03:17 [Pub][ePrint]Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based, by Craig Gentry and Amit Sahai and Brent Waters[ expand ]

21:14 [Event][New]Analyzing Animal Vocal Communication Sequences[ expand ]
18:17 [Pub][ePrint]On the Security of the TLS Protocol: A Systematic Analysis, by Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee[ expand ]

09:30 [Conf][Crypto]Report on SAC 2012[ expand ]
03:47 [Event][New]PQCrypto 2014: 6th International Conference on Post-Quantum Cryptography[ expand ]

16:48 [Conf][Crypto]Report on Crypto 2012[ expand ]
12:36 [Pub]IACR Publication Reform - Open Discussion[ expand ]
08:53 [Conf]Report on Inscrypt 2012[ expand ]
08:48 [Conf]Report on TCC 2012[ expand ]
08:42 [Job][New]Research fellow in computer security, University of Bergen, Norway, EEA[ expand ]
08:33 [Event][New]Pairing 2013: The 6th International Conference on Pairing-Based Cryptography[ expand ]

15:17 [Pub][ePrint]Attribute-Based Encryption for Circuits, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]A Novel Technique in Linear Cryptanalysis, by Wen-Long Sun Jie Guan Lin Ding[ expand ]
15:17 [Pub][ePrint]Parallel and Dynamic Searchable Symmetric Encryption, by Seny Kamara and Charalampos Papamanthou[ expand ]
15:17 [Pub][ePrint]Protecting PUF Error Correction by Codeword Masking, by Dominik Merli and Frederic Stumpf and Georg Sigl[ expand ]
15:17 [Pub][ePrint]Double-authentication-preventing signatures, by Bertram Poettering and Douglas Stebila[ expand ]
15:17 [Pub][ePrint]A method for obtaining lower bounds on the higher order nonlinearity of Boolean function, by Mikhail S. Lobanov[ expand ]
15:17 [Pub][ePrint]Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs[ expand ]

18:17 [Pub][ePrint]Fully-Anonymous Functional Proxy-Re-Encryption, by Yutaka Kawai and Katsuyuki Takashima[ expand ]
18:17 [Pub][ePrint]Anon-Pass: Practical Anonymous Subscriptions, by Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel[ expand ]
18:17 [Pub][ePrint]Elligator: Elliptic-curve points indistinguishable from uniform random strings, by Daniel J. Bernstein and Anna Krasnova and Tanja Lange[ expand ]
18:17 [Pub][ePrint]Sieve-in-the-Middle: Improved MITM Attacks (Full Version), by Anne Canteaut and Maria Naya-Plasencia and Bastien Vayssière[ expand ]