International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 [ 14 ] 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
18:17 [Pub][ePrint]Smart Security Management in Secure Devices, by Bruno Robisson, Michel Agoyan, Patrick Soquet, S\\\'ebastien Le Henaff, Franck Wajsb\\\"urt, Pirouz Bazargan-Sabet, Guillaume Phan[ expand ]
18:17 [Pub][ePrint]GMU Hardware API for Authenticated Ciphers, by Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj[ expand ]
18:17 [Pub][ePrint]The Fallacy of Composition of Oblivious RAM and Searchable Encryption, by Muhammad Naveed[ expand ]
18:17 [Pub][ePrint]De Bruijn Sequences from Nonlinear Feedback Shift Registers, by Ming Li and Dongdai Lin[ expand ]
18:17 [Pub][ePrint]Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques, by Huaifeng Chen and Xiaoyun Wang[ expand ]
18:17 [Pub][ePrint]Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption., by Romain Gay and Iordanis Kerenidis and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Secure Multi-Party Shuffling, by Mahnush Movahedi and Jared Saia and Mahdi Zamani[ expand ]
18:17 [Pub][ePrint]EdDSA for more curves, by Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang[ expand ]
18:17 [Pub][ePrint]Quantum Cryptanalysis of NTRU, by Scott Fluhrer[ expand ]
18:17 [Pub][ePrint]Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts, by Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou[ expand ]
18:17 [Pub][ePrint]Preprocessing-Based Verification of Multiparty Protocols with Honest Majority, by Peeter Laud and Alisa Pankova[ expand ]
09:17 [Forum][2015 Reports] Re: 2015/650 It looks like not secure by Oleksandr Kazymyrov[ expand ]
03:17 [Forum][2015 Reports] 2015/650 It looks like not secure by movax[ expand ]

18:42 [Job][New]Ph.D. student in Crypto-Finance, Cybersecurity and Privacy, University of Luxembourg[ expand ]
16:34 [Job][New]Ph.D., Hochschule Offenburg (University of Applied Sciences)[ expand ]
09:17 [Pub][ePrint]Analyzing the Efficiency of Biased-Fault Based Attacks, by Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont[ expand ]

16:39 [News]CRYPTO registration open, Journal of Cryptology delivery changes[ expand ]
15:17 [Pub][ePrint]Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves, by Ryutaroh Matsumoto[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of a modern rotor machine in a multicast setting, by Shane Kepley and David Russo and Rainer Steinwandt[ expand ]
09:17 [Pub][ePrint]A Hybrid Gaussian Sampler for Lattices over Rings, by Léo Ducas and Thomas Prest[ expand ]
09:17 [Pub][ePrint]Diversity and Transparency for ECC, by Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå[ expand ]
09:17 [Pub][ePrint]Single-Cycle Implementations of Block Ciphers, by Pieter Maene and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Randomizing the Montgomery Powering Ladder, by Duc-Phong Le \\and Chik How Tan \\and Michael Tunstall[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of a Markov Chain Based User Authentication Scheme, by Ruhul Amin and G.P. Biswas[ expand ]
09:17 [Pub][ePrint]An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves, by Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin[ expand ]
09:17 [Pub][ePrint]DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone, by Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng[ expand ]

18:16 [Job][New]Two permanent academic posts in Secure Systems at Surrey, University of Surrey[ expand ]
16:11 [Event][New]Passwords '15: The 9th International Conference on Passwords[ expand ]
16:10 [Event][New]CHAE: Challenges in Authenticated Encryption[ expand ]
09:17 [Pub][ePrint]Homomorphic Signature Schemes - A survey, by Giulia Traverso and Denise Demirel and Johannes Buchmann[ expand ]
03:17 [Pub][ePrint]Modelling ciphersuite and version negotiation in the TLS protocol, by Benjamin Dowling and Douglas Stebila[ expand ]
03:17 [Pub][ePrint]Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption, by Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller[ expand ]
03:17 [Pub][ePrint]A New Encryption Standard of Ukraine: The Kalyna Block Cipher, by Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksan[ expand ]
03:17 [Pub][ePrint]On the Hardness of Proving CCA-security of Signed ElGamal, by David Bernhard and Marc Fischlin and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]Adaptive Proofs of Knowledge in the Random Oracle Model, by David Bernhard and Marc Fischlin and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]Efficient ephemeral elliptic curve cryptographic keys, by Andrea Miele and Arjen K. Lenstra[ expand ]
03:17 [Pub][ePrint]Decomposition attack on SASASASAS, by Alex Biryukov and Dmitry Khovratovich[ expand ]
03:17 [Pub][ePrint]Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy, by Cl\\\'{e}mentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen[ expand ]
03:17 [Pub][ePrint]The Pythia PRF Service, by Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart[ expand ]

21:17 [Pub][ePrint]Short Accountable Ring Signatures Based on DDH, by Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit[ expand ]
21:17 [Pub][ePrint]A New Partial Key Exposure Attack on Multi-power RSA, by Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings, by Jing Li and Licheng Wang[ expand ]
21:17 [Pub][ePrint]Very-efficient simulatable flipping of many coins into a well, by Luís T. A. N. Brandão[ expand ]
21:17 [Pub][ePrint]Polynomial time reduction from approximate shortest vector problem to principle ideal probelm for lattices in cyclotomic rings, by Hao Chen[ expand ]
21:17 [Pub][ePrint]An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment, by Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta[ expand ]
21:17 [Pub][ePrint]A Novel Cyberspace-Oriented Access Control Model, by Fenghua Li and Yanchao Wang and Rongna Xie and Fangfang Shan and Jinbo Xiong[ expand ]
21:17 [Pub][ePrint]Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes, by Matthias Krause[ expand ]
21:17 [Pub][ePrint]Microcash: Efficient Off-Line Small Payments, by Chris Pavlovski and Colin Boyd[ expand ]
21:17 [Pub][ePrint]Phasing: Private Set Intersection using Permutation-based Hashing, by Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner[ expand ]
21:17 [Pub][ePrint]An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme, by Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models, by Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji[ expand ]
21:17 [Pub][ePrint]Accelerating Homomorphic Evaluation on Reconfigurable Hardware, by Thomas P\\\"oppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias[ expand ]
21:17 [Pub][ePrint]Unconditionally Secure Computation with Reduced Interaction, by Ivan Damgård and Jesper Buus Nielsen[ expand ]
21:17 [Pub][ePrint]BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme, by Véronique Cortier and Georg Fuchsbauer and David Galindo[ expand ]
21:17 [Pub][ePrint]An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme, by Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer[ expand ]
21:17 [Pub][ePrint]On Necessary Padding with IO, by Justin Holmgren[ expand ]
21:17 [Pub][ePrint]Practical Round-Optimal Blind Signatures in the Standard Model, by Georg Fuchsbauer and Christian Hanser and Daniel Slamanig[ expand ]
21:17 [Pub][ePrint]Ed448-Goldilocks, a new elliptic curve, by Mike Hamburg[ expand ]
21:17 [Pub][ePrint]Automated Analysis and Synthesis of Authenticated Encryption Schemes, by Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff[ expand ]
21:17 [Pub][ePrint]Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators, by Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand[ expand ]
21:17 [Pub][ePrint]Random Digit Representation of Integers, by Nicolas Méloni and M. Anwar Hasan[ expand ]
21:17 [Pub][ePrint]Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms, by Sarani Bhattacharya, Debdeep Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions, by Susumu Kiyoshima[ expand ]
21:17 [Pub][ePrint]Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits, by Seher Tutdere and Osmanbey Uzunkol[ expand ]
21:17 [Pub][ePrint]An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities, by Juan Carlos Ku-Cauich Guillermo Morales-Luna Horacio Tapia-Recillas[ expand ]
21:17 [Pub][ePrint]Generalised tally-based decoders for traitor tracing and group testing, by Boris Skoric and Wouter de Groot[ expand ]
21:17 [Pub][ePrint]The leaking battery A privacy analysis of the HTML5 Battery Status API, by Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz[ expand ]
21:17 [Pub][ePrint]Security Analysis of Niu et al. Authentication and Ownership Management Protocol, by Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati[ expand ]
20:15 [Job][New]Post.doc., Norwegian University of Science and Technology (NTNU), Trondheim, Norway[ expand ]
18:17 [Pub][ePrint]Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem, by Fangguo Zhang[ expand ]
18:17 [Pub][ePrint]Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud, by Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei[ expand ]
18:17 [Pub][ePrint]The Simeck Family of Lightweight Block Ciphers, by Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong[ expand ]
16:29 [Job][New]Ph.D. scholarship, Institute of Computer Science, Polish Academy of Sciences, POLAND[ expand ]

21:24 [Event][New]FC '16: Financial Cryptography and Data Security 2016[ expand ]

21:17 [Pub][ePrint]A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0, by Shijun Zhao and Qianying Zhang[ expand ]
21:17 [Pub][ePrint]McBits: fast constant-time code-based cryptography, by Daniel J. Bernstein and Tung Chou and Peter Schwabe[ expand ]
21:17 [Pub][ePrint]Experimental Study of DIGIPASS GO3 and the Security of Authentication, by Igor Semaev[ expand ]
21:17 [Pub][ePrint]Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Benoit Libert and Damien Stehle[ expand ]
21:17 [Pub][ePrint]Netcoin - A Traceable P2P Electronic Cash System, by Hitesh Tewari and Eamon O Nuallain[ expand ]
21:17 [Pub][ePrint]Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM, by Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon[ expand ]
21:17 [Pub][ePrint]Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm, by Steven D. Galbraith and Ping Wang and Fangguo Zhang[ expand ]
21:17 [Pub][ePrint]Structure-Preserving Signatures from Standard Assumptions, Revisited, by Eike Kiltz and Jiaxin Pan and Hoeteck Wee[ expand ]
21:17 [Pub][ePrint]Complementary Dual Codes for Counter-measures to Side-Channel Attacks, by Claude Carlet and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers, by Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay[ expand ]
21:17 [Pub][ePrint]A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation, by Mei Wang, Zheng Yuan,Xiao Feng[ expand ]

23:21 [Event][New]ACNS'16: 14th International Conference on Applied Cryptography and Network Security[ expand ]

16:08 [Job][New]Two PhD Positions in Cryptography, University of Bristol[ expand ]

16:27 [Job][New]Ph.D. scholarship, University of Bergen[ expand ]

22:47 [Job][New]Postdoc, Cryptographic Algorithms Group, CISPA, Saarland University, Germany[ expand ]
22:47 [Job][New]Sr. SW Engineer – Security/Applied Cryptography Expert , Aspera - an IBM Company[ expand ]

03:55 [News]Open Letter to the Hon'ble President of India[ expand ]

18:17 [Pub][ePrint]Predictive Models for Min-Entropy Estimation, by John Kelsey and Kerry A. McKay and Meltem Sonmez Turan[ expand ]
18:17 [Pub][ePrint]The Chain Rule for HILL Pseudoentropy, Revisited, by Krzysztof Pietrzak and Maciej Skorski[ expand ]
18:17 [Pub][ePrint]Combining Differential Privacy and Secure Multiparty Computation, by Martin Pettai and Peeter Laud[ expand ]
18:17 [Pub][ePrint]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?, by Amir Moradi and Alexander Wild[ expand ]
18:17 [Pub][ePrint]Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations, by Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana[ expand ]
18:17 [Pub][ePrint]Differential Fault Intensity Analysis, by Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont[ expand ]
18:17 [Pub][ePrint]Disk Encryption: Do We Need to Preserve Length?, by Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar[ expand ]
18:17 [Pub][ePrint]A Physical Approach for Stochastic Modeling of TERO-based TRNG, by Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI[ expand ]
18:17 [Pub][ePrint]Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information, by Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and[ expand ]
18:17 [Pub][ePrint]How much randomness can be extracted from memoryless Shannon entropy sources?, by Maciej Skorski[ expand ]
18:17 [Pub][ePrint]TriviA: A Fast and Secure Authenticated Encryption Scheme, by Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi[ expand ]
18:17 [Pub][ePrint]Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath, by A.-M. Leventi-Peetz and J.-V. Peetz[ expand ]
18:17 [Pub][ePrint]An analysis of the $C$ class of bent functions, by Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic[ expand ]
18:17 [Pub][ePrint]SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System, by Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang[ expand ]
18:17 [Pub][ePrint]SIMON and SPECK: Block Ciphers for the Internet of Things, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
18:17 [Pub][ePrint]How to Securely Prolong the Computational Bindingness of Pedersen Commitments, by Denise Demirel and Jean Lancrenon[ expand ]
09:17 [Pub][ePrint]Secure Key Generation from Biased PUFs, by Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems[ expand ]
09:17 [Pub][ePrint]How Secure and Quick is QUIC? Provable Security and Performance Analyses, by Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru[ expand ]
09:17 [Pub][ePrint]Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation, by Christina Brzuska and Arno Mittelbach[ expand ]
09:17 [Pub][ePrint]Composable & Modular Anonymous Credentials: Definitions and Practical Constructions, by Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss[ expand ]

01:50 [News]FSE 2013 videos[ expand ]

20:10 [Event][New]CTISRM2016: The International Conference on Computing Technology, Information Security[ expand ]

21:17 [Pub][ePrint]A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation, by Mridul Nandi[ expand ]

18:17 [Pub][ePrint]Tampering with the Delivery of Blocks and Transactions in Bitcoin, by Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun[ expand ]
18:17 [Pub][ePrint]Twist Insecurity, by Manfred Lochter, Andreas Wiemers[ expand ]
18:17 [Pub][ePrint]The Carnac protocol -- or how to read the contents of a sealed envelope, by Michael Scott and Brian Spector[ expand ]
18:17 [Pub][ePrint]Known-key Distinguisher on Full PRESENT, by Céline Blondeau and Thomas Peyrin and Lei Wang[ expand ]
18:17 [Pub][ePrint]Fair and Robust Multi-Party Computation using a Global Transaction Ledger, by Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas[ expand ]
18:17 [Pub][ePrint]Last fall degree, HFE, and Weil descent attacks on ECDLP, by Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo[ expand ]
18:17 [Pub][ePrint]On Public Key Encryption from Noisy Codewords, by Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi[ expand ]
18:17 [Pub][ePrint]Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order, by Tobias Schneider and Amir Moradi and Tim Güneysu[ expand ]
18:17 [Pub][ePrint]Constant Communication Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass[ expand ]
18:17 [Pub][ePrint]Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version), by Bingke Ma and Bao Li and Rongl[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of Reduced-Round Whirlwind (Full Version), by Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li[ expand ]
03:17 [Pub][ePrint]Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes, by Henri Gilbert and Jérôme Plût and Joana Treger[ expand ]
03:17 [Pub][ePrint]A Framework for Identity-Based Encryption with Almost Tight Security, by Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada[ expand ]
03:17 [Pub][ePrint]FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime, by Craig Costello and Patrick Longa[ expand ]
03:17 [Pub][ePrint]Sanctum: Minimal RISC Extensions for Isolated Execution, by Victor Costan and Ilia Lebedev and Srinivas Devadas[ expand ]
03:17 [Pub][ePrint]Privacy in the Genomic Era, by Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang[ expand ]
03:17 [Pub][ePrint]PUA - Privacy and Unforgeability for Aggregation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva and Melek Önen[ expand ]
00:17 [Pub][ePrint]PUA - Privacy and Unforgeability for Aggregation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molvaa and Melek Onen ¨[ expand ]
00:17 [Pub][ePrint]SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip, by J. Longo and E. De Mulder and D. Page and M. Tunstall[ expand ]
00:17 [Pub][ePrint]Generic Construction of UC-Secure Oblivious Transfer, by Olivier Blazy and Céline Chevalier[ expand ]
00:17 [Pub][ePrint]Concurrent Secure Computation with Optimal Query Complexity, by Ran Canetti and Vipul Goyal and Abhishek Jain[ expand ]
00:17 [Pub][ePrint]Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting, by Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen[ expand ]

15:55 [Event][New]PKC: Public Key Cryptography[ expand ]
15:54 [Event][New]16th International Conference on Cryptology, Indocrypt (Indocrypt)[ expand ]

23:09 [Job][New]PhD student in Information Security and Cryptography, Chalmers University of Technology, Sweden[ expand ]
16:00 [Job][New]Postdoctoral researcher in Quantum Cryptography, University of Amsterdam[ expand ]
16:00 [Job][New]PhD candidate in Quantum Cryptography, University of Amsterdam[ expand ]
16:00 [Event][New]ICICS 2015: International Conference on Information and Communications Security[ expand ]
09:17 [Pub][ePrint]Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers, by Takanori Isobe and Kyoji Shibutani[ expand ]
09:17 [Pub][ePrint]Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates, by Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack, by Tapas Pandit and Sumit Kumar Pandey and Rana Barua[ expand ]
09:17 [Pub][ePrint]An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue[ expand ]

21:17 [Pub][ePrint]Round-Optimal Black-Box Two-Party Computation, by Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro[ expand ]
21:17 [Pub][ePrint]An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices, by Paul Kirchner and Pierre-Alain Fouque[ expand ]

17:11 [News]Deadline approaching for IACR School proposals[ expand ]

21:17 [Pub][ePrint]Quantum homomorphic encryption for circuits of low $T$-gate complexity, by Anne Broadbent and Stacey Jeffery[ expand ]
04:08 [Event][New]PRIVAGEN 2015: Privacy-Aware Computational Genomics 2015[ expand ]

21:17 [Forum][2014 Reports] 2015/468 FHE for plaintexts from Z_p, with prime p, do not work? by movax[ expand ]
17:37 [Event][New]PETS: Privacy Enhancing Technologies Symposium (PETS)[ expand ]
15:16 [Job][New]Doctoral Research Fellows, University of Passau[ expand ]
06:37 [Job][New]Post-Doc, Ruhr University Bochum[ expand ]
06:37 [Job][New]PhD Research Fellowship in Secure Networking Technologies, Norwegian University of Science and Technology (NTNU), Trondheim, Norway[ expand ]

14:44 [Event][New]CT-RSA'16: RSA Conference 2016 Cryptographer's Track[ expand ]

15:06 [Event][New]ICISSP 2016: 2nd International Conference on Information Systems Security and Privacy[ expand ]
00:17 [Pub][ePrint]Upending Stock Market Structure Using Secure Multi-Party Computation, by Charanjit S. Jutla[ expand ]
00:17 [Pub][ePrint]ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices, by Amir Hassani Karbasi, Reza Ebrahimi Atani[ expand ]
00:17 [Pub][ePrint]Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines, by Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz[ expand ]
00:17 [Pub][ePrint]Secure Computation of MIPS Machine Code, by Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz[ expand ]
00:17 [Pub][ePrint]Actively Secure OT Extension with Optimal Overhead, by Marcel Keller and Emmanuela Orsini and Peter Scholl[ expand ]
00:17 [Pub][ePrint]FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs, by Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing[ expand ]
00:17 [Pub][ePrint]Alternative cubics\' rules with an algebraic appeal, by Daniel R. L. Brown[ expand ]
00:17 [Pub][ePrint]Bloom Filters in Adversarial Environments, by Moni Naor and Eylon Yogev[ expand ]
00:17 [Pub][ePrint]Improved Side-Channel Analysis of Finite-Field Multiplication, by Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff[ expand ]
00:17 [Pub][ePrint]Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption, by Bart Mennink and Reza Reyhanitabar and Damian Vizár[ expand ]

12:17 [Pub][ePrint]Tweaking Even-Mansour Ciphers, by Benoît Cogliati and Rodolphe Lampe and Yannick Seurin[ expand ]
12:17 [Pub][ePrint]Pairing Based Mutual Healing in Wireless Sensor Networks, by Sarita Agrawal and Jay Patel and Manik Lal Das[ expand ]
12:17 [Pub][ePrint]Towards Easy Leakage Certification, by François Durvaux and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, by François Durvaux and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, by Vincent Grosso and François-Xavier Standaert[ expand ]
12:17 [Pub][ePrint]Problems, solutions and experience of the first international student\'s Olympiad in cryptography, by Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel [ expand ]

22:34 [Event][New]LightSec 2015: Workshop on Lightweight Cryptography for Security & Privacy[ expand ]

15:44 [Event][New]C&TC 2015: 5th Int. Symposium on Cloud and Trusted Computing[ expand ]
03:32 [PhD][Update]Nishant Doshi: Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption[ expand ]
03:28 [PhD][New]Dai Yamamoto: Security Evaluation and Improvement of Physically Unclonable Functions[ expand ]
00:17 [Pub][ePrint]Related-Key Rectangle Attack on Round-reduced \\textit{Khudra} Block Cipher, by Xiaoshuang Ma and Kexin Qiao[ expand ]
00:17 [Pub][ePrint]PICO: An Ultra lightweight and Low power encryption design for pervasive computing, by GAURAV BANSOD , NARAYAN PISHAROTY AND ABHIJIT PATIL[ expand ]
00:17 [Pub][ePrint]Reproducible Circularly-Secure Bit Encryption: Applications and Realizations, by Mohammad Hajiabadi, Bruce M. Kapron[ expand ]
00:17 [Pub][ePrint]Practical Free-Start Collision Attacks on 76-step SHA-1, by Pierre Karpman and Thomas Peyrin and Marc Stevens[ expand ]
00:17 [Pub][ePrint]Power Analysis Attacks against IEEE 802.15.4 Nodes, by Colin O\'Flynn and Zhizhang Chen[ expand ]
00:17 [Pub][ePrint]Spacecoin: A Cryptocurrency Based on Proofs of Space, by Sunoo Park and Krzysztof Pietrzak and Jo\\\"el Alwen and Georg Fuchsbauer and Peter Gazi[ expand ]

22:58 [Job][New]PhD student , Universitat Pompeu Fabra, Barcelona, Spain[ expand ]

20:30 [Event][New]AFRICACRYPT 2016: International Conference on Cryptology, AFRICACRYPT 2016[ expand ]
09:17 [Pub][ePrint]Robust Profiling for DPA-Style Attacks, by Carolyn Whitnall and Elisabeth Oswald[ expand ]
09:17 [Pub][ePrint]Generic Key Recovery Attack on Feistel Scheme, by Takanori Isobe and Kyoji Shibutani[ expand ]
09:17 [Pub][ePrint]Short Randomizable Signatures, by David Pointcheval and Olivier Sanders[ expand ]
06:17 [Pub][ePrint]Secure Key Exchange Protocol based on Virtual Proof of Reality, by Yansong Gao[ expand ]
05:07 [Job][New]Call for Ph.D. Students - Cloud Security, The University of Auckland, New Zealand[ expand ]
05:07 [Job][New]Research Fellow/Postdoctoral Researcher - Cloud Security, The University of Auckland[ expand ]

16:05 [Event][New]Inscrypt 2015: 11th International Conference on Information Security and Cryptology[ expand ]

21:17 [Pub][ePrint]Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ, by Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai[ expand ]
21:17 [Pub][ePrint]Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search, by Anja Becker, Nicolas Gama, Antoine Joux[ expand ]
21:17 [Pub][ePrint]Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency, by Sergey Gorbunov and Silvio Micali[ expand ]
21:17 [Pub][ePrint]Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange, by Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan[ expand ]

09:17 [Pub][ePrint]Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping, by Yongge Wang[ expand ]
09:17 [Pub][ePrint]Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin, by Ren Zhang[ expand ]
09:17 [Pub][ePrint]Subversion-Resilient Signature Schemes, by Giuseppe Ateniese and Bernardo Magri and Daniele Venturi[ expand ]

19:12 [Event][New]SBSeg 2015: XV Brazilian Symposium on Information and Computational Systems Security[ expand ]
09:17 [Pub][ePrint]Key-Recovery Attacks on ASASA, by Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE, by Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Time-Lock Puzzles from Randomized Encodings, by Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters[ expand ]
09:17 [Pub][ePrint]Computing Individual Discrete Logarithms Faster in $GF(p^n)$, by Aurore Guillevic[ expand ]
06:10 [Event][New]Mycrypt 2016: Int'l Conference on Cryptology & Malicious Security hosted in Malaysia[ expand ]

21:17 [Pub][ePrint]Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply, by Sami Saab, Andrew Leiserson, and Michael Tunstall[ expand ]
15:20 [Job][New]Three Post-Doc positions, SICS Swedish ICT[ expand ]
15:19 [Event][New]MyCRYPT2016: Int'l Conference on Cryptology & Malicious Security hosted in Malaysia[ expand ]
03:03 [Event][New]MyCRYPT2016: International Conference on Cryptology & Malicious Security[ expand ]

22:31 [Job][Update]Intern Software Developer (Cryptography), CloudFlare Inc.[ expand ]
21:17 [Pub][ePrint]Near Collision Side Channel Attacks, by Baris Ege and Thomas Eisenbarth and Lejla Batina[ expand ]
21:17 [Pub][ePrint]Equivoe-T: Transposition Equivocation Cryptography, by Gideon Samid[ expand ]
21:17 [Pub][ePrint]A flaw in a theorem about Schnorr signatures, by Daniel R. L. Brown[ expand ]
21:17 [Pub][ePrint]Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers, by Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra[ expand ]
21:17 [Pub][ePrint]Decomposing the ASASA Block Cipher Construction, by Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander[ expand ]
21:17 [Pub][ePrint]Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler, by Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégo[ expand ]
21:17 [Pub][ePrint]The Tower Number Field Sieve, by Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung[ expand ]
12:17 [Pub][ePrint]The Iterated Random Permutation Problem with Applications to Cascade Encryption, by Brice Minaud and Yannick Seurin[ expand ]
12:17 [Pub][ePrint]The Norwegian Internet Voting Protocol: A new Instantiation, by Kristian Gjøsteen and Anders Smedstuen Lund[ expand ]

21:56 [Job][New]Intern Software Developer (Cryptography), CloudFlare Inc.[ expand ]
21:56 [Event][New]Conference on Mathematics of Cryptography[ expand ]
15:17 [Pub][ePrint]Centrally Banked Cryptocurrencies, by George Danezis and Sarah Meiklejohn[ expand ]
15:17 [Pub][ePrint]Multi-Prover Commitments Against Non-Signaling Attacks, by Serge Fehr and Max Fillinger[ expand ]
15:17 [Pub][ePrint]Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure, by Alberto Battistello and Christophe Giraud[ expand ]
15:17 [Pub][ePrint]Algebraic partitioning: Fully compact and (almost) tightly secure cryptography, by Dennis Hofheinz[ expand ]
15:17 [Pub][ePrint]Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials, by Jiajun Zhang and Haining Fan[ expand ]
09:17 [Pub][ePrint]Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost, by Zhangxiang Hu and Payman Mohassel and Mike Rosulek[ expand ]
09:17 [Pub][ePrint]Quantifying Location Privacy Leakage from Transaction Prices, by Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun[ expand ]
02:01 [Event][New]CryptoBG*2015: CryptoBG*2015: Cryptology and Cyber Resilience[ expand ]

15:17 [Pub][ePrint]Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers, by Sondre R{\\o}njom[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the LSH and SHA-V Hash Functions, by Yonglin Hao and Hongbo Yu[ expand ]
15:17 [Pub][ePrint]Fault Tolerant Infective Countermeasure for AES, by Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay[ expand ]
15:17 [Pub][ePrint]Masking vs. Multiparty Computation: How Large is the Gap for AES?, by Vincent Grosso and François-Xavier Standaert and Sebastian Faust[ expand ]
15:17 [Pub][ePrint]Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices, by Nishanth Chandran and Melissa Chase and [ expand ]
15:17 [Pub][ePrint]Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement, by Sonam Devgan Kaul and Amit K. Awasthi[ expand ]

00:49 [Event][New]SPiCy: 1st Workshop on Security and Privacy in Cybermatics[ expand ]

22:51 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 1 post), NXP Semiconductors, Leuven, Belgium[ expand ]
09:17 [Pub][ePrint]Scalable and private media consumption with Popcorn, by Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish[ expand ]
09:17 [Pub][ePrint]On Black-Box Complexity of Universally Composable Security in the CRS model, by Carmit Hazay and Muthuramakrishnan Venkitasubramaniam[ expand ]
09:17 [Pub][ePrint]Contention in Cryptoland: Obfuscation, Leakage and UCE, by Mihir Bellare, Igors Stepanovs and Stefano Tessaro[ expand ]

21:17 [Pub][ePrint]How to detect unauthorised usage of a key, by Jiangshan Yu and Mark Ryan and Cas Cremers[ expand ]
21:17 [Pub][ePrint]Turning Online Ciphers Off, by Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam[ expand ]
21:17 [Pub][ePrint]More Rounds, Less Security?, by Jian Guo and J\\\'{e}r\\\'{e}my Jean and Nicky Mouha and Ivica Nikoli\\\'{c}[ expand ]
21:17 [Pub][ePrint]Improved security proofs in lattice-based cryptography: using the R\\\'enyi divergence rather than the statistical distance, by Shi Bai and Adeline Langlois and Tancr{\\`e}de Lepoint and Damien Stehl\[ expand ]
15:17 [Job][New]Lecturer, Royal Holloway, University of London[ expand ]
15:17 [Event][New]ECC 2015: Summer school of the 19th Workshop on Elliptic Curve Cryptography[ expand ]
09:17 [Pub][ePrint]Time-release Protocol from Bitcoin and Witness Encryption for SAT, by Jia Liu and Flavio Garcia and Mark Ryan[ expand ]

21:17 [Pub][ePrint]Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers, by Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii[ expand ]
21:17 [Pub][ePrint]Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation, by Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede[ expand ]
21:17 [Pub][ePrint]A Provably Secure Group Signature Scheme from Code-Based Assumptions, by Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]

21:17 [Pub][ePrint]How to Build Time-Lock Encryption, by Tibor Jager[ expand ]
21:17 [Pub][ePrint]Authentication Key Recovery in Galois/Counter Mode (GCM), by John Mattsson[ expand ]
21:17 [Pub][ePrint]XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, by Bart Mennink[ expand ]
21:17 [Pub][ePrint]Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences, by Eleonora Guerrini and Laurent Imbert and Théo Winterhalter[ expand ]
21:17 [Pub][ePrint]Fully Homomorphic Encryption without bootstrapping, by Masahiro Yagisawa[ expand ]
21:17 [Pub][ePrint]VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS, by Mehak Khurana and Meena Kumari[ expand ]
09:17 [Pub][ePrint]High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer, by Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orl[ expand ]
09:17 [Pub][ePrint]A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs, by Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott[ expand ]
09:17 [Pub][ePrint]On the power of Public-key Functional Encryption with Function Privacy, by Vincenzo Iovino and Qiang Tang and Karol Zebrowski[ expand ]
09:17 [Pub][ePrint]Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications, by Andrew Miller and Rob Jansen[ expand ]

23:14 [Conf][Crypto]CRYPTO 2015 list of accepted papers[ expand ]
09:17 [Pub][ePrint]The Oblivious Machine - or: How to Put the C into MPC, by Marcel Keller[ expand ]
09:17 [Pub][ePrint]Practical Fully Homomorphic Encryption without Noise Reduction, by Dongxi Liu[ expand ]

09:17 [Pub][ePrint]Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process, by Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang[ expand ]
09:17 [Pub][ePrint]Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation, by Hwajeong Seo and Zhe Liu and Howon Kim[ expand ]
09:17 [Pub][ePrint]Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies, by Florian Tschorsch and Björn Scheuermann[ expand ]

16:28 [Event][New]TRUDEVICE: 4th Workshop on Secure Hardware and Security Evaluation[ expand ]
09:17 [Pub][ePrint]Multilinear Maps Using Random Matrix, by Gu Chunsheng[ expand ]
09:17 [Pub][ePrint]Accelerating SWHE based PIRs using GPUs, by Wei Dai, Yarkın Dor\\\"{o}z and Berk Sunar[ expand ]

17:16 [Job][New]Senior Software / Principal - Security, Apcera - Hybrid Cloud Start-Up San Francisco, CA[ expand ]
17:15 [Job][New]Lecturer, University of Cape Town[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the multilinear map on the ideal lattices, by Jung Hee Cheon and Changmin Lee[ expand ]
15:17 [Pub][ePrint]Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab, by Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi[ expand ]
15:17 [Pub][ePrint]Improved Integral Cryptanalysis of Feistel Structures, by Bing Sun and Xin Hai and Lei Cheng and Zhichao Yang and Wenyu Zhang[ expand ]
15:17 [Pub][ePrint]A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS, by Sheena Sathyan and Shaji R S Professor[ expand ]
15:17 [Pub][ePrint]Generic Conversions from CPA to CCA secure Functional Encryption, by Mridul Nandi and Tapas Pandit[ expand ]
11:44 [Job][New]Research Associate in Information Assurance, University of Luxembourg[ expand ]

22:09 [Event][New]WEWoRC: 6th Western European Workshop on Research in Cryptology[ expand ]
17:40 [Job][New]Post-Doc, Boston University, MIT, Northeastern, and UConn[ expand ]
12:17 [Pub][ePrint]Collateral damage of Facebook Apps: an enhanced privacy scoring model, by Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel[ expand ]
12:17 [Pub][ePrint]Secure Deduplication of Encrypted Data without Additional Independent Servers, by Jian Liu and N. Asokan and Benny Pinkas[ expand ]
12:17 [Pub][ePrint]A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO, by Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhui[ expand ]
09:17 [Pub][ePrint]An Optimization of Gu Map-1, by Yupu Hu and Huiwen Jia[ expand ]
09:17 [Pub][ePrint]Masks will Fall Off -- Higher-Order Optimal Distinguishers, by Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul[ expand ]
00:17 [Pub][ePrint]On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees, by Sihong Su and Xiaohu Tang[ expand ]
00:17 [Pub][ePrint]Adaptively Secure Computation with Partial Erasures, by Carmit Hazay and Yehuda Lindell and Arpita Patra[ expand ]
00:17 [Pub][ePrint]On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions, by Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu[ expand ]

14:00 [News]A survey on the Helios e-voting system[ expand ]

17:24 [Conf][TCC]TCC 2016 CFP released[ expand ]
17:15 [Job][New]Professor in Cyber Security / Cyber Crime, Newcastle University, UK[ expand ]
17:15 [Job][New]Senior Engineer - Applied Cryptography, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]
17:14 [Job][New]Ph.D. Scholarship funded by the Royal Society of UK, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey[ expand ]
17:14 [Job][New]Ph.D. / M.Sc. Scholarships, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey[ expand ]
17:13 [Event][New]SPC: First Workshop on Security and Privacy in the Cloud[ expand ]
17:13 [Event][New]SWJ'15: Scientific World Journal, special issue on Physical Cryptanalysis[ expand ]
09:17 [Pub][ePrint]A Comment on Gu Map-1, by Yupu Hu and Huiwen Jia[ expand ]

09:17 [Pub][ePrint]A New Model for Error-Tolerant Side-Channel Cube Attacks, by Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede[ expand ]

18:17 [Pub][ePrint]On the Amortized Complexity of Zero-knowledge Protocols, by Ronald Cramer and Ivan Damgård and Marcel Keller[ expand ]
18:17 [Pub][ePrint]XLS is not a Strong Pseudorandom Permutation, by Mridul Nandi[ expand ]
18:17 [Pub][ePrint]Revisiting Security Claims of XLS and COPA, by Mridul Nandi[ expand ]
18:17 [Pub][ePrint]Security Evaluation and Enhancement of Bistable Ring PUFs, by Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson[ expand ]
18:17 [Pub][ePrint]Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks, by Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer[ expand ]
15:17 [Forum][2015 Reports] 2015/313: Quantum attacks against the short PIP problem are not polynomial time by biasse[ expand ]
10:13 [PhD][New]Liam Keliher: Linear Cryptanalysis of Substitution-Permutation Networks[ expand ]

12:17 [Pub][ePrint]Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors, by Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson[ expand ]
12:17 [Pub][ePrint]Message-Locked Encryption for Lock-Dependent Messages, by Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev[ expand ]
12:17 [Pub][ePrint]On Concurrently Secure Computation in the Multiple Ideal Query Model, by Vipul Goyal and Abhishek Jain[ expand ]
12:17 [Pub][ePrint]A Hybrid Approach for Proving Noninterference of Java Programs, by Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr[ expand ]

21:17 [Pub][ePrint]A Note on the Unsoundness of vnTinyRAM\'s SNARK, by Bryan Parno[ expand ]
21:17 [Forum][2014 Reports] 2015/313: Quantum attacks against the short PIP problem are not polynomial time by biasse[ expand ]
12:17 [Pub][ePrint]On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks, by Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang[ expand ]
12:17 [Pub][ePrint]On the (Fast) Algebraic Immunity of Boolean Power Functions, by Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang[ expand ]

15:17 [Pub][ePrint]Dickson Polynomials that are Involutions, by Pascale Charpin and Sihem Mesnager and Sumanta Sarkar[ expand ]
15:17 [Pub][ePrint]A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT, by Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu[ expand ]
15:17 [Pub][ePrint]Non-Repudiable Provable Data Possession in Cloud Storage, by Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu[ expand ]
15:17 [Pub][ePrint]Conversions among Several Classes of Predicate Encryption and Their Applications, by Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka[ expand ]
15:17 [Pub][ePrint]Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing, by Alex Biryukov and Daniel Dinu and Dmitry Khovratovich[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of Round-Reduced LED, by Ivica Nikoli\\\'c and Lei Wang and Shuang Wu[ expand ]
12:17 [Pub][ePrint]Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol, by Philipp Jovanovic and Samuel Neves[ expand ]

21:17 [Pub][ePrint]A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement, by Mudit Bhargava and Ken Mai[ expand ]
21:17 [Pub][ePrint]Complementing Feistel Ciphers, by Alex Biryukov and Ivica Nikolic[ expand ]
21:17 [Pub][ePrint]Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices, by Stefan Heyse and Ingo von Maurich and Tim Güneysu[ expand ]
21:17 [Pub][ePrint]FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware, by Begül Bilgin and Andrey Bogdanov and Miroslav Knezević and Florian Mendel and Qingju Wang[ expand ]
21:17 [Pub][ePrint]On the Implementation of Unified Arithmetic on Binary Huff Curves, by Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede[ expand ]
21:17 [Pub][ePrint]Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation, by Marina Blanton and Fattaneh Bayatbabolghani[ expand ]
21:17 [Pub][ePrint]VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism, by Zhe Liu and Husen Wang and Johann Gro{\\ss}sch{\\\"a}dl and Zhi Hu a[ expand ]
21:17 [Pub][ePrint]What Information is Leaked under Concurrent Composition?, by Vipul Goyal and Divya Gupta and Abhishek Jain[ expand ]
21:17 [Pub][ePrint]Non-invasive Spoofing Attacks for Anti-lock Braking Systems, by Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava[ expand ]
21:17 [Pub][ePrint]Optimized Interpolation Attacks on LowMC, by Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang[ expand ]
21:17 [Pub][ePrint]Order-Revealing Encryption and the Hardness of Private Learning, by Mark Bun and Mark Zhandry[ expand ]
21:17 [Pub][ePrint]HETest: A Homomorphic Encryption Testing Framework, by Mayank Varia and Sophia Yakoubov and Yang Yang[ expand ]
21:17 [Pub][ePrint]STRIBOB / WHIRLBOB Security Analysis Addendum, by Markku-Juhani O. Saarinen[ expand ]
21:17 [Pub][ePrint]On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes, by Mridul Nandi[ expand ]
21:17 [Pub][ePrint]A study of Pair Encodings: Predicate Encryption in prime order groups, by Shashank Agrawal and Melissa Chase[ expand ]
21:17 [Pub][ePrint]Survey on Cryptographic Obfuscation, by Máté Horváth[ expand ]
12:49 [PhD][New]Nishant Doshi: Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption[ expand ]

15:24 [Job][New]Full Professor (W3) in Information Security, University of Stuttgart, Germany[ expand ]
13:25 [PhD][New]Damien Vergnaud[ expand ]
13:24 [PhD][Update]Aurore Guillevic: Arithmetic of pairings on algebraic curves for cryptography[ expand ]
12:34 [PhD][New]Aurore Guillevic: Arithmetic of pairings on algebraic curves for cryptography[ expand ]
01:07 [Event][New]IWDW2015: 14th International Workshop on Digital Forensics and Watermarking[ expand ]

20:21 [Event][New]PST2015: 13th International Conference on Privacy, Security and Trust[ expand ]
20:15 [Job][New]Post-Doc, Tampere University of Technology, Finland[ expand ]

15:17 [Pub][ePrint]Side-Channel Analysis of MAC-Keccak Hardware Implementations, by Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser[ expand ]
15:17 [Pub][ePrint]Efficient Ring-LWE Encryption on 8-bit AVR Processors, by Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Gro{\\ss}sch{\\\"a}dl and Howon Kim and Ingrid Verbauwhede[ expand ]
15:17 [Pub][ePrint]Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, by Jie Chen and Romain Gay and Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves, by Franck Rondepierre[ expand ]
15:17 [Pub][ePrint]Higher-order cryptanalysis of LowMC, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel[ expand ]
15:17 [Pub][ePrint]Computation-Trace Indistinguishability Obfuscation and its Applications, by Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou[ expand ]
15:17 [Pub][ePrint]Feasibility and Infeasibility of Secure Computation with Malicious PUFs, by Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder[ expand ]
15:17 [Pub][ePrint]Zero-Knowledge Accumulators and Set Operations, by Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos[ expand ]
15:17 [Pub][ePrint]Sequential Secret Sharing as a New Hierarchical Access Structure, by Mehrdad Nojoumian and Douglas R. Stinson[ expand ]
12:17 [Pub][ePrint]Success through confidence: Evaluating the effectiveness of a side-channel attacj, by Adrian Thillard and Emmanuel Prouff and Thomas Roche[ expand ]
12:17 [Pub][ePrint]Simple Chosen-Ciphertext Security from Low-Noise LPN, by Eike Kiltz and Daniel Masny and Krzysztof Pietrzak[ expand ]
12:17 [Pub][ePrint]Expiration and Revocation of Keys for Attribute-based Signatures, by Stephen R. Tate and Roopa Vishwanathan[ expand ]
12:17 [Pub][ePrint]New attacks on RSA with Moduli $N=p^rq$, by Abderrahmane Nitaj and Tajjeeddine Rachidi[ expand ]
12:17 [Pub][ePrint]Factoring RSA moduli with weak prime factors, by Abderrahmane Nitaj and Tajjeeddine Rachidi[ expand ]
12:17 [Pub][ePrint]Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes, by Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro[ expand ]
12:17 [Pub][ePrint]Generalizing Homomorphic MACs for Arithmetic Circuits, by Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo[ expand ]
12:17 [Pub][ePrint]Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys, by Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark[ expand ]
12:17 [Pub][ePrint]Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer, by Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann[ expand ]

15:17 [Pub][ePrint]Fully Succinct Garbled RAM, by Ran Canetti and Justin Holmgren[ expand ]
15:17 [Pub][ePrint]Method to Protect Passwords in Databases for Web Applications, by Scott Contini[ expand ]
15:17 [Pub][ePrint]Biclique cryptanalysis of MIBS-80 and PRESENT-80, by Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba[ expand ]
15:17 [Pub][ePrint]Forgery Attacks on round-reduced ICEPOLE-128, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel[ expand ]
15:17 [Pub][ePrint]On the Communication Complexity of Secure Computation, by Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran[ expand ]
15:17 [Pub][ePrint]Dual System Encryption Framework in Prime-Order Groups, by Nuttapong Attrapadung[ expand ]
15:17 [Pub][ePrint]Keccak, by Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche[ expand ]
00:17 [Pub][ePrint]Privately Evaluating Decision Trees and Random Forests, by David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter[ expand ]
00:17 [Pub][ePrint]Feasibility and Completeness of Cryptographic Tasks in the Quantum World, by Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas[ expand ]
00:17 [Pub][ePrint]Condensed Unpredictability, by Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak[ expand ]
00:17 [Pub][ePrint]Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings, by Rafael Pass and abhi shelat[ expand ]
00:17 [Pub][ePrint]Speed Records for Ideal Lattice-Based Cryptography on AVR, by Thomas Pöppelmann and Tobias Oder and Tim Güneysu[ expand ]
00:17 [Pub][ePrint]Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game, by Sumit Chakraborty[ expand ]
00:17 [Pub][ePrint]Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation, by Céline Blondeau and Aslí Bay and Serge Vaudenay[ expand ]
00:17 [Pub][ePrint]MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection, by Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia[ expand ]
00:17 [Pub][ePrint]PAC Learning of Arbiter PUFs, by Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert[ expand ]

14:31 [Job][New]PhD student, University College London[ expand ]
05:20 [Event][New]SSR 2015: Security Standardisation Research 2015[ expand ]
00:17 [Pub][ePrint]Cluster Computing in Zero Knowledge, by Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]

21:17 [Pub][ePrint]Cryptography from Post-Quantum Assumptions, by Raza Ali Kazmi[ expand ]
18:17 [Pub][ePrint]Bounds on surmising remixed keys, by Daniel R. L. Brown[ expand ]
18:00 [Job][New]Post-Doctoral Fellowships in Lattice-Based Cryptography, Ecole Normale Superieure de Lyon[ expand ]
03:17 [Pub][ePrint]On the Impossibility of Tight Cryptographic Reductions, by Christoph Bader and Tibor Jager and Yong Li and Sven Schäge[ expand ]
03:17 [Pub][ePrint]Publicly Verifiable Software Watermarking, by Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan[ expand ]
03:17 [Pub][ePrint]Security Analysis of PRINCE, by Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu[ expand ]

15:17 [Pub][ePrint]Constant-Round MPC with Fairness and Guarantee of Output Delivery, by S. Dov Gordon and Feng-Hao Liu and Elaine Shi[ expand ]
15:17 [Pub][ePrint]Financial Cryptography: Discriminatory Pricing Mechanism , by Sumit Chakraborty[ expand ]
15:17 [Pub][ePrint]On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation, by Nir Bitansky and Omer Paneth[ expand ]
15:17 [Pub][ePrint]Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library, by Evgeny Sidorov[ expand ]
15:17 [Pub][ePrint]Improved Higher-Order Differential Attacks on MISTY1, by Achiya Bar-On[ expand ]
15:17 [Pub][ePrint]A random zoo: sloth, unicorn, and trx, by Arjen K. Lenstra and Benjamin Wesolowski[ expand ]
15:17 [Pub][ePrint]On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol, by Masoumeh Safkhani and Nasour Bagheri and Mehdi Hosseinzadeh and Mojtaba Eslamnezhad N[ expand ]
15:17 [Pub][ePrint]Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions, by Qiang Tang and Jun Wang[ expand ]
15:17 [Pub][ePrint]Optimally Secure Tweakable Blockciphers, by Bart Mennink[ expand ]
15:17 [Pub][ePrint]Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem, by Claude Crepeau and Raza Ali Kazmi[ expand ]
15:17 [Pub][ePrint]Computationally binding quantum commitments, by Dominique Unruh[ expand ]
15:17 [Pub][ePrint]Achieving Differential Privacy with New Imperfect Randomness, by Yanqing Yao and Zhoujun Li[ expand ]
15:17 [Pub][ePrint]Higher-Order Side Channel Security and Mask Refreshing, by Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche[ expand ]
15:17 [Pub][ePrint]On Generalized First Fall Degree Assumptions, by Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi[ expand ]
15:17 [Pub][ePrint]A Group-theory Method to The Cycle Structures of Feedback Shift Registers, by Ming Li, Yupeng Jiang and Dongdai Lin[ expand ]
15:17 [Pub][ePrint]Succinct Randomized Encodings and their Applications, by Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang[ expand ]
06:17 [Pub][ePrint]Semantic Security and Indistinguishability in the Quantum World, by Tommaso Gagliardoni and Andreas H\\\"ulsing and Christian Schaffner[ expand ]
03:17 [Pub][ePrint]SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node, by Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann[ expand ]
03:17 [Pub][ePrint]Matrix Computational Assumptions in Multilinear Groups, by Paz Morillo and Carla R\\`afols and Jorge L. Villar[ expand ]
03:17 [Pub][ePrint]Broadcast from Minicast Secure Against General Adversaries, by Pavel Raykov[ expand ]
03:17 [Pub][ePrint]Database Outsourcing with Hierarchical Authenticated Data Structures, by Mohammad Etemad and Alptekin Küpçü[ expand ]
03:17 [Pub][ePrint]Improving Local Collisions: New Attacks on Reduced SHA-256, by Florian Mendel and Tomislav Nad and Martin Schläffer[ expand ]
03:17 [Pub][ePrint]Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud, by Chang Liu and Liehuang Zhu and Jinjun Chen[ expand ]
03:17 [Pub][ePrint]A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation, by An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar[ expand ]
03:17 [Pub][ePrint]Fault Analysis of Kuznyechik, by Riham AlTawy and Onur Duman and Amr M. Youssef[ expand ]

06:17 [Pub][ePrint]End-to-End Verifiable Elections in the Standard Model∗ , by Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang[ expand ]
06:17 [Pub][ePrint]Two Round MPC from LWE via Multi-Key FHE, by Pratyay Mukherjee and Daniel Wichs[ expand ]
03:17 [Pub][ePrint]Watermarking Cryptographic Programs Against Arbitrary Removal Strategies, by Ryo Nishimaki and Daniel Wichs[ expand ]

19:51 [Job][Update]Doctoral/Post-doctoral Research Fellow in new DFG-Funded project Algebraic Fault Attacks, Chair of Computer Engineering (Lehrstuhl für Technische Informatik), University of Passau, Ger[ expand ]
16:06 [Job][New]Doctoral/Post-doctoral Research Fellow in new DFG-Funded project \, University of Passau[ expand ]

03:17 [Pub][ePrint]High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers, by Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter S[ expand ]
03:17 [Pub][ePrint]Identity-Set-based Broadcast Encryption supporting \"Cut-or-Select\" with Short Ciphertext, by Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo[ expand ]
03:17 [Pub][ePrint]Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, by Gilad Asharov and Gil Segev[ expand ]
03:17 [Pub][ePrint]A New Distinguisher on Grain v1 for 106 rounds, by Santanu Sarkar[ expand ]
03:17 [Pub][ePrint]Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation, by Berry Schoenmakers and Meilof Veeningen[ expand ]

21:17 [Pub][ePrint]Arithmetic Cryptography, by Benny Applebaum and Jonathan Avron and Christina Brzuska[ expand ]
21:17 [Pub][ePrint]Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange, by Janaka Alawatugoda and Colin Boyd and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]On the Correlation Intractability of Obfuscated Pseudorandom Functions, by Ran Canetti and Yilei Chen and Leonid Reyzin[ expand ]
21:17 [Pub][ePrint]Nearly Optimal Verifiable Data Streaming (Full Version), by Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger[ expand ]
21:17 [Pub][ePrint]Security Intelligence for Broadcast : Threat Analytics, by Sumit Chakraborty[ expand ]
21:17 [Pub][ePrint]sp-AELM: Sponge based Authenticated Encryption Scheme for Memory Constrained Devices, by Megha Agrawal and Donghoon Chang and Somitra Sanadhya[ expand ]
21:17 [Pub][ePrint]Sponge based CCA2 secure asymmetric encryption for arbitrary length message, by Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhaya[ expand ]
21:17 [Pub][ePrint]PAGES - A Family of Block Ciiphers, by Dieter Schmidt[ expand ]
21:17 [Pub][ePrint]Cryptanalysis of a fair anonymity for the tor network, by Amadou Moctar Kane[ expand ]
21:17 [Pub][ePrint]Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation, by Sujoy Sinha Roy and Kimmo J\\\"arvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede[ expand ]

16:49 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 2 posts), Ruhr-University Bochum[ expand ]

16:20 [Job][New]Post-Doc, Zhejiang University City College, Hangzhou, CHINA[ expand ]

18:33 [Job][New]Three senior lectureships or lectureships (associate/assistant professor), University of Birmingham, UK[ expand ]
17:50 [Job][New]Post-Doc, Mathematical Institute, Oxford, UK[ expand ]
16:20 [Job][New]Ph.D. student in Security and Privacy of Cyber-Physical Systems, University College Cork, Ireland[ expand ]
16:18 [Job][New]Post-Doc, Mathematical Institute, Oxford[ expand ]

15:44 [Job][New]Professorship in Cyber Security and Privacy, School of Informatics, University of Edinburgh, UK[ expand ]

22:02 [Event][New]CANS 2015: The 14th International Conference on Cryptology and Network Security[ expand ]
06:17 [Pub][ePrint]Strongly Secure Authenticated Key Exchange from Ideal Lattices, by Xiaopeng Yang and Wenping Ma[ expand ]
06:17 [Pub][ePrint]Some results on Sprout, by Subhadeep Banik[ expand ]
06:17 [Pub][ePrint]Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata, by Saeideh Kabirirad and Hamideh Hajiabadi[ expand ]
06:17 [Pub][ePrint]Secure Multi-Party Computation with Identifiable Abort, by Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas[ expand ]

06:17 [Pub][ePrint]Hybrid Publicly Verifiable Computation, by James Alderman and Christian Janson and Carlos Cid and Jason Crampton[ expand ]
06:17 [Pub][ePrint]Point Decomposition Problem in Binary Elliptic Curves, by Koray Karabina[ expand ]
06:17 [Pub][ePrint]Practical Divisible E-Cash, by Patrick Märtens[ expand ]
06:17 [Pub][ePrint]Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice, by Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti[ expand ]
06:17 [Pub][ePrint]Non-malleability under Selective Opening Attacks: Implication and Separation, by Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen[ expand ]
06:17 [Pub][ePrint]A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys, by Divesh Aggarwal and Alexander Golovnev[ expand ]
06:17 [Pub][ePrint]Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange, by Suvradip Chakraborty and Srinivasan Raghuraman and Pandu Rangan C[ expand ]
06:17 [Pub][ePrint]Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers, by Peeter Laud and Alisa Pankova[ expand ]
06:17 [Pub][ePrint]Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles, by Paolo D\'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente[ expand ]
03:17 [Pub][ePrint]Query-Complexity Amplification for Random Oracles, by Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann[ expand ]
03:17 [Pub][ePrint]Certificate-Based Encryption Resilient to Key Leakage, by Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang[ expand ]

15:10 [Event][New]STM 2015: 11th International Workshop on Security and Trust Management[ expand ]
15:10 [Event][New]SECRYPT'15: 12th International Conference on Security and Cryptography[ expand ]
13:08 [PhD][Update]Pablo Rauzy: Formal Software Methods for Cryptosystems Implementation Security[ expand ]
12:58 [PhD][New]Hadi Soleimany: Studies in Lightweight Cryptography[ expand ]
12:57 [PhD][Update]Filipe Beato: Private Information Sharing in Online communities[ expand ]
12:56 [PhD][New]Juraj Šarinay: Cryptographic Hash Functions in Groups and Provable Properties[ expand ]
00:17 [Pub][ePrint]Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev[ expand ]
00:17 [Pub][ePrint]Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks, by Pierre-Alain Fouque and Thomas Vannet[ expand ]
00:17 [Pub][ePrint]Tagged One-Time Signatures: Tight Security and Optimal Tag Size, by Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo[ expand ]
00:17 [Pub][ePrint]New algorithm for the discrete logarithm problem on elliptic curves, by Igor Semaev[ expand ]
00:17 [Pub][ePrint]TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation, by Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti[ expand ]
00:17 [Pub][ePrint]Authenticated Key Exchange over Bitcoin, by Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao[ expand ]
00:17 [Pub][ePrint]Black-Box Garbled RAM, by Sanjam Garg and Steve Lu and Rafail Ostrovsky[ expand ]
00:17 [Pub][ePrint]Analysis of VAES3 (FF2), by Morris Dworkin and Ray Perlner[ expand ]
00:17 [Pub][ePrint]Foundations of Reconfigurable PUFs (Full Version), by Jonas Schneider and Dominique Schröder[ expand ]
00:17 [Pub][ePrint]Communication-Optimal Proactive Secret Sharing for Dynamic Groups, by Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky[ expand ]
00:17 [Pub][ePrint]The Design Space of Lightweight Cryptography, by Nicky Mouha[ expand ]
00:17 [Pub][ePrint]Boosting OMD for Almost Free Authentication of Associated Data, by Reza Reyhanitabar and Serge Vaudenay and Damian Vizár[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of GGH Map, by Yupu Hu and Huiwen Jia[ expand ]

18:41 [Job][New]Assistant/Associate Professor, Innopolis University, Kazan, Russian Federation[ expand ]
18:40 [Event][New]WISA'15: The 16th International Workshop on Information Security Applications[ expand ]
18:39 [Event][New]MIST'15: The 7th ACM CCS International Workshop on Managing Insider Security Threats[ expand ]
18:38 [Event][New]Cryptology2016: 5th International Cryptology and Information Security Conference 2016[ expand ]
17:10 [News]2015 IACR Fellows announced[ expand ]

20:40 [Event][New]DPM 2015: 10th International Workshop on Data Privacy Management[ expand ]

16:34 [Job][New]2 fully funded PhD positions, Xi an Jiaotong-Liverpool University[ expand ]
16:33 [Job][New]Postdoc in Cryptography, University of Luxembourg[ expand ]

23:54 [Job][New]Researcher, Bell Labs, Tel Aviv - Israel[ expand ]
23:44 [Job][New]Post-Doc, Bell Labs, Tel Aviv - Israel[ expand ]
15:17 [Pub][ePrint]Scalable Divisible E-cash, by Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré[ expand ]
15:17 [Pub][ePrint]A Note on the Lindell-Waisbard Private Web Search Scheme, by Zhengjun Cao and Lihua Liu[ expand ]
15:17 [Pub][ePrint]Secure Random Linear Code Based Public Key Encryption Scheme RLCE, by Yongge Wang[ expand ]
15:17 [Pub][ePrint]Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack, by Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao[ expand ]
15:17 [Pub][ePrint]The Uniform Distribution of Sequences Generated by Iteration of Polynomials, by Emil Lerner[ expand ]
15:17 [Pub][ePrint]Security Analysis of Re-Encryption RPC Mix Nets, by Ralf Kuesters and Tomasz Truderung[ expand ]
15:17 [Pub][ePrint]Accelerating Somewhat Homomorphic Evaluation using FPGAs, by Erd\\.{i}n\\c{c} \\\"{O}zt\\\"{u}rk and Yark{\\i}n Dor\\\"{o}z and Berk Sunar and Erkay Sava\\c{s}[ expand ]
15:17 [Pub][ePrint]Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
15:17 [Pub][ePrint]Secret Shared Random Access Machine, by Shlomi Dolev and Yin Li[ expand ]
15:17 [Pub][ePrint]Two Operands of Multipliers in Side-Channel Attack, by Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki[ expand ]
15:17 [Pub][ePrint]Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes, by Joseph A. Akinyele and Christina Garman and Susan Hohenberger[ expand ]
15:17 [Pub][ePrint]Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks, by Muhammed F. Esgin and Orhun Kara[ expand ]
15:17 [Pub][ePrint]Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms, by Aydin Aysu and Patrick Schaumont[ expand ]
15:17 [Pub][ePrint]A quantum-safe circuit-extension handshake for Tor, by John Schanck and William Whyte and Zhenfei Zhang[ expand ]

23:25 [Job][New]Software Security Engineer, Oblong Industries[ expand ]
15:39 [Event][New]SPE2015: IEEE 5th International Workshop on Security and Privacy Engineering[ expand ]

17:55 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 2 posts), Royal Holloway, University of London[ expand ]

12:17 [Pub][ePrint]Impossible Differential Cryptanalysis of Reduced Round SIMON, by Zhan Chen and Ning Wang and Xiaoyun Wang[ expand ]
12:17 [Pub][ePrint]Improved Linear Trails for the Block Cipher Simon, by Tomer Ashur[ expand ]
12:17 [Pub][ePrint]A Note on Scalar Multiplication Using Division Polynomials, by Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao[ expand ]
12:17 [Pub][ePrint]Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data, by Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia[ expand ]

20:54 [Job][New]Internship – M.S./Ph.D. student in Computer Science or a closely related field, Bosch Research and Technology Center North America – 2835 East Carson St., Pittsburgh, PA, 15203 USA[ expand ]
15:17 [Pub][ePrint]Non-Interactive Secure Computation Based on Cut-and-Choose, by Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva[ expand ]
15:17 [Pub][ePrint]From Statistical Zero Knowledge to Secret Sharing, by Vinod Vaikuntanathan and Prashant Nalini Vasudevan[ expand ]
15:17 [Pub][ePrint]Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption, by Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou[ expand ]
15:17 [Pub][ePrint]Improved Cryptanalysis of AES-like Permutations, by Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin[ expand ]
15:17 [Pub][ePrint]Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting, by Sébastien Canard and David Pointcheval and Olivier Sanders[ expand ]
15:17 [Pub][ePrint]One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games, by Marco Tomamichel and Serge Fehr and J\\k{e}drzej Kaniewski and Stephanie Wehner[ expand ]
15:17 [Pub][ePrint]An Improvment of the Elliptic Net Algorithm, by Binglong Chen and Chang-An Zhao[ expand ]
15:17 [Pub][ePrint]MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems, by Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai[ expand ]
15:17 [Pub][ePrint]Low Depth Circuits for Efficient Homomorphic Sorting, by Gizem S. \\c{C}etin and Yark{\\i}n Dor\\\"{o}z and Berk Sunar and Erkay Sava\\c{s}[ expand ]
15:17 [Pub][ePrint]Dual System Encryption via Predicate Encodings, by Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing, by Baodong Qin and Shengli Liu[ expand ]
11:35 [Event][New]TCC 2016: Thirteenth Theory of Cryptography Conference[ expand ]
10:36 [News]Micali & Reyzin receive inaugural TCC Test-of-Time award[ expand ]
10:23 [News]Message from the IACR President[ expand ]

22:33 [Event][New]Fifteenth IMA International Conference on Cryptography and Coding[ expand ]

22:48 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 2 posts), NXP Semiconductors, Leuven, Belgium[ expand ]
15:17 [Pub][ePrint]Toward Secure Implementation of McEliece Decryption, by Mariya Georgieva and Frédéric de Portzamparc[ expand ]
15:17 [Pub][ePrint]Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk, by Markus Dichtl[ expand ]
15:17 [Pub][ePrint]Ideal Multilinear Maps Based on Ideal Lattices, by Gu Chunsheng[ expand ]
15:17 [Pub][ePrint]Improved Top-Down Techniques in Differential Cryptanalysis, by Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir[ expand ]
15:17 [Pub][ePrint]The Simplest Protocol for Oblivious Transfer, by Tung Chou and Claudio Orlandi[ expand ]
15:17 [Pub][ePrint]GRECS: Graph Encryption for Approximate Shortest Distance Queries, by Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios[ expand ]
15:17 [Pub][ePrint]Password Hashing Competition - Survey and Benchmark, by George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas[ expand ]
15:17 [Pub][ePrint]BlindBox: Deep Packet Inspection over Encrypted Traffic, by Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy[ expand ]
13:01 [Event][New]School on Computer-aided Cryptography[ expand ]

20:21 [Event][New]S3: SAC Summer School[ expand ]
09:17 [Pub][ePrint]Eclipse Attacks on Bitcoin\'s Peer-to-Peer Network, by Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg[ expand ]
09:17 [Pub][ePrint]A look at the PGP ecosystem through the key server data, by Hanno Böck[ expand ]
09:17 [Pub][ePrint]Research Perspectives and Challenges for Bitcoin and Cryptocurrencies, by Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten[ expand ]
09:17 [Pub][ePrint]Computational Aspects of Correlation Power Analysis, by Paul Bottinelli and Joppe W. Bos[ expand ]
09:17 [Pub][ePrint]Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES, by Patrick Derbez and Pierre-Alain Fouque[ expand ]
09:17 [Pub][ePrint]Lightweight MDS Involution Matrices, by Siang Meng Sim and Khoongming Khoo and Fr\\\'ed\\\'erique Oggier and Thomas Peyrin[ expand ]

20:19 [Job][New]Visiting assistant professor, Department of Mathematical Sciences, University of Cincinnati[ expand ]
20:18 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 2 posts), University of Bristol[ expand ]
09:17 [Pub][ePrint]Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices, by Vadim Lyubashevsky and Thomas Prest[ expand ]
05:36 [Job][New]Ph.D. student, Rochester Institute of Technology[ expand ]

09:17 [Pub][ePrint]Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction, by Yang Lu, Quanling Zhang, Jiguo Li[ expand ]
09:17 [Pub][ePrint]A comprehensive analysis of game-based ballot privacy definitions, by David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Tornado Attack on RC4 with Applications to WEP \\& WPA, by Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux[ expand ]
09:17 [Pub][ePrint]Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers, by Haiyan Wang , Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Linearization of Multi-valued Nonlinear Feedback Shift Registers, by Haiyan Wang, Jianghua Zhong, Dongdai Lin[ expand ]
09:17 [Pub][ePrint]How to Construct UC-Secure Searchable Symmetric Encryption Scheme, by Kaoru Kurosawa and Yasuhiro Ohtaki[ expand ]
09:17 [Pub][ePrint]Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys, by Junji Shikata[ expand ]
09:17 [Pub][ePrint]Improved (Hierarchical) Inner-Product Encryption from Lattices, by Keita Xagawa[ expand ]
09:17 [Pub][ePrint]Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES, by Ryo Nishimaki and Keita Xagawa[ expand ]
09:17 [Pub][ePrint]Subgroup security in pairing-based cryptography, by Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon[ expand ]
09:17 [Pub][ePrint]Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting, by Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]Practical Attacks on the Round-reduced PRINCE, by Pawel Morawiecki[ expand ]
09:17 [Pub][ePrint]Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation, by Jeremy Jean and Ivica Nikolic[ expand ]
09:17 [Pub][ePrint]Reliable Message Transmission under Partial Knowledge, by Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
09:17 [Pub][ePrint]Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]
09:17 [Pub][ePrint]Espresso: A Stream Cipher for 5G Wireless Communication Systems, by Elena Dubrova and Martin Hell[ expand ]
09:17 [Pub][ePrint]Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE, by Alex Biryukov, Patrick Derbez and Léo Perrin[ expand ]
09:17 [Pub][ePrint]Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE, by Patrick Derbez and Léo Perrin[ expand ]

16:16 [Event][New]FPS 2015: 8th International Symposium on Foundations & Practice of Security[ expand ]
16:15 [Event][New]PQCrypto 2016: The Seventh International Conference on Post-Quantum Cryptography[ expand ]

20:35 [Job][New]One Postdoc and one PhD studentship, University of Strathclyde, UK[ expand ]

15:36 [Event][New]BCS 2015: 2nd Conference on Cryptography and Information Theory- BalkanCryptSec 2015[ expand ]
12:17 [Pub][ePrint]One Time Programs with Limited Memory, by Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając[ expand ]
12:17 [Pub][ePrint]Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers, by Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers[ expand ]
12:17 [Pub][ePrint]Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack, by Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey[ expand ]
12:17 [Pub][ePrint]Performance and Security Improvements for Tor: A Survey, by Mashael AlSabah and Ian Goldberg[ expand ]
12:17 [Pub][ePrint]Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique, by Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya[ expand ]
04:06 [Job][New]Summer Intern – M.A./M.S./Ph.D. student in Computer Science, Computer Engineering, or Applied Math, IBM Research – Almaden, 650 Harry Road, San Jose, CA 95120-6099, USA[ expand ]

09:17 [Pub][ePrint]Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, by Ben Smyth and Steven Frink and Michael R. Clarkson[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Full Sprout, by Virginie Lallemand and Mar\\\'ia Naya-Plasencia[ expand ]
09:17 [Pub][ePrint]A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher, by Yonglin Hao[ expand ]
09:17 [Pub][ePrint]W-SPS: Designing a Wide-Area Secure Positioning System, by Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun[ expand ]
09:17 [Pub][ePrint]Improving GGH Public Key Scheme Using Low Density Lattice Codes, by Reza Hooshmand, Taraneh Eghlidos and Mohammad Reza Aref[ expand ]

16:45 [Event][New]SPACE 2015: Intl. Conf. on Security, Privacy, and Applied Cryptography Engineering[ expand ]
12:17 [Pub][ePrint]Leakage-Resilient Cryptography with Key Derived from Sensitive Data, by Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz[ expand ]
12:17 [Pub][ePrint]Tradeoff Cryptanalysis of Memory-Hard Functions, by Alex Biryukov and Dmitry Khovratovich[ expand ]
12:17 [Pub][ePrint]Secure Physical Computation using Disposable Circuits, by Ben Fisch and Daniel Freund and Moni Naor[ expand ]

22:31 [Job][New]Ph.D. student - PUF design and security, Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France[ expand ]
21:17 [Pub][ePrint]Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
21:17 [Pub][ePrint]Privacy and Access Control for Outsourced Personal Records, by Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder[ expand ]
21:17 [Pub][ePrint]New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers, by Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar[ expand ]
21:17 [Pub][ePrint]Towards Understanding the Known-Key Security of Block Ciphers, by Elena Andreeva, Andrey Bogdanov, and Bart Mennink[ expand ]
21:17 [Pub][ePrint]Tighter, faster, simpler side-channel security evaluations beyond computing power, by Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal[ expand ]
21:17 [Pub][ePrint]Key Homomorphic PRFs and Their Applications, by Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan[ expand ]
04:47 [Job][New]• Research Fellow/Postdoctoral Researcher in Applied Crypto, University of Auckland, Auckland, New Zealand[ expand ]

22:39 [Event][New]ISC: The Eighteenth Information Security Conference[ expand ]
09:17 [Pub][ePrint]Efficient Format Preserving Encrypted Databases, by Prakruti C, Sashank Dara and V.N. Muralidhara[ expand ]
09:17 [Pub][ePrint]Efficient k-out-of-n oblivious transfer protocol, by wang qinglong[ expand ]
09:17 [Pub][ePrint]Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles, by Subhamoy Maitra and Goutam Paul and Willi Meier[ expand ]
09:17 [Pub][ePrint]Quasi-Adaptive NIZK for Linear Subspaces Revisited, by Eike Kiltz and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]A revocable anonymity in Tor, by Amadou Moctar Kane[ expand ]
09:17 [Pub][ePrint]GCM Security Bounds Reconsidered, by Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata[ expand ]

19:37 [Event][New]CyberSec2015: 4th Inter. Conf. on Cyber Security, Cyber Welfare, and Digital Forensic[ expand ]

16:17 [Pub][ePrint]Attribute-Based Versions of Schnorr and ElGamal, by Javier Herranz[ expand ]
16:17 [Pub][ePrint]Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows, by Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger[ expand ]
16:17 [Pub][ePrint]Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing, by Thijs Laarhoven and Benne de Weger[ expand ]
16:17 [Pub][ePrint]Secure and Efficient Initialization and Authentication Protocols for SHIELD, by Chenglu Jin and Marten van Dijk[ expand ]
16:17 [Pub][ePrint]Triathlon of Lightweight Block Ciphers for the Internet of Things, by Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov[ expand ]
16:17 [Pub][ePrint]Towards Secure Distance Bounding, by Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay[ expand ]
16:17 [Pub][ePrint]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations, by Tobias Schneider and Amir Moradi[ expand ]
16:17 [Pub][ePrint]Efficient and Secure Delegation of Group Exponentiation to a Single Server, by Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain[ expand ]
16:17 [Pub][ePrint]Towards Key-Length Extension\\\\ with Optimal Security: Cascade Encryption and Xor-cascade Encryption, by Jooyoung Lee and Martijn Stam[ expand ]
16:17 [Pub][ePrint]Leakage-Resilient Symmetric Encryption via Re-keying, by Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque[ expand ]
16:17 [Pub][ePrint]Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs, by Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu[ expand ]
16:17 [Pub][ePrint]Adaptively Secure Coin-Flipping, Revisited, by Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park[ expand ]
16:17 [Pub][ePrint]Statistical Properties of Multiplication mod $2^n$, by A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]

19:17 [Pub][ePrint]Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs, by Amir Moradi and Gesine Hinterwälder[ expand ]
19:17 [Pub][ePrint]Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives, by Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu[ expand ]
19:17 [Pub][ePrint]SCA Resistance Analysis of Sponge based MAC-PHOTON, by N. Nalla Anandakumar[ expand ]
19:17 [Pub][ePrint]Tighter Reductions for Forward-Secure Signature Schemes, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists, by Stephanie Bayer and Jens Groth[ expand ]
19:17 [Pub][ePrint]Practical Homomorphic MACs for Arithmetic Circuits, by Dario Catalano and Dario Fiore[ expand ]
19:17 [Pub][ePrint]Improving Modular Inversion in RNS using the Plus-Minus Method, by Karim Bigou and Arnaud Tisserand[ expand ]
19:17 [Pub][ePrint]Memory-saving computation of the pairing final exponentiation on BN curves, by Sylvain DUQUESNE and Loubna GHAMMAM[ expand ]
19:17 [Pub][ePrint]iDASH Secure Genome Analysis Competition Using ObliVM, by Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Multi-Client Non-Interactive Verifiable Computation, by Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid[ expand ]
19:17 [Pub][ePrint]Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance, by Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár[ expand ]
19:17 [Pub][ePrint]New Techniques for SPHFs and Efficient One-Round PAKE Protocols, by Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud[ expand ]
19:17 [Pub][ePrint]How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality, by Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas[ expand ]
19:17 [Pub][ePrint]Higher Order Differential Analysis of NORX, by Sourav Das and Subhamoy Maitra and and Willi Meier[ expand ]
19:17 [Pub][ePrint]Remotely Managed Logic Built-In Self-Test for Secure M2M Communications, by Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets[ expand ]
19:17 [Pub][ePrint]Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities, by Céline Blondeau and Kaisa Nyberg[ expand ]
19:17 [Pub][ePrint]New Links Between Differential and Linear Cryptanalysis, by Céline Blondeau and Kaisa Nyberg[ expand ]
19:17 [Pub][ePrint]Tweakable Blockciphers with Asymptotically Optimal Security, by Rodolphe Lampe and Yannick Seurin[ expand ]
19:17 [Pub][ePrint]Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis, by Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi [ expand ]
19:17 [Pub][ePrint]Key-Homomorphic Constrained Pseudorandom Functions, by Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens[ expand ]
19:17 [Pub][ePrint]Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs, by Alexander Wild and Amir Moradi and Tim Güneysu[ expand ]

18:52 [Job][New]Research Scientist, Senior Research Scientist, Nanyang Technological University, Singapore[ expand ]
00:11 [Job][New]Ph.D. position, Ruhr-University Bochum, Horst-Goertz Institute[ expand ]

16:26 [Event][New]SECRYPT 2015: 12th International Conference on Security and Cryptography[ expand ]
10:17 [Pub][ePrint]A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves, by Palash Sarkar and Shashank Singh[ expand ]
10:17 [Pub][ePrint]On Time and Order in Multiparty Computation, by Pablo Azar and Shafi Goldwasser and Sunoo Park[ expand ]

15:15 [Event][New]Mathematics of Lattices and Cybersecurity[ expand ]
10:17 [Pub][ePrint]On the Security of an Efficient Group Key Agreement Scheme for MANETs, by Purushothama B R and Nishat Koti[ expand ]
10:17 [Pub][ePrint]Key Recovery for LWE in Polynomial Time, by Kim Laine and Kristin Lauter[ expand ]

10:17 [Pub][ePrint]Trivial Nonce-Misusing Attack on Pure OMD, by Tomer Ashur and Bart Mennink[ expand ]
04:17 [Pub][ePrint]A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia, by Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma[ expand ]
04:17 [Pub][ePrint]Indistinguishability Obfuscation from Compact Functional Encryption, by Prabhanjan Ananth and Abhishek Jain[ expand ]
04:17 [Pub][ePrint]Silent Simon: A Threshold Implementation under 100 Slices, by Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth[ expand ]
01:17 [Pub][ePrint]Authenticated Network Time Synchronization, by Benjamin Dowling and Douglas Stebila and Greg Zaverucha[ expand ]
01:17 [Pub][ePrint]Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation, by Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer[ expand ]
01:17 [Pub][ePrint]Short Schnorr signatures require a hash function with more than just random-prefix resistance, by Daniel R. L. Brown[ expand ]
01:17 [Pub][ePrint]More PS and H-like bent functions, by C. Carlet[ expand ]
01:17 [Pub][ePrint]Post-Zeroizing Obfuscation: The case of Evasive Circuits, by Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry[ expand ]
01:17 [Pub][ePrint]Naturally Rehearsing Passwords, by Jeremiah Blocki and Manuel Blum and Anupam Datta[ expand ]
01:17 [Pub][ePrint]The Cryptographic Hardness of Random Local Functions -- Survey, by Benny Applebaum[ expand ]
01:17 [Pub][ePrint]Constant Size Ring Signature Without Random Oracle, by Priyanka Bose and Dipanjan Das and C. Pandu Rangan[ expand ]
01:17 [Pub][ePrint]Indistinguishability Obfuscation from Functional Encryption, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]New Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
01:17 [Pub][ePrint]Exploring the Resilience of Some Lightweight Ciphers Against Proled Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
01:17 [Pub][ePrint]Differential-Linear Cryptanalysis of ICEPOLE, by Tao Huang; Ivan Tjuawinata; Hongjun Wu[ expand ]

22:17 [Pub][ePrint]Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE, by Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu[ expand ]
22:17 [Pub][ePrint]From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Ilan Komargodski and Gil Segev[ expand ]
22:17 [Pub][ePrint]Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, by Nuttapong Attrapadung and Shota Yamada[ expand ]
22:17 [Pub][ePrint]Building Lossy Trapdoor Functions from Lossy Encryption, by Brett Hemenway and Rafail Ostrovsky[ expand ]
22:17 [Pub][ePrint]On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining, by Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor[ expand ]
22:17 [Pub][ePrint]Circuits Resilient to Additive Attacks with Applications to Secure Computation, by Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer[ expand ]
22:17 [Pub][ePrint]Functional Encryption from (Small) Hardwae Tokens, by Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Inverting the Fnal exponentiation of Tate pairings on ordinary elliptic curves using faults, by Ronan Lashermes and Jacques Fournier and Louis Goubin[ expand ]
22:17 [Pub][ePrint]Bad directions in cryptographic hash functions, by Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen[ expand ]
22:17 [Pub][ePrint]Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons, by Tobias Pulls and Roel Peeters[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of HMAC/NMAC-Whirlpool, by Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu[ expand ]
22:17 [Pub][ePrint]On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs, by Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann[ expand ]
22:17 [Pub][ePrint]High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures, by Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage[ expand ]
22:17 [Pub][ePrint]New Attacks on Feistel Structures with Improved Memory Complexities, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Observations on the SIMON block cipher family, by Stefan Kölbl and Gregor Leander and Tyge Tiessen[ expand ]
22:17 [Pub][ePrint]Security of the AES with a Secret S-box, by Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen[ expand ]
22:17 [Pub][ePrint]Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs, by Erich Wenger and Paul Wolfger[ expand ]
22:17 [Pub][ePrint]Multi-Client Verifiable Computation with Stronger Security Guarantees, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method, by Céline Blondeau and Marine Minier[ expand ]
19:17 [Pub][ePrint]The Random Oracle Model: A Twenty-Year Retrospective, by Neal Koblitz and Alfred Menezes[ expand ]
19:17 [Pub][ePrint]Performance Analysis of Some Password Hashing Schemes, by Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya[ expand ]
19:17 [Pub][ePrint]A Practical Key Exchange for the Internet using Lattice Cryptography, by Vikram Singh[ expand ]
18:07 [Event][New]C&TC 2015: 5th International Symposium on Cloud Computing, Trusted Computing and Secu[ expand ]
18:06 [Job][New]Post-Doc, Ph.D., High Assurance Software Lab --- INESC TEC & Minho University[ expand ]
18:06 [Job][New]Research Fellow / Post-doc, Nanyang Technological University (NTU), Singapore[ expand ]
16:17 [Pub][ePrint]Multi-keyword Similarity Search Over Encrypted Cloud Data, by Mikhail Strizhov and Indrajit Ray[ expand ]
16:17 [Pub][ePrint]Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs, by Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. [ expand ]

23:11 [Job][New]Research Associate, Technische Universitaet Muenchen; Instiute for Security in Information Technology; Munich; Germany[ expand ]
22:17 [Pub][ePrint]Generalizing Efficient Multiparty Computation, by Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp[ expand ]
19:17 [Pub][ePrint]From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions, by Pierre Karpman[ expand ]
19:17 [Pub][ePrint]Private Computation on Encrypted Genomic Data, by Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig[ expand ]
19:17 [Pub][ePrint]Homomorphic Computation of Edit Distance, by Jung Hee Cheon and Miran Kim and Kristin Lauter[ expand ]
19:17 [Pub][ePrint]On Lightweight Stream Ciphers with Shorter Internal States, by Frederik Armknecht and Vasily Mikhalev[ expand ]
19:17 [Pub][ePrint]How to Bootstrap Anonymous Communication, by Sune K. Jakobsen and Claudio Orlandi[ expand ]
17:12 [Event][New]FSE: Fast Software Encryption[ expand ]
13:17 [Pub][ePrint]Block-wise Non-Malleable Codes, by Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay[ expand ]
13:17 [Pub][ePrint]Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro[ expand ]
13:17 [Pub][ePrint]Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes, by Ricardo Dahab and Steven Galbraith and Eduardo Morais[ expand ]
13:17 [Pub][ePrint]Perfect Structure on the Edge of Chaos, by Nir Bitansky and Omer Paneth and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Multilinear Pseudorandom Functions, by Aloni Cohen and Justin Holmgren[ expand ]
13:17 [Pub][ePrint]GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs, by Alexander Wild and Amir Moradi and Tim Güneysu[ expand ]
13:17 [Pub][ePrint]Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, by Dennis Hofheinz and Jessica Koch and Christoph Striecks[ expand ]
13:17 [Pub][ePrint]Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON, by Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xia[ expand ]
13:17 [Pub][ePrint]Multi-User Oblivious RAM Secure Against Malicious Servers, by Travis Mayberry and Erik-Oliver Blass and Guevara Noubir[ expand ]
13:17 [Pub][ePrint]Reconfigurable LUT: Boon or Bane for Secure Applications, by Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device, by Alexandre Duc and Sebastian Faust and Fran\\c{c}ois-Xavier Standaert[ expand ]