International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 [ 2 ] 3 4 5 6 7 8 9 10 11 12 13
21:17 [Pub][ePrint]Some Randomness Experiments on TRIVIUM, by Subhabrata Samajder and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Algebraic Cryptanalysis of Wild McEliece Incognito, by Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich[ expand ]
21:17 [Pub][ePrint]A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation, by Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung[ expand ]
21:17 [Pub][ePrint]Offline Dictionary Attack on Password Authentication Schemes using Smart Cards, by Ding Wang and Ping Wang[ expand ]

21:18 [Job][New]Professor in Cryptography (tenured) , Graz University of Technology, Austria, Europe [ expand ]
21:17 [Job][New]Tenure-Track Staff Member, CWI Amsterdam, NL, Europe[ expand ]
09:17 [Pub][ePrint]Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption, by Katsuyuki Takashima[ expand ]

21:37 [Event][New]FDTC'14: Workshop on Fault Diagnosis and Tolerance in Cryptography 2014[ expand ]
15:17 [Pub][ePrint]Reconsidering Generic Composition, by Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton[ expand ]
15:17 [Pub][ePrint]Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness, by Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas[ expand ]
15:17 [Pub][ePrint]ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]

22:31 [Event][New]Crypto: Crypto 2015 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2016 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2017 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2018 (tentative)[ expand ]
20:50 [PhD][Update]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
20:28 [Event][New]SSR 2014: 1st International conference on Security Standardisation Research[ expand ]

15:17 [Pub][ePrint]Privacy-Preserving Implicit Authentication, by Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti[ expand ]
09:04 [PhD][New]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
09:03 [PhD][New]Sourav Sen Gupta: Analysis and Implementation of RC4 Stream Cipher[ expand ]
09:02 [PhD][New]Julio Cesar López Hernández[ expand ]
08:50 [Event][New]SPACE 2014: 4th International Conference on Security, Privacy, and Applied Cryptography[ expand ]
00:17 [Pub][ePrint]Verifiable Computation over Encrypted Data in the Presence of Verification Queries, by Rosario Gennaro and Valerio Pastro[ expand ]
00:17 [Pub][ePrint]From Input Private to Universally Composable Secure Multiparty Computation Primitives, by Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen[ expand ]
00:17 [Pub][ePrint]Automatic Protocol Selection in Secure Two-Party Computations, by Florian Kirschbaum and Thomas Schneider and Axel Schröpfer[ expand ]
00:17 [Pub][ePrint]Doubly Spatial Encryption from DBDH, by Jie Chen and Hoeteck Wee[ expand ]

22:32 [Job][New]Post-Doc, LIASD, University Paris 8, France[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2018[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2017[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2016[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2015[ expand ]
09:17 [Pub][ePrint]Fast GPGPU-Based Elliptic Curve Scalar Multiplication, by Eric M. Mahé and Jean-Marie Chauvet[ expand ]

21:02 [News]Scott Vanstone (1947-2014)[ expand ]

20:30 [Event][New]CARDIS 2014: 13th Smart Card Research and Advanced Application Conference[ expand ]
20:19 [News]President's letter[ expand ]

15:17 [Pub][ePrint]Breaking POET Authentication with a Single Query, by Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei[ expand ]
15:17 [Pub][ePrint]Crypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili[ expand ]

21:17 [Pub][ePrint]Low Overhead Broadcast Encryption from Multilinear Maps, by Dan Boneh and Brent Waters and Mark Zhandry[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols, by Sai Raghu Talluri and Swapnoneel Roy[ expand ]
18:14 [Event][New]ESORICS 2014: 19th European Symposium on Research in Computer Security[ expand ]
15:17 [Pub][ePrint]JHAE: An Authenticated Encryption Mode Based on JH, by Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri[ expand ]
10:43 [Job][New]Ph.D. students, TELECOM-ParisTech[ expand ]
10:33 [Event][New]BalkanCryptSec: International Conference on Cryptography and Information Security[ expand ]

21:17 [Pub][ePrint]Two-sources Randomness Extractors for Elliptic Curves, by Abdoul Aziz Ciss[ expand ]
21:17 [Pub][ePrint]Side-Channel Analysis on Blinded Regular Scalar Multiplications, by Benoit Feix and Mylène Roussellet and Alexandre Venelli[ expand ]
21:17 [Pub][ePrint]The Temperature Side Channel and Heating Fault Attacks, by Michael Hutter and Jörn-Marc Schmidt[ expand ]
21:17 [Pub][ePrint]Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment, by Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal[ expand ]
21:17 [Pub][ePrint]A Second Look at Fischlin\'s Transformation, by Özgür Dagdelen and Daniele Venturi[ expand ]

15:17 [Pub][ePrint]FFT-Based Key Recovery for the Integral Attack, by Yosuke Todo[ expand ]

15:17 [Pub][ePrint]AES-Based Authenticated Encryption Modes in Parallel High-Performance Software, by Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser[ expand ]
07:04 [Job][New]Ph.D. student in Quantum Cryptography, University of and CWI Amsterdam, the Netherlands, Europe[ expand ]

21:17 [Pub][ePrint]Oblivious Data Structures, by Xiao Wang and Kartik Nayak and Chang Liu and Elaine Shi and Emil Stefanov and Yan Huang[ expand ]
21:17 [Pub][ePrint]SETUP in Secret Sharing Schemes, by Ruxandra F. Olimid[ expand ]
21:17 [Pub][ePrint]Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs, by Tetsu Iwata and Lei Wang[ expand ]
21:17 [Pub][ePrint]Proving the TLS Handshake Secure (as it is), by Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin[ expand ]

12:42 [Event][New]ProvSec 2014: The Eighth International Conference on Provable Security[ expand ]
12:42 [Event][New]ARES 2014: The Ninth International Conference on Availability, Reliability and Securi[ expand ]
10:17 [Pub][ePrint]A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro[ expand ]
10:17 [Pub][ePrint]Improving throughput of RC4 algorithm using multithreading techniques in multicore processors, by T.D.B Weerasinghe[ expand ]

22:17 [Pub][ePrint]Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs, by Maura B. Paterson and Douglas R. Stinson[ expand ]
22:17 [Pub][ePrint]Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data, by Qingji Zheng and Shouhuai Xu[ expand ]
22:17 [Pub][ePrint]Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES, by Valentina Banciu and Elisabeth Oswald[ expand ]

16:17 [Pub][ePrint]One-Round Witness Indistinguishability from Indistinguishability Obfuscation, by Qihua Niu, Hongda Li, Bei Liang, Fei Tang[ expand ]
16:17 [Pub][ePrint]Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms, by T.D.B Weerasinghe[ expand ]
16:17 [Pub][ePrint]Analysis of a Modified RC4 Algorithm, by T.D.B Weerasinghe[ expand ]
16:05 [Job][New]Security Systems Programmer Associate, University of Michigan Transportation Research Institute (UMTRI), USA, North-West[ expand ]
15:36 [Event][New]CSS 2014: 3rd Conference on Cryptography and Security Systems 2014[ expand ]
15:20 [Job][New]Security Systems Programmer Lead, University of Michigan Transportation Research Institute (UMTRI), USA, North-West[ expand ]
09:00 [Job][Update]PhD Positions in Applied Cryptology, Worcester Polytechnic Institue, MA, USA[ expand ]
05:47 [Job][New]Lecturer, Computer Engineering and Systems, University of Washington, Tacoma Washington USA[ expand ]

22:17 [Pub][ePrint]Continuous Non-malleable Codes, by Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi[ expand ]
22:17 [Pub][ePrint]Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?, by Jeroen Delvaux and Dawu Gu and Dries Schellekens and Ingrid Verbauwhede[ expand ]
22:17 [Pub][ePrint]An Effective RC4 Stream Cipher, by T.D.B Weerasinghe[ expand ]
10:17 [Pub][ePrint]Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256, by Shay Gueron[ expand ]
10:17 [Pub][ePrint]Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms , by Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman[ expand ]
09:19 [Event][New]Asiacrypt 2014[ expand ]
09:18 [Event][New]Asiacrypt 2014: The 20th Annual Conference on the Theory and Application of Cryptography[ expand ]
01:17 [Pub][ePrint]Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond, by Scott Coull and Kevin Dyer[ expand ]
01:17 [Pub][ePrint]How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs, by Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs[ expand ]
01:17 [Pub][ePrint]Tuple decoders for traitor tracing schemes, by Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven[ expand ]
01:17 [Pub][ePrint]Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters, by Yuriy Tarannikov[ expand ]
01:17 [Pub][ePrint]Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices, by Arnaud Dambra and Philippe Gaborit and Myl\\`ene Roussellet and Julien Schrek and Nicolas Tafforeau[ expand ]
01:17 [Pub][ePrint]``Ooh Aah... Just a Little Bit\'\' : A small amount of side channel can go a long way, by Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom[ expand ]
01:17 [Pub][ePrint]TRUESET: Nearly Practical Verifiable Set Computations, by Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikolaos Triandopoulos[ expand ]

13:17 [Pub][ePrint]Weak-Key Leakage Resilient Cryptography, by Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan[ expand ]
13:17 [Pub][ePrint]Point compression for the trace zero subgroup over a small degree extension field, by Elisa Gorla and Maike Massierer[ expand ]
08:28 [Job][New]Full Time Lecturer, University of Washington, Tacoma Washington USA[ expand ]
08:27 [Job][New]Cloud Security R&D Engineers, Applied Science and Technology Research Institute (ASTRI), Hong Kong[ expand ]

19:17 [Pub][ePrint]CLOC: Authenticated Encryption for Short Input, by Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka[ expand ]
19:17 [Pub][ePrint]Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate $[ expand ]
16:17 [Pub][ePrint]Honey Encryption: Security Beyond the Brute-Force Bound, by Ari Juels and Thomas Ristenpart[ expand ]
16:17 [Pub][ePrint]Non-Interactive Cryptography in the RAM Model of Computation, by Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
16:17 [Pub][ePrint]Verifiable Oblivious Storage, by Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam[ expand ]
16:17 [Pub][ePrint]A Statistics-based Fundamental Model for Side-channel Attack Analysis, by Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang[ expand ]
16:17 [Pub][ePrint]Security Analysis of Key-Alternating Feistel Ciphers, by Rodolphe Lampe and Yannick Seurin[ expand ]

01:17 [Pub][ePrint]On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications, by Nikolaos Karapanos and Srdjan Capkun[ expand ]

22:17 [Pub][ePrint]The Multiple Number Field Sieve for Medium and High Characteristic Finite Fields, by Razvan Barbulescu and Cécile Pierrot[ expand ]
22:17 [Pub][ePrint]Millions of Millionaires: Multiparty Computation in Large Networks, by Mahdi Zamani and Mahnush Movahedi and Jared Saia[ expand ]