International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 [ 2 ] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
06:17 [Pub][ePrint]Zero-Knowledge Password Policy Checks and Verifier-Based PAKE, by Franziskus Kiefer and Mark Manulis[ expand ]
06:17 [Pub][ePrint]A New Way to Prevent UKS Attacks Using Trusted Computing, by Qianying Zhang and Shijun Zhao and Dengguo Feng[ expand ]

05:24 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]

09:17 [Pub][ePrint]Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries, by Martin Pettai and Peeter Laud[ expand ]
09:17 [Pub][ePrint]Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5, by Florian Legendre and Gilles Dequen and Michaël Krajecki[ expand ]

12:01 [Conf]Proceedings PKC 2014 online[ expand ]
11:07 [Event][New]SCN 2014: 9th Conference on Security and Cryptography for Networks[ expand ]
11:06 [Event][New]Indocrypt: 15th International Conference on Cryptology, Indocrypt[ expand ]
06:19 [Job][New]PhD Student, PhD positions at CTIC, Aarhus University, Denmark, Northern Europe[ expand ]
06:19 [Job][New]Ph.D. Scholarship in Computer Science (3 years full time), University of Wollongong, Australia[ expand ]

21:17 [Pub][ePrint]High Parallel Complexity Graphs and Memory-Hard Functions, by Joel Alwen and Vladimir Serbinenko[ expand ]
21:17 [Pub][ePrint]SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs, by Aydin Aysu and Ege Gulcan and Patrick Schaumont[ expand ]

14:46 [Job][New]PhD scholarship, University of Auckland, New Zealand[ expand ]

15:05 [Event][New]M2MSec'14: First International Workshop on Security and Privacy in M2M Communications[ expand ]
10:55 [Job][New]Researcher in Boolean Functions, Reliable Communication Group, Department of Informatics, University of Bergen, Norway[ expand ]

18:17 [Pub][ePrint]Linear Sequential Circuit Approximation of Acterbahn Stream Cipher, by Shazia Afreen[ expand ]

15:32 [Job][New]Doctoral Student, Technische Universität Darmstadt, Germany[ expand ]

17:11 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]
17:10 [Event][New]Workshop on Security and Privacy for Smart Connected Devices 2014[ expand ]

09:17 [Pub][ePrint]Efficient Fuzzy Search on Encrypted Data, by Alexandra Boldyreva and Nathan Chenette[ expand ]
09:17 [Pub][ePrint]Enhancing Oblivious RAM Performance Using Dynamic Prefetching, by Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas[ expand ]
09:17 [Pub][ePrint]Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, by Yark{\\i}n Dor\\\"{o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar[ expand ]
09:17 [Pub][ePrint]Bandwidth Efficient PIR from NTRU, by Yark{\\i}n Dor\\\"{o}z, Berk Sunar and Ghaith Hammouri[ expand ]
09:17 [Pub][ePrint]Self-Updatable Encryption with Short Public Parameters and Its Extensions, by Kwangsu Lee[ expand ]
09:17 [Pub][ePrint]Isogeny graphs with maximal real multiplication, by Sorina Ionica and Emmanuel Thomé[ expand ]
09:17 [Pub][ePrint]Investigating the Feasibility of LEAP+ in ZigBee Specification, by Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi[ expand ]
07:03 [Event][New]QCRYPT: 4th International Conference on Quantum Cryptography[ expand ]
07:03 [Event][New]Workshop on Cybersecurity in a Post-Quantum World[ expand ]

00:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]

21:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-Or and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]
21:17 [Pub][ePrint]CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks, by Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi[ expand ]
15:17 [Pub][ePrint]Weak-Key Analysis of POET, by Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser[ expand ]
00:17 [Pub][ePrint]Adaptively Secure Functional Encryption for Finitite Languages from DLIN Assumption, by Tapas Pandit and Rana Barua[ expand ]

09:17 [Pub][ePrint]Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices, by Henry Carter and Charles Lever and Patrick Traynor[ expand ]
09:17 [Pub][ePrint]Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64, by Léo Perrin and Dmitry Khovratovich[ expand ]
05:52 [Job][New]Summer Intern – Master\\\'s / Ph.D. student in Computer Science, Computer Engineering, or Applied Math, IBM Research – Almaden, 650 Harry Road, San Jose, CA 95120-6099, USA[ expand ]

15:17 [Pub][ePrint]Optimizing Obfuscation: Avoiding Barrington\'s Theorem, by Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations, by Toomas Krips and Jan Willemson[ expand ]
15:17 [Pub][ePrint]Total Break of Zorro using Linear and Differential Attacks, by Shahram Rasoolzadeh and Zahra Ahmadian and Mahmood Salmasizadeh and Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]Dynamic Searchable Encryption via Blind Storage, by Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter[ expand ]

18:08 [Event][New]SECRYPT 2014: 11th International Conference on Security and Cryptography[ expand ]
18:08 [Job][New]Research Scientist, RSA Laboratories, Cambridge, MA, USA[ expand ]
18:07 [Job][New]Internship, Security in Telecommunications, TU Berlin, Germany[ expand ]

18:17 [Pub][ePrint]A Practical Universal Forgery Attack against PAES-8, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]A Forgery Attack against PANDA-s, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]Implementation and improvement of the Partial Sum Attack on 6-round AES, by Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala[ expand ]
18:17 [Pub][ePrint]Attack On the Markov Problem, by James L. Adams[ expand ]
18:17 [Pub][ePrint]Squaring Algorithms with Delayed Carry Method and Efficient Parallelization, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]
18:17 [Pub][ePrint]Secret-Sharing for NP from Indistinguishability Obfuscation, by Ilan Komargodski and Moni Naor and Eylon Yogev[ expand ]
18:17 [Pub][ePrint]Remarks on the Pocklington and Padr\\\'o-S\\\'aez Cube Root Algorithm in $\\mathbb F_q$, by Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon[ expand ]
18:13 [Job][New]Doctoral Students (and Post-Doc), Technische Universität Darmstadt, Germany[ expand ]
17:17 [Event][New]RFIDsec'14 Asia: 2014 Workshop on RFID Security[ expand ]
17:15 [Job][New]Post-Doc, University of Versailles-St-Quentin-en-Yvelines, France[ expand ]

21:17 [Pub][ePrint]Some Randomness Experiments on TRIVIUM, by Subhabrata Samajder and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Algebraic Cryptanalysis of Wild McEliece Incognito, by Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich[ expand ]
21:17 [Pub][ePrint]A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation, by Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung[ expand ]
21:17 [Pub][ePrint]Offline Dictionary Attack on Password Authentication Schemes using Smart Cards, by Ding Wang and Ping Wang[ expand ]

21:18 [Job][New]Professor in Cryptography (tenured) , Graz University of Technology, Austria, Europe [ expand ]
21:17 [Job][New]Tenure-Track Staff Member, CWI Amsterdam, NL, Europe[ expand ]
09:17 [Pub][ePrint]Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption, by Katsuyuki Takashima[ expand ]

21:37 [Event][New]FDTC'14: Workshop on Fault Diagnosis and Tolerance in Cryptography 2014[ expand ]
15:17 [Pub][ePrint]Reconsidering Generic Composition, by Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton[ expand ]
15:17 [Pub][ePrint]Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness, by Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas[ expand ]
15:17 [Pub][ePrint]ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]

22:31 [Event][New]Crypto: Crypto 2015 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2016 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2017 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2018 (tentative)[ expand ]
20:50 [PhD][Update]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
20:28 [Event][New]SSR 2014: 1st International conference on Security Standardisation Research[ expand ]

15:17 [Pub][ePrint]Privacy-Preserving Implicit Authentication, by Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti[ expand ]
09:04 [PhD][New]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
09:03 [PhD][New]Sourav Sen Gupta: Analysis and Implementation of RC4 Stream Cipher[ expand ]
09:02 [PhD][New]Julio Cesar López Hernández[ expand ]
08:50 [Event][New]SPACE 2014: 4th International Conference on Security, Privacy, and Applied Cryptography[ expand ]
00:17 [Pub][ePrint]Verifiable Computation over Encrypted Data in the Presence of Verification Queries, by Rosario Gennaro and Valerio Pastro[ expand ]
00:17 [Pub][ePrint]From Input Private to Universally Composable Secure Multiparty Computation Primitives, by Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen[ expand ]
00:17 [Pub][ePrint]Automatic Protocol Selection in Secure Two-Party Computations, by Florian Kirschbaum and Thomas Schneider and Axel Schröpfer[ expand ]
00:17 [Pub][ePrint]Doubly Spatial Encryption from DBDH, by Jie Chen and Hoeteck Wee[ expand ]

22:32 [Job][New]Post-Doc, LIASD, University Paris 8, France[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2018[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2017[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2016[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2015[ expand ]
09:17 [Pub][ePrint]Fast GPGPU-Based Elliptic Curve Scalar Multiplication, by Eric M. Mahé and Jean-Marie Chauvet[ expand ]

21:02 [News]Scott Vanstone (1947-2014)[ expand ]

20:30 [Event][New]CARDIS 2014: 13th Smart Card Research and Advanced Application Conference[ expand ]
20:19 [News]President's letter[ expand ]

15:17 [Pub][ePrint]Breaking POET Authentication with a Single Query, by Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei[ expand ]
15:17 [Pub][ePrint]Crypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili[ expand ]

21:17 [Pub][ePrint]Low Overhead Broadcast Encryption from Multilinear Maps, by Dan Boneh and Brent Waters and Mark Zhandry[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols, by Sai Raghu Talluri and Swapnoneel Roy[ expand ]
18:14 [Event][New]ESORICS 2014: 19th European Symposium on Research in Computer Security[ expand ]
15:17 [Pub][ePrint]JHAE: An Authenticated Encryption Mode Based on JH, by Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri[ expand ]
10:43 [Job][New]Ph.D. students, TELECOM-ParisTech[ expand ]
10:33 [Event][New]BalkanCryptSec: International Conference on Cryptography and Information Security[ expand ]

21:17 [Pub][ePrint]Two-sources Randomness Extractors for Elliptic Curves, by Abdoul Aziz Ciss[ expand ]
21:17 [Pub][ePrint]Side-Channel Analysis on Blinded Regular Scalar Multiplications, by Benoit Feix and Mylène Roussellet and Alexandre Venelli[ expand ]
21:17 [Pub][ePrint]The Temperature Side Channel and Heating Fault Attacks, by Michael Hutter and Jörn-Marc Schmidt[ expand ]
21:17 [Pub][ePrint]Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment, by Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal[ expand ]