International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [ 23 ] 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
18:41 [Job][New]Assistant/Associate Professor, Innopolis University, Kazan, Russian Federation[ expand ]
18:40 [Event][New]WISA'15: The 16th International Workshop on Information Security Applications[ expand ]
18:39 [Event][New]MIST'15: The 7th ACM CCS International Workshop on Managing Insider Security Threats[ expand ]
18:38 [Event][New]Cryptology2016: 5th International Cryptology and Information Security Conference 2016[ expand ]
17:10 [News]2015 IACR Fellows announced[ expand ]

20:40 [Event][New]DPM 2015: 10th International Workshop on Data Privacy Management[ expand ]

16:34 [Job][New]2 fully funded PhD positions, Xi an Jiaotong-Liverpool University[ expand ]
16:33 [Job][New]Postdoc in Cryptography, University of Luxembourg[ expand ]

23:54 [Job][New]Researcher, Bell Labs, Tel Aviv - Israel[ expand ]
23:44 [Job][New]Post-Doc, Bell Labs, Tel Aviv - Israel[ expand ]
15:17 [Pub][ePrint]Scalable Divisible E-cash, by Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré[ expand ]
15:17 [Pub][ePrint]A Note on the Lindell-Waisbard Private Web Search Scheme, by Zhengjun Cao and Lihua Liu[ expand ]
15:17 [Pub][ePrint]Secure Random Linear Code Based Public Key Encryption Scheme RLCE, by Yongge Wang[ expand ]
15:17 [Pub][ePrint]Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack, by Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao[ expand ]
15:17 [Pub][ePrint]The Uniform Distribution of Sequences Generated by Iteration of Polynomials, by Emil Lerner[ expand ]
15:17 [Pub][ePrint]Security Analysis of Re-Encryption RPC Mix Nets, by Ralf Kuesters and Tomasz Truderung[ expand ]
15:17 [Pub][ePrint]Accelerating Somewhat Homomorphic Evaluation using FPGAs, by Erd\\.{i}n\\c{c} \\\"{O}zt\\\"{u}rk and Yark{\\i}n Dor\\\"{o}z and Berk Sunar and Erkay Sava\\c{s}[ expand ]
15:17 [Pub][ePrint]Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
15:17 [Pub][ePrint]Secret Shared Random Access Machine, by Shlomi Dolev and Yin Li[ expand ]
15:17 [Pub][ePrint]Two Operands of Multipliers in Side-Channel Attack, by Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki[ expand ]
15:17 [Pub][ePrint]Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes, by Joseph A. Akinyele and Christina Garman and Susan Hohenberger[ expand ]
15:17 [Pub][ePrint]Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks, by Muhammed F. Esgin and Orhun Kara[ expand ]
15:17 [Pub][ePrint]Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms, by Aydin Aysu and Patrick Schaumont[ expand ]
15:17 [Pub][ePrint]A quantum-safe circuit-extension handshake for Tor, by John Schanck and William Whyte and Zhenfei Zhang[ expand ]

23:25 [Job][New]Software Security Engineer, Oblong Industries[ expand ]
15:39 [Event][New]SPE2015: IEEE 5th International Workshop on Security and Privacy Engineering[ expand ]

17:55 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 2 posts), Royal Holloway, University of London[ expand ]

12:17 [Pub][ePrint]Impossible Differential Cryptanalysis of Reduced Round SIMON, by Zhan Chen and Ning Wang and Xiaoyun Wang[ expand ]
12:17 [Pub][ePrint]Improved Linear Trails for the Block Cipher Simon, by Tomer Ashur[ expand ]
12:17 [Pub][ePrint]A Note on Scalar Multiplication Using Division Polynomials, by Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao[ expand ]
12:17 [Pub][ePrint]Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data, by Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia[ expand ]

20:54 [Job][New]Internship – M.S./Ph.D. student in Computer Science or a closely related field, Bosch Research and Technology Center North America – 2835 East Carson St., Pittsburgh, PA, 15203 USA[ expand ]
15:17 [Pub][ePrint]Non-Interactive Secure Computation Based on Cut-and-Choose, by Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva[ expand ]
15:17 [Pub][ePrint]From Statistical Zero Knowledge to Secret Sharing, by Vinod Vaikuntanathan and Prashant Nalini Vasudevan[ expand ]
15:17 [Pub][ePrint]Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption, by Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou[ expand ]
15:17 [Pub][ePrint]Improved Cryptanalysis of AES-like Permutations, by Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin[ expand ]
15:17 [Pub][ePrint]Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting, by Sébastien Canard and David Pointcheval and Olivier Sanders[ expand ]
15:17 [Pub][ePrint]One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games, by Marco Tomamichel and Serge Fehr and J\\k{e}drzej Kaniewski and Stephanie Wehner[ expand ]
15:17 [Pub][ePrint]An Improvment of the Elliptic Net Algorithm, by Binglong Chen and Chang-An Zhao[ expand ]
15:17 [Pub][ePrint]MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems, by Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai[ expand ]
15:17 [Pub][ePrint]Low Depth Circuits for Efficient Homomorphic Sorting, by Gizem S. \\c{C}etin and Yark{\\i}n Dor\\\"{o}z and Berk Sunar and Erkay Sava\\c{s}[ expand ]
15:17 [Pub][ePrint]Dual System Encryption via Predicate Encodings, by Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing, by Baodong Qin and Shengli Liu[ expand ]
11:35 [Event][New]TCC 2016: Thirteenth Theory of Cryptography Conference[ expand ]
10:36 [News]Micali & Reyzin receive inaugural TCC Test-of-Time award[ expand ]
10:23 [News]Message from the IACR President[ expand ]

22:33 [Event][New]Fifteenth IMA International Conference on Cryptography and Coding[ expand ]

22:48 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 2 posts), NXP Semiconductors, Leuven, Belgium[ expand ]
15:17 [Pub][ePrint]Toward Secure Implementation of McEliece Decryption, by Mariya Georgieva and Frédéric de Portzamparc[ expand ]
15:17 [Pub][ePrint]Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk, by Markus Dichtl[ expand ]
15:17 [Pub][ePrint]Ideal Multilinear Maps Based on Ideal Lattices, by Gu Chunsheng[ expand ]
15:17 [Pub][ePrint]Improved Top-Down Techniques in Differential Cryptanalysis, by Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir[ expand ]
15:17 [Pub][ePrint]The Simplest Protocol for Oblivious Transfer, by Tung Chou and Claudio Orlandi[ expand ]
15:17 [Pub][ePrint]GRECS: Graph Encryption for Approximate Shortest Distance Queries, by Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios[ expand ]
15:17 [Pub][ePrint]Password Hashing Competition - Survey and Benchmark, by George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas[ expand ]
15:17 [Pub][ePrint]BlindBox: Deep Packet Inspection over Encrypted Traffic, by Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy[ expand ]
13:01 [Event][New]School on Computer-aided Cryptography[ expand ]

20:21 [Event][New]S3: SAC Summer School[ expand ]
09:17 [Pub][ePrint]Eclipse Attacks on Bitcoin\'s Peer-to-Peer Network, by Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg[ expand ]
09:17 [Pub][ePrint]A look at the PGP ecosystem through the key server data, by Hanno Böck[ expand ]
09:17 [Pub][ePrint]Research Perspectives and Challenges for Bitcoin and Cryptocurrencies, by Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten[ expand ]
09:17 [Pub][ePrint]Computational Aspects of Correlation Power Analysis, by Paul Bottinelli and Joppe W. Bos[ expand ]
09:17 [Pub][ePrint]Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES, by Patrick Derbez and Pierre-Alain Fouque[ expand ]
09:17 [Pub][ePrint]Lightweight MDS Involution Matrices, by Siang Meng Sim and Khoongming Khoo and Fr\\\'ed\\\'erique Oggier and Thomas Peyrin[ expand ]

20:19 [Job][New]Visiting assistant professor, Department of Mathematical Sciences, University of Cincinnati[ expand ]
20:18 [Job][New]Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers – 2 posts), University of Bristol[ expand ]
09:17 [Pub][ePrint]Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices, by Vadim Lyubashevsky and Thomas Prest[ expand ]
05:36 [Job][New]Ph.D. student, Rochester Institute of Technology[ expand ]

09:17 [Pub][ePrint]Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction, by Yang Lu, Quanling Zhang, Jiguo Li[ expand ]
09:17 [Pub][ePrint]A comprehensive analysis of game-based ballot privacy definitions, by David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Tornado Attack on RC4 with Applications to WEP \\& WPA, by Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux[ expand ]
09:17 [Pub][ePrint]Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers, by Haiyan Wang , Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Linearization of Multi-valued Nonlinear Feedback Shift Registers, by Haiyan Wang, Jianghua Zhong, Dongdai Lin[ expand ]
09:17 [Pub][ePrint]How to Construct UC-Secure Searchable Symmetric Encryption Scheme, by Kaoru Kurosawa and Yasuhiro Ohtaki[ expand ]
09:17 [Pub][ePrint]Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys, by Junji Shikata[ expand ]
09:17 [Pub][ePrint]Improved (Hierarchical) Inner-Product Encryption from Lattices, by Keita Xagawa[ expand ]
09:17 [Pub][ePrint]Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES, by Ryo Nishimaki and Keita Xagawa[ expand ]
09:17 [Pub][ePrint]Subgroup security in pairing-based cryptography, by Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon[ expand ]
09:17 [Pub][ePrint]Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting, by Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]Practical Attacks on the Round-reduced PRINCE, by Pawel Morawiecki[ expand ]
09:17 [Pub][ePrint]Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation, by Jeremy Jean and Ivica Nikolic[ expand ]
09:17 [Pub][ePrint]Reliable Message Transmission under Partial Knowledge, by Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
09:17 [Pub][ePrint]Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]
09:17 [Pub][ePrint]Espresso: A Stream Cipher for 5G Wireless Communication Systems, by Elena Dubrova and Martin Hell[ expand ]
09:17 [Pub][ePrint]Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE, by Alex Biryukov, Patrick Derbez and Léo Perrin[ expand ]
09:17 [Pub][ePrint]Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE, by Patrick Derbez and Léo Perrin[ expand ]

16:16 [Event][New]FPS 2015: 8th International Symposium on Foundations & Practice of Security[ expand ]
16:15 [Event][New]PQCrypto 2016: The Seventh International Conference on Post-Quantum Cryptography[ expand ]

20:35 [Job][New]One Postdoc and one PhD studentship, University of Strathclyde, UK[ expand ]

15:36 [Event][New]BCS 2015: 2nd Conference on Cryptography and Information Theory- BalkanCryptSec 2015[ expand ]
12:17 [Pub][ePrint]One Time Programs with Limited Memory, by Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając[ expand ]
12:17 [Pub][ePrint]Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers, by Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers[ expand ]
12:17 [Pub][ePrint]Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack, by Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey[ expand ]
12:17 [Pub][ePrint]Performance and Security Improvements for Tor: A Survey, by Mashael AlSabah and Ian Goldberg[ expand ]
12:17 [Pub][ePrint]Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique, by Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya[ expand ]
04:06 [Job][New]Summer Intern – M.A./M.S./Ph.D. student in Computer Science, Computer Engineering, or Applied Math, IBM Research – Almaden, 650 Harry Road, San Jose, CA 95120-6099, USA[ expand ]

09:17 [Pub][ePrint]Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, by Ben Smyth and Steven Frink and Michael R. Clarkson[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Full Sprout, by Virginie Lallemand and Mar\\\'ia Naya-Plasencia[ expand ]
09:17 [Pub][ePrint]A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher, by Yonglin Hao[ expand ]
09:17 [Pub][ePrint]W-SPS: Designing a Wide-Area Secure Positioning System, by Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun[ expand ]
09:17 [Pub][ePrint]Improving GGH Public Key Scheme Using Low Density Lattice Codes, by Reza Hooshmand, Taraneh Eghlidos and Mohammad Reza Aref[ expand ]

16:45 [Event][New]SPACE 2015: Intl. Conf. on Security, Privacy, and Applied Cryptography Engineering[ expand ]
12:17 [Pub][ePrint]Leakage-Resilient Cryptography with Key Derived from Sensitive Data, by Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz[ expand ]
12:17 [Pub][ePrint]Tradeoff Cryptanalysis of Memory-Hard Functions, by Alex Biryukov and Dmitry Khovratovich[ expand ]
12:17 [Pub][ePrint]Secure Physical Computation using Disposable Circuits, by Ben Fisch and Daniel Freund and Moni Naor[ expand ]

22:31 [Job][New]Ph.D. student - PUF design and security, Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France[ expand ]
21:17 [Pub][ePrint]Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
21:17 [Pub][ePrint]Privacy and Access Control for Outsourced Personal Records, by Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder[ expand ]
21:17 [Pub][ePrint]New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers, by Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar[ expand ]
21:17 [Pub][ePrint]Towards Understanding the Known-Key Security of Block Ciphers, by Elena Andreeva, Andrey Bogdanov, and Bart Mennink[ expand ]
21:17 [Pub][ePrint]Tighter, faster, simpler side-channel security evaluations beyond computing power, by Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal[ expand ]
21:17 [Pub][ePrint]Key Homomorphic PRFs and Their Applications, by Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan[ expand ]
04:47 [Job][New]• Research Fellow/Postdoctoral Researcher in Applied Crypto, University of Auckland, Auckland, New Zealand[ expand ]

22:39 [Event][New]ISC: The Eighteenth Information Security Conference[ expand ]
09:17 [Pub][ePrint]Efficient Format Preserving Encrypted Databases, by Prakruti C, Sashank Dara and V.N. Muralidhara[ expand ]
09:17 [Pub][ePrint]Efficient k-out-of-n oblivious transfer protocol, by wang qinglong[ expand ]
09:17 [Pub][ePrint]Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles, by Subhamoy Maitra and Goutam Paul and Willi Meier[ expand ]
09:17 [Pub][ePrint]Quasi-Adaptive NIZK for Linear Subspaces Revisited, by Eike Kiltz and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]A revocable anonymity in Tor, by Amadou Moctar Kane[ expand ]
09:17 [Pub][ePrint]GCM Security Bounds Reconsidered, by Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata[ expand ]

19:37 [Event][New]CyberSec2015: 4th Inter. Conf. on Cyber Security, Cyber Welfare, and Digital Forensic[ expand ]

16:17 [Pub][ePrint]Attribute-Based Versions of Schnorr and ElGamal, by Javier Herranz[ expand ]
16:17 [Pub][ePrint]Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows, by Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger[ expand ]
16:17 [Pub][ePrint]Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing, by Thijs Laarhoven and Benne de Weger[ expand ]
16:17 [Pub][ePrint]Secure and Efficient Initialization and Authentication Protocols for SHIELD, by Chenglu Jin and Marten van Dijk[ expand ]
16:17 [Pub][ePrint]Triathlon of Lightweight Block Ciphers for the Internet of Things, by Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov[ expand ]
16:17 [Pub][ePrint]Towards Secure Distance Bounding, by Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay[ expand ]
16:17 [Pub][ePrint]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations, by Tobias Schneider and Amir Moradi[ expand ]
16:17 [Pub][ePrint]Efficient and Secure Delegation of Group Exponentiation to a Single Server, by Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain[ expand ]
16:17 [Pub][ePrint]Towards Key-Length Extension\\\\ with Optimal Security: Cascade Encryption and Xor-cascade Encryption, by Jooyoung Lee and Martijn Stam[ expand ]
16:17 [Pub][ePrint]Leakage-Resilient Symmetric Encryption via Re-keying, by Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque[ expand ]
16:17 [Pub][ePrint]Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs, by Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu[ expand ]
16:17 [Pub][ePrint]Adaptively Secure Coin-Flipping, Revisited, by Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park[ expand ]
16:17 [Pub][ePrint]Statistical Properties of Multiplication mod $2^n$, by A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]

19:17 [Pub][ePrint]Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs, by Amir Moradi and Gesine Hinterwälder[ expand ]
19:17 [Pub][ePrint]Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives, by Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu[ expand ]
19:17 [Pub][ePrint]SCA Resistance Analysis of Sponge based MAC-PHOTON, by N. Nalla Anandakumar[ expand ]
19:17 [Pub][ePrint]Tighter Reductions for Forward-Secure Signature Schemes, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists, by Stephanie Bayer and Jens Groth[ expand ]
19:17 [Pub][ePrint]Practical Homomorphic MACs for Arithmetic Circuits, by Dario Catalano and Dario Fiore[ expand ]
19:17 [Pub][ePrint]Improving Modular Inversion in RNS using the Plus-Minus Method, by Karim Bigou and Arnaud Tisserand[ expand ]
19:17 [Pub][ePrint]Memory-saving computation of the pairing final exponentiation on BN curves, by Sylvain DUQUESNE and Loubna GHAMMAM[ expand ]
19:17 [Pub][ePrint]iDASH Secure Genome Analysis Competition Using ObliVM, by Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Multi-Client Non-Interactive Verifiable Computation, by Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid[ expand ]
19:17 [Pub][ePrint]Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance, by Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár[ expand ]
19:17 [Pub][ePrint]New Techniques for SPHFs and Efficient One-Round PAKE Protocols, by Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud[ expand ]
19:17 [Pub][ePrint]How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality, by Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas[ expand ]
19:17 [Pub][ePrint]Higher Order Differential Analysis of NORX, by Sourav Das and Subhamoy Maitra and and Willi Meier[ expand ]
19:17 [Pub][ePrint]Remotely Managed Logic Built-In Self-Test for Secure M2M Communications, by Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets[ expand ]
19:17 [Pub][ePrint]Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities, by Céline Blondeau and Kaisa Nyberg[ expand ]
19:17 [Pub][ePrint]New Links Between Differential and Linear Cryptanalysis, by Céline Blondeau and Kaisa Nyberg[ expand ]
19:17 [Pub][ePrint]Tweakable Blockciphers with Asymptotically Optimal Security, by Rodolphe Lampe and Yannick Seurin[ expand ]
19:17 [Pub][ePrint]Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis, by Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi [ expand ]
19:17 [Pub][ePrint]Key-Homomorphic Constrained Pseudorandom Functions, by Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens[ expand ]
19:17 [Pub][ePrint]Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs, by Alexander Wild and Amir Moradi and Tim Güneysu[ expand ]

18:52 [Job][New]Research Scientist, Senior Research Scientist, Nanyang Technological University, Singapore[ expand ]
00:11 [Job][New]Ph.D. position, Ruhr-University Bochum, Horst-Goertz Institute[ expand ]

16:26 [Event][New]SECRYPT 2015: 12th International Conference on Security and Cryptography[ expand ]
10:17 [Pub][ePrint]A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves, by Palash Sarkar and Shashank Singh[ expand ]
10:17 [Pub][ePrint]On Time and Order in Multiparty Computation, by Pablo Azar and Shafi Goldwasser and Sunoo Park[ expand ]

15:15 [Event][New]Mathematics of Lattices and Cybersecurity[ expand ]
10:17 [Pub][ePrint]On the Security of an Efficient Group Key Agreement Scheme for MANETs, by Purushothama B R and Nishat Koti[ expand ]
10:17 [Pub][ePrint]Key Recovery for LWE in Polynomial Time, by Kim Laine and Kristin Lauter[ expand ]

10:17 [Pub][ePrint]Trivial Nonce-Misusing Attack on Pure OMD, by Tomer Ashur and Bart Mennink[ expand ]
04:17 [Pub][ePrint]A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia, by Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma[ expand ]
04:17 [Pub][ePrint]Indistinguishability Obfuscation from Compact Functional Encryption, by Prabhanjan Ananth and Abhishek Jain[ expand ]
04:17 [Pub][ePrint]Silent Simon: A Threshold Implementation under 100 Slices, by Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth[ expand ]
01:17 [Pub][ePrint]Authenticated Network Time Synchronization, by Benjamin Dowling and Douglas Stebila and Greg Zaverucha[ expand ]
01:17 [Pub][ePrint]Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation, by Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer[ expand ]
01:17 [Pub][ePrint]Short Schnorr signatures require a hash function with more than just random-prefix resistance, by Daniel R. L. Brown[ expand ]
01:17 [Pub][ePrint]More PS and H-like bent functions, by C. Carlet[ expand ]
01:17 [Pub][ePrint]Post-Zeroizing Obfuscation: The case of Evasive Circuits, by Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry[ expand ]
01:17 [Pub][ePrint]Naturally Rehearsing Passwords, by Jeremiah Blocki and Manuel Blum and Anupam Datta[ expand ]
01:17 [Pub][ePrint]The Cryptographic Hardness of Random Local Functions -- Survey, by Benny Applebaum[ expand ]
01:17 [Pub][ePrint]Constant Size Ring Signature Without Random Oracle, by Priyanka Bose and Dipanjan Das and C. Pandu Rangan[ expand ]
01:17 [Pub][ePrint]Indistinguishability Obfuscation from Functional Encryption, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]New Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
01:17 [Pub][ePrint]Exploring the Resilience of Some Lightweight Ciphers Against Proled Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
01:17 [Pub][ePrint]Differential-Linear Cryptanalysis of ICEPOLE, by Tao Huang; Ivan Tjuawinata; Hongjun Wu[ expand ]

22:17 [Pub][ePrint]Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE, by Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu[ expand ]
22:17 [Pub][ePrint]From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Ilan Komargodski and Gil Segev[ expand ]
22:17 [Pub][ePrint]Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, by Nuttapong Attrapadung and Shota Yamada[ expand ]
22:17 [Pub][ePrint]Building Lossy Trapdoor Functions from Lossy Encryption, by Brett Hemenway and Rafail Ostrovsky[ expand ]
22:17 [Pub][ePrint]On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining, by Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor[ expand ]
22:17 [Pub][ePrint]Circuits Resilient to Additive Attacks with Applications to Secure Computation, by Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer[ expand ]
22:17 [Pub][ePrint]Functional Encryption from (Small) Hardwae Tokens, by Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Inverting the Fnal exponentiation of Tate pairings on ordinary elliptic curves using faults, by Ronan Lashermes and Jacques Fournier and Louis Goubin[ expand ]
22:17 [Pub][ePrint]Bad directions in cryptographic hash functions, by Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen[ expand ]
22:17 [Pub][ePrint]Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons, by Tobias Pulls and Roel Peeters[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of HMAC/NMAC-Whirlpool, by Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu[ expand ]
22:17 [Pub][ePrint]On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs, by Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann[ expand ]
22:17 [Pub][ePrint]High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures, by Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage[ expand ]
22:17 [Pub][ePrint]New Attacks on Feistel Structures with Improved Memory Complexities, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Observations on the SIMON block cipher family, by Stefan Kölbl and Gregor Leander and Tyge Tiessen[ expand ]
22:17 [Pub][ePrint]Security of the AES with a Secret S-box, by Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen[ expand ]
22:17 [Pub][ePrint]Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs, by Erich Wenger and Paul Wolfger[ expand ]
22:17 [Pub][ePrint]Multi-Client Verifiable Computation with Stronger Security Guarantees, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method, by Céline Blondeau and Marine Minier[ expand ]
19:17 [Pub][ePrint]The Random Oracle Model: A Twenty-Year Retrospective, by Neal Koblitz and Alfred Menezes[ expand ]
19:17 [Pub][ePrint]Performance Analysis of Some Password Hashing Schemes, by Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya[ expand ]
19:17 [Pub][ePrint]A Practical Key Exchange for the Internet using Lattice Cryptography, by Vikram Singh[ expand ]
18:07 [Event][New]C&TC 2015: 5th International Symposium on Cloud Computing, Trusted Computing and Secu[ expand ]
18:06 [Job][New]Post-Doc, Ph.D., High Assurance Software Lab --- INESC TEC & Minho University[ expand ]
18:06 [Job][New]Research Fellow / Post-doc, Nanyang Technological University (NTU), Singapore[ expand ]
16:17 [Pub][ePrint]Multi-keyword Similarity Search Over Encrypted Cloud Data, by Mikhail Strizhov and Indrajit Ray[ expand ]
16:17 [Pub][ePrint]Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs, by Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. [ expand ]

23:11 [Job][New]Research Associate, Technische Universitaet Muenchen; Instiute for Security in Information Technology; Munich; Germany[ expand ]
22:17 [Pub][ePrint]Generalizing Efficient Multiparty Computation, by Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp[ expand ]
19:17 [Pub][ePrint]From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions, by Pierre Karpman[ expand ]
19:17 [Pub][ePrint]Private Computation on Encrypted Genomic Data, by Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig[ expand ]
19:17 [Pub][ePrint]Homomorphic Computation of Edit Distance, by Jung Hee Cheon and Miran Kim and Kristin Lauter[ expand ]
19:17 [Pub][ePrint]On Lightweight Stream Ciphers with Shorter Internal States, by Frederik Armknecht and Vasily Mikhalev[ expand ]
19:17 [Pub][ePrint]How to Bootstrap Anonymous Communication, by Sune K. Jakobsen and Claudio Orlandi[ expand ]
17:12 [Event][New]FSE: Fast Software Encryption[ expand ]
13:17 [Pub][ePrint]Block-wise Non-Malleable Codes, by Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay[ expand ]
13:17 [Pub][ePrint]Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro[ expand ]
13:17 [Pub][ePrint]Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes, by Ricardo Dahab and Steven Galbraith and Eduardo Morais[ expand ]
13:17 [Pub][ePrint]Perfect Structure on the Edge of Chaos, by Nir Bitansky and Omer Paneth and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Multilinear Pseudorandom Functions, by Aloni Cohen and Justin Holmgren[ expand ]
13:17 [Pub][ePrint]GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs, by Alexander Wild and Amir Moradi and Tim Güneysu[ expand ]
13:17 [Pub][ePrint]Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, by Dennis Hofheinz and Jessica Koch and Christoph Striecks[ expand ]
13:17 [Pub][ePrint]Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON, by Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xia[ expand ]
13:17 [Pub][ePrint]Multi-User Oblivious RAM Secure Against Malicious Servers, by Travis Mayberry and Erik-Oliver Blass and Guevara Noubir[ expand ]
13:17 [Pub][ePrint]Reconfigurable LUT: Boon or Bane for Secure Applications, by Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device, by Alexandre Duc and Sebastian Faust and Fran\\c{c}ois-Xavier Standaert[ expand ]

17:15 [Job][New]Full-time PhD or Postdoc positions in the area of Wireless Sensor Networks (WSN) Security , University of Mannheim, Germany[ expand ]

15:34 [Event][New]HSIPC'15: The Scientific World Journal: Special Issue on Physical Cryptanalysis[ expand ]
10:18 [Job][Update]Postdoc Positions in Cloud-Computing and Storage Security, IBM Research - Zurich[ expand ]
07:00 [Job][New]Ph.D., DOCOMO Communications Lab. Europe GmbH, Munich[ expand ]
04:17 [Pub][ePrint]Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
04:17 [Pub][ePrint]Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy, by Maciej Skorski[ expand ]
04:17 [Pub][ePrint]Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs, by Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallègue[ expand ]
04:17 [Pub][ePrint]Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors, by Muhammad Yasir Malik[ expand ]
04:17 [Pub][ePrint]Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue, by Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy[ expand ]
04:17 [Pub][ePrint]How to Compress Homomorphic Ciphertexts, by Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrède Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey[ expand ]
04:17 [Pub][ePrint]Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption, by Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura[ expand ]
04:17 [Pub][ePrint]The Multivariate Hidden Number Problem, by Steven D. Galbraith and Barak Shani[ expand ]
04:17 [Pub][ePrint]sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices, by Shijun Zhao and Qianying Zhang[ expand ]
04:17 [Pub][ePrint]TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM, by Lucjan Hanzlik and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
04:17 [Pub][ePrint]Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware, by Attila A. Yavuz and Jorge Guajardo[ expand ]
04:17 [Pub][ePrint]Provably weak instances of Ring-LWE, by Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange[ expand ]
04:17 [Pub][ePrint]Inner Product Masking Revisited, by Josep Balasch and Sebastian Faust and Benedikt Gierlichs[ expand ]

22:17 [Pub][ePrint]Weakening the Isolation Assumption of Tamper-proof Hardware Tokens, by Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges[ expand ]
22:17 [Pub][ePrint]Mergeable Functional Encryption, by Vincenzo Iovino and Karol Zebrowski[ expand ]
22:17 [Pub][ePrint]GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte, by Shay Gueron and Yehuda Lindell[ expand ]
22:17 [Pub][ePrint]Multi-Key Security: The Even-Mansour Construction Revisited, by Nicky Mouha and Atul Luykx[ expand ]
22:17 [Pub][ePrint]Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA, by Christian Wittke and Zoya Dyka and Peter Langendoerfer[ expand ]
22:17 [Pub][ePrint]Universally Composable Firewall Architectures using Trusted Hardware, by Dirk Achenbach and Jörn Müller-Quade and Jochen Rill[ expand ]
22:17 [Pub][ePrint]Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method, by Shantian Cheng and Juanyang Zhang[ expand ]
22:17 [Pub][ePrint]Surreptitiously Weakening Cryptographic Systems, by Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart[ expand ]
22:17 [Pub][ePrint]Meet in the Middle Attacks on Reduced Round Kuznyechik, by Riham AlTawy and Amr M. Youssef[ expand ]
22:17 [Pub][ePrint]Rotational Cryptanalysis of ARX Revisited, by Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld[ expand ]
22:17 [Pub][ePrint]Some New Results on Binary Polynomial Multiplication, by Murat Cenk and M. Anwar Hasan[ expand ]
22:17 [Pub][ePrint]Generalization of Statistical Criteria for Sboxes, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha[ expand ]
22:17 [Pub][ePrint]TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY, by Grasha Jacob, Dr. A. Murugan, Irine Viola[ expand ]
03:08 [PhD][New]Jerzy Jaworski[ expand ]
03:08 [PhD][New]Przemyslaw Sokolowski: Contributions to cryptanalysis: design and analysis of cryptographic hash functions[ expand ]

13:11 [Event][New]SECITC'15: 8th International Conference on Security for Information Technology & Comm.[ expand ]
05:37 [Event][New]MSPN�2015: International Conference on Mobile, Secure and Programmable Networking[ expand ]
05:37 [Event][New]MSPN’2015: International Conference on Mobile, Secure and Programmable Networking[ expand ]

13:07 [Event][New]WISTP'2015: The 9th WISTP International Conference on Information Security Theory and P[ expand ]

08:08 [Event][New]Summer School on Fully Homomorphic Encryption and Multi-Linear Maps[ expand ]

07:17 [Pub][ePrint]Related-Key Forgeries for Prøst-OTR, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel[ expand ]
07:17 [Pub][ePrint]Structural Evaluation by Generalized Integral Property, by Yosuke Todo[ expand ]
07:17 [Pub][ePrint]On the security margin of MAC striping, by Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt[ expand ]
06:26 [Job][New]Research Fellows (2 Openings), Cyber Security Researchers of Waikato (CROW), University of Waikato[ expand ]

10:17 [Pub][ePrint]Structural Weaknesses in the Open Smart Grid Protocol, by Klaus Kursawe and Christiane Peters[ expand ]
10:17 [Pub][ePrint]Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives, by David Derler and Christian Hanser and Daniel Slamanig[ expand ]
10:17 [Pub][ePrint]Practical Compact E-Cash with Arbitrary Wallet Size, by Patrick Märtens[ expand ]
10:17 [Pub][ePrint]On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, by Anne Canteaut and Joëlle Roué[ expand ]
10:17 [Pub][ePrint]On the Disadvantages of Pairing-based Cryptography, by Zhengjun Cao and Lihua Liu[ expand ]
10:17 [Pub][ePrint]Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme, by Massimo Chenal, Qiang Tang[ expand ]

13:13 [Job][New]Research scientist & post-doc, Advanced Digital Sciences Center, Singapore[ expand ]
13:10 [Job][New]Post-doctorate in Information and Network Security, The Information Security Centre of Excellence, University of New Brunswick, Fredericton, Canada[ expand ]
03:30 [Job][New]PostDoc on Vehicular Networking Security, Institute of Distributed Systems, Ulm University, Germany[ expand ]

14:30 [Event][New]ICISS 2015: 11th International Conference on Information Systems Security[ expand ]
07:17 [Pub][ePrint]On the Difficulty of Securing Web Applications using CryptDB, by İhsan Haluk AKIN and Berk Sunar[ expand ]
02:59 [Event][New]ECTCM 2015: Third International Workshop on Emerging Cyberthreats and Countermeasures[ expand ]
01:17 [Pub][ePrint]Amortizing Garbled Circuits, by Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff[ expand ]

22:17 [Pub][ePrint]The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group, by Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti[ expand ]
22:17 [Pub][ePrint]On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack, by Jiqiang Lu[ expand ]
22:17 [Pub][ePrint]Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters, by GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji[ expand ]
22:17 [Pub][ePrint]On the Existence and Constructions of Vectorial Boolean Bent Functions, by Yuwei Xu and Chuankun Wu[ expand ]
22:17 [Pub][ePrint]Fully Structure-Preserving Signatures and Shrinking Commitments, by Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi[ expand ]
22:17 [Pub][ePrint]Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds, by Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen[ expand ]
22:17 [Pub][ePrint]Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols, by Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt[ expand ]
14:23 [Job][New]Post-Doctoral Research Fellow Positions, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]
07:17 [Pub][ePrint]Oblivious Network RAM, by Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin[ expand ]
07:17 [Pub][ePrint]Non-Interactive Zero-Knowledge Proofs of Non-Membership, by Olivier Blazy and Céline Chevalier and Damien Vergnaud[ expand ]
07:17 [Pub][ePrint]Factoring N=p^r q^s for Large r and s, by Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun[ expand ]
07:17 [Pub][ePrint]The Sum Can Be Weaker Than Each Part, by Gaëtan Leurent and Lei Wang[ expand ]
02:22 [Event][New]WiSec 2015: The 8th ACM Conference on Security and Privacy in Wireless and Mobile Netwo[ expand ]
00:40 [Event][New]School on Design and Security of Cryptographic Algorithms and Devices[ expand ]

12:02 [Job][New]Postdoctoral Researcher Positions, New York University Abu Dhabi, Center for Interdisciplinary Studies in Security & Privacy (CRISSP)[ expand ]

05:58 [Job][New]Post-Doc, Newcastle University, UK[ expand ]

12:18 [Event][New]ISCISC 2015: 12th International ISC Conference on Information Security and Cryptology[ expand ]
12:15 [Job][New]Postdoc Positions in Cloud-Computing and Storage Security, IBM Research - Zurich[ expand ]
12:10 [Event][New]ACISP 2015: 20th Australasian Conference on Information Security and Privacy[ expand ]
02:11 [Job][New]Post-Doc, Université de Caen Basse-Normandie[ expand ]
02:11 [Job][New][ expand ]
02:04 [PhD][New]AbdelAlim Kamal Farag: Cryptanalysis and Secure Implementation of Modern Cryptographic Algorithms[ expand ]

20:18 [PhD][New]Benjamin Fuller: Strong Key Derivation from Noisy Sources[ expand ]
20:18 [PhD][Update]Jian Guo: Analysis of Cryptographic Hash Functions[ expand ]

13:17 [Pub][ePrint]On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks, by Benoît Cogliati and Yannick Seurin[ expand ]
13:17 [Pub][ePrint]A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, by Gregor Leander and Brice Minaud and Sondre Rønjom[ expand ]
13:17 [Pub][ePrint]An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting, by Susumu Kiyoshima[ expand ]
13:17 [Pub][ePrint]Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware, by Tobias Schneider and Amir Moradi and Tim Güneysu[ expand ]
13:17 [Pub][ePrint]A lightweight-friendly modifcation of GOST block cipher, by Andrey Dmukh and Denis Dygin and Grigory Marshalko[ expand ]
13:17 [Pub][ePrint]Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation, by Handan Kılınç and Alptekin Küpçü[ expand ]
13:17 [Pub][ePrint]CamlCrush: A PKCS\\#11 Filtering Proxy, by R. Benadjila and T. Calderon and M. Daubignard[ expand ]
08:06 [Event][New]ICISC 2015: 18th International Conference on Information Security and Cryptology[ expand ]

23:18 [Job][New]Assistant Professor, Kyushu University, Fukuoka (Japan)[ expand ]
23:18 [Job][New]Post-doctoral Researcher and Researcher positions, Microsoft Research, Redmond, Washington[ expand ]

23:16 [Event][New]C2SI-Berger2015: International Conference in Codes, Cryptology and Information Security[ expand ]
13:17 [Pub][ePrint]Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, by Yuval Yarom and Gefei Li and Damith C. Ranasinghe[ expand ]
13:17 [Pub][ePrint]More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries, by Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner[ expand ]
13:17 [Pub][ePrint]Verified Proofs of Higher-Order Masking, by Gilles Barthe and Sonia Bela\\\"id and Fran\\c{c}ois Dupressoir and Pierre-Alain Fouque and Benjamin Gr\\\'egoire and Pierre-Yves Strub[ expand ]
02:35 [Event][New]Cyber Security in the Critical Infrastructure: Advances and Future Direction[ expand ]
02:28 [Event][New]Cloud Cryptography: State of the Art and Recent Advances[ expand ]

23:57 [Job][New]1 PhD student, 2 Postdocs , Graz University of Technology[ expand ]
16:17 [Pub][ePrint]Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation, by Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam[ expand ]
16:17 [Pub][ePrint]Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems, by Berry Schoenmakers and Meilof Veeningen[ expand ]
16:17 [Pub][ePrint]Cold Boot Attacks in the Discrete Logarithm Setting, by Bertram Poettering and Dale L. Sibborn[ expand ]

02:17 [Job][New]2 x Lectureships (equivalent to assistant professor) in Security of Cyber-Physical Systems, Security Lancaster Research Centre, Lancaster University, UK[ expand ]

16:17 [Pub][ePrint]Better Algorithms for LWE and LWR, by Alexandre Duc and Florian Tramèr and Serge Vaudenay[ expand ]
16:17 [Pub][ePrint]Richer Efficiency/Security Trade-offs in 2PC, by Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek[ expand ]
16:17 [Pub][ePrint]Non-committing encryption from $\\Phi$-hiding, by Brett Hemenway and Rafail Ostrovsky and Alon Rosen[ expand ]

19:17 [Pub][ePrint]Tight Bounds for Keyed Sponges and Truncated CBC, by Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro[ expand ]
19:17 [Pub][ePrint]Interactive Message-Locked Encryption and Secure Deduplication, by Mihir Bellare and Sriram Keelveedhi[ expand ]
19:17 [Pub][ePrint]Improved Meet-in-the-Middle Distinguisher on Feistel Schemes, by Li Lin, Wenling Wu[ expand ]
19:17 [Pub][ePrint]Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability, by Carla Ràfols[ expand ]
19:17 [Pub][ePrint]On Solving Lpn using BKW and Variants, by Sonia Bogos and Florian Tramer and Serge Vaudenay[ expand ]
19:17 [Pub][ePrint]On Obfuscation with Random Oracles, by Ran Canetti and Yael Tauman Kalai and Omer Paneth[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Encryption Scheme from DDH, by Guilhem Castagnos and Fabien Laguillaumie[ expand ]

10:17 [Pub][ePrint]On the concrete hardness of Learning with Errors, by Martin R. Albrecht and Rachel Player and Sam Scott[ expand ]
10:17 [Pub][ePrint]Reliable Information Extraction for Single Trace Attacks, by Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall[ expand ]
10:17 [Pub][ePrint]Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms, by Binanda Sengupta and Abhijit Das[ expand ]
10:17 [Pub][ePrint]Group Signature with Deniability: How to Disavow a Signature, by Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka[ expand ]

09:23 [Event][New]GenoPri'15: 2nd International Workshop on Genome Privacy and Security[ expand ]

12:56 [Job][New]Post-Doc, AIT Austrian Institute of Technology[ expand ]

10:17 [Pub][ePrint]High Performance Lattice-based CCA-secure Encryption, by Rachid El~Bansarkhani and Johannes Buchmann[ expand ]
10:17 [Pub][ePrint]Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP, by Artur Mariano and Thijs Laarhoven and Christian Bischof[ expand ]
10:17 [Pub][ePrint]Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN, by Zahra Ahmadian and Sahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref[ expand ]
10:17 [Pub][ePrint]Type-Based Verification of Electronic Voting Protocols, by Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling[ expand ]

15:33 [Event][New]IEEE CNS 2015: 3rd IEEE Conference on Communications and Network Security[ expand ]
15:32 [Event][New]ARES: 10th International Conference on Availability, Reliability and Security[ expand ]
15:31 [Event][New]ECC: Workshop on Elliptic Curve Cryptography Standards[ expand ]
10:17 [Pub][ePrint]Aggregate Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]

19:17 [Pub][ePrint]Aggregatable Pseudorandom Functions and Connections to Learning, by Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol, by Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza [ expand ]
19:17 [Pub][ePrint]Faster software for fast endomorphisms, by Billy Bob Brumley[ expand ]
19:17 [Pub][ePrint]Cryptographically Secure CRC for Lightweight Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
19:17 [Pub][ePrint]Suit up! Made-to-Measure Hardware Implementations of Ascon, by Hannes Gro{\\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\\\"o}fer[ expand ]
19:17 [Pub][ePrint]On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks, by Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel[ expand ]

22:17 [Pub][ePrint]Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF, by Zvika Brakerski and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF, by Zvika Brakerski and Vinod Vaikuntanthan[ expand ]
19:17 [Pub][ePrint]Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence, by Kai-Min Chung and Rafael Pass[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Ascon, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
19:17 [Pub][ePrint]Predicate Encryption for Circuits from LWE, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
19:17 [Pub][ePrint]Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$), by Jeremy Maitin-Shepard[ expand ]
19:17 [Pub][ePrint]On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption, by Adam Smith and Ye Zhang[ expand ]
19:17 [Pub][ePrint]A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
19:17 [Pub][ePrint]Obfuscating Circuits via Composite-Order Graded Encoding, by Benny Applebaum and Zvika Brakerski[ expand ]
03:30 [Job][New]Post-Doc, Ph.D. student, University of Massachusetts Amherst[ expand ]

11:58 [Event][New]SPRO 2015: International Workshop on Software Protection[ expand ]
11:56 [Job][New]Ph.D in Information Security, University of Surrey, Guildford (UK)[ expand ]
10:17 [Pub][ePrint]Non-Abelian Analogs of Lattice Rounding, by Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan[ expand ]
10:17 [Pub][ePrint]Multilinear Maps Using Ideal Lattices without Encodings of Zero, by Gu Chunsheng[ expand ]
10:17 [Pub][ePrint]TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems, by Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang[ expand ]
10:17 [Pub][ePrint]Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification, by Xin Li[ expand ]
10:17 [Pub][ePrint]Simpler Efficient Group Signatures from Lattices, by Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang[ expand ]
10:17 [Pub][ePrint]Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds, by Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Meh[ expand ]
10:17 [Pub][ePrint]A linear attack on Kahrobaei-Lam-Shpilrain key exchange protocol, by Jintai Ding, Alexei Miasnikov, Alexander Ushakov[ expand ]
10:17 [Pub][ePrint]Simple Functional Encryption Schemes for Inner Products, by Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval[ expand ]
10:17 [Pub][ePrint]Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, by Yannis Rouselakis and Brent Waters[ expand ]
10:17 [Pub][ePrint]One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model, by Florian Bergsma, Tibor Jager, Jörg Schwenk[ expand ]
10:17 [Pub][ePrint]Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based, by San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]
10:17 [Pub][ePrint]Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification, by Nico Döttling[ expand ]
10:17 [Pub][ePrint]Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR, by Tancrède Lepoint and Mehdi Tibouchi[ expand ]
09:21 [Event][New]ICCC 2015: International Conference on Coding and Cryptography[ expand ]

22:17 [Forum][2014 Reports] Re: 2014/728 Unpicking PLAID response - Nit-Picking PLAID by tommaso.gagliardoni[ expand ]
22:17 [Forum][2014 Reports] 2014/728 Unpicking PLAID response - Nit-Picking PLAID by Graeme.Freedman[ expand ]
00:14 [Job][New]Lecturer, University of Wollongong[ expand ]

11:48 [Event][New]ESORICS 2015: 20th European Symposium on Research in Computer Security[ expand ]
10:17 [Pub][ePrint]Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications, by Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik D[ expand ]
10:17 [Forum][IACR Publication Reform] Re: 2014/728 Unpicking PLAID response - Nit-Picking PLAID by tommaso.gagliardoni[ expand ]
05:52 [Event][New]ProvSec'15: The Ninth International Conference on Provable Security[ expand ]

10:17 [Pub][ePrint]Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms, by Shengli Liu and Kenneth G. Paterson[ expand ]
10:17 [Pub][ePrint]Rig: A simple, secure and flexible design for Password Hashing, by Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya[ expand ]

13:17 [Pub][ePrint]Post-Quantum Secure Onion Routing (Future Anonymity in Today\'s Budget), by Satrajit Ghosh and Aniket Kate[ expand ]

19:17 [Pub][ePrint]Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure, by Tobias Pulls and Roel Peeters[ expand ]
19:17 [Pub][ePrint]Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions, by Jan Camenisch and Robert R. Enderlein and Gregory Neven[ expand ]
19:17 [Pub][ePrint]Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE), by Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren[ expand ]
10:17 [Pub][ePrint]Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs, by Carmit Hazay[ expand ]
10:17 [Pub][ePrint]Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security, by Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen[ expand ]
10:17 [Pub][ePrint]Characterization of MDS mappings, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
10:17 [Pub][ePrint]A note on the security of Higher-Order Threshold Implementations, by Oscar Reparaz[ expand ]

22:17 [Pub][ePrint]On the Cryptographic Hardness of Finding a Nash Equilibrium, by Nir Bitansky and Omer Paneth and Alon Rosen[ expand ]
13:17 [Pub][ePrint]Security Weaknesses of an Anonymous Attribute Based Encryption\" appeared in ASIACCS\'13, by Payal Chaudhari and Maniklal Das and Anish Mathuria[ expand ]
13:17 [Pub][ePrint]Simple Lattice Trapdoor Sampling from a Broad Class of Distributions, by Vadim Lyubashevsky and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Lattices with Symmetry, by H. W. Lenstra, Jr. and A. Silverberg[ expand ]
13:17 [Pub][ePrint]XPIRe: Private Information Retrieval for Everyone, by Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian[ expand ]
13:17 [Pub][ePrint]Cryptanalysis of a New Additive Homomorphic Encryption based on the co-ACD Problem, by Moon Sung Lee[ expand ]
13:17 [Pub][ePrint]How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search, by Nathan E. Price and Alan T. Sherman[ expand ]

16:17 [Pub][ePrint]Topology-Hiding Computation, by Tal Moran and Ilan Orlov and Silas Richelson[ expand ]

19:17 [Pub][ePrint]Tightly-Secure Signatures from Chameleon Hash Functions, by Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan[ expand ]
19:17 [Pub][ePrint]Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
19:17 [Pub][ePrint]Related-Key Differential Cryptanalysis of Reduced-Round ITUBee, by Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo[ expand ]
19:17 [Pub][ePrint]Algebraic Algorithms for LWE Problems, by Martin Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]

16:17 [Pub][ePrint]Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data, by Foteini Baldimtsi and Olga Ohrimenko[ expand ]

01:17 [Pub][ePrint]Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security, by GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL[ expand ]
01:17 [Pub][ePrint]Compact Accumulator using Lattices, by Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini[ expand ]
01:17 [Pub][ePrint]Double-and-Add with Relative Jacobian Coordinates, by Björn Fay[ expand ]
01:17 [Pub][ePrint]Computational Independence, by Björn Fay[ expand ]
01:17 [Pub][ePrint]The Boomerang Attacks on BLAKE and BLAKE2, by Yonglin Hao[ expand ]

19:17 [Pub][ePrint]Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay, by Alex Biryukov and Ivan Pustogarov[ expand ]
19:17 [Pub][ePrint]On Continuous After-the-Fact Leakage-Resilient Key Exchange, by Mohsen Toorani[ expand ]

17:10 [PhD][Update]Pascal Junod: Statistical cryptanalysis of block ciphers[ expand ]
17:08 [PhD][New][ expand ]
17:08 [PhD][New]Ludovic Perret: Algebraic and Combinatorial Tools for Public Key Cryptography[ expand ]
16:17 [Pub][ePrint][ expand ]
08:49 [Job][Update][ expand ]
07:17 [Pub][ePrint]DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS, by Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce[ expand ]
07:17 [Pub][ePrint]Fair Multiple-bank E-cash in the Standard Model, by Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li[ expand ]
07:17 [Pub][ePrint]Simple composition theorems of one-way functions -- proofs and presentations, by Jaime Gaspar and Eerke Boiten[ expand ]
07:17 [Pub][ePrint]A pure block chain based decentralized exchange., by Harsh Patel[ expand ]

07:10 [Event][New]SAC'15: Selected Areas in Cryptography 2015[ expand ]

16:41 [PhD][Update]Olivier Billet: Cryptologie multivariable[ expand ]

15:29 [Event][New]C2SI-berger2015: International Conference in "Codes, Cryptology and Information Security"[ expand ]

20:00 [PhD][New]Paul Camion[ expand ]
19:59 [PhD][New]Khaled Ouafi: Security and Privacy in RFID Systems[ expand ]
19:59 [PhD][New]Olivier Billet: Multivariate cryptology[ expand ]
19:57 [PhD][New][ expand ]
19:56 [PhD][New]Jacques Patarin: Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S.[ expand ]

18:00 [News]Call for IACR Cryptology School Proposals[ expand ]
15:09 [Event][New]RCD 2015: 3rd Romanian Cryptology Days Conference[ expand ]

05:08 [Pub][ePrint]ePrint surpasses 1000 papers in 2014[ expand ]
04:17 [Pub][ePrint]CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication, by Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Michael J. Freedman and Edward W. Felten[ expand ]
04:17 [Pub][ePrint]COFFE: Ciphertext Output Feedback Faithful Encryption, by Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel[ expand ]
04:17 [Pub][ePrint]Experiments in Encrypted and Searchable Network Audit Logs , by Bhanu Prakash Gopularam and Sashank Dara and Nalini N[ expand ]
04:17 [Pub][ePrint]Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE, by Xiaopeng Yang, Wenping Ma and Chengli Zhang[ expand ]
04:17 [Pub][ePrint]Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions, by Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri[ expand ]
04:17 [Pub][ePrint]First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA, by Yongdae Kim and Hyunsoo Yoon[ expand ]
04:17 [Pub][ePrint]Hierarchical deterministic Bitcoin wallets that tolerate key leakage, by Gus Gutoski and Douglas Stebila[ expand ]
04:17 [Pub][ePrint]Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM, by Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Sriniv[ expand ]
04:17 [Pub][ePrint]Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves, by Maike Massierer[ expand ]
04:17 [Pub][ePrint]Partial Garbling Schemes and Their Applications, by Yuval Ishai and Hoeteck Wee[ expand ]
04:17 [Pub][ePrint]Two novel applications of bilinear groups to ABE encryption, by Riccardo Longo and Chiara Marcolla and Massimiliano Sala[ expand ]
04:17 [Pub][ePrint]How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA, by Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer[ expand ]
04:17 [Pub][ePrint]Incentivized Outsourced Computation Resistant to Malicious Contractors, by Alptekin Kupcu[ expand ]
04:17 [Pub][ePrint]Constant Round Concurrent Zero-knowledge from Indistinguishability Obfuscation, by Kai-Min Chung and Huijia Lin and Rafael Pass[ expand ]
04:17 [Pub][ePrint]Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations, by Pille Pullonen and Sander Siim[ expand ]
04:17 [Pub][ePrint]Controlled Homomorphic Encryption: Definition and Construction, by Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti[ expand ]
04:17 [Pub][ePrint]Armadillo: a compilation chain for privacy preserving applications, by Sergiu Carpov and Paul Dubrulle and Renaud Sirdey[ expand ]
04:17 [Pub][ePrint]Cryptanalysis of Full PRIDE Block Cipher, by Yibin Dai and Shaozhen Chen[ expand ]
02:07 [PhD][Update]Vijayakrishnan Pasupathinathan: Hardware-based Identification and Authentication Systems[ expand ]
02:05 [PhD][Update]Mike Rosulek: The Structure of Secure Multi-Party Computation[ expand ]

19:53 [Job][New]Assistant Professor in Computer Science with Specialization in Computer Security, KTH Royal Institute of Technology[ expand ]
19:07 [Job][New]PhD Student, Worcester Polytechnic Institute, United States[ expand ]

17:15 [Job][New]Post-Doc, Université Libre de Bruxelles[ expand ]
06:09 [PhD][New]Sareh Emami: Security Analysis of Cryptographic Algorithms[ expand ]
06:07 [PhD][New]Anderson C. A. Nascimento: Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols[ expand ]
06:07 [PhD][New]Hideki Imai[ expand ]
06:04 [PhD][Update]Christophe Tartary: Authentication for Multicast Authentication[ expand ]

17:39 [Job][New]Postdoc, Microsoft Research[ expand ]

17:53 [Event][New]EUSIPCO: European Signal Processing Conference, Information Forensics and Security[ expand ]

18:59 [PhD][New][ expand ]
18:58 [PhD][New][ expand ]
18:57 [PhD][New]Miklos Santha[ expand ]
18:57 [PhD][Update]Henri Gilbert: Cryptanalyse des algorithmes de chiffrement symétrique[ expand ]
15:32 [Job][New]Ph.D. student and Post-Doc, University of Luxembourg[ expand ]
15:32 [Job][New]Postdoc, Saarland University, Germany[ expand ]
04:17 [Pub][ePrint]Related-Key Differential Attack on Round Reduced RECTANGLE-80, by Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma[ expand ]
04:17 [Pub][ePrint]Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement, by Bartosz Zoltak[ expand ]
04:17 [Pub][ePrint]Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel, by Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert[ expand ]
02:29 [PhD][New]Hassan Jameel Asghar: Design and Analysis of Human Identification Protocols[ expand ]
02:29 [PhD][New]Karine Heydemann[ expand ]
02:29 [PhD][Update]Nicolas Moro: Security of assembly programs against fault attacks on embedded processors[ expand ]

16:17 [Pub][ePrint]Publicly Verifiable Non-Interactive Arguments for Delegating Computation, by Omer Paneth and Guy N. Rothblum[ expand ]
16:17 [Pub][ePrint]A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors, by Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng[ expand ]
16:17 [Pub][ePrint]The Chaining Lemma and its application, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
16:17 [Pub][ePrint]Improved Differential Analysis of Block Cipher PRIDE, by Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma[ expand ]
16:17 [Pub][ePrint]Public Verification of Private Effort, by Giulia Alberini and Tal Moran and Alon Rosen[ expand ]
16:17 [Pub][ePrint]Outlier Privacy, by Edward Lui and Rafael Pass[ expand ]

15:21 [Job][New]PhD Student, ETH Zurich, Switzerland[ expand ]

15:24 [Job][New]Postdoc position, Royal Institute of Technology, Stockholm, Sweden[ expand ]

10:17 [Pub][ePrint]Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II, by Jeroen Delvaux and Dawu Gu and Roel Peeters and Ingrid Verbauwhede[ expand ]
10:17 [Pub][ePrint]Geppetto: Versatile Verifiable Computation, by Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur[ expand ]
10:17 [Pub][ePrint]Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
10:17 [Pub][ePrint]Non-Linearity and Affine Equivalence of Permutations, by P R Mishra, Indivar Gupta and N Rajesh Pillai[ expand ]
10:17 [Pub][ePrint]Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON, by Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma[ expand ]
07:00 [Job][New]Postdoc fellow, Zhejiang University City College[ expand ]
07:00 [Job][New]6 Ph.D. students and 2 Post-docs, Cosic, KU Leuven, Belgium[ expand ]

07:17 [Pub][ePrint]A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials, by Haining Fan[ expand ]
07:17 [Pub][ePrint]Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function, by Y. Wei and E. Pasalic and F. Zhang and W. Wu[ expand ]
07:17 [Pub][ePrint]Jackpot Stealing Information From Large Caches via Huge Pages, by Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
07:17 [Pub][ePrint]Privacy-Preserving Face Recognition with Outsourced Computation, by Can Xiang and Chunming Tang[ expand ]
07:17 [Pub][ePrint]Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments, by Jorge Munilla and Mike Burmester and Albert Peinado[ expand ]
07:17 [Pub][ePrint]A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy, by Maciej Skorski[ expand ]
07:17 [Pub][ePrint]Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms, by Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen[ expand ]

22:17 [Forum][IACR Publication Reform] 2014/728 Unpicking PLAID response - Nit-Picking PLAID by Graeme.Freedman[ expand ]
20:56 [Job][New]Security Engineer, ESCRYPT INC[ expand ]
20:54 [Event][New]PHDays: Positive Hack Days[ expand ]
05:54 [Event][New]QCrypt 2015: The 5th International Conference on Quantum Cryptography[ expand ]

16:07 [Event][New]CSF'15: 28th IEEE Computer Security Foundations Symposium[ expand ]
10:17 [Pub][ePrint]Predicate Encryption for Multi-Dimensional Range Queries from Lattices, by Romain Gay and Pierrick Méaux and Hoeteck Wee[ expand ]

22:17 [Pub][ePrint]Predicate Encryption for Multi-Dimensional Range Queries from Lattices, by Romain Gay and Pierrick M\\\'eaux and Hoeteck Wee[ expand ]
22:17 [Pub][ePrint]On two windows multivariate cryptosystem depending on random parameters, by Urszula Romańczuk-Polubiec, Vasyl Ustimenko[ expand ]
22:17 [Pub][ePrint]Malicious-Client Security in Blind Seer: A Scalable Private DBMS, by Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin[ expand ]
22:17 [Pub][ePrint]Solving Polynomial Systems with Noise over F_2: Revisited, by Zhenyu Huang and Dongdai Lin[ expand ]
22:17 [Pub][ePrint]When are Fuzzy Extractors Possible?, by Benjamin Fuller and Leonid Reyzin and Adam Smith[ expand ]
22:17 [Pub][ePrint]Non-Interactive Secure Multiparty Computation, by Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky[ expand ]
22:17 [Pub][ePrint]Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms, by Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent J[ expand ]
22:17 [Pub][ePrint]Authenticated Encryption: How Reordering can Impact Performance, by Basel Alomair[ expand ]
22:17 [Pub][ePrint]Black Box Separations for Differentially Private Protocols, by Dakshita Khurana and Hemanta K. Maji and Amit Sahai[ expand ]
22:17 [Pub][ePrint]Tamper Detection and Continuous Non-Malleable Codes, by Zahra Jafargholi and Daniel Wichs[ expand ]
22:17 [Pub][ePrint]On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme, by Constantin Catalin Dragan and Ferucio Laurentiu Tiplea[ expand ]
22:17 [Pub][ePrint]Algebraic Fault Analysis of Katan, by Frank Quedenfeld[ expand ]

07:54 [Event][New]CTCrypt 2015: 4th Workshop on Current Trends in Cryptology[ expand ]
07:54 [Event][New]CTCrypt'2015: 4th Workshop on Current Trends in Cryptology[ expand ]
07:53 [Event][New]CTCrypt?2015: 4th Workshop on Current Trends in Cryptology[ expand ]
07:42 [Event][New]Latincrypt 2015[ expand ]
07:40 [Job][New]two PhD positions, Luxembourg University[ expand ]

17:43 [Job][New]Cryptography Security Analyst, UK Security Lab[ expand ]
17:42 [Job][New]Junior professorship with tenure track in computer algebra, University of Ulm, Germany[ expand ]
10:17 [Pub][ePrint]The Related-Key Security of Iterated Even-Mansour Ciphers, by Pooya Farshim and Gordon Procter[ expand ]
10:17 [Pub][ePrint]Balanced Encoding to Mitigate Power Analysis: A Case Study, by Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye[ expand ]

22:01 [Conf][AC]Asiacrypt proceedings available[ expand ]
21:00 [Job][New]Post-Doc, University of Luxembourg[ expand ]
19:17 [Pub][ePrint]Modified Alternating Step Generators with Non-Linear Scrambler, by Robert Wicik and Tomasz Rachwalik and Rafał Gliwa[ expand ]
19:17 [Pub][ePrint]Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, by Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda[ expand ]

23:51 [Job][New]PhD students and Postdoctoral Fellowships in Post-Quantum Cryptography, University of Waterloo[ expand ]
13:17 [Pub][ePrint]Simplification/complication of the basis of prime Boolean ideal, by Alexander Rostovtsev and Anna Shustrova[ expand ]
13:17 [Pub][ePrint]Lattice Point Enumeration on Block Reduced Bases, by Michael Walter[ expand ]
13:17 [Pub][ePrint]The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
13:17 [Pub][ePrint]On a new fast public key cryptosystem, by Samir Bouftass.[ expand ]
13:17 [Pub][ePrint]Boomerang Attack on Step-Reduced SHA-512, by Hongbo Yu, Dongxia Bai[ expand ]
13:17 [Pub][ePrint]EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes, by Georg Fuchsbauer and Christian Hanser and Daniel Slamanig[ expand ]

19:17 [Pub][ePrint]HaTCh: Hardware Trojan Catcher, by Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk[ expand ]
19:17 [Pub][ePrint]Public-Coin Differing-Inputs Obfuscation and Its Applications, by Yuval Ishai, Omkant Pandey, Amit Sahai[ expand ]
19:17 [Pub][ePrint]Garbled RAM From One-Way Functions, by Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro[ expand ]
19:17 [Pub][ePrint]Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
19:17 [Pub][ePrint]Security Analysis of an Authentication Scheme Using Smart Cards, by Gaurav Tiwari and Amit K. Awasthi and Neha Shukla[ expand ]
19:17 [Pub][ePrint]Trapdoor Computational Fuzzy Extractors, by Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas[ expand ]
19:17 [Pub][ePrint]Analysis of Lewko-Sahai-Waters Revocation System , by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]Outsourcing Secure Two-Party Computation as a Black Box, by Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler[ expand ]
19:17 [Pub][ePrint]Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, by Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia[ expand ]

18:10 [Election]IACR election 2014 results[ expand ]

23:09 [Event][New]RFIDsec 2015: 11th Workshop on RFID Security[ expand ]

15:53 [Job][New]PhD Studentship in Security/Privacy, University College London[ expand ]
15:52 [Job][New]Visiting Post-Doc or Ph.D. student, Aalto University School of Science, Helsinki, Finland[ expand ]

16:17 [Pub][ePrint]Efficient Generic Zero-Knowledge Proofs from Commitments, by Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias[ expand ]
16:17 [Pub][ePrint]Certificateless Proxy Re-Encryption Without Pairing, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
16:17 [Pub][ePrint]Bicliques with Minimal Data and Time Complexity for AES (Extended Version $\\star$), by Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya[ expand ]
16:17 [Pub][ePrint]Cryptanalysis of JAMBU, by Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang[ expand ]

17:11 [Event][New]Lightweight Cryptography Workshop 2015[ expand ]
10:17 [Pub][ePrint]Immunizing Multilinear Maps Against Zeroizing Attacks, by Dan Boneh and David J. Wu and Joe Zimmerman[ expand ]
10:17 [Pub][ePrint]Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero, by Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai[ expand ]
10:17 [Pub][ePrint]Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices, by Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois[ expand ]

10:17 [Pub][ePrint]Physical functions : the common factor of side-channel and fault attacks ?, by Bruno Robisson and Hélène Le Bouder[ expand ]
03:52 [Event][New]WiSec 2015: 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks[ expand ]

17:50 [Event][New]FSP 2015: The 2015 International Workshop on Future Security and Privacy[ expand ]
13:17 [Pub][ePrint]Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results, by Keita Emura and Takuya Hayashi[ expand ]
13:17 [Pub][ePrint]Indistinguishability Obfuscation for Turing Machines with Unbounded Memory, by Venkata Koppula and Allison Bishop Lewko and Brent Waters[ expand ]
13:17 [Pub][ePrint]Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields, by Antoine Joux and Cécile Pierrot[ expand ]
13:17 [Pub][ePrint]New Cryptosystem Using The CRT And The Jordan Normal Form, by Hemlata Nagesh and Birendra Kumar Sharma[ expand ]
13:17 [Pub][ePrint]Differential Analysis of Block Ciphers SIMON and SPECK, by Alex Biryukov and Arnab Roy and Vesselin Velichkov[ expand ]

18:03 [Job][New]Post-Doc (Research Fellow), University of Birmingham[ expand ]
18:03 [Job][New]PhD student, Swedish Institute of Computer Science, Security Lab and Lund University[ expand ]
07:17 [Pub][ePrint]Batch NFS, by Daniel J. Bernstein and Tanja Lange[ expand ]
07:17 [Pub][ePrint]Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, by Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert[ expand ]
07:17 [Pub][ePrint]Experimenting with Shuffle Block Cipher and SMT Solvers, by Martin Stanek[ expand ]
07:17 [Pub][ePrint]Web Tap Payment Authentication and Encryption With Zero Customer Effort, by Henry Ng[ expand ]
07:17 [Pub][ePrint]The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically, by Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan[ expand ]

20:58 [Event][New]ACISP 2014: 20th Australasian Conference on Information Security and Privacy[ expand ]
17:32 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Arlington, VA[ expand ]

19:17 [Pub][ePrint]Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi[ expand ]
19:17 [Pub][ePrint]The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan[ expand ]
19:17 [Pub][ePrint]Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai[ expand ]
19:17 [Pub][ePrint]Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi[ expand ]
06:48 [Event][New]Asiacrypt: Asiacrypt 2016[ expand ]
06:48 [Event][New]Eurocrypt: Eurocrypt 2016[ expand ]
06:40 [Event][New]Asiacrypt: Asiacrypt 2015[ expand ]

13:17 [Pub][ePrint]Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri[ expand ]
13:17 [Pub][ePrint]A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman[ expand ]
13:17 [Pub][ePrint]Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao[ expand ]
13:17 [Pub][ePrint]Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro[ expand ]
13:17 [Pub][ePrint]Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro[ expand ]

13:17 [Pub][ePrint]Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol[ expand ]

13:17 [Pub][ePrint]Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\\\'e[ expand ]
01:17 [Pub][ePrint]Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv[ expand ]

22:46 [Event][New]Security of symmetric ciphers in network protocols[ expand ]
21:52 [Event][New]Genopri 2015: Genopri 2015 (2nd International Workshop on Genome Privacy and Security[ expand ]
03:17 [Pub][ePrint]How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz[ expand ]
00:17 [Pub][ePrint]Falcon Codes: Fast, Authenticated LT Codes, by Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos[ expand ]

16:43 [Event][New][Extension] SI Security and Privacy in Unified Communications[ expand ]
16:42 [Job][New]Principal Solution Specialist - Encryption, SafeNet [ expand ]
16:41 [Job][New]Post-Doc, Nanyang Technological University, Singapore[ expand ]
15:17 [Pub][ePrint]The Power of Negations in Cryptography, by Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen[ expand ]
00:17 [Pub][ePrint]A Practical Attack Against the HIVE Hidden Volume Encryption System, by Kenneth G. Paterson and Mario Strefler[ expand ]
00:17 [Pub][ePrint]Some Security Results of the RC4 + Stream Cipher, by Subhadeep Banik and Sonu Jha[ expand ]

15:17 [Pub][ePrint]Side Channel Power Analysis of an AES-256 Bootloader, by Colin O\'Flynn and Zhizhang Chen[ expand ]
15:17 [Pub][ePrint]A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme, by Eduardo Morais and Ricardo Dahab[ expand ]
15:17 [Pub][ePrint]Leveled Fully Homomorphic Signatures from Standard Lattices, by Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Efficiently Making Secure Two-Party Computation Fair, by Handan Kılınç and Alptekin Küpçü[ expand ]
15:17 [Pub][ePrint]Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion, by Kerry A. McKay and Poorvi L. Vora[ expand ]
15:17 [Pub][ePrint]THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS, by Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan[ expand ]
15:17 [Pub][ePrint]Advanced Algebraic Attack on Trivium, by Frank Quedenfeld and Christopher Wolf[ expand ]
15:17 [Pub][ePrint]Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014, by Georg Fuchsbauer[ expand ]
15:17 [Pub][ePrint]Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity, by Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures, by Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings, by Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]Distance Lower Bounding, by Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi[ expand ]
15:17 [Pub][ePrint]Hardware Implementation of Secure Shamir\'s Secret Sharing Scheme , by Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky[ expand ]
15:17 [Pub][ePrint]Accountable Storage, by Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia[ expand ]
15:17 [Pub][ePrint]Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, by Omar Choudary and Markus G. Kuhn[ expand ]
15:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack , by Pei Luo and Yunsi Fei[ expand ]

18:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]

21:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]
21:17 [Pub][ePrint]Obfuscation of Probabilistic Circuits and Applications, by Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan[ expand ]
21:17 [Pub][ePrint]Overview of the Candidates for the Password Hashing Competition -- And their Resistance against Garbage-Collector Attacks, by Stefan Lucks and Jakob Wenzel[ expand ]
21:17 [Pub][ePrint]Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective, by Joppe W. Bos and Michael Naehrig and Joop van de Pol[ expand ]
21:17 [Pub][ePrint]Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Protecting obfuscation against arithmetic attacks, by Eric Miles and Amit Sahai and Mor Weiss[ expand ]
18:17 [Pub][ePrint]CM55: special prime-field elliptic curves almost optimizing den Boer\'s reduction between Diffie-Hellman and discrete logs, by Daniel R. L. Brown[ expand ]
18:17 [Pub][ePrint]UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
16:08 [Event][New]DBSec 2015: 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]
16:02 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Corp, Arlington, VA[ expand ]
03:55 [News]Video of IACR Distinguished Lecture[ expand ]

18:38 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA- i_SW Corporation[ expand ]

17:20 [Event][New]CECC '15: 15th Central European Conference on Cryptology[ expand ]
06:17 [Pub][ePrint]Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES, by Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding[ expand ]

00:17 [Pub][ePrint]Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas[ expand ]

21:17 [Pub][ePrint]Bootstrapping for HElib, by Shai Halevi and Victor Shoup[ expand ]
21:17 [Pub][ePrint]Recent Results in Scalable Multi-Party Computation, by Jared Saia and Mahdi Zamani[ expand ]
21:17 [Pub][ePrint]An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov[ expand ]
21:17 [Pub][ePrint]Dynamic Behavior of RS latches using FIB processing and probe connection, by Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto[ expand ]
21:17 [Pub][ePrint]Exponent Blinding May Not Prevent Timing Attacks on RSA, by Werner Schindler[ expand ]
21:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions, by Ilan Komargodski and Gil Segev and Eylon Yogev[ expand ]
21:17 [Pub][ePrint]Random Oracle Uninstantiability from Indistinguishability Obfuscation, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Bj\\\"orn Tackmann and Daniele Venturi[ expand ]
21:17 [Pub][ePrint]Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation, by Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti[ expand ]
21:17 [Pub][ePrint]How to Choose Interesting Points for Template Attack More Effectively?, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng[ expand ]
21:17 [Pub][ePrint]A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation, by Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou[ expand ]
21:17 [Pub][ePrint]Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -, by Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts[ expand ]
21:17 [Pub][ePrint]Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın[ expand ]
21:17 [Pub][ePrint]Differential Factors: Improved Attacks on SERPENT, by Cihangir Tezcan and Ferruh Özbudak[ expand ]
21:17 [Pub][ePrint]Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system, by SK Hafizul Islam, G. P. Biswas[ expand ]
21:17 [Pub][ePrint]Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao[ expand ]
21:17 [Pub][ePrint]Pseudonymous Secure Computation from Time-Lock Puzzles, by Jonathan Katz and Andrew Miller and Elaine Shi[ expand ]
21:17 [Pub][ePrint]Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware, by Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou[ expand ]
20:56 [Job][New]PhD student, Chalmers University of Technology, Sweden[ expand ]
18:17 [Pub][ePrint]Relating Undisturbed Bits to Other Properties of Substitution Boxes, by Rusydi H. Makarim and Cihangir Tezcan[ expand ]
18:17 [Pub][ePrint]Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs, by Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli[ expand ]
18:17 [Pub][ePrint]Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătă[ expand ]
18:17 [Pub][ePrint]Faster ECC over $\\mathbb{F}_{2^{521}-1}$, by Robert Granger and Michael Scott[ expand ]
18:17 [Pub][ePrint]Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang[ expand ]
18:17 [Pub][ePrint]BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita[ expand ]
15:17 [Pub][ePrint]Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, by Nicolas T. Courtois and Pinar Emi[ expand ]
15:17 [Pub][ePrint]Reflections on Slide with a Twist Attacks, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
13:45 [Event][New]IWSEC 2015: The 10th International Workshop on Security[ expand ]

06:17 [Pub][ePrint]Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Michael Walfish and Victor Vu[ expand ]
03:17 [Pub][ePrint]Adaptively Secure Two-party Computation From Indistinguishability Obfuscation , by Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya[ expand ]
03:17 [Pub][ePrint]Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Antigoni Polychroniadou[ expand ]

16:33 [Event][New]SECITC '15: 8th Int'l Conference on Security for Information Technology&Communications[ expand ]
16:33 [Job][New]Postdoctoral Researcher (Drone Security), University College Cork, Ireland[ expand ]
15:17 [Pub][ePrint]Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator, by Jun Xu, Lei Hu, Zhangjie Huang[ expand ]
15:17 [Pub][ePrint]Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Constrained PRFs for Unbounded Inputs, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa[ expand ]
15:17 [Pub][ePrint]SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, by Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]An Improved Transformation between HILL and Metric Conditional Pseudoentropy, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism, by David Galindo and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation, by Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman[ expand ]
12:17 [Pub][ePrint]Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi[ expand ]

17:13 [Event][New]CS2 2015: Second Workshop on Cryptography and Security in Computing Systems[ expand ]

18:17 [Pub][ePrint]Requirements for Standard Elliptic Curves, by Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze[ expand ]
16:50 [Job][New]Post-Doc, Commissariat à l\'Energie Atomique (French DoE), Paris area, France[ expand ]
16:02 [News]IACR webserver no longer supports SSLv2 and SSLv3[ expand ]
03:18 [Event][New]CHES 2015: Cryptographic Hardware and Embedded Systems[ expand ]

17:44 [Election]IACR 2014 Election: Vote now![ expand ]

20:00 [Event][New]IEEE S&P 2015: IEEE Symposium on Security and Privacy[ expand ]
09:05 [Job][New]PhD Student, RMIT University, Melbourne, Australia[ expand ]

14:16 [Job][New]Post-Doc Fully Homomorphic Encryption, University of Bristol[ expand ]
12:17 [Pub][ePrint]Tweaks and Keys for Block Ciphers: the TWEAKEY Framework, by Jérémy Jean and Ivica Nikolić and Thomas Peyrin[ expand ]
12:17 [Pub][ePrint]Adaptively Secure UC Constant Round Multi-Party Computation Protocols, by Ivan Damgaard and Antigoni Polychroniadou and Vanishree Rao[ expand ]
12:17 [Pub][ePrint]Additively Homomorphic UC commitments with Optimal Amortized Overhead, by Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti[ expand ]
12:17 [Pub][ePrint]Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor\'s Algorithm, by Zhengjun Cao and Zhenfu Cao and Lihua Liu[ expand ]
09:38 [Job][Update]Tenure-Track Faculty Positions, Shanghai Jiao Tong University, Shanghai, China[ expand ]
09:34 [Job][New]Post Doc, Université de Caen Basse-Normandie[ expand ]

15:17 [Forum][2013 Reports] 2013/235 by Ben.Smyth[ expand ]
03:17 [Pub][ePrint]Interactive Coding for Interactive Proofs, by Yevgeniy Dodis and Allison Bishop Lewko[ expand ]
03:17 [Pub][ePrint]Learning with Errors in the Exponent, by Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert[ expand ]
03:17 [Pub][ePrint]Towards Optimal Bounds for Implicit Factorization Problem, by Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin[ expand ]
03:17 [Pub][ePrint]Accountable Tracing Signatures, by Markulf Kohlweiss and Ian Miers[ expand ]
03:17 [Pub][ePrint]On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries, by Rafael Dowsley and Anderson C. A. Nascimento[ expand ]
03:17 [Pub][ePrint]Ballot secrecy with malicious bulletin boards, by Ben Smyth[ expand ]
03:17 [Pub][ePrint]Non-malleable Reductions and Applications, by Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski[ expand ]
03:17 [Pub][ePrint]Operational Signature Schemes, by Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schroeder[ expand ]
03:17 [Pub][ePrint]Riding on Asymmetry: Efficient ABE for Branching Programs, by Sergey Gorbunov and Dhinakaran Vinayagamurthy[ expand ]
00:17 [Pub][ePrint]Circulant Matrices and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Optimized Karatsuba Squaring on 8-bit AVR Processors, by Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim[ expand ]
00:17 [Pub][ePrint]FHE Bootstrapping in less than a second, by Léo Ducas and Daniele Micciancio[ expand ]
00:17 [Pub][ePrint]A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves, by Palash Sarkar and Shashank Singh[ expand ]
00:17 [Pub][ePrint]Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing, by Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina[ expand ]
00:17 [Pub][ePrint]Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, by Dario Catalano and Dario Fiore[ expand ]
00:17 [Pub][ePrint]Search-and-compute on Encrypted Data, by Jung Hee Cheon and Miran Kim and Myungsun Kim[ expand ]
00:17 [Pub][ePrint]A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems, by Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae[ expand ]
00:17 [Pub][ePrint]Simulation-Based Secure Functional Encryption in the Random Oracle Model, by Vincenzo Iovino and Karol Zebrowski[ expand ]
00:17 [Pub][ePrint]Server-Aided Two-Party Computation with Simultaneous Corruption, by Ignacio Cascudo and Ivan Damgård and Samuel Ranellucci[ expand ]
00:17 [Pub][ePrint]Online/Off-line Ring Signature Scheme with Provable Security, by Jayaprakash Kar[ expand ]
00:17 [Pub][ePrint]Leakage-resilient non-malleable codes, by Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski[ expand ]
00:17 [Pub][ePrint]Summation polynomial algorithms for elliptic curves in characteristic two, by Steven D. Galbraith and Shishay W. Gebregiyorgis[ expand ]
00:17 [Pub][ePrint]Dual-System Simulation-Soundness with Applications to UC-PAKE and More, by Charanjit S. Jutla and Arnab Roy[ expand ]
00:17 [Pub][ePrint]Short Signatures from Homomorphic Trapdoor Functions, by Jacob Alperin-Sheriff[ expand ]

15:17 [Pub][ePrint]A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov[ expand ]
15:17 [Pub][ePrint]Physical Characterization of Arbiter PUFs, by Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich[ expand ]
15:17 [Pub][ePrint]Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties, by Georgi Ivanov and Nikolay Nikolov and Svetla Nikova[ expand ]
12:30 [Job][Update]Associate professor (lecturer) in Computer Security., University of Birmingham, UK[ expand ]
12:20 [Job][New]Tenure-Track Faculty Positions, Shanghai Jiao Tong University, Shanghai, China[ expand ]
06:17 [Pub][ePrint]Efficient Pairings and ECC for Embedded Systems, by Thomas Unterluggauer and Erich Wenger[ expand ]
06:17 [Pub][ePrint]Verifiable Random Functions from Weaker Assumptions, by Tibor Jager[ expand ]
06:17 [Pub][ePrint]Multi-Identity and Multi-Key Leveled FHE from Learning with Errors, by Michael Clear and Ciar\\\'{a}n McGoldrick[ expand ]
06:17 [Pub][ePrint]Tightly-Secure Authenticated Key Exchange, by Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li[ expand ]
06:17 [Pub][ePrint]Distributed Cryptography Based on the Proofs of Work, by Marcin Andrychowicz and Stefan Dziembowski[ expand ]
06:17 [Pub][ePrint]SPHINCS: practical stateless hash-based signatures, by Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Peter Schwabe a[ expand ]
06:17 [Pub][ePrint]Efficient Identity-Based Encryption over NTRU Lattices, by Léo Ducas and Vadim Lyubashevsky and Thomas Prest[ expand ]
06:17 [Pub][ePrint]Robust Authenticated-Encryption: AEZ and the Problem that it Solves, by Viet Tung Hoang and Ted Krovetz and Phillip Rogaway[ expand ]
06:17 [Pub][ePrint]Classification of the CAESAR Candidates, by Farzaneh Abed and Christian Forler and Stefan Lucks[ expand ]
06:17 [Pub][ePrint]Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof, by Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan[ expand ]
06:17 [Pub][ePrint]Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses, by Sarani Bhattacharya and Debdeep Mukhopadhyay[ expand ]

09:44 [Job][New]Associate professor (lecturer) in Computer Security., University of Birmingham, UK[ expand ]

23:53 [Event][New]DAC: Design Automation Conference - Hardware Software Security Track[ expand ]
23:53 [Event][New]COSADE 2015: 6th Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
09:23 [Event][New]5th Bar-Ilan Winter School on Cryptography: Advances in Practical MPC[ expand ]

15:25 [Job][New]Two full-time PhD or Postdoc positions in the area of Wireless Sensor Networks (WSN) Security, Universität Mannheim (Germany) and Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany)[ expand ]
13:29 [Job][New]4 Research Scientists, Temasek Laboratories at Nanyang Technological University, Singapore[ expand ]
06:17 [Pub][ePrint]Statistical Properties of the Square Map Modulo a Power of Two, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha[ expand ]
06:17 [Pub][ePrint]Tuning GaussSieve for Speed, by Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang[ expand ]
03:17 [Pub][ePrint]Another Tor is possible, by Amadou Moctar Kane[ expand ]
03:17 [Pub][ePrint]On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation, by Chun Guo and Dongdai Lin[ expand ]
03:17 [Pub][ePrint]Divisible E-Cash Made Practical, by Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré[ expand ]
03:17 [Pub][ePrint]Weak Instances of PLWE, by Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter[ expand ]
00:17 [Pub][ePrint]Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware, by Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian[ expand ]
00:17 [Pub][ePrint]Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis, by Raghavan Kumar and Philipp Jovanovic and Ilia Polian[ expand ]

12:52 [Event][New]SI Security and Privacy in Unified Communications: Challenges and Solutions[ expand ]

06:17 [Pub][ePrint]Simple-looking joint decoders for traitor tracing and group testing, by Boris Skoric[ expand ]
06:17 [Pub][ePrint]Deterministic Public-Key Encryption under Continual Leakage, by Venkata Koppula,Omkant Pandey,Yannis Rouselakis,Brent Waters[ expand ]
06:17 [Pub][ePrint]Implementing Cryptographic Program Obfuscation, by Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff[ expand ]
06:17 [Pub][ePrint]Anonymous IBE from Quadratic Residuosity with Improved Performance, by Michael Clear and Hitesh Tewari and Ciar\\\'{a}n McGoldrick[ expand ]

06:17 [Pub][ePrint](Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, by Koji Nuida and Kaoru Kurosawa[ expand ]

10:28 [Job][Update]Lecturer/Senior Lecturer (Chancellor\'s Fellowship), University of Strathclyde, UK[ expand ]
10:28 [Job][New]Lecturer/Senior Lecturer (Chancellor\'s Fellowship), University of Strathclyde, UK[ expand ]

06:17 [Pub][ePrint]Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation, by Artur Mariano, Shahar Timnat and Christian Bischof[ expand ]
06:17 [Pub][ePrint]Automated Analysis and Synthesis of Block-Cipher Modes of Operation, by Alex J. Malozemoff and Jonathan Katz and Matthew D. Green[ expand ]
06:17 [Pub][ePrint]Obfuscating Low-Rank Matrix Branching Programs, by Amit Sahai and Mark Zhandry[ expand ]
06:17 [Pub][ePrint]Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps, by Nuttapong Attrapadung[ expand ]
06:17 [Pub][ePrint]How to Obfuscate Programs Directly, by Joe Zimmerman[ expand ]
01:22 [Event][New]PASSWORDS '14: The 7th International Conference on Passwords, Norway[ expand ]

15:17 [Pub][ePrint]Succinct Randomized Encodings and their Applications, by Nir Bitansky and Sanjam Garg and Sidharth Telang[ expand ]
15:17 [Pub][ePrint]AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation, by Takaaki Mizuki and Yu-ichi Hayashi[ expand ]
15:17 [Pub][ePrint]Indistinguishability Obfuscation of Iterated Circuits and RAM Programs, by Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation, by Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu[ expand ]
15:17 [Pub][ePrint]Algebraic Attacks on Human Identification Protocols, by Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk[ expand ]
15:17 [Pub][ePrint]Succinct Garbling Schemes and Applications, by Huijia Lin and Rafael Pass[ expand ]
15:17 [Pub][ePrint]The Bitcoin Backbone Protocol: Analysis and Applications, by Juan Garay and Aggelos Kiayias and Nikos Leonardos[ expand ]
15:17 [Pub][ePrint]One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin, by Jens Groth and Markulf Kohlweiss[ expand ]
15:17 [Pub][ePrint]On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin clients, by Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]Access Control in Publicly Verifiable Outsourced Computation, by James Alderman and Carlos Cid and Jason Crampton and Christian Janson[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of Reduced-round SIMON32 and SIMON48, by Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo[ expand ]
14:42 [Job][New]Ph.D. student (3 positions), Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]

17:14 [PhD][New]Florian Legendre: Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques[ expand ]
12:08 [Event][New]ECC '15: 19th Workshop on Elliptic Curve Cryptography[ expand ]
09:17 [Pub][ePrint]Montgomery Modular Multiplication on ARM-NEON Revisited, by Hwajeong Seo, Zhe Liu, Johann Groschadl, Jongseok Choi, and Howon Kim[ expand ]
09:17 [Pub][ePrint]How to Efficiently Evaluate RAM Programs with Malicious Security, by Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek[ expand ]
09:17 [Pub][ePrint]Cryptographic Reverse Firewalls, by Ilya Mironov and Noah Stephens-Davidowitz[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Broadcast Encryption with Small System Parameters, by Mark Zhandry[ expand ]
09:17 [Pub][ePrint]Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates, by Samee Zahur and Mike Rosulek and David Evans[ expand ]
09:17 [Pub][ePrint]Computing Mod Without Mod, by Mark A. Will and Ryan K. L. Ko[ expand ]
09:17 [Pub][ePrint]Bilinear Entropy Expansion from the Decisional Linear Assumption, by Lucas Kowalczyk and Allison Bishop Lewko[ expand ]
09:17 [Pub][ePrint]Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication, by Alonso Gonzalez-Ulloa and Alejandro Hevia[ expand ]
09:17 [Pub][ePrint][ expand ]
09:17 [Pub][ePrint]Higher-Order Threshold Implementations, by Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
09:17 [Pub][ePrint]Hardware Trojan Horses in Cryptographic IP Cores, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage[ expand ]

11:33 [Job][New]postdoc and PhD student, Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland[ expand ]
09:17 [Pub][ePrint]Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations, by Mehmet Sabır Kiraz and Osmanbey Uzunkol[ expand ]
09:17 [Pub][ePrint]Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications, by Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma,[ expand ]
09:17 [Pub][ePrint]Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM, by Daniel E. Holcomb and Kevin Fu[ expand ]
09:17 [Pub][ePrint]Decoy-based information security, by Vladimir Shpilrain[ expand ]
09:17 [Pub][ePrint]Universal Signature Aggregators, by Susan Hohenberger and Venkata Koppula and Brent Waters[ expand ]
09:17 [Pub][ePrint]Sieving for shortest vectors in lattices using angular locality-sensitive hashing, by Thijs Laarhoven[ expand ]
09:17 [Pub][ePrint]Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security, by Benoit Libert and Marc Joye and Moti Yung and Thomas Peters[ expand ]
09:17 [Pub][ePrint]A survey of Fault Attacks in Pairing Based Cryptography, by Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes[ expand ]
09:17 [Pub][ePrint]Eliminating Leakage in Reverse Fuzzy Extractors, by André Schaller, Boris Skoric, Stefan Katzenbeisser[ expand ]

13:26 [Event][New]PETS: Privacy Enhancing Technologies Symposium[ expand ]
13:26 [Event][New]InTrust 2014: The 6th International conference on Trustworthy Computing[ expand ]

09:17 [Pub][ePrint]Non-existence of [n; 5] type Generalized Bent function., by Shashi Kant Pandey and P.R Mishra and B.K Dass[ expand ]
09:17 [Pub][ePrint]SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers, by Smile Markovski and Aleksandra Mileva and Vesna Dimitrova[ expand ]
09:17 [Pub][ePrint]A Very Compact FPGA Implementation of LED and PHOTON, by N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann[ expand ]

15:54 [Event][New]Summer school on real-world crypto and privacy[ expand ]

14:37 [PhD][New][ expand ]
14:37 [PhD][Update]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]

18:17 [Pub][ePrint]Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings, by SK Hafizul Islam and Abhishek Singh[ expand ]
00:17 [Pub][ePrint]Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function, by Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
00:17 [Pub][ePrint]Dealer-Leakage Resilient Verifiable Secret Sharing, by Ruxandra F. Olimid[ expand ]
00:17 [Pub][ePrint]S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?, by Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedr[ expand ]
00:17 [Pub][ePrint]Augmented Learning with Errors: The Untapped Potential of the Error Term, by Rachid El Bansarkhani and Özgür Dagdelen and Johannes Buchmann[ expand ]
00:17 [Pub][ePrint]Resizable Tree-Based Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass[ expand ]
00:17 [Pub][ePrint]Secure modular password authentication for the web using channel bindings, by Mark Manulis and Douglas Stebila and Nick Denham[ expand ]
00:17 [Pub][ePrint]Differentially Private Linear Algebra in the Streaming Model, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Faster Binary-Field Multiplication and Faster Binary-Field MACs, by Daniel J. Bernstein and Tung Chou[ expand ]
00:17 [Pub][ePrint]Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol, by Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and[ expand ]
00:17 [Pub][ePrint]The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves, by Benjamin Smith[ expand ]
00:17 [Pub][ePrint]CIARP: A RISC Processor For Cryptography Applications, by Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi[ expand ]
00:17 [Pub][ePrint]Efficient Software Implementation of Ring-LWE Encryption, by Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede[ expand ]

21:17 [Pub][ePrint]Protecting Encrypted Cookies from Compression Side-Channel Attacks, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
06:31 [Event][New]IoTPTS 2015: ASIACCS Workshop on IoT Privacy, Trust, and Security[ expand ]

21:17 [Pub][ePrint]Crypto-analyses on \"secure and efficient privacy-preserving public auditing scheme for cloud storage\", by Yalin Chen and Jue-Sam Chou*[ expand ]
18:17 [Pub][ePrint]Differential Cryptanalysis of SipHash, by Christoph Dobraunig and Florian Mendel and Martin Schläffer[ expand ]
18:17 [Pub][ePrint]On Shor\'s Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers, by Zhengjun Cao and Zhenfu Cao[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Constrained Pseudorandom Functions, by Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters[ expand ]
18:17 [Pub][ePrint]Bivariate Polynomials Modulo Composites and their Applications, by Dan Boneh and Henry Corrigan-Gibbs[ expand ]
18:17 [Pub][ePrint]Square Span Programs with Applications to Succinct NIZK Arguments, by George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss[ expand ]
18:17 [Pub][ePrint]How to Split a Secret into Unknown Shares, by Ruxandra F. Olimid[ expand ]
18:17 [Pub][ePrint]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment, by Amir Moradi[ expand ]
18:17 [Pub][ePrint]Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment\', by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]
18:17 [Pub][ePrint]A comprehensive empirical comparison of parallel ListSieve and GaussSieve, by Artur Mariano and Ozgur Dagdelen and Christian Bischof[ expand ]
09:18 [Job][New]Research Fellowship Scheme, Queen’s University Belfast, UK[ expand ]
07:44 [Pub]Proceedings of CHES 2014 available online[ expand ]

15:17 [Event][New]Eurocrypt 2015: Eurocrypt 2015[ expand ]
01:14 [Job][New]PhD Positions, Southern Illinois University Carbondale, USA[ expand ]

09:17 [Pub][ePrint]Co-Location-Resistant Clouds, by Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd[ expand ]
09:17 [Pub][ePrint]Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks, by Mohammad Wazid[ expand ]

09:17 [Pub][ePrint]New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\\mathbb{F}_2$, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle, by Yehuda Lindell[ expand ]
01:42 [Event][New]CPSS'15: 1st Cyber-Physical System Security Workshop[ expand ]

16:02 [News]President\'s message 9/2014[ expand ]
15:17 [PhD][New]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]
15:15 [PhD][New]Carolyn Whitnall: Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation[ expand ]

09:17 [Pub][ePrint]A Note on Quantum Security for Post-Quantum Cryptography, by Fang Song[ expand ]
09:17 [Pub][ePrint]Formal Treatment of Privacy-Enhancing Credential Systems, by Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen[ expand ]
09:17 [Pub][ePrint]Analysis Of Variance and CPA in SCA, by Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philipp[ expand ]
09:17 [Pub][ePrint]The Feasibility of Outsourced Database Search in the Plain Model, by Carmit Hazay and Hila Zarosim[ expand ]
09:17 [Pub][ePrint]Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lu[ expand ]
03:15 [Job][New]Ph.D. student in Theoretical Computer Science, CWI / University of Amsterdam[ expand ]

01:39 [PhD][Update][ expand ]

21:17 [Pub][ePrint]Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version), by Christina Boura and Mar\\\'ia Naya-Plasencia and Valentin Suder[ expand ]
21:17 [Pub][ePrint]HIMMO security, by Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Domingo Gomez-Perez and Jaime Gutierrez[ expand ]
21:17 [Pub][ePrint]A Fully Homomorphic Encryption Scheme with Better Key Size, by Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song[ expand ]
21:17 [Pub][ePrint]Linearity Measures for MQ Cryptography, by Simona Samardjiska and Danilo Gligoroski[ expand ]
21:17 [Pub][ePrint]Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques, by Benoit Feix and Hugues Thiebeauld[ expand ]
21:17 [Pub][ePrint]An Practical Iterative Side Channel Cube Attack on AES-128/256, by Erfan Aghaee and Majid Rahimi and Hamed Yusefi[ expand ]
21:17 [Pub][ePrint]Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures, by Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu[ expand ]

17:47 [Event][New]SCC '15: The Third International Workshop on Security in Cloud Computing[ expand ]
16:53 [Event][New]RWC2015: Real World Cryptography Workshop 2015[ expand ]
12:17 [Pub][ePrint]Security Proofs for the BLT Signature Scheme, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
12:17 [Pub][ePrint]Proof of Proximity of Knowledge, by Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Malicious Hashing: Eve\'s Variant of SHA-1, by Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
09:17 [Pub][ePrint]Optimal Proximity Proofs, by Ioana Boureanu and Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead, by Enrique Larraia[ expand ]
09:17 [Pub][ePrint]Integration of hardware tokens in the Idemix library, by Antonio de la Piedra[ expand ]
06:17 [Pub][ePrint]Efficient Interval Check in the Presence of Malicious Adversaries, by Genqiang Wu and Yeping He and Yi Lu and Liping Ding[ expand ]
06:17 [Pub][ePrint]Efficient Implementation of Keyless Signatures with Hash Sequence Authentication, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
06:17 [Pub][ePrint]Analytic Toolbox for White-Box Implementations: Limitation and Perspectives, by Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong[ expand ]
06:17 [Pub][ePrint]Reducing the Complexity of Normal Basis Multiplication, by Omer Egecioglu and Cetin Kaya Koc[ expand ]

17:02 [Event][New]ACNS'15: 13th International Conference on Applied Cryptography and Network Security[ expand ]
16:56 [Event][New]Crypto: Crypto 2016[ expand ]
16:56 [Event][New]Crypto: Crypto 2015[ expand ]
09:17 [Pub][ePrint]The Adjacency Graph of Some LFSRs, by Ming Li and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Bits Security of the CDH Problems over Finite Fields, by Mingqiang Wang and Tao Zhan and Haibin Zhang[ expand ]
07:12 [Event][New]ASK 2014: The Fourth Asian Workshop on Symmetric Key Cryptography - Cryptology School[ expand ]
07:03 [Event][New]School on Cryptographic Attacks[ expand ]

16:33 [Job][New]Ph.D. student or Post-Doc (cryptographic protocols and/or electronic voting), University of Trier, Germany[ expand ]
15:17 [Pub][ePrint]Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards, by Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers[ expand ]
15:17 [Pub][ePrint]Error-Tolerant Algebraic Side-Channel Attacks Using BEE, by Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao[ expand ]
15:17 [Pub][ePrint]A Unified Formalism for Physical Attacks, by Hélène Le Bouder , Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria[ expand ]

15:17 [Pub][ePrint]Improved Linear Cryptanalysis of Round Reduced SIMON, by Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram and Martin M. Lauridsen[ expand ]
15:17 [Pub][ePrint]Remarks on the Cryptographic Primitive of Attribute-based Encryption, by Zhengjun Cao and Lihua Liu[ expand ]
15:17 [Pub][ePrint]A Counterexample to the Chain Rule for Conditional HILL Entropy, by Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs[ expand ]

18:17 [Pub][ePrint]Attacks in Stream Ciphers: A Survey, by Gustavo Banegas[ expand ]
15:17 [Pub][ePrint]Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, by Zhen Liu and Zhenfu Cao and Duncan S. Wong[ expand ]
12:17 [Pub][ePrint]The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function, by Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang[ expand ]
00:17 [Pub][ePrint]Efficient RAM and control flow in verifiable outsourced computation, by Riad S. Wahby and Srinath Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish[ expand ]
00:17 [Pub][ePrint]How to Estimate the Success Rate of Higher-Order Side-Channel Attacks, by Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard[ expand ]
00:17 [Pub][ePrint]Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound, by Xiao Shaun Wang and T-H. Hubert Chan and Elaine Shi[ expand ]
00:17 [Pub][ePrint]SCORAM: Oblivious RAM for Secure Computation, by Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi[ expand ]

02:53 [Event][New]8th International Conference on Cryptology Africacrypt 2015[ expand ]
00:17 [Pub][ePrint]DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity, by Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis[ expand ]
00:17 [Pub][ePrint]On the Communication Complexity of Secure Function Evaluation with Long Output, by Pavel Hubacek and Daniel Wichs[ expand ]
00:17 [Pub][ePrint]Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation, by Ran Cohen and Yehuda Lindell[ expand ]
00:17 [Pub][ePrint]Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings, by Yehuda Lindell and Ben Riva[ expand ]
00:17 [Pub][ePrint]Fully Secure Functional Encryption without Obfuscation, by Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry[ expand ]
00:17 [Pub][ePrint]Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, by Julien Bringer and Claude Carlet and Hervé Chaba[ expand ]
00:17 [Pub][ePrint]On the Optimal Pre-Computation of Window $\\tau$NAF for Koblitz Curves, by William R. Trost and Guangwu Xu[ expand ]
00:17 [Pub][ePrint]Locally Decodable and Updatable Non-Malleable Codes and Their Applications, by Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
00:17 [Pub][ePrint]Outsourced Pattern Matching, by Sebastian Faust and Carmit Hazay and Daniele Venturi[ expand ]
00:17 [Pub][ePrint]One-Round Deniable Key Exchange with Perfect Forward Security, by Weiqiang Wen and Libin Wang and Min Xie[ expand ]

20:13 [Job][New]Cryptography Engineer, CloudFlare Inc.[ expand ]
15:28 [Event][New]TOC2014: RISC Seminar on Theory of Cryptography[ expand ]

15:02 [Job][New]Post-Doc, LORIA-CNRS, University of Lorraine, Nancy, France[ expand ]
14:33 [Job][Update]Doctoral Researcher in the collaborative research center CROSSING, Technische Universität Darmstadt, Germany[ expand ]
09:17 [Pub][ePrint]On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks\', by Ashok Kumar Das[ expand ]
09:17 [Pub][ePrint]Balanced permutations Even-Mansour ciphers, by Shoni Gilboa and Shay Gueron[ expand ]
09:17 [Pub][ePrint]The Multiple Number Field Sieve with Conjugation Method, by Cécile Pierrot[ expand ]
09:17 [Pub][ePrint]Revocation in Publicly Verifiable Outsourced Computation, by James Alderman and Carlos Cid and Jason Crampton and Christian Janson[ expand ]
09:17 [Pub][ePrint]Interactive Proofs under Continual Memory Leakage, by Prabhanjan Ananth and Vipul Goyal and Omkant Pandey[ expand ]
09:17 [Pub][ePrint]On the Primitivity of Trinomials over Small Finite Fields, by YUjuan Li and Jinhua Zhao and Huaifu Wang[ expand ]
09:17 [Pub][ePrint]A Class of FSRs and Their Adjacency Graphs, by Ming Li and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]On the cycle decomposition of the WG-NLFSR, by YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou[ expand ]
09:17 [Pub][ePrint]Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE, by Itai Dinur[ expand ]
09:17 [Pub][ePrint]Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms, by Bo Zhu and Xinxin Fan and Guang Gong[ expand ]
09:17 [Pub][ePrint]Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions, by Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay[ expand ]
09:17 [Pub][ePrint]Mersenne factorization factory, by Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra[ expand ]
09:17 [Pub][ePrint]A Dynamic Cube Attack on $105$ round Grain v1, by Subhadeep Banik[ expand ]
09:17 [Pub][ePrint]A note on CCA2-protected McEliece Cryptosystem with a systematic public key, by Pavol Zajac[ expand ]
09:17 [Pub][ePrint]Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model, by Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk[ expand ]
09:17 [Pub][ePrint]FPGA Trojans through Detecting and Weakening of Cryptographic Primitives, by Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar[ expand ]
09:17 [Pub][ePrint]An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\\gf_{2^{2k}}$ from the Inverse Function, by Xi Chen, Yazhi Deng, Min Zhu and Longjiang Qu[ expand ]
09:17 [Pub][ePrint]Universally Composable Secure Group Communication, by TIAN Youliang, PENG Changgen[ expand ]
09:17 [Pub][ePrint]High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems, by Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Dere[ expand ]
09:17 [Pub][ePrint]Graded Multilinear Maps from Lattices, by Craig Gentry and Sergey Gorbunov and Shai Halevi[ expand ]
09:17 [Pub][ePrint]Side Channel Attacks: Vulnerability Analysis of \\texttt{PRINCE} and \\texttt{RECTANGLE} using DPA, by Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai[ expand ]

18:47 [Event][New]ICITS 2015: 8th International Conference on Information Theoretic Security[ expand ]

03:14 [Event][New]DIMACS Workshop on The Mathematics of Post-Quantum Cryptography[ expand ]

03:47 [Event][New]Design and security of crypto algorithms and devices for real-world applications[ expand ]
03:28 [Event][New]Design and security of crypto algorithms and devices for real-world applic.[ expand ]

15:56 [Event][New]nullcon International Security Conference[ expand ]
03:17 [Pub][ePrint]Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines, by Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas[ expand ]
03:17 [Pub][ePrint]Pattern Matching Encryption, by Melissa Chase and Emily Shen[ expand ]
03:17 [Pub][ePrint]Generic Hardness of the Multiple Discrete Logarithm Problem, by Aaram Yun[ expand ]
03:17 [Pub][ePrint]Improved Timing Attacks on ECDSA, by Vikram Singh[ expand ]
03:17 [Pub][ePrint]Type 2 Structure-Preserving Signature Schemes Revisited, by Sanjit Chatterjee and Alfred Menezes[ expand ]
03:17 [Pub][ePrint]Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP, by Hongda Li, Qihua Niu, Guifang Huang[ expand ]
03:17 [Pub][ePrint]Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity, by Ran Canetti and Abhishek Jain and Omer Paneth[ expand ]
03:17 [Pub][ePrint]Verifiable Member and Order Queries on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia[ expand ]
03:17 [Pub][ePrint]Zipf\'s Law in Passwords, by Ding Wang, Gaopeng Jian, Haibo Cheng, Qianchen Gu, Chen Zhu, Ping Wang[ expand ]

23:42 [Election]IACR 2014 Election: Nominations open[ expand ]
21:17 [Pub][ePrint]Efficient Oblivious Parallel Array Reads and Writes for Secure Multiparty Computation, by Peeter Laud[ expand ]
21:17 [Pub][ePrint]Realizing two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger[ expand ]
21:17 [Pub][ePrint]An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency, by Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai[ expand ]
21:17 [Pub][ePrint]On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption, by Debrup Chakraborty and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs, by Daniel Genkin and Itamar Pipman and Eran Tromer[ expand ]
01:05 [Event][New]HOST '15: IEEE International Symposium on Hardware-Oriented Security and Trust[ expand ]

15:54 [Job][New]Postdoc position at the Center for the Theory of Interactive Computation (CTIC), Aarhus University[ expand ]
15:54 [Event][New]EEETEM2015: The International Conference on Electrical and Electronic Engineering Telec[ expand ]

02:17 [Event][New]DIPDMWC: The International Conference on Digital Information Processing, Data Mining[ expand ]

15:17 [Pub][ePrint]Pretty Understandable Democracy 2.0, by Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach[ expand ]

18:18 [Job][New]Security Architect, Nagravision, Cheseaux - Switzerland[ expand ]
00:17 [Pub][ePrint]Fully Secure Attribute Based Encryption from Multilinear Maps, by Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry[ expand ]
00:17 [Pub][ePrint]Privacy and Imperfect Randomness, by Yevgeniy Dodis and Yanqing Yao[ expand ]
00:17 [Pub][ePrint]Expressive and Secure Searchable Encryption in the Public Key Setting, by Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng[ expand ]
00:17 [Pub][ePrint]A Security Analysis of the Composition of ChaCha20 and Poly1305, by Gordon Procter[ expand ]
00:17 [Pub][ePrint]Nearly Practical and Privacy-Preserving Proofs on Authenticated Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
00:17 [Pub][ePrint]KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes, by Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao[ expand ]
00:17 [Pub][ePrint]The M3dcrypt Password Scheme, by Isaiah Makwakwa[ expand ]
00:17 [Pub][ePrint]THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER, by Mohammad Sadegh Nemati Nia, Ali Payandeh[ expand ]
00:17 [Pub][ePrint]Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender, by Florian Böhl and Simon Greiner and Patrik Scheidecker[ expand ]
00:17 [Pub][ePrint]Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe, by zhen Liu and Duncan S. Wong[ expand ]
00:17 [Pub][ePrint]Attribute-Based Encryption Optimized for Cloud Computing, by Máté Horváth[ expand ]
00:17 [Pub][ePrint]Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality, by Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ost[ expand ]
00:17 [Pub][ePrint](Nothing else) MATor(s): Monitoring the Anonymity of Tor\'s Path Selection, by Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi[ expand ]
00:17 [Pub][ePrint]Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation, by Shlomi Dolev and Niv Giboa and Ximing Li[ expand ]
00:17 [Pub][ePrint]Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation, by Craig Gentry[ expand ]

21:17 [Pub][ePrint]Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps, by Ferucio Laurentiu Tiplea and Constantin Catalin Dragan[ expand ]
21:17 [Pub][ePrint]Adding Controllable Linkability to Pairing-Based Group Signatures For Free, by Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer[ expand ]
21:17 [Pub][ePrint]A Multi-Function Provable Data Possession Scheme in Cloud Computing, by Xiaojun Yu and Qiaoyan Wen[ expand ]
21:17 [Pub][ePrint]On the Limits of Computational Fuzzy Extractors, by Kenji Yasunaga and Kosuke Yuzawa[ expand ]
21:17 [Pub][ePrint]SPOKE: Simple Password-Only Key Exchange in the Standard Model, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
21:17 [Pub][ePrint]Private Web Search with Constant Round Efficiency, by Heeyeon Joo and Myungsun Kim[ expand ]

15:17 [Pub][ePrint]Recursive Trees for Practical ORAM, by Tarik Moataz and Erik-Oliver Blass and Guevara Noubir[ expand ]
06:17 [Pub][ePrint]DTKI: a new formalized PKI with no trusted parties, by Jiangshan Yu and Vincent Cheval and Mark Ryan[ expand ]
06:17 [Pub][ePrint]A Cryptographic Study of Tokenization Systems, by Sandra D\\\'iaz-Santiago and Lil Mar\\\'ia Rodr\\\'iguez-Henr\\\'iquez and Debrup Chakraborty[ expand ]
06:17 [Pub][ePrint]Adaptive versus Static Security in the UC Model, by Ivan Damgård and Jesper Buus Nielsen[ expand ]

15:54 [Event][New]Inscrypt 2014: The 10th International Conference on Information Security and Cryptology[ expand ]

23:09 [Event][New]WCC 2015: The 9th International Workshop on Coding and Cryptography[ expand ]

17:28 [Event][New]CT-RSA 2015: RSA Conference 2015 Cryptographers' Track[ expand ]
16:59 [Job][New]Cryptography Engineer, Nagravision, Cheseaux - Switzerland[ expand ]
16:58 [Job][Update]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:58 [Job][New]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:57 [Event][New]EBECEGC2015: The International Conference on Electrical and Bio-medical Engineering, Cle[ expand ]

21:17 [Pub][ePrint]Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, by Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Garbled Circuits Without Privacy with Applications To Efficient Zero-Knowledge, by Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi[ expand ]
21:17 [Pub][ePrint]Strong Externalized Universal Composabilit / Generalized UC Revisited, by Jesper Buus Nielsen and Mario Strefler[ expand ]
21:17 [Pub][ePrint]Secure Fingerprint Identification of High Accuracy, by Marina Blanton and Siddharth Saraph[ expand ]
21:17 [Pub][ePrint]Scalable Zero Knowledge via Cycles of Elliptic Curves, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]

21:40 [Job][New]Ph.D. student, Department of Informatics, University of Bergen, Norway[ expand ]
00:17 [Pub][ePrint]Oblivious Parallel RAM, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]

13:39 [Job][Update]30+ Open Positions in Crypto & Security, NXP Semiconductors[ expand ]

21:42 [Event][New]TCC: Theoretical Cryptography Conference[ expand ]
21:17 [Pub][ePrint]Improved Exponential-time Algorithms for Inhomogeneous-SIS, by Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield[ expand ]
21:17 [Pub][ePrint]Multiprecision multiplication on AVR revisited, by Michael Hutter and Peter Schwabe[ expand ]
12:17 [Pub][ePrint]Compact and Side Channel Secure Discrete Gaussian Sampling, by Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede[ expand ]
12:17 [Pub][ePrint]Automated algebraic analysis of structure-preserving signature schemes, by Joeri de Ruiter[ expand ]

09:17 [Pub][ePrint]Authenticated Key Exchange from Ideal Lattices, by Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook[ expand ]
09:17 [Pub][ePrint]A Punctured Programming Approach to Adaptively Secure Functional Encryption, by Brent Waters[ expand ]
09:17 [Pub][ePrint]Non-interactive zero-knowledge proofs in the quantum random oracle model, by Dominique Unruh[ expand ]
09:17 [Pub][ePrint]An Algebraic Approach to Non-Malleability, by Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald[ expand ]
09:17 [Pub][ePrint]The SPEKE Protocol Revisited, by Feng Hao and Siamak F. Shahandashti[ expand ]
09:17 [Pub][ePrint]Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
09:17 [Pub][ePrint]Template Attacks Based On Priori Knowledge, by Guangjun Fan and Yongbin Zhou and Dengguo Feng[ expand ]
09:17 [Pub][ePrint]NSEC5: Provably Preventing DNSSEC Zone Enumeration, by Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv[ expand ]
09:17 [Pub][ePrint](Hierarchical) Identity-Based Encryption from Affine Message Authentication, by Olivier Blazy and Eike Kiltz and Jiaxin Pan[ expand ]

18:09 [Job][New]Research Associate, Faculty of Computer Science, University of New Brunswick, Fredericton, Canada[ expand ]
03:52 [Event][New]ICCICS2014: The International Conference on Cyber-Crime Investigation and Cyber Securit[ expand ]
03:52 [Event][New]EECEA2014: The International Conference on Electrical, Electronics, Computer Engineeri[ expand ]

09:57 [Job][New]Post-Doc, HASLab, INESC TEC, Braga, Portugal[ expand ]

15:17 [Pub][ePrint]The Hunting of the SNARK, by Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer[ expand ]
15:17 [Pub][ePrint]Scan Based Side Channel Attack on Grain v1, by Sonu Kumar Jha[ expand ]
13:35 [Event][New]COST Action IC1306 - School on Cryptographic Attacks[ expand ]

15:17 [Pub][ePrint]The Exact PRF-Security of NMAC and HMAC, by Peter Gazi and Krzysztof Pietrzak and Michal Rybár[ expand ]
15:17 [Pub][ePrint]Reducing Communication Overhead of the Subset Difference Scheme, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
15:17 [Pub][ePrint]Vernam Two, by Dan P. Milleville[ expand ]
15:17 [Pub][ePrint]Simple AEAD Hardware Interface (S{\\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]Security Analysis of Multilinear Maps over the Integers, by Hyung Tae Lee and Jae Hong Seo[ expand ]
15:17 [Pub][ePrint]A new public key system based on Polynomials over finite fields GF(2), by Gurgen Khachatrian[ expand ]
15:17 [Pub][ePrint]On the Optimality of Differential Fault Analyses on CLEFIA, by Juliane Krämer and Anke Stüber and Ágnes Kiss[ expand ]
15:17 [Pub][ePrint]How to manipulate curve standards: a white paper for the black hat, by Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\\\"ulsing and Tanja Lange and Ruben Niederhagen an[ expand ]
15:17 [Pub][ePrint]Deja Q: Using Dual Systems to Revisit q-Type Assumptions, by Melissa Chase and Sarah Meiklejohn[ expand ]

00:17 [Pub][ePrint]Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter[ expand ]

09:17 [Pub][ePrint]New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\\Sigma \\Pi$PKC, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai[ expand ]
09:17 [Pub][ePrint]Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz[ expand ]
01:45 [Event][New]FC '15: Financial Cryptography and Data Security 2015[ expand ]

18:17 [Pub][ePrint]Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker[ expand ]
06:29 [Event][New]NWC: National Workshop on Cryptology[ expand ]

18:17 [Pub][ePrint]A Security Definition for Multi Secret Sharing and a Scheme Based on LWE, by Massoud Hadian Dehkordi and Reza Ghasemi[ expand ]
06:16 [Job][New]Tenure Track Positions in Computer Eng, CS and IT, University of Washington, Tacoma[ expand ]

21:17 [Pub][ePrint]Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA, by Aleksandar Kircanski[ expand ]
21:17 [Pub][ePrint]hHB: a Harder HB+ Protocol, by Ka Ahmad Khoureich[ expand ]
21:17 [Pub][ePrint]Performance Increasing Approaches For Binary Field Inversion, by Vladislav Kovtun and Maria Bulakh[ expand ]
21:17 [Pub][ePrint]An Investigation of Some Forward Security Properties for PEKS and IBE, by Qiang Tang[ expand ]
21:17 [Pub][ePrint]Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Double shielded Public Key Cryptosystems, by Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang[ expand ]
21:17 [Pub][ePrint]Round-Efficient Black-Box Construction of Composable Multi-Party Computation, by Susumu Kiyoshima[ expand ]
15:17 [Pub][ePrint]Securing Cloud Data in the New Attacker Model, by Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]General Statistically Secure Computation with Bounded-Resettable Hardware Tokens, by Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges[ expand ]
15:17 [Pub][ePrint]On Virtual Grey Box Obfuscation for General Circuits, by Nir Bitansky and Ran Caentti and Yael Tauman-Kalai and Omer Paneth[ expand ]
15:17 [Pub][ePrint]A Simpler Variant of Universally Composable Security for Standard Multiparty Computation, by Ran Canetti and Asaf Cohen and Yehuda Lindell[ expand ]
15:17 [Pub][ePrint]Efficient Record-Level Keyless Signatures for Audit Logs, by Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards[ expand ]
09:17 [Pub][ePrint]Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation, by Daniel Augot and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Function-Private Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Gil Segev[ expand ]
09:17 [Pub][ePrint]New Attacks on the RSA Cryptosystem, by Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig[ expand ]
09:17 [Pub][ePrint]Implicit factorization of unbalanced RSA moduli, by Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin[ expand ]
09:17 [Pub][ePrint]Authentication Schemes Based on Resilient Maps, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]
09:17 [Pub][ePrint]Anonymous and Publicly Linkable Reputation Systems, by Johannes Blömer and Jakob Juhnke and Christina Kolb[ expand ]
09:17 [Pub][ePrint]Solving closest vector instances using an approximate shortest independent vectors oracle, by Chengliang Tian and Wei Wei and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Secure Mutual Testing Strategy for Cryptographic SoCs, by Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]A Practical Second-Order Fault Attack against a Real-World Pairing Implementation, by Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert[ expand ]
09:17 [Pub][ePrint]On the Multi-output Filtering Model and Its Applications, by Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu[ expand ]
09:17 [Pub][ePrint]EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor, by Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto[ expand ]
09:17 [Pub][ePrint]Optimized Architecture for AES, by Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey[ expand ]
09:17 [Pub][ePrint]Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption, by Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang[ expand ]
09:17 [Pub][ePrint]A Secure Cloud-based NFC Mobile Payment Protocol , by pardis pourghomi and muhammad qasim saeed and george ghinea[ expand ]

15:25 [Job][New][ expand ]

19:09 [Job][New]Lecturer and Reader (2 positions); PhD positions, The School of Informatics, University of Edinburgh, UK[ expand ]

16:55 [Job][Update]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
13:55 [Job][New]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
11:54 [Event][New]Security and Privacy in Unified Communications: Challenges and Solutions[ expand ]

13:32 [PhD][New][ expand ]

11:49 [Event][New]TrustED 2014: International Workshop on Trustworthy Embedded Devices[ expand ]

16:05 [Job][Update]Research Associate, University of New Brunswick, Fredericton, Canada[ expand ]
16:05 [Job][New][ expand ]
15:17 [Job][New][ expand ]
15:16 [Job][New]Full-Time PhD Position in Cryptographic Protocol Design, University of Twente, The Netherlands[ expand ]
08:40 [Event][New]Cryptography Summer School[ expand ]
08:34 [Event][New]AsiaCCS'15: 10th ACM Symposium on Information, Computer and Communications Security[ expand ]
08:06 [Event][New]FSE 2015: 22nd International Workshop on Fast Software Encryption[ expand ]

18:17 [Pub][ePrint]Constrained Verifiable Random Functions, by Georg Fuchsbauer[ expand ]
18:17 [Pub][ePrint]On Decomposition of an NFSR into a Cascade Connection of Two Smaller, by Tian Tian and Wen-Feng Qi[ expand ]
18:17 [Pub][ePrint]On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes, by Massimo Chenal and Qiang Tang[ expand ]

15:17 [Pub][ePrint]Differential Power Analysis of a McEliece Cryptosystem, by Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt[ expand ]
15:17 [Pub][ePrint]Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions, by Jaiganesh Balasundaram[ expand ]
09:17 [Pub][ePrint]On the Pitfalls of using Arbiter-PUFs as Building Blocks, by Georg T. Becker[ expand ]
09:17 [Pub][ePrint]Spatial Bloom Filters: Enabling Privacy in Location-aware Applications, by Paolo Palmieri and Luca Calderoni and Dario Maio[ expand ]
09:17 [Pub][ePrint]FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison, by Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap[ expand ]
09:17 [Pub][ePrint]Leakage-Resilient Signatures with Graceful Degradation, by Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel[ expand ]
09:17 [Pub][ePrint]Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups, by Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin[ expand ]

12:17 [Forum][2014 Reports] Re: 2014/377 by Boaz123[ expand ]
09:17 [Pub][ePrint]Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory, by Annelie Heuser and Olivier Rioul and Sylvain Guilley[ expand ]
09:17 [Pub][ePrint]Curve41417: Karatsuba revisited, by Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange[ expand ]
09:17 [Pub][ePrint]Differential Analysis on Block Cipher PRIDE, by Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong[ expand ]
09:17 [Pub][ePrint]Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice, by Chunming Tang and Yanfeng Q[ expand ]
09:17 [Pub][ePrint]Fully Secure and Fast Signing from Obfuscation, by Kim Ramchen and Brent Waters[ expand ]
09:17 [Pub][ePrint]Constrained Pseudorandom Functions: Verifiable and Delegatable, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model, by Susan Hohenberger and Venkata Koppula and Brent Waters[ expand ]

18:17 [Pub][ePrint]On powers of codes, by Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z\\\'emor[ expand ]
18:17 [Pub][ePrint]Realizing Pico: Finally No More Passwords!, by Jens Hermans and Roel Peeters[ expand ]
18:17 [Pub][ePrint]Cryptography from Compression Functions: The UCE Bridge to the ROM, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi[ expand ]
15:55 [Event][New]ICICS2014: The 16th International Conference on Information & Communications Security[ expand ]

21:17 [Pub][ePrint]On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards, by Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili[ expand ]
21:17 [Pub][ePrint]On the Connection between Leakage Tolerance and Adaptive Security, by Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel[ expand ]
21:17 [Pub][ePrint]On the Classification of Finite Boolean Functions up to Fairness, by Nikolaos Makriyannis[ expand ]
21:17 [Pub][ePrint]Ideal Social Secret Sharing Using Birkhoff Interpolation Method, by Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian[ expand ]

16:01 [Job][New]Post-Doc, Cryptolux, University of Luxembourg[ expand ]
06:17 [Pub][ePrint]RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data, by Noboru Kunihiro and Junya Honda[ expand ]

18:17 [Pub][ePrint]Rmind: a tool for cryptographically secure statistical analysis, by Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk[ expand ]
18:17 [Pub][ePrint]Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions, by Johannes Blömer and Gennadij Liske[ expand ]
18:17 [Pub][ePrint]A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher, by Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay[ expand ]
18:17 [Pub][ePrint]Privacy preserving delegated word search in the cloud, by Kaoutar Elkhiyaoui and Melek Onen and Refik Molva[ expand ]
18:17 [Pub][ePrint]Reversing Stealthy Dopant-Level Circuits, by Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino[ expand ]
07:34 [Event][New]ICIEIS2014: International Conference on Informatics Engineering and Information science[ expand ]

15:17 [Pub][ePrint]How to Generate and use Universal Parameters, by Dakshita Khurana and Amit Sahai and Brent Waters[ expand ]
10:10 [Event][New]ICISSP 2015: 1st International Conference on Information Systems Security and Privacy[ expand ]

00:17 [Pub][ePrint]A Provable Security Analysis of Intel\'s Secure Key RNG, by Thomas Shrimpton and R. Seth Terashima[ expand ]
00:17 [Pub][ePrint]Efficient Hidden Vector Encryption with Constant-Size Ciphertext, by Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo[ expand ]
00:17 [Pub][ePrint]What\'s the Gist? Privacy-Preserving Aggregation of User Profiles, by Igor Bilogrevic \\and Julien Freudiger \\and Emiliano De Cristofaro \\and Ersin Uzun[ expand ]
00:17 [Pub][ePrint]Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob, by Markku-Juhani O. Saarinen[ expand ]

21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Improved Short Lattice Signatures in the Standard Model, by Léo Ducas and Daniele Micciancio[ expand ]
21:17 [Pub][ePrint]Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer, by Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş[ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Hardness of k-LWE and Applications in Traitor Tracing, by San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld[ expand ]
21:17 [Pub][ePrint]Arithmetic on Abelian and Kummer Varieties, by David Lubicz and Damien Robert[ expand ]

21:12 [PhD][New]J. C. Migliore[ expand ]
21:12 [PhD][Update]Elisa Gorla: Lifting properties from the general hyperplane section of a projective scheme[ expand ]

15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Bootstrappable Identity-Based Fully Homomorphic Encryption, by Michael Clear and Ciar\\\'{a}n McGoldrick[ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge, by Dan Ding and Guizhen Zhu and Xiaoyun Wang[ expand ]
15:17 [Pub][ePrint]Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson[ expand ]
15:17 [Pub][ePrint]GGHLite: More Efficient Multilinear Maps from Ideal Lattices, by Adeline Langlois and Damien Stehle and Ron Steinfeld[ expand ]
15:17 [Pub][ePrint]Binary Elligator Squared, by Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Universally Composable Non-Interactive Key Exchange, by Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz[ expand ]
09:26 [Job][New]Software Security Engineer, CloudFlare Inc.[ expand ]

18:26 [PhD][New]San Ling[ expand ]
18:26 [PhD][Update]Lei Wei: Analysis of Iterated Block Ciphers[ expand ]
18:26 [PhD][New]Elisa Gorla[ expand ]
18:25 [PhD][New][ expand ]
18:25 [PhD][New][ expand ]
18:17 [Pub][ePrint]Towards a Unified Theory of Cryptographic Agents, by Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran[ expand ]
18:17 [Pub][ePrint]Even more practical secure logging: Tree-based Seekable Sequential Key Generators, by Giorgia Azzurra Marson and Bertram Poettering[ expand ]
18:17 [Pub][ePrint]Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks, by Benny Applebaum and Eyal Widder[ expand ]
18:17 [Pub][ePrint]Relaxed Two-to-one Recoding Schemes, by Omkant Pandey and Kim Ramchen and Brent Waters[ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint]Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key, by Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich[ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint][ expand ]
06:17 [Pub][ePrint]Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability, by Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin[ expand ]
06:17 [Pub][ePrint]PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption, by Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au[ expand ]