International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 [ 36 ] 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
2012-11-01
18:17 [Pub][ePrint]Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff, by Byoung-il Kim and Jin Hong[ expand ]


2012-10-31
10:21 [Event][New]SPW 2013: Twenty-first International Workshop on Security Protocols[ expand ]


2012-10-30
00:17 [Pub][JoC]FlipIt: The Game of “Stealthy Takeover”[ expand ]


2012-10-29
15:17 [Pub][ePrint]On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting, by Marina Blanton and Mehrdad Aliasgari[ expand ]
15:17 [Pub][ePrint]Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials\'\' Problem, by Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber[ expand ]
15:17 [Pub][ePrint]Quantum-Secure Message Authentication Codes, by Dan Boneh and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]Candidate Multilinear Maps from Ideal Lattices and Applications, by Sanjam Garg and Craig Gentry and Shai Halevi[ expand ]
15:17 [Pub][ePrint]A New Approach to Discrete Logarithm Problem with Auxiliary Inputs, by Taechan Kim and Jung Hee Cheon[ expand ]
08:26 [Event][New]ISCTURKEY: International Conference on Information Security and Cryptology[ expand ]
08:25 [Event][New]ICIA2013: The Second International Conference on Informatics & Applications[ expand ]


2012-10-27
00:17 [Pub][JoC]A One-Time Stegosystem and Applications to Efficient Covert Communication[ expand ]



2012-10-26
15:17 [Pub][ePrint]Secure Outsourced Attribute-Based Signatures, by Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo[ expand ]


2012-10-25
15:17 [Pub][ePrint]Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps, by Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani[ expand ]
15:17 [Pub][ePrint]Attribute-Based Encryption for Circuits from Multilinear Maps, by Amit sahai and Brent Waters[ expand ]
15:17 [Pub][ePrint]Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers, by Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
15:17 [Pub][ePrint]An Efficient Three-Party Authenticated Key Exchange Protocol for Mobile-Commerce Environments Using Elliptic Curve Cryptography, by Nishant Doshi[ expand ]
15:17 [Pub][ePrint]A Novel Approach for RSA-based Certificateless Signature Scheme, by Nishant Doshi[ expand ]
15:17 [Pub][ePrint]Breaking Public Keys - How to Determine an Unknown RSA Public Modulus, by Hans-Joachim Knobloch[ expand ]
15:17 [Pub][ePrint]The LED Block Cipher, by Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw[ expand ]
15:17 [Pub][ePrint]Some observations to speed the polynomial selection in the number field sieve, by Min Yang, Qingshu Meng, Zhangyi Wang, Huanguo Zhang[ expand ]
15:17 [Pub][ePrint]Taking proof-based verified computation a few steps closer to practicality (extended version), by Srinath Setty and Victor Vu and Benjamin Braun and Andrew J. Blumberg and Michael Walfish[ expand ]
15:17 [Pub][ePrint]A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA, by Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj[ expand ]
15:17 [Pub][ePrint]Evaluating User Privacy in Bitcoin, by Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes, by Oriol Farras and Carles Padro[ expand ]
15:17 [Pub][ePrint]Improved Impossible Differential Attack on Reduced Version of Camellia-192/256, by Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li[ expand ]
15:17 [Pub][ePrint]Leakage-Resilient Cryptography from Minimal Assumptions, by Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Collecting Data while Preserving Individuals\' Privacy: A Case Study, by Alexis Bonnecaze and Robert Rolland[ expand ]
15:17 [Pub][ePrint]A note on invariant linear transformations in multivariate public key cryptography, by Andreas Wiemers[ expand ]
15:17 [Pub][ePrint]How to Garble RAM Programs, by Steve Lu and Rafail Ostrovsky[ expand ]


2012-10-23
12:35 [Event][New]ICT-EurAsia 2013: Information Communication Technology-Eurasia Conference 2013[ expand ]
05:41 [Job][New]Senior Cryptographic Systems Engineer - 35824 - , Raytheon, Goleta, CA, US[ expand ]


2012-10-22
06:15 [Event][New]FSE 2010: The 17th International Workshop on Fast Software Encryption[ expand ]



2012-10-20
19:12 [Job][New]Postdoctoral Researcher, Department of Computer Science, University of Helsinki[ expand ]


2012-10-18
00:17 [Pub][JoC]A Note on Constant-Round Zero-Knowledge Proofs of Knowledge[ expand ]


2012-10-16
18:17 [Pub][ePrint]Symbolic computation in block cipher with application to PRESENT, by Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang[ expand ]
15:17 [Pub][ePrint]Nanoelectronic Solutions for Hardware Security, by Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki[ expand ]
15:17 [Pub][ePrint]New Constructions and Proof Methods for Large Universe Attribute-Based Encryption, by Yannis Rouselakis and Brent Waters[ expand ]
15:17 [Pub][ePrint]Using Randomizers for Batch Verification of ECDSA Signatures, by Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury[ expand ]
15:17 [Pub][ePrint]On the security of two smart-card-based remote user authentication schemes for WSN, by Ding Wang and Chun-guang Ma[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the OKH Authenticated Encryption Scheme, by Peng Wang and Wenling Wu and Liting Zhang[ expand ]
15:17 [Pub][ePrint]Defending Against the Unknown Enemy: Applying FlipIt to System Security, by Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandop[ expand ]
15:17 [Pub][ePrint]Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? , by Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]A Framework for Unique Ring Signatures, by Matthew Franklin and Haibin Zhang[ expand ]
15:17 [Pub][ePrint]Concurrent Signatures without Random Oracles, by Xiao Tan and Qiong Huang and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]SHADE: Secure HAmming DistancE computation from oblivious transfer, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
15:17 [Pub][ePrint]ON PROVABLY SECURE CODE-BASED SIGNATURE AND SIGNCRYPTION SCHEME, by Preetha Mathew K and Sachin Vasant and C Pandu Rangan[ expand ]
15:17 [Pub][ePrint]Quantitative Analysis of the Full Bitcoin Transaction Graph, by Dorit Ron and Adi Shamir[ expand ]
05:35 [Event][New]ICEND 2013: 2nd International Conference on e-Technologies and Networks for Development[ expand ]


2012-10-15
19:49 [Event][New]Africacrypt 2013[ expand ]
02:41 [Event][New]NSS 2013: The 7th International Conference on Network and System Security (NSS 2013)[ expand ]
02:41 [Event][New]ICICS 2013: The 4th International Conference on Information and Communication Systems[ expand ]



2012-10-14
15:17 [Pub][ePrint]On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption, by Divya Gupta and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Improved side channel attack on the block cipher NOEKEON, by Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang[ expand ]
15:17 [Pub][ePrint]Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock , by Hadi Soleimany[ expand ]
15:17 [Pub][ePrint]Quantum algorithm for the discrete logarithm problem for matrices over finite group rings, by A. D. Myasnikov and A. Ushakov[ expand ]
15:17 [Pub][ePrint]On the Power of Random Oracles, by Iftach Haitner and Eran Omri and Hila Zarosim[ expand ]


2012-10-07
21:17 [Pub][ePrint]Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications, by San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang[ expand ]
21:17 [Pub][ePrint]On Transaction Pseudonyms with Implicit Attributes, by Stefan G. Weber[ expand ]
21:17 [Pub][ePrint]Leakage Squeezing of Order Two, by Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi[ expand ]
21:17 [Pub][ePrint]Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes, by Joep de Groot and Boris Skoric and Niels de Vreede and Jean-Paul Linnartz[ expand ]
21:17 [Pub][ePrint]Packed Ciphertexts in LWE-based Homomorphic Encryption, by Zvika Brakerski and Craig Gentry and Shai Halevi[ expand ]
21:17 [Pub][ePrint]Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing, by Mihir Bellare and Viet Tung Hoang and Phillip Rogaway[ expand ]
21:17 [Pub][ePrint]Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions, by Kai-Min Chung and Huijia Lin and Rafael Pass[ expand ]


2012-10-04
20:25 [Event][New]HOST: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST[ expand ]


2012-10-03
17:11 [News]SHA-3 Winner: Keccak[ expand ]
14:53 [Event][New]LightSec 2013: International Workshop on Lightweight Cryptography for Security & Privacy[ expand ]



2012-10-02
15:17 [Pub][ePrint]Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
15:17 [Pub][ePrint]An Attack on a Fully Homomorphic Encryption Scheme, by Hu Yupu, Wang Fenghe[ expand ]
14:26 [Job][New]Postdoc, EPFL, Lausanne, Switzerland[ expand ]
14:26 [Job][New]PhD student, EPFL, Lausanne, Switzerland[ expand ]
09:05 [Event][New]ECRYPT II AES Day[ expand ]
07:01 [Job][Update]Tenure track Assistant Professor, Digital Security, Radboud University Nijmegen[ expand ]
05:35 [Job][New]Post-doctoral Researcher, Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK[ expand ]
05:35 [Job][New]Faculty Members, Indian Statistical Institute, Kolkata[ expand ]


2012-09-30
03:17 [Pub][ePrint]Computational Soundness of Coinductive Symbolic Security under Active Attacks, by Mohammad Hajiabadi, Bruce M. Kapron[ expand ]
03:17 [Pub][ePrint]Plaintext Awareness in Identity-Based Key Encapsulation, by Mark Manulis and Bertram Poettering and Douglas Stebila[ expand ]
03:17 [Pub][ePrint]Domain-Specific Pseudonymous Signatures for the German Identity Card, by Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler[ expand ]
03:17 [Pub][ePrint]PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version), by Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rozic, Ahmad-Reza Sadeg[ expand ]


2012-09-28
05:29 [Election]List of Candidates[ expand ]


2012-09-27
15:17 [Pub][ePrint]Resource-based Corruptions and the Combinatorics of Hidden Diversity, by Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung[ expand ]
15:17 [Pub][ePrint]New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation, by Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Am[ expand ]
15:17 [Pub][ePrint]Security weakness in the Proof of Storage with Deduplication, by Youngjoo Shin, Junbeom Hur, Kwangjo Kim[ expand ]
15:17 [Pub][ePrint]Bellcore attack in practice, by Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos[ expand ]
15:17 [Pub][ePrint]Provably Secure Concurrent Error Detection Against Differential Fault Analysis, by Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri[ expand ]



2012-09-26
05:31 [Event][New]CCH: 14th Cryptologic History Symposium[ expand ]
05:12 [Job][New]Senior Principal Engineer- Secure Hardware Design , Cryptography Research Inc. (CRI) San Francisco, California[ expand ]
05:12 [Job][New]Senior Member Technical Staff II-Security Engineering, Cryptography Research Inc. (CRI) San Francisco,California[ expand ]


2012-09-24
06:17 [Pub][ePrint]Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists, by Liangze Li and Hongfeng Wu and Fan Zhang[ expand ]


2012-09-22
15:17 [Pub][ePrint]Rotational cryptanalysis of round-reduced Keccak, by Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny[ expand ]
15:17 [Pub][ePrint]Dynamic Proofs of Retrievability via Oblivious RAM, by David Cash and Alptekin Kupcu and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Faster batch forgery identification, by Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk[ expand ]
15:17 [Pub][ePrint]New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments, by Helger Lipmaa and Bingsheng Zhang[ expand ]
15:17 [Pub][ePrint]Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity, by Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta[ expand ]


2012-09-20
12:17 [Pub][ePrint]Enhanced Chosen-Ciphertext Security and Applications, by Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O\'Neill[ expand ]
12:17 [Pub][ePrint]Salus: A System for Server-Aided Secure Function Evaluation, by Seny Kamara and Payman Mohassel and Ben Riva[ expand ]
12:17 [Pub][ePrint]2048XKS - A Software Oriented High Security Block Cipher, by Dieter Schmidt[ expand ]
12:17 [Pub][ePrint]A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms, by Ga Won Lee and Jin Hong[ expand ]
12:17 [Pub][ePrint]Efficient Implementation of RSA Algorithm with MKE, by Sami A. Nagar and Dr. Saad Alshamma[ expand ]
12:17 [Pub][ePrint]Private Top-k Aggregation Protocols, by Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim[ expand ]
12:17 [Pub][ePrint]A Versatile Multi-Input Multiplier over Finite Fields, by Haibo Yi, Shaohua Tang[ expand ]
12:17 [Pub][ePrint]Differential Analysis of the LED Block Cipher, by Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici[ expand ]
09:17 [Pub][ePrint]A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Gr{\\o}stl, by Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki[ expand ]
09:17 [Pub][ePrint]A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes, by Maura B. Paterson and Douglas R. Stinson[ expand ]
09:17 [Pub][ePrint]Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems, by Thijs Laarhoven and Joop van de Pol and Benne de Weger[ expand ]
09:17 [Pub][ePrint]Pairing computation on Edwards curves with high-degree twists, by Liangze Li and Hongfeng Wu and Fan Zhang[ expand ]
09:17 [Pub][ePrint]Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens, by Özgür Dagdelen and Marc Fischlin[ expand ]
09:17 [Pub][ePrint]Secret Sharing and Secure Computing from Monotone Formulae, by Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen[ expand ]
06:59 [Event][New]DIMACS Workshop on Information-Theoretic Network Security[ expand ]
06:59 [Event][New]3rd Bar-Ilan Winter School on Crypto: Bilinear Pairings in Cryptography[ expand ]
06:58 [Job][New]two PhD positions, University of Luxembourg[ expand ]
06:57 [Job][New]Tenure track Assistant Professor, Digital Security, Radboud University Nijmegen[ expand ]



2012-09-15
00:17 [Pub][JoC]Enhancements of Trapdoor Permutations[ expand ]


2012-09-12
21:47 [Election]Nomination now open[ expand ]


2012-09-11
16:48 [Event][New]MCCCC26: 26th Midwest Conference on Combinatorics, Cryptography and Computing[ expand ]
16:47 [Event][New]JSC: Journal of Symbolic Computation[ expand ]
16:46 [Event][New]ICIEIS2013: The Second International Conference on Informatics Engineering & Informatio[ expand ]
16:45 [Job][New]Post-Doc in Security and Privacy, Saarland University, Germany[ expand ]
16:45 [Job][New]PhD Studentship in Zero-Knowledge Proofs, University College London, United Kingdom[ expand ]


2012-09-10
00:17 [Pub][JoC]An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers[ expand ]



2012-09-08
15:17 [Pub][ePrint]Dynamic Searchable Symmetric Encryption, by Seny Kamara and Charalampos Papamanthou and Tom Roeder[ expand ]
15:17 [Pub][ePrint]PRINCE- A Low-latency Block Cipher for Pervasive Computing Applications (Full version), by Julia Borghoff and Anne Canteaut and Tim G\\\"{u}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R.[ expand ]
15:17 [Pub][ePrint]An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption, by Graham Enos and Yuliang Zheng[ expand ]
15:17 [Pub][ePrint]Generic Construction of Trace and Revoke Schemes, by Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydın Selcuk[ expand ]
11:15 [Job][New]Professor in IT Security / Cloud Security, Graz University of Technology, IAIK[ expand ]
11:14 [Event][New]Crypto: 34th Annual Cryptology Conference[ expand ]


2012-09-07
21:17 [Pub][ePrint]Cryptanalysis of a recent two factor authentication scheme , by Michael Scott[ expand ]
21:17 [Pub][ePrint]Invertible Polynomial Representation for Private Set Operations, by Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon[ expand ]
21:17 [Pub][ePrint]Computing endomorphism rings of abelian varieties of dimension two , by Gaetan Bisson[ expand ]
18:17 [Pub][ePrint]Tahoe - The Least-Authority Filesystem, by Zooko Wilcox-O\'Hearn and Brian Warner[ expand ]


2012-09-06
18:17 [Pub][ePrint]Functional Encryption with Bounded Collusions via Multi-Party Computation, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Optimizing Segment Based Document Protection (Corrected Version), by Miroslaw Kutylowski and Maciej Gebala[ expand ]
18:17 [Pub][ePrint]The Curious Case of Non-Interactive Commitments, by Mohammad Mahmoody and Rafael Pass[ expand ]
18:17 [Pub][ePrint]False Positive probabilities in q-ary Tardos codes: comparison of attacks, by A. Simone and B. Skoric[ expand ]
12:51 [Job][New]TENURE-TRACK OR TENURED POSITION , Aalto University School of Science, Helsinki, Finland[ expand ]
12:51 [Job][New]PhD + job in industry, Université Paris 1 Panthéon-Sorbonne[ expand ]
12:51 [Job][New]PhD + job in industry, Université Paris 7[ expand ]
12:50 [Job][New]Ph.D. student + an industrial job., Université Paris 1, Panthéon-Sorbonne.[ expand ]
12:50 [Job][New]Research Associate in Zero-Knowledge Proofs, University College London[ expand ]
09:17 [Pub][JoC]Compact Proofs of Retrievability[ expand ]
08:12 [Job][New]Ph.D. position, Research Group Cryptographic Algorithms, Saarland University, Germany[ expand ]


2012-09-05
18:17 [Pub][ePrint]Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition, by Mihir Bellare and Adam O\'Neill[ expand ]
18:17 [Pub][ePrint]RKA Security beyond the Linear Barrier, by Mihir Bellare and Kenneth G. Paterson and Susan Thomson[ expand ]
18:17 [Pub][ePrint]Faster implementation of scalar multiplication on Koblitz curves, by Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez[ expand ]
18:17 [Pub][ePrint]Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
18:17 [Pub][ePrint]Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity, by Ashish Choudhury and Martin Hirt and Arpita Patra[ expand ]
18:17 [Pub][ePrint]Garbling XOR Gates ``For Free\'\' in the Standard Model, by Benny Applebaum[ expand ]
06:10 [Job][New]Research Scientist / Senior Research Scientist, Palo Alto Research Center (PARC, a Xerox Company)[ expand ]
06:10 [Job][New]Lecturer or Senior Lecturer, University of Cape Town, South Africa[ expand ]



2012-09-04
00:07 [News]Videos from Crypto 2012[ expand ]


2012-09-03
15:17 [Pub][ePrint]Efficient Query Integrity for Outsourced Dynamic Databases, by Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese[ expand ]
15:17 [Pub][ePrint]A Method for Generating Full Cycles by a Composition of NLFSRs, by Elena Dubrova[ expand ]
15:17 [Pub][ePrint]On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown, by Lidong Han and Wei Wei and Mingjie Liu[ expand ]
15:17 [Pub][ePrint]Desynchronization Attack on RAPP Ultralightweight Authentication Protocol, by Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation, by Meicheng Liu and Yin Zhang and Dongdai Lin[ expand ]
15:17 [Pub][ePrint]The low-call diet: Authenticated Encryption for call counting HSM users, by Mike Bond and George French and Nigel P. Smart and Gaven J. Watson[ expand ]
15:17 [Pub][ePrint]Updating attribute in CP-ABE: A New Approach, by Nishant Doshi and Devesh Jinwala[ expand ]
15:17 [Pub][ePrint]\"Metaproofs\" (and their Cryptographic Applications), by Alfredo De Santis and Moti Yung[ expand ]
15:17 [Pub][ePrint]Format-Transforming Encryption: More than Meets the DPI, by Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton[ expand ]
15:17 [Pub][ePrint]Scalable Deniable Group Key Establishment, by Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona[ expand ]
15:17 [Pub][ePrint]Hierarchical Identity-Based (Lossy) Trapdoor Functions, by Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols[ expand ]
15:17 [Pub][ePrint]Are We Compromised? Modelling Security Assessment Games, by Viet Pham and Carlos Cid[ expand ]
15:17 [Pub][ePrint]Privacy Amplification with Asymptotically Optimal Entropy Loss, by Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin[ expand ]
15:17 [Pub][ePrint]Constant Ciphertext Length in CP-ABE, by Nishant Doshi and Devesh Jinwala[ expand ]
15:17 [Pub][ePrint]Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey, by Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann[ expand ]
15:17 [Pub][ePrint]Entangled Cloud Storage, by Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi[ expand ]
15:17 [Pub][ePrint]Enabling 3-share Threshold Implementations for any 4-bit S-box, by Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann[ expand ]
15:17 [Pub][ePrint]On 3-share Threshold Implementations for 4-bit S-boxes, by Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang[ expand ]
15:17 [Pub][ePrint]On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs, by Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung[ expand ]
15:17 [Pub][ePrint]Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, by Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefa[ expand ]
15:17 [Pub][ePrint]Succinct Malleable NIZKs and an Application to Compact Shuffles, by Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn[ expand ]
15:17 [Pub][ePrint]On pseudorandomization of information-theoretically secure schemes without hardness assumptions, by Koji Nuida[ expand ]
15:17 [Pub][ePrint]Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems, by Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes[ expand ]
15:17 [Pub][ePrint]Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model, by Ivan Damgard and Sarah Zakarias[ expand ]


2012-09-02
00:59 [Event][New]ICISC 2012: The International Conference on Information Security and Cryptology[ expand ]


2012-08-27
14:07 [Event][New]-: Crypto 2013[ expand ]



2012-08-26
10:36 [Job][New]Security Software Developer, escrypt Inc.[ expand ]


2012-08-24
23:03 [News]IACR BibTeX file available[ expand ]


2012-08-23
11:08 [Job][New]Ph.D. student, University of Trier, Germany[ expand ]
11:08 [Job][New]Assistant Professor, Kanazawa University, Japan[ expand ]
11:08 [Job][New]Faculty position (Professur, W2) , Saarland University, Center for IT-Security, Privacy and Accountability[ expand ]
11:08 [Job][New]PhD student, University of Luxembourg[ expand ]
11:07 [Event][New]Workshop on Real-World Cryptography[ expand ]
11:07 [Event][New]WCC 2013: International Workshop on Coding and Cryptography[ expand ]
11:06 [Event][New]ANTE: Annals of Telecommunications: Special Issue on: Privacy-aware electronic so[ expand ]
00:17 [Pub][ePrint]Computational Soundness without Protocol Restrictions, by Michael Backes and Ankit Malik and Dominique Unruh[ expand ]
00:17 [Pub][ePrint]Exploiting Collisions in Addition Chain-based Exponentiation Algorithms, by Neil Hanley and HeeSeok Kim and Michael Tunstall[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture, by Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui[ expand ]
00:17 [Pub][ePrint]Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols, by Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref[ expand ]
00:17 [Pub][ePrint]Designated Verifier Threshold Proxy Signature Scheme without Random Oracles, by Mohammad Beheshti-Atashgah \\and Majid Bayat \\and Mahmoud Gardeshi \\and Mohammad Reza Aref[ expand ]
00:17 [Pub][ePrint]Short communication: An interpretation of the Linux entropy estimator, by Benjamin Pousse[ expand ]


2012-08-22
00:17 [Pub][ePrint]Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance, by John Steinberger[ expand ]
00:17 [Pub][ePrint]Short Signatures From Diffie-Hellman: Realizing Short Public Key, by Jae Hong Seo[ expand ]
00:17 [Pub][ePrint]Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles, by Mohammad Reza Reyhanitabar and Willy Susilo[ expand ]
00:17 [Pub][ePrint]Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol, by Wang Qinglong, Xu Li[ expand ]
00:17 [Pub][ePrint]Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting, by Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean[ expand ]
00:17 [Pub][ePrint]A j-lanes tree hashing mode and j-lanes SHA-256, by Shay Gueron[ expand ]
00:17 [Pub][ePrint]An Efficient Signcryption Scheme from q-Diffie-Hellman Problems, by Jayaprakash Kar[ expand ]
00:17 [Pub][ePrint]Approaches for the Parallelization of Software Implementation of Integer Multiplication, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]



2012-08-20
00:17 [Pub][JoC]Polynomial Runtime and Composability[ expand ]


2012-08-19
17:48 [Conf][Crypto]CRYPTO 2012 on Facebook[ expand ]


2012-08-18
06:17 [Pub][ePrint]T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags, by Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva[ expand ]
06:17 [Pub][ePrint]Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming, by Carles Padro and Leonor Vazquez and An Yang[ expand ]
06:17 [Pub][ePrint]Semantically Secure Functional Encryption, Revisited, by Manuel Barbosa and Pooya Farshim[ expand ]
06:17 [Pub][ePrint]Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited, by Zhengan Huang and Shengli Liu and Baodong Qin[ expand ]
06:17 [Pub][ePrint]Glitches and Static Power Hand in Hand, by Amir Moradi and Oliver Mischke[ expand ]
06:17 [Pub][ePrint]A Quasigroup Based Random Number Generator for Resource Constrained Environments, by Matthew Battey and Abhishek Parakh[ expand ]
06:17 [Pub][ePrint]Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime, by Sorin Iftene[ expand ]
06:17 [Pub][ePrint]Perfect Keyword Privacy in PEKS Systems, by Mototsugu Nishioka[ expand ]
06:17 [Pub][ePrint]Functional Encryption: New Perspectives and Lower Bounds, by Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
06:17 [Pub][ePrint]New results on nonexistence of generalized bent functions, by Yupeng Jiang and Yingpu Deng[ expand ]
06:17 [Pub][ePrint]Computational Entropy and Information Leakage, by Benjamin Fuller and Leonid Reyzin[ expand ]
06:17 [Pub][ePrint]Efficient Signatures of Knowledge and DAA in the Standard Model, by David Bernhard and Georg Fuchsbauer and Essam Ghadafi[ expand ]


2012-08-17
05:12 [Job][New]Assistant Professor in Cryptology and Information Security, JAIST, Japan[ expand ]



2012-08-16
20:55 [Event][New]HASP'12: Workshop on Hardware and Architectural Support for Security and Privac[ expand ]
07:59 [Event][New]IEEE ICIT 2013: Special Session on Security and Coding Aspects of Longrange RFID[ expand ]
07:59 [Event][New]ACSW-AISC: Australasian Information Security Conference[ expand ]
07:58 [Job][New]Post-doc, University of Auckland, New Zealand[ expand ]


2012-08-14
09:17 [Pub][ePrint]Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting, by Xiang Xie and Rui Xue and Rui Zhang[ expand ]
09:17 [Pub][ePrint]Perfect Ambiguous Optimistic Fair Exchange, by Yang Wang and Man Ho Au and Willy Susilo[ expand ]
09:17 [Pub][ePrint]Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits, by Nir Bitansky and Alessandro Chiesa[ expand ]


2012-08-13
15:17 [Pub][ePrint]Hush Functions Extended to Any Size Input versus Any Size Output, by Gideon Samid[ expand ]
15:17 [Pub][ePrint]Crowd-Blending Privacy, by Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass[ expand ]
15:17 [Pub][ePrint]Must you know the code of f to securely compute f?, by Mike Rosulek[ expand ]
15:17 [Pub][ePrint]A Probabilistic Quantum Key Transfer Protocol, by Abhishek Parakh[ expand ]
15:17 [Pub][ePrint]Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes, by Yohei Watanabe and Takenobu Seito and Junji Shikata[ expand ]
15:17 [Pub][ePrint]Barriers in Cryptography with Weak, Correlated and Leaky Sources, by Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Computing small discrete logarithms faster, by Daniel J. Bernstein and Tanja Lange[ expand ]
12:17 [Pub][ePrint]New Leakage Resilient CCA-Secure Public Key Encryption, by Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong[ expand ]
12:17 [Pub][ePrint]EPiC: Efficient Privacy-Preserving Counting for MapReduce, by Erik-Oliver Blass and Guevara Noubir and Triet Vo Huu[ expand ]
07:37 [Event][New]TCC2013: The Tenth Theory of Cryptography Conference[ expand ]


2012-08-11
01:26 [Event][New]Qshine-2013: Heterogeneous Networking for Quality, Reliability, Security and Robustness[ expand ]



2012-08-09
16:00 [Job][New]Research Associate in Verifiable Internet Voting (M/F), University of Luxembourg [ expand ]
15:50 [Event][New]RISE'12: Workshop on Redefining and Integrating Security Engineering[ expand ]
15:49 [Event][New]PROOFS: Workshop on Security Proofs for Embedded Systems[ expand ]


2012-08-08
06:17 [Pub][ePrint]Stam\'s Conjecture and Threshold Phenomena in Collision Resistance, by John Steinberger, Xiaoming Sun, Zhe Yang[ expand ]


2012-08-07
21:17 [Pub][ePrint]Tweakable Blockciphers with Beyond Birthday-Bound Security, by Will Landecker and Thomas Shrimpton and R. Seth Terashima[ expand ]
21:17 [Pub][ePrint]Long Term Confidentiality: a Survey, by Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier[ expand ]
21:17 [Pub][ePrint]On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups, by Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt[ expand ]
07:14 [Conf][CHES]invited speakers announced [ expand ]


2012-08-06
15:17 [Pub][ePrint]Differential Fault Analysis of AES: Towards Reaching its Limits, by Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall[ expand ]
15:17 [Pub][ePrint]A note on \'An efficient certificateless aggregate signature with constant pairing computations\', by Debiao He, Miaomiao Tian[ expand ]
15:17 [Pub][ePrint]Factorization of a 1061-bit number by the Special Number Field Sieve, by Greg Childers[ expand ]
15:17 [Pub][ePrint]Improved CRT Algorithm for Class Polynomials in Genus 2, by Kristin Lauter and Damien Robert[ expand ]
15:17 [Pub][ePrint]Multi-receiver Homomorphic Authentication Codes for Network Coding, by Zhaohui Tang, and Hoon Wei Lim[ expand ]
05:51 [Conf][CHES]Early registration deadline Aug. 5[ expand ]



2012-08-05
18:38 [News]Wanted: Volunteers for Crypto (GC) and Websystem[ expand ]
18:17 [Pub][ePrint]Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem, by Ding Wang and Chun-guang Ma[ expand ]
18:17 [Pub][ePrint]Breaking and Repairing GCM Security Proofs, by Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu[ expand ]
18:17 [Pub][ePrint]Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption, by Amit Sahai and Hakan Seyalioglu and Brent Waters[ expand ]
18:17 [Pub][ePrint]Secure Database Commitments and Universal Arguments of Quasi Knowledge, by Melissa Chase and Ivan Visconti[ expand ]
18:17 [Pub][ePrint]Differential Privacy with Imperfect Randomness, by Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan[ expand ]
18:17 [Pub][ePrint]Group Signatures with Almost-for-free Revocation, by Benoit Libert and Thomas Peters and Moti Yung[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Multi-Party Computation with Dishonest Majority, by Sanjam Garg and Amit Sahai[ expand ]
18:17 [Pub][ePrint]New Preimage Attacks Against Reduced SHA-1, by Simon Knellwolf and Dmitry Khovratovich[ expand ]
15:17 [Pub][ePrint]Rational authentication protocols and their use in financial transactions, by Long Hoang Nguyen[ expand ]
15:17 [Pub][ePrint]Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian, by Robert Drylo[ expand ]
15:17 [Pub][ePrint]A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes, by Ed Kendall and Michelle Kendall and Wilfrid S. Kendall[ expand ]
15:17 [Pub][ePrint]The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures, by Gautham Sekar[ expand ]
15:17 [Pub][ePrint]Scalable Group Signatures with Revocation, by Benoit Libert and Thomas Peters and Moti Yung[ expand ]
15:17 [Pub][ePrint]Programmable encryption and key-dependent messages, by Dominique Unruh[ expand ]
15:17 [Pub][ePrint]Biclique Cryptanalysis of TWINE, by Mustafa \\c{C}oban and Ferhat Karako\\c{c} and \\\"{O}zkan Bozta\\c{s}[ expand ]
15:17 [Pub][ePrint]Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, by Dario Fiore and Rosario Gennaro[ expand ]
15:17 [Pub][ePrint]Impossibility Results for Static Input Secure Computation, by Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti[ expand ]
15:17 [Pub][ePrint]TorScan: Tracing Long-lived Connections and Differential Scanning Attacks, by Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann[ expand ]
15:17 [Pub][ePrint]On the Security of Dynamic Group Signatures: Preventing Signature Hijacking, by Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta[ expand ]
15:17 [Pub][ePrint]A formal study of two physical countermeasures against side channel attacks, by Sébastien Briais and Sylvain Guilley and Jean-Luc Danger[ expand ]
15:17 [Pub][ePrint]Simple construction of epsilon-biased distribution, by Long Hoang Nguyen and Andrew William Roscoe[ expand ]


2012-08-03
08:32 [Event][New]COSADE: Constructive Side-Channel Analysis and Secure Design[ expand ]


2012-08-02
15:17 [Pub][ePrint]Security margin evaluation of SHA-3 contest finalists through SAT-based attacks, by Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny[ expand ]
15:17 [Pub][ePrint]A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers, by Denise Demirel and Jeroen van de Graaf[ expand ]


2012-08-01
06:17 [Pub][ePrint]Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials, by Yin Li and Gong-liang Chen and Xiao-ning Xie[ expand ]
06:17 [Pub][ePrint]DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems, by Kan Yang and Xiaohua Jia and Kui Ren[ expand ]
06:17 [Pub][ePrint]Weaknesses of an Improvement Authentication Scheme using , by Rafael Martínez-Peláez and Francisco Rico-Novella[ expand ]
06:17 [Pub][ePrint]Efficient Padding Oracle Attacks on Cryptographic Hardware, by Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay[ expand ]
06:17 [Pub][ePrint]Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal, by Cas Cremers and Michèle Feltz[ expand ]
06:17 [Pub][ePrint]Revisiting Key Schedule\'s Diffusion In Relation With Round Function\'s Diffusion, by Jialin Huang and Xuejia Lai[ expand ]



2012-07-31
16:31 [Event][New]FC13: Financial Crypto[ expand ]


2012-07-30
06:17 [Pub][JoC]A Comparison of Cryptanalytic Tradeoff Algorithms[ expand ]


2012-07-27
07:33 [Job][New]Security Expert for Smart Card and Embedded Devices, Samsung Electronics, Republic of Korea (South Korea)[ expand ]


2012-07-26
14:30 [Job][New]Research and PhD positions, Information Security Group, Royal Holloway, University of London, United Kingdom[ expand ]



2012-07-25
21:17 [Pub][ePrint]Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation, by Mukund Kalyanaraman and Michael Orshansky[ expand ]
21:17 [Pub][ePrint]Probabilistic Infinite Secret Sharing, by Laszlo Csirmaz[ expand ]
21:17 [Pub][ePrint]Infinite Secret Sharing -- Examples, by Alexander Dibert and Laszlo Csirmaz[ expand ]
21:17 [Pub][ePrint]Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme, by Qingfeng Cheng[ expand ]
21:17 [Pub][ePrint]MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, by Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto[ expand ]
05:22 [Job][New]M.Sc. and Ph.D. in Cryptography, Security, and Privacy, Koç University, Turkey[ expand ]
05:19 [Event][New]IPICS 2012: IPICS Summer School 2012[ expand ]


2012-07-24
18:17 [Pub][ePrint]Secret Sharing Schemes for Very Dense Graphs, by Amos Beimel and Oriol Farràs and Yuval Mintz[ expand ]
18:17 [Pub][ePrint]Fully Private Revocable Predicate Encryption, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Dongdong Sun[ expand ]
18:17 [Pub][ePrint]Forward-Secure Hierarchical Predicate Encryption, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Dongdong Sun[ expand ]
18:17 [Pub][ePrint]Efficient Implementation of Bilinear Pairings on ARM Processors, by Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao[ expand ]
18:17 [Pub][ePrint]Cross-Unlinkable Hierarchical Group Signatures, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
18:17 [Pub][ePrint]Comments on four multi-server authentication protocols using smart card, by *Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4[ expand ]
18:17 [Pub][ePrint]Secure Computation on Floating Point Numbers, by Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele[ expand ]
04:48 [Event][New](IJCSS): International Journal of Computer Science and Security[ expand ]


2012-07-23
12:17 [Pub][ePrint]On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\\cP S^+$, by Brajesh Kumar Singh[ expand ]
12:17 [Pub][ePrint]A New Efficient Authenticated ID-Based Group Key Agreement Protocol, by Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash[ expand ]
12:17 [Pub][ePrint]An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks, by Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari[ expand ]
12:17 [Pub][ePrint]An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, by Martin Albrecht and Gregor Leander[ expand ]
12:17 [Pub][ePrint]An Algebraic Fault Attack on the LED Block Cipher, by Philipp Jovanovic and Martin Kreuzer and Ilia Polian[ expand ]
12:17 [Pub][ePrint]Differential Fault Analysis on Block Cipher Piccolo, by Kitae Jeong[ expand ]
12:17 [Pub][ePrint]PIRMAP: Efficient Private Information Retrieval for MapReduce, by Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan[ expand ]
12:17 [Pub][ePrint]Cross-Domain Password-Based Authenticated Key Exchange Revisited, by Liqun Chen and Hoon Wei Lim and Guomin Yang[ expand ]


2012-07-21
00:17 [Pub][ePrint]A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings, by Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat[ expand ]



2012-07-20
21:17 [Pub][ePrint]ID Based Signcryption Scheme in Standard Model, by S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan[ expand ]


2012-07-19
06:17 [Pub][ePrint]Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy, by Shaohui Wang,Sujuan Liu,Danwei Chen[ expand ]


2012-07-18
18:17 [Event][New]ICDIPC: 3rd Inter. Conf. on Digital Information Processing & Communications[ expand ]
08:35 [Event][New]Inscrypt 2012: The 8th China International Conference on Information Security and Cryptology[ expand ]
08:35 [Event][New]Inscrypt'2012: The 8th China International Conference on Information Security and Cryptology[ expand ]


2012-07-16
18:39 [Event][New]WESS 2012: 7th Workshop on Embedded Systems Security[ expand ]
15:20 [Conf][Crypto]CRYPTO 2012 - CALL FOR PARTICIPATION[ expand ]
03:17 [Pub][ePrint]Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three, by Chol-Sun Sin[ expand ]
03:17 [Pub][ePrint]Wide Strong Private RFID Identification based on Zero-Knowledge, by Roel Peeters and Jens Hermans[ expand ]
03:17 [Pub][ePrint]The Arithmetic Codex, by Ignacio Cascudo and Ronald Cramer and Chaoping Xing[ expand ]
03:17 [Pub][ePrint]New cryptographic constructions using generalized learning with errors problem, by Jintai ding[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of Sood et al.\'s Authentication Scheme using Smart Cards, by Rafael Martínez-Peláez and Francisco Rico-Novella[ expand ]
03:17 [Pub][ePrint]CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing, by Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen[ expand ]



2012-07-14
07:01 [Job][New]Senior Level Cryptography Lead at Seagate, Seagate, Longmont, CO, USA[ expand ]


2012-07-12
18:17 [Pub][ePrint]Functional Encryption for Regular Languages, by Brent Waters[ expand ]
14:03 [Event][New]CSE2012: ECRYPT Summer School: Challenges in Security Engineering 2012[ expand ]
13:01 [Conf][Crypto]GREAT NEWS: More Stipends are available to Students Attending CRYTPO[ expand ]


2012-07-11
18:17 [Pub][ePrint]Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles, by Zheng Yang and J\\\"org Schwenk[ expand ]
18:17 [Pub][ePrint]Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited, by Junji Shikata[ expand ]
18:17 [Pub][ePrint]On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification, by Afonso Arriaga and Manuel Barbosa and Pooya Farshim[ expand ]
12:23 [Job][Update]Teaching Position (Tenure), Salary A13/A14, Ruhr University Bochum, Germany[ expand ]


2012-07-09
11:49 [Job][New]Teaching Position (Tenure), Salary A13/A14, Ruhr University Bochum, Germany[ expand ]
05:48 [PhD][New]Tal Malkin[ expand ]
05:47 [PhD][New]Ilya Kizhvatov: Physical Security of Cryptographic Algorithm Implementations[ expand ]
05:47 [PhD][New]Seung Geol Choi: On Adaptive Security and Round Efficiency in Secure Multi-party Computation[ expand ]



2012-07-08
12:52 [Conf][Crypto]Early Registration Deadline for CRYPTO is TODAY![ expand ]


2012-07-06
21:17 [Pub][ePrint]Breaking pairing-based cryptosystems using $\\eta_T$ pairing over $GF(3^{97})$, by Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi[ expand ]
21:17 [Pub][ePrint]Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\\Sigma\\Pi$PKC, Constructed Based on Maximum Length Code, by Masao KASAHARA[ expand ]
21:17 [Pub][ePrint]High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions, by Tamás Györfi and Octavian Creţ and Guillaume Hanrot and Nicolas Brisebarre[ expand ]
21:17 [Pub][ePrint]Enhancing Location Privacy for Electric Vehicles (at the right time), by Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou[ expand ]
21:17 [Pub][ePrint]A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption, by Liangliang Xiao and I-Ling Yen[ expand ]
21:17 [Pub][ePrint]A Differential Fault Attack on Grain-128a using MACs, by Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar[ expand ]
21:17 [Pub][ePrint]Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption, by Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven[ expand ]
21:17 [Pub][ePrint]Algebraic Differential Fault Attacks on LED using a Single Fault Injection, by Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji[ expand ]
21:17 [Pub][ePrint]Edwards model of elliptic curves defined over any fields, by Oumar DIAO and Emmanuel FOUOTSA[ expand ]
21:17 [Pub][ePrint]Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output, by Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]On Reconfigurable Fabrics and Generic Side-Channel Countermeasures, by Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik[ expand ]
21:17 [Pub][ePrint]On Hashing Graphs, by Ashish Kundu, Elisa Bertino[ expand ]
21:17 [Pub][ePrint]SipHash: a fast short-input PRF, by Jean-Philippe Aumasson and Daniel J. Bernstein[ expand ]
21:17 [Pub][ePrint]Quantum Key Distribution in the Classical Authenticated Key Exchange Framework, by Michele Mosca and Douglas Stebila and Berkant Ustaoglu[ expand ]
21:17 [Pub][ePrint]Multiple Differential Cryptanalysis using \\LLR and $\\chi^2$ Statistics, by Céline Blondeau and Benoît Gérard and Kaisa Nyberg[ expand ]
21:17 [Pub][ePrint]Another look at non-uniformity, by Neal Koblitz and Alfred Menezes[ expand ]
21:17 [Pub][ePrint]PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --, by Gilles Piret and Thomas Roche and Claude Carlet[ expand ]
21:17 [Pub][ePrint]Publicly Verifiable Ciphertexts, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Fully Anonymous Attribute Tokens from Lattices, by Jan Camenisch and Gregory Neven and Markus Rückert[ expand ]
21:17 [Pub][ePrint]Never trust a bunny, by Daniel J. Bernstein and Tanja Lange[ expand ]
21:17 [Pub][ePrint]Securing Circuits Against Constant-Rate Tampering, by Dana Dachman-Soled and Yael Tauman Kalai[ expand ]
21:17 [Pub][ePrint]Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy, by Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin[ expand ]
21:17 [Pub][ePrint]Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions, by Ivan Damgard and Adriana Lopez-Alt[ expand ]
21:17 [Pub][ePrint]A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions, by Anne Canteaut and Thomas Fuhr and Mar\\\'{i}a Naya-Plasencia and Pascal Paillier and Jean-Ren\\\'{e} Reinh[ expand ]
21:17 [Pub][ePrint]Achieving Constant Round Leakage-Resilient Zero-Knowledge, by Omkant Pandey[ expand ]
21:17 [Pub][ePrint]New Preimage Attacks on Hash Modes of AES-256, by Deukjo Hong and Dong-Chan Kim and Daesung Kwon[ expand ]
21:17 [Pub][ePrint]Simultaneous hashing of multiple messages , by Shay Gueron and Vlad Krasnov[ expand ]
21:17 [Pub][ePrint]Improved Broadcast Encryption Scheme with Constant-Size Ciphertext, by Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton[ expand ]
21:17 [Pub][ePrint]Factorisation of RSA-704 with CADO-NFS, by Shi Bai and Emmanuel Thom\\\'e and Paul Zimmermann[ expand ]
21:17 [Pub][ePrint]Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs, by Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid [ expand ]
21:17 [Pub][ePrint]On Continual Leakage of Discrete Log Representations, by Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]A Framework for Efficient Fully-Equipped UC Commitments, by Eiichiro Fujisaki[ expand ]
21:17 [Pub][ePrint]Multiparty Proximity Testing with Dishonest Majority from Equality Testing, by Ran Gelles and Rafail Ostrovsky and Kina Winoto[ expand ]
21:17 [Pub][ePrint]Distributed Key Generation in the Wild, by Aniket Kate and Yizhou Huang and Ian Goldberg[ expand ]
21:17 [Pub][ePrint]Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem, by Colleen M. Swanson and Douglas R. Stinson[ expand ]
21:17 [Pub][ePrint]How to Store some Secrets, by Reto E. Koenig and Rolf Haenni[ expand ]
21:17 [Pub][ePrint]Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption, by Omar Choudary and Felix Grobert and Joachim Metz[ expand ]
21:17 [Pub][ePrint]Optimal Lower Bound for Differentially Private Multi-Party Aggregation, by T-H. Hubert Chan and Elaine Shi and Dawn Song[ expand ]
21:17 [Pub][ePrint]Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices, by Ioana Boureanu and Serge Vaudenay[ expand ]
15:03 [Job][New]Post-Doc Applied Cryptography, University of Twente, Enschede, The Netherlands[ expand ]
09:43 [Job][New]Research Fellows and Ph.D. students, Nanyang Technological University, Singapore[ expand ]
00:15 [Event][New]ACNS'13: 11th International Conference on Applied Cryptography and Network Security[ expand ]


2012-07-05
14:45 [Conf][Crypto]Early registration deadline for CRYPTO is July 8![ expand ]
05:40 [Job][New]Post-Doc Positions, IT University of Copenhagen, Denmark[ expand ]


2012-07-04
13:18 [Job][Update]Post-Doc, University of Warsaw, Poland[ expand ]
13:18 [Job][Update]PhD Student, University of Warsaw, Poland[ expand ]
13:18 [Job][Update]MSc Student, University of Warsaw, Poland[ expand ]
13:17 [Job][New]PhD Student, University of Warsaw[ expand ]



2012-07-03
12:22 [Job][New]PKI Officer, Federal Office of Police, Bern[ expand ]
12:14 [Event][New]Inscrypt 2012: China International Conference on Information Security and Cryptology[ expand ]
12:12 [Event][New]FSE 2013: 20th International Workshop on Fast Software Encryption[ expand ]


2012-07-02
05:26 [Job][New]Mobile Application Developers with , Cellcrypt, London, UK[ expand ]
05:25 [Job][New]Post-Doc, Department of Electrical Engineering, Linköping University, Linköping, Sweden[ expand ]
05:24 [Job][New]2 Research Scientists, Temasek Laboratories, National University of Singapore, Singapore[ expand ]
05:16 [Event][New]IJCSS: International Journal of Computer Science and Security[ expand ]


2012-06-29
21:15 [Conf][Crypto]CRYPTO 2012 Early Registration Deadline is Approaching[ expand ]
05:16 [Event][New]PKC 2013: Public Key Cryptography 2013[ expand ]


2012-06-28
05:42 [Event][New]DATE 2013: Design Automation and Test in Europe - Topic Track on Secure Systems[ expand ]



2012-06-25
00:17 [Pub][JoC]Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles[ expand ]


2012-06-24
10:50 [Event][New]TCC2013: The Tenth Theoretical Cryptography Conference[ expand ]
09:29 [PhD][New]Billy Bob Brumley: Covert Timing Channels, Caching, and Cryptography[ expand ]


2012-06-23
10:42 [PhD][New]Sujoy Sinha Roy: Design and Analysis of Elliptic Curve Cryptosystems on FPGAs[ expand ]


2012-06-22
08:09 [Conf][EC]Videos from Eurocrypt 2012[ expand ]



2012-06-20
15:41 [Event][Update]Indocrypt 2012[ expand ]
15:41 [Event][Update]Crypto 2013[ expand ]


2012-06-19
18:59 [Event][Update]CT-RSA 2013: The Cryptographers' Track at RSA Conference[ expand ]
15:45 [Job][New]Senior Researcher, Software Technology and Applications Competence Center, Tartu, Estonia[ expand ]


2012-06-18
14:49 [Job][New]Post-doc, Universite catholique de Louvain[ expand ]
11:04 [Event][Update]ESTEL-SEC 2012: ESTEL Security and Privacy Special Track[ expand ]
11:03 [Job][New]Ph.D. Student, Post-Doc, Intel Collaborative Research Institute
for Secure Computing (ICRI-SC) at TU-Darmstadt
[ expand ]


2012-06-13
10:57 [Job][New]PhD studentship in Applied Cryptography, Royal Holloway, University of London[ expand ]
05:26 [Job][New]Postdoctoral and Research Fellowships, Queensland University of Technology, Brisbane, Australia[ expand ]



2012-06-12
08:23 [PhD][Update]Nicky Mouha: Automated Techniques for Hash Function and Block Cipher Cryptanalysis[ expand ]
08:20 [Event][New]ESTEL-SEC 2012: ESTEL Security and Privacy Special Track[ expand ]
06:17 [Pub][ePrint]Security Analysis of RAPP An RFID Authentication Protocol based on Permutation, by Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei[ expand ]
06:17 [Pub][ePrint]New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques, by Allison Lewko and Brent Waters[ expand ]
06:17 [Pub][ePrint]A note on generalized bent criteria for Boolean functions, by Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica[ expand ]
06:17 [Pub][ePrint]3D Hardware Canaries, by Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and T[ expand ]
06:17 [Pub][ePrint]ML Confidential: Machine Learning on Encrypted Data, by Thore Graepel and Kristin Lauter and Michael Naehrig[ expand ]
06:17 [Pub][ePrint]Revisiting Dedicated and Block Cipher based Hash Functions, by Anupam Pattanayak[ expand ]
06:17 [Pub][ePrint]DECT Security Analysis, by Erik Tews[ expand ]
06:17 [Pub][ePrint]The Discrete Logarithm Problem in non-representable rings, by Matan Banin and Boaz Tsaban[ expand ]
06:17 [Pub][ePrint]Homomorphic A-codes for Network Coding, by Zhaohui Tang[ expand ]
06:17 [Pub][ePrint]A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences, by Xu ZiJie and Xu Ke[ expand ]
06:17 [Pub][ePrint]An Analysis of ZVP-Attack on ECC Cryptosystems, by Claude Crépeau and Raza Ali Kazmi[ expand ]
06:17 [Pub][ePrint]The Multivariate Probabilistic Encryption Scheme MQQ-ENC, by Danilo Gligoroski and Simona Samardjiska[ expand ]


2012-06-11
14:41 [Event][New]ICMLA 2012: Special Session on Machine Learning in Information and System Security[ expand ]
14:41 [Event][New]PQCrypto 2013: Post-Quantum Crypto 2013[ expand ]
09:37 [Job][New]Security and Cryptography Researcher, Safemarket Ltd, Thessaloniki, Greece[ expand ]


2012-06-08
19:24 [PhD][New]Roel Peeters: Security Architecture for Things That Think[ expand ]


2012-06-06
05:16 [PhD][New]U. Rajeswar Rao[ expand ]
05:16 [PhD][New]Rayanki Balakrishna: Multihop Performace Issuess in Wire less Mobile Ad Hoc networks[ expand ]
05:15 [PhD][New]U.Rajeswar Rao[ expand ]



2012-06-05
20:52 [Event][Update]SPACE'12: Int. Conference on Security, Privacy and Applied Cryptography Engineering[ expand ]
18:17 [Pub][ePrint]Using Variance to Analyze Visual Cryptography Schemes, by Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou[ expand ]
18:17 [Pub][ePrint]Bounds on the Threshold Gap in Secret Sharing over Small Fields, by Ignacio Cascudo and Ronald Cramer and Chaoping Xing[ expand ]
18:17 [Pub][ePrint]Non-uniform cracks in the concrete: the power of free precomputation, by Daniel J. Bernstein and Tanja Lange[ expand ]
18:17 [Pub][ePrint]A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) , by Markku-Juhani O. Saarinen and Daniel Engels[ expand ]
18:17 [Pub][ePrint]Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker, by Gergei Bana and Pedro Adão and Hideki Sakurada[ expand ]
05:55 [Job][New]Research Scientist / Senior Research Scientist, PARC, Palo Alto, CA, USA[ expand ]


2012-06-04
04:59 [PhD][New]Erik Tews: DECT Security Analysis[ expand ]
04:59 [PhD][New]Johannes Buchmann[ expand ]
00:17 [Pub][ePrint]Tightly Secure Signatures and Public-Key Encryption, by Dennis Hofheinz and Tibor Jager[ expand ]
00:17 [Pub][ePrint]A mathematical problem for security analysis of hash functions and pseudorandom generators, by Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata[ expand ]
00:17 [Pub][ePrint]Fast and compact elliptic-curve cryptography, by Mike Hamburg[ expand ]
00:17 [Pub][ePrint]Verified Security of Redundancy-Free Encryption from Rabin and RSA, by Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin[ expand ]
00:17 [Pub][ePrint]Multi-Channel Broadcast Encryption, by Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh[ expand ]
00:17 [Pub][ePrint]Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols, by Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp[ expand ]
00:17 [Pub][ePrint]Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography, by Duong Hieu Phan and Viet Cuong Trinh[ expand ]
00:17 [Pub][ePrint]Generation of Nonlinear Feedback Shift Registers with special-purpose hardware, by Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki[ expand ]
00:17 [Pub][ePrint]An anonymous proxy signature scheme without random oracles, by Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol, by Debiao He[ expand ]


2012-06-03
21:17 [Pub][ePrint]Anonymous Credentials Light , by Foteini Baldimtsi and Anna Lysyanskaya[ expand ]
21:17 [Pub][ePrint]Tamper and Leakage Resilience in the Split-State Model, by Feng-Hao Liu and Anna Lysyanskaya[ expand ]
21:17 [Pub][ePrint]In the blink of an eye: There goes your AES key, by Sergei Skorobogatov and Christopher Woods[ expand ]
21:17 [Pub][ePrint]Broadcast-enhanced Key Predistribution Schemes, by Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson[ expand ]
21:17 [Pub][ePrint]Two grumpy giants and a baby, by Daniel J. Bernstein and Tanja Lange[ expand ]
21:17 [Pub][ePrint]New Transference Theorems on Lattices Possessing n^\\epsilon-unique Shortest Vectors, by Wei Wei and Chengliang Tian and Xiaoyun Wang[ expand ]
21:17 [Pub][ePrint]Actively Secure Two-Party Evaluation of any Quantum Operation, by Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail[ expand ]
21:17 [Pub][ePrint]On The Distribution of Linear Biases: Three Instructive Examples, by Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander[ expand ]
21:17 [Pub][ePrint]On instance separation in the UC-framework, by István Vajda[ expand ]
21:17 [Pub][ePrint]A Public Shuffle without Private Permutations, by Myungsun Kim and Jinsu Kim and Jung Hee Cheon[ expand ]
21:17 [Pub][ePrint]Threshold Implementations of all 3x3 and 4x4 S-boxes, by B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.St\\\"{u}tz[ expand ]
21:17 [Pub][ePrint]Differential Power Analysis on ZUC Algorithm, by TANG Ming, CHENG PingPan ,QIU ZhenLong[ expand ]
15:06 [Conf][Crypto]Crypto 2012 list of accepted papers[ expand ]


2012-06-01
13:45 [Event][New]FPS 2012: 5th International Symposium on Foundations & Practice of Security[ expand ]



2012-05-30
02:23 [Conf][Crypto]Crypto 2012 online registration is open[ expand ]


2012-05-29
21:17 [Pub][ePrint]Boomerang and Slide-Rotational Analysis of the SM3 Hash Function, by Aleksandar Kircanski and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Public-Key Cryptography from New Multivariate Quadratic Assumptions, by Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang[ expand ]
21:17 [Pub][ePrint]Passive Corruption in Statistical Multi-Party Computation, by Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub[ expand ]
21:17 [Pub][ePrint]Homomorphic Signature for Identity Authentication in Cloud Computing, by Zhiwei Wang, Guozi Sun and Danwei Chen[ expand ]
21:17 [Pub][ePrint]Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings, by Enrico Thomae[ expand ]
21:17 [Pub][ePrint]Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications, by Dario Fiore and Rosario Gennaro[ expand ]
21:17 [Pub][ePrint]Improved ``Partial Sums\"-based Square Attack on AES, by Michael Tunstall[ expand ]
21:17 [Pub][ePrint]Concurrent Zero Knowledge in the Bounded Player Model, by Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti[ expand ]
21:17 [Pub][ePrint]Improved Indifferentiability Security Bound for the JH Mode, by Dustin Moody and Souradyuti Paul and Daniel Smith-Tone[ expand ]
21:17 [Pub][ePrint]Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil, by Rkia Aouinatou (1) Mostafa Belkasmi (2)[ expand ]
21:17 [Pub][ePrint]Official Arbitration and its Application to Secure Cloud Storage, by Alptekin Küpçü[ expand ]
21:17 [Pub][ePrint]Implementing BLAKE with AVX, AVX2, and XOP, by Samuel Neves and Jean-Philippe Aumasson[ expand ]
21:17 [Pub][ePrint]Fully Homomorphic Message Authenticators, by Rosario Gennaro and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]Ring Group Signatures, by Liqun Chen[ expand ]
21:17 [Pub][ePrint]Fair Exchange of Short Signatures Without Trusted Third Party, by Philippe Camacho[ expand ]
21:17 [Pub][ePrint]Computationally-Fair Group and Identity-Based Key-Exchange, by Andrew C. Yao and Yunlei Zhao[ expand ]
21:17 [Pub][ePrint]Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis, by Sk Subidh Ali and Debdeep Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions, by Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo[ expand ]
21:17 [Pub][ePrint]Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages, by Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud[ expand ]
21:17 [Pub][ePrint]Some properties of q-ary functions based on spectral analysis, by Deep Singh and Maheshanand Bhaintwal[ expand ]
21:17 [Pub][ePrint]ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY, by Md. Iftekhar Salam and Hoon-Jae Lee[ expand ]
21:17 [Pub][ePrint]An Adaptive-Ciphertext Attack against \"I $\\oplus$ C\'\' Block Cipher Modes With an Oracle, by Jon Passki and Tom Ritter[ expand ]
21:17 [Pub][ePrint]Efficient Dynamic Provable Possession of Remote Data via Update Trees, by Yihua Zhang and Marina Blanton[ expand ]
05:57 [PhD][Update]Olivier Markowitch: Non-repudiation protocols[ expand ]


2012-05-28
08:29 [Event][New]SecurIT: SecurIT 1st International Security Conference on Internet of Things[ expand ]
08:27 [Event][New]BulCrypt 2012: Bulgarian Cryptography Days 2012[ expand ]
08:26 [Event][New]CT-RSA 2013: The Cryptographers' Track at RSA Conference[ expand ]


2012-05-25
17:39 [PhD][New]Peter Birkner: Efficient Arithmetic on Low-Genus Curves[ expand ]
17:37 [PhD][New]Jens Zumbrägel: Public-key cryptography based on simple semirings[ expand ]
17:37 [PhD][New]Joachim Rosenthal[ expand ]
17:36 [Job][New]6 Ph.D. students, TELECOM-ParisTech, Paris, France[ expand ]



2012-05-22
07:36 [Job][Update]Lecturer, Queensland University of Technology, Brisbane, Australia[ expand ]
00:17 [Pub][ePrint]Quantifying Side-Channel Information Leakage from Web Applications, by Luke Mather and Elisabeth Oswald[ expand ]


2012-05-21
21:17 [Pub][ePrint]On a CCA2-secure variant of McEliece in the standard model, by Edoardo Persichetti[ expand ]
21:17 [Pub][ePrint]Self-pairings on Hyperelliptic Curves, by Steven D. Galbraith and Chang-An Zhao[ expand ]
12:59 [Job][New]Postdoctoral Research Assistant in Cryptography, Dept Computer Science, University of Bristol[ expand ]
09:22 [Event][Update]STM 2012: 8th International Workshop on Security and Trust Management[ expand ]


2012-05-17
18:10 [PhD][New]Côme Berbain: Analyse et conception d\'algorithmes de chiffrement à flot[ expand ]
18:09 [Job][New]M.Sc. and Ph.D. positions with scholarship, Koç University, Turkey[ expand ]
18:07 [Event][New]CryptoBG*2012: CryptoBG*2012: [MC3D] Meet Challenges in Cryptography and Cyber Defense[ expand ]
06:17 [Pub][ePrint]Garbling Schemes, by Mihir Bellare and Viet Tung Hoang and Phillip Rogaway[ expand ]
06:17 [Pub][ePrint]Compilation Techniques for Efficient Encrypted Computation, by Christopher Fletcher and Marten van Dijk and Srinivas Devadas[ expand ]


2012-05-14
19:30 [PhD][Update]Nicolás González-Deleito: Trust relationships in exchange protocols[ expand ]
18:17 [Pub][ePrint]On the (In)Security of IDEA in Various Hashing Modes, by Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang[ expand ]
13:06 [Event][New]APSIT: Call for Chapters proposals: Architectures and Protocols for Secure Informat[ expand ]
12:17 [Pub][ePrint]One-way Functions from Chebyshev Polynomials, by Kai-Yuen Cheong[ expand ]
00:17 [Pub][JoC]Quark: A Lightweight Hash[ expand ]



2012-05-13
13:37 [Job][New]Hardware Design Expert, A Private Company in Abu Dhabi, United Arab Emirates[ expand ]
13:35 [Job][New]Cryptography Expert, A Private Company in Abu Dhabi, United Arab Emirates[ expand ]
03:17 [Pub][ePrint]Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol, by I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart[ expand ]


2012-05-12
06:48 [Event][New]ECC 2012: The 16th workshop on Elliptic Curve Cryptography 2012[ expand ]
06:46 [PhD][New]Gilles Brassard: Relativized cryptography[ expand ]
06:46 [PhD][New]John E. Hopcroft[ expand ]


2012-05-11
16:03 [PhD][New]Nicolas Guillermin: Implémentation matérielle de coprocesseurs haute performance pour la cryptographie asymétrique[ expand ]
16:03 [PhD][New]Sylvain Duquesne[ expand ]
09:30 [PhD][New]Luk Bettale: Algebraic Cryptanalysis: Tools and Applications[ expand ]
09:29 [PhD][New]Jean-Charles Faugère[ expand ]
09:29 [PhD][New]Ludovic Perret[ expand ]


2012-05-10
15:28 [Job][New]Cryptographer, Sphinx Solutions and Washington, DC, USA[ expand ]
05:41 [Event][New]NPSec 2012: 7th Workshop on Secure Network Protocols[ expand ]
00:17 [Pub][ePrint]The Transformation from the Galois NLFSR to the Fibonacci Configuration, by Lin Zhiqiang[ expand ]
00:17 [Pub][ePrint]The myth of generic DPA...and the magic of learning, by Carolyn Whitnall and Elisabeth Oswald and Fran\\c{c}ois-Xavier Standaert[ expand ]
00:17 [Pub][ePrint]How to Garble Arithmetic Circuits, by Benny Applebaum and Yuval Ishai and Eyal Kushilevitz[ expand ]
00:17 [Pub][ePrint]FastPRP: Fast Pseudo-Random Permutations for Small Domains, by Emil Stefanov and Elaine Shi[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of pairing-free certificateless authenticated key agreement protocol, by Zhian Zhu[ expand ]
00:17 [Pub][ePrint]Fair Private Set Intersection with a Semi-trusted Arbiter, by Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello[ expand ]
00:17 [Pub][ePrint]The Linux Psedorandom Number Generator Revisited, by Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau[ expand ]
00:17 [Pub][ePrint]Dual Form Signatures: An Approach for Proving Security from Static Assumptions, by Michael Gerbush and Allison Lewko and Adam O\'Neill and Brent Waters[ expand ]
00:17 [Pub][ePrint]Transposition of AES Key Schedule, by Jialin Huang, Xuejia Lai[ expand ]
00:17 [Pub][ePrint]A Novel Strong Designated Verifier Signature Scheme without Random Oracles, by Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh[ expand ]
00:17 [Pub][ePrint]Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols, by José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barte and Stephan Krenn and Santiago Z[ expand ]



2012-05-09
09:58 [PhD][New]Christophe Giraud: Attacks on embedded cryptosystems and corresponding countermeasures[ expand ]
04:32 [Event][New]QCRYPT 2012: 2nd Annual Conference on Quantum Cryptography[ expand ]


2012-05-08
18:51 [PhD][New]Nicolás González-Deleito: Trust relationships in exchange protocols[ expand ]
18:50 [PhD][New]Yves Roggeman[ expand ]
18:49 [PhD][New]Olivier Markowitch: Non-repudiation protocols[ expand ]
18:49 [PhD][New]Gilles Piret: Block Ciphers: Security Proofs, Cryptanalysis, Design, and Fault Attacks[ expand ]
18:46 [Job][Update]Post-Doc, Technical University Denmark, Copenhagen[ expand ]
18:45 [Job][New]Research Fellow, Nanyang Technological University, Singapore[ expand ]
18:45 [Event][New]crypt@b-it 2012: crypt@b-it 2012: Summer school on Cryptography[ expand ]


2012-05-07
00:17 [Pub][JoC]Logic Minimization Techniques with Applications to Cryptology[ expand ]


2012-05-05
07:21 [Event][Update]Provable Privacy Workshop[ expand ]
05:36 [Conf][AC]Asiacrypt 2012[ expand ]



2012-05-04
14:23 [PhD][Update]Özgül Küçük: Design and Analysis of Cryptographic Hash Functions[ expand ]
14:20 [PhD][New]Özgül Küçük: Design and Analysis of Cryptographic Hash Functions[ expand ]


2012-05-03
12:17 [Pub][ePrint]Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin, by Ghassan O. Karame and Elli Androulaki and Srdjan Capkun[ expand ]
12:17 [Pub][ePrint]On Efficient Pairings on Elliptic Curves over Extension Fields, by Xusheng Zhang and Kunpeng Wang and Dongdai Lin[ expand ]
12:17 [Pub][ePrint]A Secret Sharing Scheme Based on Group Presentations and the Word Problem, by Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain[ expand ]
12:17 [Pub][ePrint]On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes, by Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen[ expand ]
12:17 [Pub][ePrint]Cryptography from tensor problems, by Leonard J. Schulman[ expand ]
12:17 [Pub][ePrint]Compress Multiple Ciphertexts Using ElGamal Encryption Schemes, by Myungsun Kim and Jihye Kim and Jung Hee Cheon[ expand ]
12:17 [Pub][ePrint]New Identity Based Encryption And Its Proxy Re-encryption, by Xu An Wang and Xiaoyuan Yang[ expand ]
12:17 [Pub][ePrint]Binary and q-ary Tardos codes, revisited, by Boris Skoric and Jan-Jaap Oosterwijk[ expand ]


2012-05-01
15:50 [Event][Update]SCC2012: Third international conference on Symbolic Computation and Cryptography[ expand ]


2012-04-30
18:17 [Pub][ePrint]ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash, by Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya[ expand ]
18:17 [Pub][ePrint]When Homomorphism Becomes a Liability, by Zvika Brakerski[ expand ]
18:17 [Pub][ePrint]Shorter IBE and Signatures via Asymmetric Pairings, by Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes, by Enrico Thomae[ expand ]
18:17 [Pub][ePrint]A secret sharing scheme of prime numbers based on hardness of factorization, by Kai-Yuen Cheong[ expand ]
18:17 [Pub][ePrint]Implementing Pairings at the 192-bit Security Level, by Diego F. Aranha and Laura Fuentes-Castañeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez[ expand ]
18:17 [Pub][ePrint]A General Construction for 1-round $\\delta$-RMT and (0, $\\delta$)-SMT, by Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang[ expand ]
18:17 [Pub][ePrint]On Ideal Lattices and Learning with Errors Over Rings, by Vadim Lyubashevsky and Chris Peikert and Oded Regev[ expand ]
18:17 [Pub][ePrint]Languages with Efficient Zero-Knowledge PCP\'s are in SZK, by Mohammad Mahmoody and David Xiao[ expand ]
18:17 [Pub][ePrint]Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results, by Marten van Dijk and Ulrich Rührmair[ expand ]
18:17 [Pub][ePrint]Secure password-based remote user authentication scheme with non-tamper resistant smart cards, by Ding Wang and Chun-guang Ma and Peng Wu[ expand ]
18:17 [Pub][ePrint]Zero-Knowledge for Multivariate Polynomials, by Valerie Nachef and Jacques Patarin and Emmanuel Volte[ expand ]
18:17 [Pub][ePrint]The Boomerang Attacks on the Round-Reduced Skein-512, by Hongbo Yu and Jiazhe Chen and XIaoyun Wang[ expand ]
18:17 [Pub][ePrint]In the point of view security, An efficient scheme in IBE with random oracle, by Rkia Aouinatou1, Mostafa Belkasmi2[ expand ]
18:17 [Pub][ePrint]On Necessary and Sufficient Conditions for Private Ballot Submission, by D. Bernhard and O. Pereira and B. Warinschi[ expand ]
18:17 [Pub][ePrint]Ring-LWE in Polynomial Rings, by Leo Ducas and Alain Durmus[ expand ]
18:17 [Pub][ePrint]SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks, by Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan[ expand ]
18:17 [Pub][ePrint]A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis, by Qi Chai and Guang Gong[ expand ]
18:17 [Pub][ePrint]Less is More: Relaxed yet Composable Security Notions for Key Exchange, by C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams[ expand ]
18:17 [Pub][ePrint]Key distribution system and attribute-based encryption , by Masahiro Yagisawa[ expand ]
18:17 [Pub][ePrint]Ring Switching in BGV-Style Homomorphic Encryption, by Craig Gentry and Shai Halevi and Nigel P. Smart[ expand ]
16:55 [Job][New]Ph.D. scholarship, Center for Advanced Security Research Darmstadt (CASED)[ expand ]
16:55 [Job][New]Post-Doc, Technical University Denmark, Copenhagen[ expand ]



2012-04-26
21:47 [Event][New]ACM STC: The Seventh ACM Workshop on Scalable Trusted Computing[ expand ]
12:09 [PhD][Update]Kazuo Sakiyama: Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems[ expand ]
09:01 [PhD][Update]Amos Beimel: Secure Schemes for Secret Sharing and Key Distribution[ expand ]


2012-04-25
07:14 [Event][Update]CARDIS 2012: Eleventh Smart Card Research and Advanced Application Conference[ expand ]


2012-04-24
15:54 [Event][New]CARDIS 2012: Eleventh Smart Card Research and Advanced Application Conference[ expand ]


2012-04-23
20:24 [Job][New]PhD. student, Orange Labs Caen (France)[ expand ]
20:19 [Event][New]EuroPKI 2012: 9th European PKI Workshop: Research and Applications[ expand ]
09:23 [Event][Update]ProvSec 2012: The Sixth International Conference on Provable Security[ expand ]
00:17 [Pub][ePrint]Perfect Algebraic Immune Functions, by Meicheng Liu and Yin Zhang and Dongdai Lin[ expand ]
00:17 [Pub][ePrint]Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices, by Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama[ expand ]
00:17 [Pub][ePrint]On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks, by Yusong Du, and Fangguo Zhang[ expand ]
00:17 [Pub][ePrint]Adaptive Preimage Resistance Analysis Revisited:\\\\ Requirements, Subtleties and Implications, by Donghoon Chang and Moti Yung[ expand ]
00:17 [Pub][ePrint]A New Guess-and-Determine Attack on the A5/1, by Jay Shah and Ayan Mahalanobis[ expand ]
00:17 [Pub][ePrint]Hedged Public-key Encryption: How to Protect against Bad Randomness, by Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek[ expand ]
00:17 [Pub][ePrint]Private Fingerprint Matching, by Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona[ expand ]
00:17 [Pub][ePrint]Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams, by T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu[ expand ]
00:17 [Pub][ePrint]Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
00:17 [Pub][ePrint]Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts, by Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler[ expand ]
00:17 [Pub][ePrint]Quadratic Span Programs and Succinct NIZKs without PCPs, by Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova[ expand ]
00:17 [Pub][ePrint]Automatic Search of Truncated Impossible Differentials and Applications, by Shengbao Wu, Mingsheng Wang[ expand ]
00:17 [Pub][ePrint]Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions, by Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong[ expand ]
00:17 [Pub][ePrint]Almost-Everywhere Secure Computation with Edge Corruptions, by Nishanth Chandran and Juan Garay and Rafail Ostrovsky[ expand ]



2012-04-22
09:17 [Pub][ePrint]Cryptanalysis of Hummingbird-2, by Kai Zhang, Lin Ding and Jie Guan[ expand ]
09:17 [Pub][ePrint](Pseudo) Preimage Attack on Round-Reduced Gr{\\o}stl Hash Function and Others (Extended Version), by Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou[ expand ]


2012-04-18
18:01 [PhD][New]Tolga Acar: High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems[ expand ]
16:52 [Event][Update]FSE 2013: Fast Software Encryption[ expand ]
08:17 [Event][New]FSE 2013: Fast Software Encryption[ expand ]


2012-04-17
21:12 [Event][New]STM 2012: 8th International Workshop on Security and Trust Management[ expand ]
18:42 [News]Fellows 2012[ expand ]


2012-04-16
23:01 [News]IACR Minutes[ expand ]
08:05 [News]Double Crypto? - on Publication Bandwidth[ expand ]
07:53 [Conf][FSE]Report on FSE 2012[ expand ]
00:17 [Pub][ePrint]Information-flow control for programming on encrypted data, by J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman[ expand ]



2012-04-15
15:59 [Event][New]Eurocrypt 2013[ expand ]


2012-04-14
18:11 [Event][New]CANS 2012: The 11th International Conference on Cryptology and Network Security[ expand ]
06:46 [Event][Update]FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography[ expand ]


2012-04-13
18:17 [Pub][ePrint]Comment an Anonymous Multi-receiver Identity-based Encryption Scheme, by J.H.Zhang, Y.B.cui[ expand ]
18:17 [Pub][ePrint]Unique Group Signatures, by Matthew Franklin and Haibin Zhang[ expand ]
18:17 [Pub][ePrint]Robust biometric-based user authentication scheme for wireless sensor networks, by Debiao He[ expand ]
18:17 [Pub][ePrint]Secure Similarity Coefficients Computation with Malicious Adversaries, by Bo Zhang and Fangguo Zhang[ expand ]
09:17 [Pub][ePrint]On the Security of an Improved Password Authentication Scheme Based on ECC, by Ding Wang and Chun-guang Ma[ expand ]
09:17 [Pub][ePrint]On The Security of One-Witness Blind Signature Schemes, by Foteini Baldimtsi and Anna Lysyanskaya[ expand ]
09:17 [Pub][ePrint]Multi-Instance Security and its Application to Password-Based Cryptography, by Mihir Bellare and Stefano Tessaro and Thomas Ristenpart[ expand ]
09:17 [Pub][ePrint]The BlueJay Ultra-Lightweight Hybrid Cryptosystem , by Markku-Juhani O. Saarinen[ expand ]
09:17 [Pub][ePrint]A Multivariate based Threshold Ring Signature Scheme, by Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann[ expand ]
09:17 [Pub][ePrint]An Efficient Homomorphic Encryption Protocol for Multi-User Systems, by Liangliang Xiao and Osbert Bastani and I-Ling Yen[ expand ]
09:17 [Pub][ePrint]Extending Order Preserving Encryption for Multi-User Systems, by Liangliang Xiao and I-Ling Yen and Dung T. Huynh[ expand ]
09:17 [Pub][ePrint]Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes, by Liangliang Xiao and I-Ling Yen[ expand ]
09:17 [Pub][ePrint]Aggregate Signcryption, by Alexander W. Dent[ expand ]
09:17 [Pub][ePrint]Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm, by Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault[ expand ]
09:17 [Pub][ePrint]Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures, by Jae Hong Seo and Jung Hee Cheon[ expand ]
08:59 [Event][New]Provable Privacy Workshop[ expand ]


2012-04-12
07:49 [News]CryptoDB updates[ expand ]



2012-04-11
21:17 [Pub][ePrint]Third-order nonlinearities of some biquadratic monomial Boolean functions, by Brajesh Kumar Singh[ expand ]
21:17 [Pub][ePrint]Replay attacks that violate ballot secrecy in Helios, by Ben Smyth[ expand ]
21:17 [Pub][ePrint]SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version), by Christian Wachsmann and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar[ expand ]
21:17 [Pub][ePrint]Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification, by Xin Li[ expand ]
21:17 [Pub][ePrint]Universally Composable Key-Management, by Steve Kremer and Robert Künnemann and Graham Steel[ expand ]
18:17 [Pub][ePrint]Quantum Money from Hidden Subspaces, by Scott Aaronson and Paul Christiano[ expand ]
18:17 [Pub][ePrint]Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication, by Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
18:17 [Pub][ePrint]Zero Knowledge with Rubik\'s Cubes, by Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF[ expand ]
18:17 [Pub][ePrint]Automatically Verified Mechanized Proof of One-Encryption Key Exchange, by Bruno Blanchet[ expand ]
18:17 [Pub][ePrint]Optimal First-Order Masking with Linear and Non-Linear Bijections, by Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER[ expand ]
18:17 [Pub][ePrint]Everlasting Quantum Security, by Unruh, Dominique[ expand ]
18:17 [Pub][ePrint]Improvements of Algebraic Attacks Based on Structured Gaussian Elimination, by Satrajit Ghosh and Abhijit Das[ expand ]
18:17 [Pub][ePrint]Towards Billion-Gate Secure Computation with Malicious Adversaries, by Benjamin Kreuter and abhi shelat and Chih-hao Shen[ expand ]
18:17 [Pub][ePrint]Eperio: Mitigating Technical Complexity in Cryptographic Election Verification, by Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams[ expand ]
18:17 [Pub][ePrint]Yet Another SHA-3 Round 3 FPGA Results Paper, by Brian Baldwin and William P. Marnane[ expand ]
18:17 [Pub][ePrint]How to Construct Quantum Random Functions, by Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange, by Nils Fleischhacker and Mark Manulis and Amir Sadr-Azodi[ expand ]
18:17 [Pub][ePrint]Asymptotic fingerprinting capacity in the Combined Digit Model, by Dion Boesten and Boris Skoric[ expand ]
18:17 [Pub][ePrint]Differentially Private Smart Metering with Battery Recharging, by Michael Backes and Sebastian Meiser[ expand ]
07:42 [News]Web-Site Update of the IACR[ expand ]


2012-04-09
16:20 [Job][New]Senior Lecturer of Theoretical Computer Science, University of Tartu, Estonia[ expand ]
16:19 [Event][New]ASK 2012: The Second Asian Workshop on Symmetric Key Cryptography[ expand ]
16:18 [Event][New]ACSAT: Conference on Advanced Computer Science Applications and Technology[ expand ]
06:17 [Job][New]Postdoctoral Research Associate in Hardware Trust and Security, Polytechnic Institute of New York University, USA[ expand ]


2012-04-06
18:07 [Event][New]ICISC '12: International Conference on Information Security and Cryptology[ expand ]


2012-04-05
18:42 [Job][New]PhD Position in Engineering Cryptographic Protocols , EC SPRIDE - European Center for Security and Privacy by Design, TU Darmstadt, Germany [ expand ]
18:34 [Event][New]ERCIM News 90: ERCIM News: Special Issue on Cybercrime and privacy issues[ expand ]
18:33 [Job][New]Postdoctoral Researcher, University of Maryland, USA[ expand ]



2012-04-03
09:11 [Event][Update]ESORICS 2012: 17th European Symposium on Research in Computer Security[ expand ]


2012-04-01
12:39 [Pub][ePrint]Approaches for the performance increasing of software implementation of integer multiplication in prime fields, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]
12:39 [Pub][ePrint]Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers, by Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan[ expand ]
12:39 [Pub][ePrint]A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes, by Val\\\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich[ expand ]
12:20 [Pub][JoC]Mercurial Commitments with Applications to Zero-Knowledge Sets[ expand ]
12:20 [Pub][JoC]A Note on the Bivariate Coppersmith Theorem[ expand ]
12:20 [Pub][JoC]On the Analysis of Cryptographic Assumptions in the Generic Ring Model[ expand ]
12:20 [Pub][JoC]A Single-Key Attack on the Full GOST Block Cipher[ expand ]


2012-03-30
08:05 [Job][Update]Ph.D scholarship, Newcastle University, UK[ expand ]
08:05 [Job][New]Ph.D scholarship, Newcastle University[ expand ]


2012-03-29
13:16 [PhD][Update]Joppe W. Bos: On the Cryptanalysis of Public-Key Cryptography[ expand ]
05:26 [Event][New]MIST 2012: Managing Insider Security Threats[ expand ]



2012-03-28
15:42 [Event][New]ICISS 2012: 8th International Conference on Information Systems Security 2012[ expand ]
11:01 [Event][Update]SCN 2012: 8th Conference on Security and Cryptography for Networks[ expand ]
05:35 [Event][New]MMM-ACNS-2012: Sixth International Conference MMM-ACNS-2012[ expand ]


2012-03-27
07:32 [Event][New]SecureComm 2012: 8th International Conference on Security and Privacy in Communication Netwo[ expand ]
07:29 [Job][New]Lecturer/Senior Lecturer in Computing (incl. IT Security and Crypto), 2 Positions, University of Surrey, United Kingdom[ expand ]


2012-03-26
11:18 [PhD][New]Joppe W. Bos: On the Cryptanalysis of Public-Key Cryptography[ expand ]
11:18 [PhD][New]Arjen K. Lenstra[ expand ]


2012-03-25
21:07 [PhD][New]Abdoul Aziz Ciss: Arithmétique et Extracteurs déterministes sur les courbes elliptiques[ expand ]
21:06 [PhD][New]Djiby Sow: Semi-modules[ expand ]
21:06 [PhD][New]Université Cheikh Anta Diop de Dakar-Sénégal[ expand ]



2012-03-23
14:11 [Event][New]CrossFyre 2012: Workshop on Cryptography, Robustness, and Provably Secure Schemes for Femal[ expand ]
06:41 [Event][New]CBC 2012: Code-based Cryptography Workshop 2012[ expand ]
06:40 [Event][New]DIAC: Directions in Authenticated Ciphers[ expand ]
06:40 [Event][New]IWDW'12: 11th International Workshop on Digital Forensics and Watermarking[ expand ]


2012-03-22
21:26 [Job][New]Post-Doc, Aalto University, Department of Information and Computer Science, Espoo, Finland[ expand ]


2012-03-20
21:49 [Job][New]Postdoc in Game Theoretic Privacy-Preservation applied to Data Mining, Loughborough University, UK[ expand ]
21:48 [PhD][Update]Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques[ expand ]
21:25 [Event][Update]CMS'2012: Communications and Multimedia Security[ expand ]


2012-03-19
07:46 [Event][New]ISC '12: Information Security Conference[ expand ]



2012-03-17
12:24 [Event][New]MoCrySEn 2012: 1st International Workshop on Modern Cryptography and Security Engineering[ expand ]


2012-03-16
11:14 [Job][New]Senior Cryptographer, Advanced Micro Devices (AMD) in Markham, Canada (Toronto Area)[ expand ]
11:14 [Job][New]Research Scientists in Cryptography, Temasek Laboraories, National University of Singapore, Singapore[ expand ]


2012-03-15
18:54 [Event][New]ICICS 2012: The 14th International Conference on Information and Communications Securit[ expand ]


2012-03-14
15:44 [Job][New]PhD Position in Public-Key Cryptography, Interdisciplinary Centre for Security, Reliability and Trust (SnT)[ expand ]
13:48 [Conf][EC]Conference Android App is now available[ expand ]
08:53 [PhD][New]Pierrick Gaudry[ expand ]
08:53 [PhD][New]Gaetan Bisson: Endomorphism Rings in Cryptography[ expand ]



2012-03-13
17:20 [Event][New]FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography[ expand ]
09:23 [Event][New]Workshop on the Theory and Practice of Multiparty Computation[ expand ]
07:16 [Job][New]Research Scientists (System Security), A*STAR, Data Storage Institute, Singapore[ expand ]


2012-03-12
15:00 [Event][New]SPACE'12: Int. Conference on Security, Privacy and Applied Cryptography Engineering[ expand ]
13:34 [Job][New]Qua­li­fi­ca­ti­ons Fel­lows (DFG - Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
13:10 [Job][New]Ph.D. (DFG-Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
12:52 [Job][New]Post Doc (DFG - Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
05:57 [Event][New]ACSA-SUMMER 2012: FTRA Int. Symp. on Advances in Cryptography, Security and Applications[ expand ]


2012-03-11
19:13 [Conf][EC]Early registration deadline is this week. To save money book now.[ expand ]


2012-03-10
16:36 [Event][New]CTCrypt 2012: Workshop on Current Trends in Cryptology[ expand ]



2012-03-09
13:54 [Event][New]WISA 2012: The 13th International Workshop on Information Security Applications[ expand ]
13:53 [Event][New]IEEE TIFS: SI on Privacy & Trust Management in Cloud & Distributed Systems[ expand ]
13:51 [Job][New]Post-Doctoral Fellowship, Ecole Normale Superieure de Lyon / INRIA[ expand ]
13:51 [Job][New]Scholarship/Student Jobs, Master in Computer Science, University of Luxembourg[ expand ]


2012-03-08
11:00 [Conf][PKC]PKC 2012 : Call for Participation[ expand ]


2012-03-06
10:43 [Conf][EC]Eurocrypt 2012 has now passed the 200 registrants milestone[ expand ]


2012-03-05
09:38 [Job][New]Research Fellow of Cryptography, University of Tartu, Estonia[ expand ]
06:19 [Event][Update]SECRYPT 2012: 9th International Conference on Security and Cryptography[ expand ]
06:15 [Event][New]SICK'12: IEEE LCN Workshop on Security in Communications Networks[ expand ]



2012-03-04
16:11 [Job][New]Ph.D studentship, School of Computing Science, Newcastle University, UK[ expand ]
14:04 [Conf][EC]Traditional English Treat : Homemade scones, jam and cream[ expand ]


2012-03-02
14:42 [Event][New]HotPETs'12: 5th Hot Topics in Privacy Enhancing Technologies[ expand ]
14:40 [Job][New]PhD student and Postdoc positions, Laboratory of Algorithmics, Cryptography and Security (LACS), University of Luxembourg[ expand ]
14:40 [Job][New]Funded PhD + Database architect position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France[ expand ]


2012-02-29
16:59 [Job][New]Funded PhD + Hardware designer position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France[ expand ]


2012-02-27
16:15 [Event][New]DPM'12: 7th DPM International Workshop on Data Privacy Management[ expand ]
14:02 [Job][New]Ph.D. student, Université Jean Monnet - Saint-Etienne - France[ expand ]



2012-02-25
20:05 [Event][New]ACISP'12: The 17th Australasian Conference on Information Security and Privacy[ expand ]


2012-02-23
07:25 [PhD][New]Essam Ghadafi: Practical Privacy-Preserving Cryptographic Protocols[ expand ]
07:25 [PhD][New]Bogdan Warinschi[ expand ]
07:19 [Event][Update]Latincrypt 2012: Second International Conference on Cryptology and Information Security[ expand ]
07:17 [Event][New]Latincrypt 2012: Second International Conference on Cryptology and Information Security[ expand ]


2012-02-21
17:18 [Job][New]Post-doctoral Researchers , Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK[ expand ]
06:30 [Event][Update]ICITS 2012: Sixth International Conference on Information-Theoretic Security[ expand ]
06:29 [Event][Update]ICITS: International Conference on Information Theoretic Security[ expand ]


2012-02-20
11:39 [Job][New]Post-Doc, Technicolor, Security Laboratories[ expand ]
10:49 [Event][New]SeCIHD'12: Int. Workshop on Security and Cognitive Informatics for Homeland Defense[ expand ]



2012-02-17
06:11 [Event][New]IWSEC2012: The 7th International Workshop on Security[ expand ]


2012-02-16
17:18 [Conf][TCC]TCC Student support[ expand ]
17:15 [Conf][TCC]Early Registration Deadline for TCC is today![ expand ]
16:42 [Event][Update]ISCISC '2012: 9th International ISC conference of Information Security and Cryptology[ expand ]
16:41 [Event][New]SAPSE '12: 4th IEEE International Workshop on Security Aspects of Process and Services[ expand ]


2012-02-15
21:03 [Conf][EC]All stipends for Eurocrypt have now been allocated[ expand ]
13:11 [Conf][EC]The Eurocrypt LNCS volume will be number 7237[ expand ]


2012-02-14
12:10 [Event][New]STAST2012: Socio-Technical Aspects of Security and Trust[ expand ]
12:09 [Job][New]Post Doctoral Fellowship , Hewlett Packard Labs, India[ expand ]



2012-02-13
20:54 [Event][New]Summer School on Tools[ expand ]
10:06 [News]Help needed! List of Crypto-Speakers[ expand ]


2012-02-11
14:07 [Event][New]YACC'12: Yet Another Conference on Cryptography[ expand ]


2012-02-09
23:23 [Event][New]TATRACRYPT '12: The 12th Central European Conference on Cryptology[ expand ]


2012-02-08
18:21 [Event][Update]PAIRING 2012: 5th International Conference on Pairing-Based Cryptography[ expand ]
10:27 [Event][New]Indocrypt 2012[ expand ]



2012-02-06
20:14 [Job][New]Ph.D. students, Nanyang Technological University, Singapore[ expand ]
20:14 [Job][New]Research Fellows, Nanyang Technological University, Singapore[ expand ]
15:30 [Job][New]Ph.D. student scholarship, Universitat Rovira i Virgili[ expand ]
06:21 [Event][Update]ACNS 2012: 10th International Conference on Applied Cryptography and Network Security[ expand ]
06:16 [Event][New]ISCISC '2012: 9th International ISC conference of Information Security and Cryptology[ expand ]


2012-02-05
06:32 [Job][Update]Faculty Positions in Computer Science, Ozyegin University, Istanbul, Turkey[ expand ]
06:32 [Job][New]Faculty Positions in Computer Science, Ozyegin University[ expand ]
06:31 [Job][New]Postdoc , Pennsylvania State University, University Park, PA, USA[ expand ]


2012-02-03
21:04 [Conf][Crypto]Crypto 2012 online submission is open[ expand ]


2012-02-02
16:33 [Event][New]SOWN2012: 2nd International Workshop on Security & Optimization for Wireless Networks[ expand ]
16:18 [Event][New]SECRYPT 2012: 9th International Conference on Security and Cryptography[ expand ]



2012-01-24
09:05 [Event][New]CMS'2012: Communications and Multimedia Security[ expand ]


2012-01-23
12:02 [Job][New]Senior Researcher / Post-Doc, TU Berlin[ expand ]


2012-01-22
13:06 [Event][Update]Asiacrypt 2012[ expand ]


2012-01-20
16:10 [Event][New]IEEE DEST-CEE 2012: 6th IEEE Inter. Conf. on Digital Ecosystems Technologies[ expand ]
15:42 [Job][New]Post-Doctoral Research Assistant in Cryptography, Information Security Group - Royal Holloway, University of London[ expand ]
14:41 [Job][New]Faculty positions, Saarland University, Saarbrücken, Germany[ expand ]



2012-01-19
13:06 [Event][New]IEEE ACS 2012: 2nd IEEE International Symposium on Anonymity and Communication Systems[ expand ]


2012-01-18
06:49 [Event][New](IJCSS): CFP - International Journal of Computer Science and Security[ expand ]


2012-01-14
13:11 [Event][New]SNDS 2012: Int Conference on Security in Computer Networks and Distributed Systems[ expand ]


2012-01-13
17:43 [Job][New]Postdoc Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany[ expand ]
17:43 [Job][New]PhD Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany[ expand ]
09:23 [Event][New]SecIoT 2012: 2012 Workshop on the Security of the Internet of Things[ expand ]
08:26 [Event][New]MNCApps: International Conference on Advances in Mobile Network, Communication[ expand ]



2012-01-12
09:55 [Job][New]Doctoral Researcher in Cybersecurity (Resilient Critical Infrastructures), Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt[ expand ]
09:55 [Job][New]Post-Doc in Privacy & Trust (group leader, coordinator) , Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt[ expand ]
06:37 [Event][New]WCEBW2012: The World Congress on E-commerce and Business on the Web[ expand ]
06:33 [Job][New]Assistant/Associate Professor in Cryptography, Technical University of Denmark[ expand ]


2012-01-11
17:23 [Event][Update]SAC 2012: The Conference on Selected Areas in Cryptography[ expand ]
17:23 [Event][New]SAC 2012: The Conference on Selected Areas in Cryptography[ expand ]
08:57 [PhD][Update]Peter Schwabe: High-Speed Cryptography and Cryptanalysis[ expand ]
08:57 [PhD][New]Julia Borghoff: Cryptanalysis of Lightweight Ciphers[ expand ]
08:56 [PhD][New]Lars Ramkilde Knudsen[ expand ]
08:56 [PhD][New]Tanja Lange[ expand ]


2012-01-10
13:03 [Job][New]Ph.D. Students, Post-Docs, Intel-TU Darmstadt Security Institute, Germany[ expand ]


2012-01-08
17:01 [Conf][EC]Registration is now open[ expand ]



2012-01-06
05:06 [Event][New]NSS 2012: The 6th International Conference on Network and System Security[ expand ]


2012-01-05
07:36 [Event][Update]WAIFI 2012: International Workshop on the Arithmetic of Finite Fields[ expand ]


2012-01-04
16:34 [Job][New]Post-Doc, University of Bristol[ expand ]
08:03 [Event][New]FutureTech 2012: The 7th FTRA International Conference on Future Information Technology[ expand ]


2012-01-03
15:37 [Event][New]VI-MSS: Mathematical and Statistical Aspects of Cryptography[ expand ]
13:31 [Job][New]Post-Doc, Bar-Ilan University, Tel-Aviv Area, Israel[ expand ]
06:34 [News]Videos of IACR lectures in cryptodb and youtube[ expand ]



2012-01-02
22:08 [Event][Update]SEC '12: 21st USENIX Security Symposium[ expand ]
22:08 [Event][New]SEC '12: 21st USENIX Security Symposium (Crypt)[ expand ]
11:24 [Conf][EC]Eurocrypt Programme Now Available[ expand ]


2011-12-30
07:09 [Event][Update]Stream Ciphers: Special Issue on[ expand ]


2011-12-28
20:17 [Job][New]Senior researcher with a strong background on cryptology, Galician Research and Development Center in Advanced Telecommunications (GRADIANT) Vigo, Spain [ expand ]


2011-12-26
21:33 [Job][New]Ph.D. positions in applied cryptography / network security / privacy, University of Surrey, United Kingdom[ expand ]



2011-12-23
16:53 [Event][New]ICITeS'2012: 2nd IEEE International Conference on Information Technology a[ expand ]
08:04 [Job][New]Research Scientist, Temasek Laboratories, National University of Singapore[ expand ]
06:43 [Event][New]SHARCS 2012: Special-Purpose Hardware for Attacking Cryptographic Systems[ expand ]


2011-12-22
09:00 [Job][New]PhD position in Security of Industrial Control Systems, University of Twente[ expand ]
08:59 [Event][New]ESORICS 2012: 17th European Symposium on Research in Computer Security[ expand ]


2011-12-20
15:46 [PhD][New]Arshad Ali: New Attacks on FCSR-based Stream Ciphers[ expand ]


2011-12-19
21:38 [PhD][New]Robert Granger: On Small Degree Extension Fields in Cryptology[ expand ]
06:36 [Event][Update]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:34 [Event][New]ANTS-X: Tenth Algorithmic Number Theory Symposium[ expand ]



2011-12-18
16:12 [Conf][EC]List of Accepted Papers[ expand ]
11:00 [Job][New]Research Assistant in Secure Software Engineering, European Center for Security and Privacy by Design, Darmstadt, Germany[ expand ]


2011-12-16
12:12 [Job][New]Security Engineer and Consultant for Germany , ESCRYPT GmbH, Bochum/Munich/Wolfsburg, Germany[ expand ]


2011-12-15
22:52 [Conf]188 Submissions at PKC 2012[ expand ]
14:20 [Event][New]esIoT: International Workshop on Extending Seamlessly to the Internet of Things[ expand ]
05:49 [Job][New]Ph.D. and postdoctoral positions, IMDEA Software Institute, Spain[ expand ]


2011-12-14
21:02 [Job][New]Postdoctoral/ Research Fellow - Information Security group, University of Calgary[ expand ]
15:15 [Job][New]Security Engineer and Consultant for USA, ESCRYPT Inc., Ann Arbor, Michigan, USA[ expand ]
14:26 [PhD][New]Filipe Beato: Privacy Preserving Information Sharing in Online communities[ expand ]
10:35 [Job][New]Post-Doc in Information Security, University of Twente[ expand ]
10:35 [Job][New]Post-Doc in Security of Industrial Control Systems, University of Twente[ expand ]
06:28 [Job][New]Post-Doctoral or Research Professor Positions , Seoul National University, Korea[ expand ]
06:27 [Job][New]Two fully funded PhD student positions in Information Security, University off Twente[ expand ]



2011-12-12
05:21 [Job][New]Tenure-Track position in Information Security , University of Twente, The Netherlands[ expand ]


2011-12-11
10:20 [PhD][New]Souradyuti Paul: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition[ expand ]


2011-12-10
19:01 [Event][New]ICDIPC2012: 2nd Inter. Conference on Digital Information Processing and Communications[ expand ]


2011-12-09
10:24 [Job][New]Ph.D. student scholarships, Center for Advanced Security Research Darmstadt (CASED), Germany[ expand ]
10:24 [Job][New]Full professor in Computer Security, KTH Royal Institute of Technology[ expand ]
08:42 [Conf][EC]Eurocrypt Stipends[ expand ]



2011-12-08
06:22 [PhD][New]Florian Mendel: Analysis of Cryptographic Hash Functions[ expand ]


2011-12-06
20:44 [Conf][FSE]Registration Now Open[ expand ]


2011-12-04
15:54 [Event][New]PAIRING 2012: 5th International Conference on Pairing-Based Cryptography[ expand ]
07:01 [PhD][New]Karim Abdellatif: Hardware Architectures for Cryptography[ expand ]
07:01 [PhD][New]Habib Mehrez[ expand ]


2011-12-03
10:26 [Job][New]Software Security Engineer (All Levels), Qualcomm Incorporated[ expand ]
10:25 [Event][New]Inscrypt'2012: The 8th China International Conference on Information Security and Cryptolo[ expand ]



2011-12-02
10:01 [Event][New]HOST'12: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST[ expand ]
07:45 [PhD][New]Christiane Peters: Curves, Codes, and Cryptography[ expand ]
05:17 [Event][Update]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]


2011-11-30
23:33 [Event][Update]TRUST 2012: 5th International Conference on Trust and Trustworthy Computing[ expand ]
23:32 [Event][New]RFIDSec'12: The 8th workshop of RFID security and privacy[ expand ]
23:30 [Job][New]PhD student, Norwegian Information Security Laboratory, GUC[ expand ]


2011-11-28
15:08 [Event][New]SECOTS 2012: Intl. Symposium on Security in Collaboration Technologies and Systems[ expand ]
15:06 [Job][New]Ph.D. Students and Post-Doc, University of Luxembourg[ expand ]


2011-11-25
13:58 [Conf][EC]Report on Eurocrypt 2011, May 15-19, 2011, Tallinn, Estonia [ expand ]
13:56 [Conf]Report on SECRYPT 2011, July 18-21, 2011, University of Seville, Spain[ expand ]
13:52 [Event][New]ARES 2012: 7th International Conference on Availability, Reliability and Security[ expand ]
09:42 [Event][New]ISCTURKEY2012: 5th International Conference on Information Security and Cryptology[ expand ]
08:20 [News]Newsletter Autumn 2011[ expand ]



2011-11-24
14:08 [Event][New]WISTP 2012: Sixth Workshop in Information Security Theory and Practice[ expand ]
06:17 [Job][New]Lecturer/Senior Lecturer, University of Wollongong, Australia[ expand ]


2011-11-23
09:42 [Conf][FSE]FSE 2012: 90 submissions received[ expand ]


2011-11-22
18:46 [Event][New]FIRST 2012: 24th Annual FIRST Conference on Computer Security and Incident Response[ expand ]


2011-11-20
16:32 [Job][New]Cryptography Architect, CipherCloud, Hyderabad, India[ expand ]
16:30 [Event][New]2nd Bar-Ilan Winter School on Cryptography: Lattice-Based Cryptography and[ expand ]



2011-11-18
06:49 [Event][Update]Is Cryptographic Theory Practically Relevant?[ expand ]
06:48 [Event][Update]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
06:44 [Event][New]Asiacrypt 2012[ expand ]
06:44 [Event][New]Crypto 2013[ expand ]
06:27 [Conf]Report on Theory of Cryptography Conference 2011 (TCC), March 28-30, 2011, Providence, RI, USA[ expand ]


2011-11-17
11:03 [Event][New]TRUST 2012[ expand ]
07:35 [Event][New]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:52 [Conf]Africacrypt 2012[ expand ]
06:22 [Election]Results 2011[ expand ]


2011-11-16
12:29 [PhD][New]Berkant Ustaoglu: Key establishment - security models, protocols and usage[ expand ]
12:00 [Conf][FSE]FSE submission server will close in 24 hours (Nov. 17, 11:59 AM UTC)[ expand ]


2011-11-15
10:13 [News]Eli Biham to hold Distinguished Lecture 2013[ expand ]
10:12 [News]Dan Boneh to hold Distinguished Lecture 2012[ expand ]



2011-11-14
18:09 [Job][New]Experienced Researchers in Cryptology, Galician Research and Development Center in Advanced Telecommunications (Gradiant), Vigo, Spain[ expand ]
10:02 [Job][New]IT Hardware Security Engineer – Smartcards, APPLUS - LGAI DIVISION Barcelona[ expand ]


2011-11-12
15:24 [Conf]Report on Fault Diagnosis and Tolerance in Cryptography Workshop (FDTC 2011) September 28, 2011, Nara, Japan (ICW)[ expand ]


2011-11-11
14:48 [Conf]Report on Africacrypt 2011 (ICW)[ expand ]
13:13 [Event][Update]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]
06:43 [Conf]Report on CHES 2011, Nara, Japan, Sept 28-Oct 1[ expand ]
06:40 [Conf]Report on Public Key Cryptography 2011 (PKC), March 6-9, 2011, Taormina, Italy[ expand ]


2011-11-08
06:46 [Conf]Report on Crypto 2011[ expand ]
06:07 [Event][New]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]



2011-11-07
16:34 [Event][New]CSP EU Forum: Cybersecurity and Privacy EU Forum 2012[ expand ]
10:56 [Conf]Report on SAC 2011, Ontario, Canada (ICW)[ expand ]


2011-11-04
12:47 [Job][New]Mathematicians , GCHQ, UK[ expand ]


2011-11-03
18:29 [PhD][New]Mark Manulis: Provably Secure Group Key Exchange[ expand ]
14:30 [Event][New]PST 2012: 10th Annual Conference on Privacy, Security and Trust[ expand ]
14:29 [Event][New]DBSEC 2012: 26th Annual WG 11.3 Conference on Data and Applications Security and Privac[ expand ]


2011-11-01
18:15 [Job][New]Mathematicians (graduate entry level), GCHQ, UK[ expand ]
16:34 [Event][New]SHA3@ISI: Hash Workshop on SHA3 Finalists[ expand ]



2011-10-29
15:29 [PhD][New]Yves Mathieu[ expand ]
15:26 [PhD][New]Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique[ expand ]


2011-10-28
17:41 [Job][New]Ph.D. Student, Signal Processing in Communications Group, University of Vigo, Spain[ expand ]
17:40 [Job][New]Technical Support Engineer - Encryption, Acumin[ expand ]


2011-10-27
20:38 [Conf]Report on InfoSecHiComNet 2011, October 19-22, Haldia, India[ expand ]


2011-10-25
19:31 [PhD][New]Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography[ expand ]



2011-10-24
15:44 [Event][New]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
15:34 [Event][New]SCC2012: Third international conference on Symbolic Computation and Cryptography[ expand ]
15:09 [Event][New]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]


2011-10-22
15:52 [Event][New]ACE-2012: Third International Conference on Advances in Computer Engineering - ACE 20[ expand ]
15:50 [Job][New]Post-Doc, Ben-Gurion university, Beer-Sheva, Israel[ expand ]


2011-10-21
08:00 [Conf][FSE]FSE 2012 deadline: November 17, 11:59 AM UTC[ expand ]


2011-10-14
08:25 [Job][New]Post-Doc, University of British Columbia, Vancouver, Canada[ expand ]



2011-10-13
20:20 [Event][Update]Crypto 2012[ expand ]
15:26 [Job][Update]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
15:25 [Job][New]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
12:01 [Event][New]ProvSec 2012: The Sixth International Conference on Provable Security[ expand ]
11:50 [Job][New]Two Post-Docs, University of Luxembourg[ expand ]
06:38 [PhD][New]Mehmet Sabir Kiraz: Secure and Fair Two-Party Computation[ expand ]
06:37 [PhD][New]Berry Schoenmakers[ expand ]


2011-10-12
06:53 [Job][New]Research Scientist, National University of Singapore, Singapore[ expand ]
05:50 [Event][New]SETA 2012: The 7th International Conference on Sequences and Their Applications[ expand ]


2011-10-11
12:28 [Event][New]SCN 2012: 8th Conference on Security and Cryptography for Networks[ expand ]


2011-10-10
12:15 [Event][Update]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]



2011-10-07
19:45 [Election]15.2% participation within the first week[ expand ]
13:16 [Job][Update]MSc student, University of Warsaw[ expand ]
13:12 [Job][New]MSc student, University of Warsaw[ expand ]


2011-10-06
06:20 [Event][New]ICACM 2012: International Conference on Applied and Computational Mathematics[ expand ]
06:08 [Event][New]WAIFI 2012: International Workshop on the Arithmetic of Finite Fields[ expand ]


2011-10-05
16:19 [Job][New]Post-Doc Position in Information Security (Quantum Key Distribution), ID Quantique, Geneva, Switzerland[ expand ]
16:19 [Job][New]Post-Doc, Tel Aviv Universaity, Israel[ expand ]


2011-10-04
17:59 [Conf][EC]194 submissions at Eurocrypt[ expand ]



2011-10-03
20:31 [Event][New]DICTAP 2012: 2nd Digital Information & Communication Technology & its Applicatiions Conf[ expand ]
15:53 [Event][New]Third SHA-3 Candidate Conference[ expand ]


2011-10-01
17:46 [Election]6.3% participation within 24h [ expand ]


2011-09-29
04:51 [Job][New]3 Security Experts in Network/SW and HW/Smartcards, LGAI Applus+, Barcelona, Spain[ expand ]
04:50 [Job][New]PhD Studentship, University of Cambridge[ expand ]
04:50 [Job][New]PhD Studentship in Mobile Payments, University of Cambridge[ expand ]


2011-09-28
05:58 [PhD][Update]Mark D. Ryan: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning[ expand ]
05:57 [PhD][New]Ben Smyth: Formal verification of cryptographic protocols with automated reasoning[ expand ]
05:57 [PhD][New]Mark D. Ryan[ expand ]



2011-09-27
22:01 [Job][New]Postdoc, Ruhr University Bochum[ expand ]


2011-09-25
16:07 [Election]List of Candidates Available[ expand ]
10:33 [Job][New]PhD in Network Security and Computer Forensics, University of Bristol[ expand ]


2011-09-23
11:48 [Job][New]Post-Doc, Computer Science and Technology Centre (CCTC) at Universidade do Minho, Braga, Portugal[ expand ]


2011-09-22
14:22 [Job][New]Four Post-Doc Positions in Security and Privacy, Universitat Rovira i Virgili[ expand ]
05:17 [Job][New]Post-Doc, University of Warsaw[ expand ]



2011-09-20
08:37 [PhD][New]Goutam Paul: Analysis and Design of RC4 and Its Variants[ expand ]
08:34 [Event][New]WiSec 2012: The Fifth ACM Conference on Wireless Network Security[ expand ]


2011-09-19
11:10 [Job][New]Ph.D. student, University of Luxembourg[ expand ]
08:22 [Job][New]Research Scientists , Institute for Infocomm Research, Singapore[ expand ]


2011-09-17
18:01 [Event][New]CFP - ISeCure Special Issue on Information Hiding[ expand ]


2011-09-16
16:27 [Job][Update]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]



2011-09-15
17:41 [PhD][New]Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques[ expand ]
17:38 [Job][New]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]
17:37 [Event][New]PSD 2012: Privacy in Statistical Databases[ expand ]


2011-09-14
09:25 [Event][Update]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
09:24 [Event][New]ACISP 2012: The 17th Australasian Conference on Information Security and Privacy[ expand ]


2011-09-12
13:48 [Job][New]Post-Doc, Ecole normale superieure, Paris, France[ expand ]


2011-09-09
22:25 [Event][New]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]
05:34 [Event][Update]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
05:33 [Event][New]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
04:50 [Job][New]PhD student , University Paris 7[ expand ]



2011-09-08
16:12 [Job][New]PhD or Post-Doc Position, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-09-07
11:03 [Job][New]Lecturer in Cybersecurity, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:02 [Job][Update]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:01 [Job][New]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen's University Belfast, UK[ expand ]
07:09 [Event][New]Stream Ciphers: Special Issue on "Stream Ciphers" in the journal CCDS, Springer[ expand ]
05:15 [Job][New]Senior Lecturer/Associate Professor, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-09-06
08:37 [Job][Update]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]


2011-09-05
10:53 [Job][New]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]



2011-09-04
14:50 [PhD][Update]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]


2011-09-03
20:31 [PhD][New]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]
17:50 [News]Distinguished Lectures Online: Gus Simmons and Ron Rivest[ expand ]


2011-09-02
17:26 [PhD][Update]Thomas Schneider: Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
14:08 [PhD][New]Hans Ulrich Simon[ expand ]


2011-09-01
05:03 [Job][New]Post-Doc in Software Security/Cryptography, University of Arizona, Tucson AZ[ expand ]



2011-08-31
16:49 [PhD][Update]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
16:24 [Event][New]ECRYPT Workshop on Lightweight Cryptography[ expand ]


2011-08-30
20:28 [PhD][New]Gene Tsudik[ expand ]
20:28 [PhD][New]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
13:46 [PhD][New]Nicky Mouha: Analysis and Design of Cryptographic Hash Functions[ expand ]
04:48 [Job][New]Ph.D. Scholarships, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-29
09:23 [PhD][New]Jens Hermans: Lightweight public-key cryptography[ expand ]
07:59 [Event][New]SCIS 2012: The 29th Symposium on Cryptography and Information Security[ expand ]


2011-08-28
17:54 [News]Message from the IACR Board to the Japanese cryptologic community[ expand ]
17:53 [News]Message from the IACR Board w.r.t. CHES 2011[ expand ]
11:38 [Event][New]Is Cryptographic Theory Practically Relevant?[ expand ]



2011-08-27
23:05 [News][Book]Books Available for Review[ expand ]
20:03 [News][Review]New Book Reviews Available[ expand ]
18:58 [News]Membership Meeting Crypto 2011[ expand ]
18:20 [News]New Entries at the Archive[ expand ]
11:43 [Event][New]SEC 2012: 27th IFIP International Information Security and Privacy Conference[ expand ]
11:42 [Event][New]2011 AlKindi: The 2011 AlKindi Student Workshop on Cryptology[ expand ]


2011-08-26
12:15 [Election]IACR Elections: Nominations possible until September 18[ expand ]


2011-08-24
18:44 [Job][New]2 - 3 Research Fellow Positions, Nanyang Technological University, Singapore[ expand ]
18:43 [Job][New]Assistant Professor, Stevens Institute of Technology, Hoboken, NJ, USA[ expand ]
08:19 [Event][New]ICITS 2012: Sixth International Conference on Information-Theoretic Security[ expand ]


2011-08-23
17:24 [PhD][New]Chun-Yuan Hsiao: BUTTERFLY EFFECT IN CRYPTOGRAPHY: CONSEQUENCES OF CHANGES IN DEFINITIONS[ expand ]
16:46 [Event][New]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]



2011-08-22
08:26 [Event][New]Inscrypt'2011: The 7th China International Conference on Information Security & Cryptolyo[ expand ]


2011-08-21
18:54 [Event][New]ISPEC 2012: The 8th Int. Conference on Information Security Practice and Experience[ expand ]


2011-08-20
10:16 [PhD][New]Pradeep Kumar Mishra: Studies on Efficient and Secure Implementation of Elliptic and Hyperelliptic Curve Cryptosystems[ expand ]
10:16 [PhD][New]Palash Sarkar[ expand ]
10:16 [PhD][New]Ero Balsa: Privacy in online social networks: analysis and solutions[ expand ]


2011-08-16
17:23 [PhD][New]Scott Russell: Communication and Query Privacy: Intrusion-Resilient Secure Channels and Private Database Queries[ expand ]
17:23 [PhD][New]Anthony Van Herrewege: Security components for trusted computer systems[ expand ]



2011-08-15
00:06 [Event][Update]TCC 2012: Ninth Theory of Cryptography Conference[ expand ]


2011-08-12
05:51 [Job][New]Postdoctoral Researcher, University of Maryland[ expand ]
05:50 [Job][New]Lecturer, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-10
17:27 [PhD][New]Rafi Chen: New Techniques for Cryptanalysis of Cryptographic Hash Functions[ expand ]


2011-08-09
17:45 [PhD][Update]: Provable Security of Symmetric Primitives[ expand ]



2011-08-08
18:09 [PhD][New]Miroslav Knezevic: Efficient Hardware Implementations of Cryptographic Primitives[ expand ]
18:09 [PhD][New]Bart Mennink: Provable Security of Symmetric Primitives[ expand ]
18:07 [PhD][New]Yoni De Mulder: Design and Cryptanalysis of White-Box Implementations[ expand ]
18:07 [PhD][Update]: On Fairness in Secure Computation[ expand ]
11:21 [PhD][New]Carmela Troncoso: Design and analysis methods for privacy technologies[ expand ]
11:21 [PhD][New]Claudia Diaz[ expand ]
11:20 [PhD][New]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-07
14:22 [PhD][Update]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-06
16:58 [PhD][New]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]
16:58 [PhD][Update]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]


2011-08-05
20:50 [PhD][New]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
20:50 [PhD][New]Rene Govaerts[ expand ]
20:50 [PhD][New]Joos Vandewalle[ expand ]
20:50 [PhD][Update]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
13:52 [PhD][New]Roel Peeters: Study and Design of a Security Architecture for Things That Think[ expand ]
13:12 [PhD][New]Dave Singelee: Study and Design of a Security Architecture for Wireless Personal Area Networks[ expand ]
12:54 [PhD][New]Sebastiaan Indesteege: Analysis and Design of Cryptographic Hash Functions[ expand ]
06:31 [PhD][Update]Debdeep Mukhopadhyay: Design and Analysis of Cellular Automata Based Cryptographic Algorithms[ expand ]



2011-08-04
05:05 [Event][New]FloCon 2012: FloCon 2012 the 8th Annual Conference for Network Flow Analysis[ expand ]


2011-08-03
16:17 [PhD][Update]Leonid Reyzin: Zero-Knowledge with Public Keys[ expand ]


2011-08-02
11:28 [Job][Update]Ph.D studentship, Newcastle University[ expand ]
11:27 [Job][New]Ph.D studentship, Newcastle University[ expand ]


2011-07-30
18:42 [News]One-Time Pad was invented 35 years earlier by Frank Miller, not Vernam and Mauborgne[ expand ]



2011-07-27
15:07 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]
14:57 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]


2011-07-25
10:14 [Event][Update]FSE 2012: 19th International Workshop on fast software encryption[ expand ]
10:14 [Event][New]FSE 2012: 19th International Workshop on fast software encryption[ expand ]


2011-07-21
22:16 [Job][New]Ph.D. Scholarships, CASED / Darmstadt University of Technlogy, Germany[ expand ]
22:04 [PhD][New]S. Dov Gordon: On Fairness in Secure Computation[ expand ]
10:42 [PhD][New]Michael Hutter: Secure and Efficient Implementation of RFID Tags Supporting Cryptography[ expand ]


2011-07-19
14:56 [PhD][New]Urs Hengartner[ expand ]
14:56 [PhD][New]Jeremy Clark: Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections[ expand ]



2011-07-18
14:56 [Event][New]The science of secrecy: ciphers to cyberspace[ expand ]
13:27 [Job][New]Senior Researcher, Fraunhofer-Institut für Sichere Informationstechnologie, Darmstadt[ expand ]


2011-07-13
07:00 [Job][New]Two Postdocs, Information Security Group, Royal Holloway, University of London[ expand ]


2011-07-11
20:04 [Event][New]NordSec 2011: 16th Nordic Conference in Secure IT Systems[ expand ]
13:38 [Job][New]Post-doc in Computer Science or related area - Claude Shannon Fellow Program, Technische Universitaet Darmstadt[ expand ]


2011-07-10
21:34 [PhD][New]Dipanwita Roychowdhury[ expand ]
21:34 [Event][New]ASCrypto 2011: The Sao Paulo Advanced School of Cryptography[ expand ]
21:28 [PhD][New]Debdeep Mukhopadhyay[ expand ]
21:24 [PhD][New]Santosh Ghosh: Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields[ expand ]



2011-07-07
08:06 [Job][Update]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]
08:06 [Job][New]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]


2011-07-06
20:51 [Event][New]HPGC'11: Workshop on Human centric computing, P2P, Grid and Cloud computing[ expand ]
20:51 [Event][New]NIAT 2011: Non-Invasive Attack Testing Workshop[ expand ]


2011-07-04
10:05 [Event][New]WSPCC: Workshop on Cloud Computing (WSPCC), IMSAA-2011 Conference [ expand ]


2011-07-03
19:05 [PhD][New]Stefan Brands: [ expand ]
19:05 [PhD][New]Mohamed Layouni: Privacy-preserving Personal Information Management[ expand ]



2011-06-30
23:21 [Event][New]DATE 2012: Design Automation and Test in Europe Conference[ expand ]
19:24 [Event][Update]Crypto 2012 (tentative)[ expand ]
07:43 [Event][New]Cryptology2012: The 3rd International Conference on Cryptology and Computer Security 2012[ expand ]


2011-06-29
09:17 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
09:16 [Event][Update]Crypto 2012 (tentative)[ expand ]
09:16 [Job][Update]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-28
07:59 [Job][New]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-27
18:39 [Event][New]CT-RSA 2012: Cryptographers' Track - RSA Conference 2012[ expand ]
05:38 [Job][New]Post-Doc, Data Storage Institute, A*STAR, Singapore[ expand ]



2011-06-26
14:57 [Event][New]10th International Conference on Applied Cryptography and Network Security (ACNS 2012)[ expand ]


2011-06-25
12:18 [Event][Update]Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011)[ expand ]


2011-06-23
16:37 [Job][Update]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]
16:37 [Job][New]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]


2011-06-22
12:21 [Job][Update]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
04:42 [Event][New]Third International Workshop on Managing Insider Security Threats (MIST'11)[ expand ]



2011-06-21
15:03 [Event][New]IEEE Systems Journal - S. I. on Security and Privacy in Complex Systems (IEEE-SPCS)[ expand ]
06:16 [Event][Update]15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012)[ expand ]


2011-06-20
09:28 [Job][New]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
08:12 [PhD][Update]Marc Girault: Analysis and design of cryptographic and data coding algorithms[ expand ]


2011-06-19
17:48 [PhD][New]Cetin K. Koc: [ expand ]
17:47 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
17:47 [PhD][New]Thomas A. Schmidt: [ expand ]


2011-06-18
22:18 [Event][Update]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]
14:32 [Event][New]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]



2011-06-17
10:09 [Event][New]The 14th International Conference on Information Security and Cryptology (ICISC 2011)[ expand ]


2011-06-15
15:57 [Event][New]1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011)[ expand ]


2011-06-14
15:46 [Event][Update]The 2nd Workshop on the Security of the Internet of Things (SecIoT 2011) (SecIoT11)[ expand ]
08:58 [Event][Update]Eurocrypt 2012[ expand ]


2011-06-13
11:22 [PhD][Update]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
11:22 [PhD][New]Louis Goubin [ expand ]
11:21 [PhD][New]Alexandre Berzati Cryptographic Analysis of Algorithm Corruptions[ expand ]
11:21 [PhD][Update]Alexandre BERZATI Cryptographic Analysis of Algorithm Corruptions[ expand ]



2011-06-11
14:22 [Event][New]Tenth Smart Card Research and Advanced Application Conference()[ expand ]


2011-06-10
10:51 [Event][New]3rd IEEE International Workshop on Privacy Aspects Of Data Mining(PADM 2011)[ expand ]


2011-06-09
19:57 [PhD][New]Francois Koeune Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators[ expand ]
19:57 [PhD][New]Christophe Petit Cryptographic hash functions from expander graphs[ expand ]
19:57 [PhD][New]Jean-Pierre Tignol [ expand ]
19:56 [PhD][Update]Jean-Pierre Tignol [ expand ]
15:56 [Event][New]8th European Workshop on Public Key Infrastructures, Services, and Applica ()[ expand ]


2011-06-08
08:35 [PhD][New]Juan González Nieto [ expand ]
08:34 [PhD][New]Colin Boyd [ expand ]
08:34 [PhD][Update]Juan González Nieto [ expand ]
08:34 [PhD][Update]Colin Boyd [ expand ]
08:34 [PhD][New]Malakondayya Choudary Gorantla Design and Analysis of Group Key Exchange Protocols[ expand ]
08:32 [Job][New]Product Securty Engineers (7 positions) ,Qualcomm Incorporated[ expand ]



2011-06-07
11:56 [Event][New]6th Data Privacy Management International Workshop()[ expand ]
11:56 [Event][New]4th International Workshop on Autonomous and Spontaneous Security()[ expand ]
09:57 [Event][New]Western European Workshop on Research in Cryptology()[ expand ]
09:34 [Event][New]Asian Workshop on Symmetric Key Cryptography(ASK 2011)[ expand ]
06:52 [PhD][New]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
06:34 [Event][New]Workshop on Information Security Applications()[ expand ]
05:09 [Event][New]Ninth Theory of Cryptography Conference()[ expand ]


2011-06-06
05:17 [Event][New]Symposium on Advances in Cryptography, Security and Applications()[ expand ]
05:17 [Event][New]2012 Financial Cryptography and Data Security Conference(FC'12)[ expand ]


2011-06-03
13:59 [Event][New]13th International Conference on Distributed Computing and Networking(ICDCN 2012)[ expand ]


2011-06-02
22:03 [PhD][New]Vassilis Zikas Generalized Corruption Models in Secure Multi-Party Computation[ expand ]



2011-06-01
16:58 [Event][New]Workshop on Security and Application for Embedded smart systems()[ expand ]
09:09 [PhD][New]Marina Samokhina The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
09:09 [PhD][New]Ernst Gabidulin [ expand ]
09:06 [Event][New]ACM Workshop on Digital Rights Management(DRM 2011)[ expand ]


2011-05-31
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-05-30
09:27 [PhD][Update]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
08:50 [Event][New]Workshop on Symmetric Cryptanalysis[ expand ]
08:07 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
08:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]


2011-05-27
14:49 [Event][New]Security Aspects in Info. Tech., High-Performance Computing & Networking()[ expand ]
14:22 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures.[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures.[ expand ]



2011-05-26
13:27 [Job][New]Associate Professor ,Information Security Institute, Queensland University of Technology[ expand ]


2011-05-25
15:30 [Event][New]6th International Conference on Risks and Security of Internet and Systems(CRiSIS 2011)[ expand ]
09:00 [Event][New]Eurocrypt 2012[ expand ]
05:18 [Job][New]Research Scientist ,Institute for Infocomm Research (I2R), Singapore[ expand ]


2011-05-20
22:21 [PhD][New]Frank Lauren Hitchcock [ expand ]
22:21 [PhD][New]Claude Elwood Shannon An Algebra for Theoretical Genetics[ expand ]
06:52 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
06:51 [PhD][New]Frans Kaashoek [ expand ]
06:48 [PhD][Update]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]


2011-05-17
08:02 [PhD][New]Julien Bringer Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory[ expand ]
07:59 [PhD][New]Philippe Langevin [ expand ]



2011-05-16
11:38 [PhD][New]Ehab Alnfrawy Towards an Efficient Public Key Cryptosystem[ expand ]
11:37 [PhD][New]Mohamed M. Abd-Eldayem [ expand ]
11:37 [PhD][New]Aly A. Fahmy [ expand ]


2011-05-15
05:40 [PhD][New]Eric Bone A Generalization of Pohlig-Hellman Simplification in Elliptic Curve Cryptography[ expand ]
05:38 [PhD][New]Fred Diamond [ expand ]


2011-05-12
13:12 [PhD][New]Jean Monnerat Short Undeniable Signatures: Design, Analysis, and Applications[ expand ]


2011-05-09
20:25 [PhD][New]Benny Chor [ expand ]
20:25 [PhD][New]Amos Beimel Secure Schemes for Secret Sharing and Key Distribution[ expand ]



2011-05-07
15:49 [PhD][New]Claude Barral Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography[ expand ]
15:48 [PhD][Update]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-05
06:30 [PhD][New]Dwaine Clarke Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]
06:29 [PhD][New]Srinivas Devadas [ expand ]
06:28 [PhD][New]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-04
11:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
06:00 [Job][New]Summer internship in applied security, encryption, and secure multiparty computation Ricoh Innovations[ expand ]


2011-05-03
11:15 [PhD][New]Jean-Luc Danger [ expand ]
06:00 [Job][New]Ph.D. or MS student Koç University, Turkey[ expand ]



2011-04-30
20:38 [PhD][New]Kerstin Lemke-Rust Models and Algorithms for Physical Cryptanalysis[ expand ]
20:38 [PhD][New]Patrick Longa High-Speed Elliptic Curve and Pairing-Based Cryptography[ expand ]


2011-04-29
18:09 [PhD][New]Sven Laur Cryptographic Protocol Design[ expand ]
18:08 [PhD][New]Kaisa Nyberg [ expand ]


2011-04-28
07:09 [PhD][New]Angus E. Taylor [ expand ]
07:09 [PhD][New]Lothrop Mittenthal Operator-Valued Polynomials in a Complex Variable, and, Generalizations of Spectral Theory[ expand ]
06:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-04-27
19:48 [PhD][New]Mohammad Mahmoody Studies in the Efficiency and (versus) Security of Cryptographic Tasks[ expand ]
19:48 [PhD][New]Boaz Barak [ expand ]
15:30 [PhD][New]Martin Simka Analysis and Implementation of Selected Blocks for Public-Key Cryptosystems in FPGAs[ expand ]
15:30 [PhD][New]Fischer Viktor Fast Methods of Digital Image Segmentation[ expand ]
15:30 [PhD][New]Drutarovsky Milos Signal Processors in Digital Signal Processing[ expand ]
15:27 [PhD][New]Yi Mu [ expand ]
15:26 [PhD][New]Andrew V. Sutherland Order Computations in Generic Groups[ expand ]
06:00 [Job][New]Teaching Fellow Royal Holloway, University of London[ expand ]



2011-04-26
12:12 [PhD][New]Mohammad Reza Reyhanitabar Contributions to the Theory and Application of Cryptographic Hash Functions[ expand ]
06:00 [Job][New]PhD Scholarship: CASED / Technische Universität Darmstadt[ expand ]


2011-04-25
14:47 [PhD][New]Qingsong Ye Privacy Preserving Dataset Operations[ expand ]
14:46 [PhD][New]Peter Schwabe High-Speed Cryptography and Cryptanalysis[ expand ]
14:46 [PhD][New]Daniel J. Bernstein [ expand ]
14:45 [PhD][New]Tanja Lange [ expand ]
14:25 [PhD][New]Susan Hohenberger Advances in Signatures, Encryption, and E-Cash from Bilinear Groups[ expand ]
14:25 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
14:24 [PhD][New]Simon L. Garfinkel Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable[ expand ]
14:24 [PhD][New]Moses Liskov New Tools in Cryptography: Mutually Independent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration[ expand ]
14:24 [PhD][New]Jonathan Herzog Computational Soundness for Standard Assumptions of Formal Cryptography[ expand ]
14:24 [PhD][New]Stanislaw Jarecki Efficient Threshold Cryptosystems[ expand ]
14:24 [PhD][New]Leonid Reyzin Zero-Knowledge with Public Keys[ expand ]
14:24 [PhD][New]Zulfikar Ramzan A Study of Luby-Rackoff Ciphers[ expand ]
14:23 [PhD][New]Yevgeniy Dodis Exposure-Resilient Cryptography[ expand ]
14:23 [PhD][New]Victor Boyko On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols[ expand ]
06:00 [Job][New]Systems Security Architect Qualcomm[ expand ]


2011-04-24
06:09 [PhD][New]Henri Gilbert [ expand ]
06:08 [PhD][New]Thomas Peyrin Analyse de fonctions de hachage cryptographiques[ expand ]


2011-04-22
20:57 [PhD][New]Michael de Mare Secure Set Membership Using 3SAT[ expand ]
20:55 [PhD][New]Rebecca Wright Achieving Perfect Secrecy Using Correlated Random Variables[ expand ]
19:05 [PhD][New]Michael Naehrig Constructive and Computational Aspects of Cryptographic Pairings[ expand ]
10:15 [PhD][New]Burton Stephen Kaliski Jr. Elliptic Curves and Cryptography: A Pseudorandom Bit Generator and Other Tools[ expand ]
10:14 [PhD][New]Ronald Linn Rivest [ expand ]
10:11 [PhD][New]Michael Sipser [ expand ]
06:00 [Job][New]Faculty positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]



2011-04-21
06:00 [Job][New]Post-doc Technische Universität Darmstadt[ expand ]
06:00 [Job][New]Two Post Doctoral Positions Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-04-20
15:29 [PhD][New]Dominique Schroeder On the Complexity of Blind Signatures[ expand ]
15:28 [PhD][New]Marc Fischlin [ expand ]
14:14 [PhD][New]Salil Vadhan A Study of Statistical Zero-Knowledge Proofs[ expand ]
14:13 [PhD][New]Deepak Kumar Dalai On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks[ expand ]
14:13 [PhD][New]Subhamoy Maitra [ expand ]
14:12 [PhD][New]Chiu Yuen Koo Studies on Fault-Tolerant Broadcast and Secure Computation[ expand ]
14:11 [PhD][New]Shien Jin Ong Unconditional Relationships within Zero Knowledge[ expand ]
14:11 [PhD][New]Shafi Goldwasser [ expand ]
14:09 [PhD][New]Andrey Bogdanov Analysis and Design of Block Cipher Constructions[ expand ]


2011-04-19
20:43 [PhD][New]Siamak Fayyaz Shahandashti Contributions to Secure and Privacy-Preserving Use of Electronic Credentials[ expand ]
20:42 [PhD][New]Vipul Goyal Stronger Notions of Secure Computation[ expand ]
20:41 [PhD][New]Amit Sahai [ expand ]
20:41 [PhD][New]Martin Novotný Time-Area Efficient Hardware Architectures for Cryptography and Cryptanalysis[ expand ]
20:40 [PhD][New]Jan Schmidt [ expand ]
13:30 [PhD][New]Kazuo Sakiyama Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems[ expand ]
12:40 [PhD][New]Ian Goldberg [ expand ]
12:39 [PhD][New]Aniket Kate Distributed Key Generation and Its Applications[ expand ]
10:02 [PhD][New]Pierre-Alain Fouque Le partage de clés cryptographiques: Théorie et Pratique[ expand ]
09:47 [PhD][New]Mike Rosulek The Structure of Secure Multi-Party Computation[ expand ]
09:46 [PhD][New]Alptekin Küpçü Efficient Cryptography for the Next Generation Secure Cloud[ expand ]
09:45 [PhD][New]Anna Lysyanskaya Signature Schemes and Applications to Cryptographic Protocol Design[ expand ]
09:45 [PhD][New]Claudio Orlandi Secure Computation in Untrusted Environments[ expand ]
09:45 [PhD][New]Jan Denef [ expand ]
09:45 [PhD][New]Renaud Pacalet [ expand ]
09:45 [PhD][New]Sylvain Guilley Geometrical Countermeasures to Side-Channel Attacks[ expand ]
09:44 [PhD][New]Jonathan Katz Efficient Cryptographic Protocols Preventing Man-in-the-Middle Attacks[ expand ]
09:43 [PhD][New]Zvi Galil [ expand ]
09:42 [PhD][New]Moti Yung [ expand ]
09:42 [PhD][New]Alejandro Hevia Anonymity and Independence in Multiparty Protocols[ expand ]
09:42 [PhD][New]Frederik Vercauteren Computing zeta functions of curves over finite fields[ expand ]
06:00 [Job][New]Two postdoctoral positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]


2011-04-18
15:30 [PhD][New]Marko Wolf Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications[ expand ]
15:30 [PhD][New]Andrea Röck Quantifying Studies of (Pseudo) Random Number Generation for Cryptography[ expand ]
15:29 [PhD][New]Nicolas Sendrier [ expand ]
15:29 [PhD][New]Martin Geisler Cryptographic Protocols: Theory and Implementation[ expand ]
15:28 [PhD][New]Ivan Damgård [ expand ]
15:28 [PhD][New]Brecht Wyseur White-Box Cryptography[ expand ]
15:27 [PhD][New]Bart Preneel Analysis and Design of Cryptographic Hash Functions[ expand ]
08:29 [PhD][New]Dalia Khader Attribute based authentication schemes[ expand ]
08:28 [PhD][New]Russell Bradford [ expand ]
08:28 [PhD][New]Sandeep S. Kumar Elliptic Curve Cryptography for Constrained Devices[ expand ]
08:27 [PhD][New]Christof Paar Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields[ expand ]
07:47 [PhD][New]Sylvain Pasini Secure communication using authenticated channels[ expand ]
07:47 [PhD][New]Jan Pelzl Practical Aspects of Curve-Based Cryptography and Cryptanalysis[ expand ]
06:00 [Job][New]Embedded Firmware Security Engineer Security Software Company, Israel (local)[ expand ]
05:48 [PhD][New]Crystal Lee Clough Square: A New Family of Multivariate Encryption Schemes[ expand ]
05:48 [PhD][New]Guomin Yang Security and Privacy in Wireless and Roaming Networks[ expand ]
05:48 [PhD][New]Duncan S. Wong [ expand ]
05:47 [PhD][New]Xiaotie Deng [ expand ]
05:46 [PhD][New]Andre Weimerskirch Authentication in Ad-hoc and Sensor Networks[ expand ]
05:44 [PhD][New]Dominique Unruh Protokollkomposition und Komplexität (Protocoll Composition and Complexity)[ expand ]
05:43 [PhD][New]Manoj Prabhakaran [ expand ]
05:43 [PhD][New]Michael Loui [ expand ]
05:40 [PhD][New]Jintai Ding [ expand ]
05:39 [PhD][New]Thomas Beth [ expand ]



2011-04-17
17:36 [PhD][New]Raminder Ruprai Improvements to the Gaudry-Schost Algorithm for Multidimensional discrete logarithm problems and Applications[ expand ]
17:35 [PhD][New]Manuel Blum [ expand ]
17:35 [PhD][New]Rene Peralta Three Results in Number Theory and Cryptography: 1. A New Algorithm to Compute Square Roots Modulo A Prime Number. 2. On the Bit Complexity of the Discrete Logarithm. 3. A Framew[ expand ]
12:22 [PhD][New]Huaxiong Wang [ expand ]
12:19 [PhD][New]Josef Pieprzyk [ expand ]
12:17 [PhD][New]Christophe Tartary Authentication for Multicast Authentication[ expand ]
10:47 [PhD][New]Wei Wu Cryptographic Protocols with Untrusted Third Party[ expand ]
10:47 [PhD][New]Willy Susilo Contributions to Fail-Stop Signature Schemes[ expand ]
10:45 [PhD][New]Turki F. Al-Somani Design and Analysis of Efficient and Secure Elliptic Curve Cryptoprocessors[ expand ]
10:45 [PhD][New]Alaaeldin A. Amin [ expand ]
10:44 [PhD][New]Elad Barkan Cryptanalysis of Ciphers and Protocols[ expand ]
10:44 [PhD][New]Eli Biham [ expand ]
10:44 [PhD][New]Stefano Tessaro Computational Indistinguishability Amplification[ expand ]
00:37 [PhD][New]Vijayakrishnan Pasupathinathan Hardware-based Identification and Authentication Systems[ expand ]
00:36 [PhD][New]Rungrat Wiangsripanawan Contributions to Mobility and Anonymity in IP Networks[ expand ]
00:36 [PhD][New]Xinyi Huang A Study of Undeniable Signatures and Their Variants[ expand ]
00:36 [PhD][New]Tsz Hon Yuen Contributions to Pairing-based Cryptography [ expand ]
00:33 [PhD][New]Rei Safavi-Naini [ expand ]


2011-04-16
23:24 [PhD][New]Man Ho Allen Au Contribution to Privacy-Preserving Cryptographic Techniques[ expand ]
23:10 [PhD][New]Waldyr Dias Benits Junior Applications of Fobenius Expansions in Elliptic Curve Cryptography[ expand ]
23:10 [PhD][New]Steven D. Galbraith [ expand ]
21:24 [PhD][New]Silvio Micali [ expand ]
21:19 [PhD][New]Brigitte Vallée [ expand ]
21:17 [PhD][New]David Pointcheval Proofs of Knowledge and Security Proofs (Les Preuves de Connaissance et leurs Preuves de Sécurité)[ expand ]
21:15 [PhD][New]Chris Peikert Cryptographic Error Correction[ expand ]
19:58 [PhD][New]M.L. Valarmathi [ expand ]
19:56 [PhD][New]R. Vimalathithan Cryptanalysis using Computational Intelligence[ expand ]
19:55 [PhD][New]Gil Segev The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks[ expand ]
19:54 [PhD][New]Moni Naor [ expand ]
19:54 [PhD][New]Claude Crépeau Correct and Private Reduction among Oblivious Transfers[ expand ]
19:15 [PhD][New]Mayank Varia Studies in Program Obfuscation[ expand ]
19:14 [PhD][New]Serge Vaudenay The Security of Cryptographic Primitives[ expand ]
19:12 [PhD][New]Marcio Juliato Fault Tolerant Cryptographic Primitives for Space Applications[ expand ]
19:12 [PhD][New]Catherine Gebotys [ expand ]
19:12 [PhD][New]Yevgeniy Vahlis Black Box and White Box Cryptography[ expand ]
19:12 [PhD][New]Charles Rackoff [ expand ]
19:12 [PhD][New]Jian Guo Analysis of Cryptographic Hash Functions[ expand ]
19:11 [PhD][New]Ran Canetti [ expand ]
19:11 [PhD][New]Rafail Ostrovsky Software Protection and Simulation on Oblivious RAMs. [ expand ]
19:10 [PhD][New]Josh Benaloh Verifiable Secret-Ballot Elections[ expand ]
19:09 [PhD][New]Michael Fischer [ expand ]
17:36 [PhD][New]Vadim Lyubashevsky Towards Practical Lattice-Based Cryptography[ expand ]
17:35 [PhD][New]Daniele Micciancio [ expand ]
17:22 [PhD][New]Alfred Menezes Elliptic Curve Cryptosystems[ expand ]
17:21 [PhD][New]Scott Vanstone [ expand ]
15:48 [PhD][New]Dr. A.Vinaya Babu [ expand ]


2011-04-15
05:45 [PhD][New]Dmitry Khovratovich New Approaches to the Cryptanalysis of Symmetric Primitives[ expand ]
05:44 [PhD][New]Alex Biryukov [ expand ]


2011-04-14
12:53 [PhD][New]Sunder Lal [ expand ]
12:52 [PhD][New]Douglas Stebila Classical Authenticated Key Exchange and Quantum Cryptography[ expand ]
12:52 [PhD][New]Michele Mosca [ expand ]
12:52 [PhD][New]Santosh Kumar Yadav Some Problems in Symmetric and Asymmetric Cryptography[ expand ]
06:00 [Job][New]Technical/Scientific Assistant University of Luxembourg[ expand ]



2011-04-13
06:00 [Job][New]Phd Position Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
06:00 [Job][New]Two Postdoc Positions in Security and Privacy Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]


2011-04-12
14:37 [PhD][New]Ashraf Masood [ expand ]
14:35 [PhD][New]Sondre Roenjom Cryptanalysis of Ciphers over Finite Cyclic Groups[ expand ]
14:34 [PhD][New]Tor Helleseth [ expand ]
11:25 [PhD][New]Santiago Zanella Beguelin Formal Certification of Game-Based Cryptographic Proofs[ expand ]


2011-04-11
15:26 [PhD][New]Sundar Lal [ expand ]
15:26 [PhD][New]Amit K Awasthi A Study of Some Delegated Digital Signature Schemes[ expand ]
14:59 [PhD][New]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
14:58 [PhD][New]Mehreen Afzal Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update[ expand ]
14:58 [PhD][New]Gaëtan Leurent Design and Analysis of Hash Functions[ expand ]
06:00 [Job][New]Senior Computer Security Researcher ICF International, Suburban Maryland near Washington, DC[ expand ]


2011-04-09
06:00 [Job][New]PhD students, Postdocs Aarhus University, Denmark[ expand ]



2011-04-07
06:00 [Job][New]5 years Post Doc position (3 years experience required) Computer Science and Technology Centre (CCTC) at Universidade do Minho, Portugal[ expand ]


2011-04-06
06:00 [Job][New]Full Professor (W3) chairing the research field Security of Integrated Hardware Technical University of Berlin[ expand ]


2011-04-05
06:00 [Job][New]PhD Studentship University of Bristol, Bristol, UK[ expand ]


2011-04-04
06:00 [Job][New]Post-Doc University of Luxembourg[ expand ]
06:00 [Job][New]Post-Doc Université catholique de Louvain (UCL, Belgium)[ expand ]
06:00 [Job][New]Associate or Assistant Professor in Cryptology Technical University of Denmark[ expand ]
06:00 [Job][New]Ph.D. student in Mathematics of Cryptography Macquarie University, Sydney, Australia[ expand ]



2011-03-22
06:00 [Job][New]Research Engineer Coding and Cryptography Research Group, Nanyang Technological University[ expand ]


2011-03-20
11:14 [PhD][New]Sungjun Park [ expand ]
11:13 [PhD][New]Jongin Lim [ expand ]
11:13 [PhD][New]Daejoon Hwang [ expand ]
11:13 [PhD][New]Jinwook Chung [ expand ]
11:13 [PhD][New]Dongho Won [ expand ]
11:13 [PhD][New]Seungjoo Kim Improved privacy and authenticity in digital signatures / key management[ expand ]


2011-03-16
20:05 [PhD][New]Fathy Helail [ expand ]
20:04 [PhD][New]Wafik Lotfallah [ expand ]
20:04 [PhD][New]Ghada Abdelhady New DES based on Elliptic Curve[ expand ]


2011-03-14
21:45 [PhD][New]Charles Bouillaguet Some attacks against hardness assumptions and cyptographic primitives[ expand ]
20:02 [PhD][New]Jayaprakash Kar Algorithms for Cryptographic Protocols Using Elliptic Curve Cryptography[ expand ]
06:00 [Job][New]Research Fellow Institute for Infocomm Research, Singapore[ expand ]



2011-03-10
07:00 [Job][New]Postdoc Macquarie Univ., Sydney[ expand ]


2011-03-09
22:13 [PhD][New]Markku-Juhani Olavi Saarinen Cryptanalysis of Dedicated Hash Functions[ expand ]
22:12 [PhD][New]Jiqiang Lu Cryptanalysis of block ciphers[ expand ]
22:10 [PhD][New]Chris Mitchell [ expand ]


2011-03-08
12:49 [PhD][New]Marc Girault [ expand ]
12:49 [PhD][New]Sébastien Canard Group signatures, variants and applications[ expand ]


2011-03-07
07:00 [Job][New]PhD. student Department of Computing, Macquarie University[ expand ]



2011-03-04
07:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-03-03
11:52 [PhD][New]Victor Lomne Power and Electro-Magnetic Side-Channel Attacks: threats and countermeasures[ expand ]
11:52 [PhD][New]Philippe Maurine [ expand ]
11:51 [PhD][New]Michel Robert [ expand ]


2011-03-01
07:09 [PhD][New]Ulrich Huber On Broadcast Encryption for Secure Software Delivery to Automobiles[ expand ]


2011-02-28
07:00 [Job][New]Assistant Professor, Cryptology and Information Security University of Versailles St-Quentin-en-Yvelines (France)[ expand ]



2011-02-25
07:00 [Job][New]PhD student CEA-LETI & UVSQ (Université de Versailles-St-Quentin-en-Yvelines)[ expand ]
06:17 [PhD][New]Yi Lu Applied Stream Ciphers in Mobile Communications[ expand ]


2011-02-24
19:02 [PhD][New]Luca De Feo Fast Algorithms for Towers of Finite Fields and Isogenies[ expand ]
19:02 [PhD][New]Éric Schost [ expand ]
19:01 [PhD][New]Marcos Antonio Simplicio Junior Message Authentication Algorithms for Wireless Sensor Networks[ expand ]
19:01 [PhD][New]François Morain [ expand ]


2011-02-23
07:00 [Job][New]1 PhD Position in Privacy-Oriented Cryptography (full-time researcher) Technische Universität Darmstadt, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-02-22
10:26 [PhD][New]John Merriman [ expand ]
10:26 [PhD][New]Nigel Smart Computer Solution of Diophantine Equations[ expand ]



2011-02-20
15:57 [PhD][New]Keith Martin [ expand ]


2011-02-18
16:20 [PhD][New]Stefan Tillich Instruction Set Extensions for Support of Cryptography on Embedded Systems[ expand ]
10:13 [PhD][New]Joachim von zur Gathen [ expand ]
10:08 [PhD][New]Axel Poschmann Lightweight Cryptography - Cryptographic Engineering for a Pervasive Worls[ expand ]


2011-02-17
06:25 [PhD][New]Karl Christian Posch [ expand ]


2011-02-16
18:06 [PhD][New]Hae Yong Kim [ expand ]
17:06 [PhD][New]Jean-Philippe Aumasson Design and analysis of symmetric cryptographic algorithms [ expand ]
17:06 [PhD][New]Thomas Baignères Quantitative security of block ciphers: designs and cryptanalysis tools[ expand ]
17:06 [PhD][New]Joern Schweisgut Elektronische Wahlen unter dem Einsatz kryptografischer Observer - Electronic Elections with Cryptographic Observers[ expand ]
15:39 [PhD][New]Atefeh Mashatan Message Authentication and Recognition Protocols Using Two-Chanel Cryptography.[ expand ]
15:38 [PhD][New]Simon Fischer Analysis of lightweight stream ciphers[ expand ]
08:25 [PhD][New]Martin Vuagnoux Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
08:24 [PhD][New]Pascal Junod Statistical cryptanalysis of block ciphers[ expand ]
08:21 [PhD][New]Willi Meier [ expand ]
08:21 [PhD][New]David Mandell Freeman Constructing abelian varieties for pairing-based cryptography[ expand ]
08:20 [PhD][New]Edward Schaefer [ expand ]
08:20 [PhD][New]Kenneth Ribet [ expand ]



2011-02-15
18:04 [PhD][New]Ben Adida Advances in Cryptographic Voting Systems[ expand ]
17:59 [PhD][New]Edlyn Teske [ expand ]
17:58 [PhD][New]Douglas Stinson [ expand ]
17:58 [PhD][New]Stephen Weis New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing[ expand ]
07:00 [Job][New]PhD Studentships Centre for Secure Information Technologies (CSIT), Queens University Belfast, Belfast, UK[ expand ]
06:47 [PhD][New]Gilles Barthe [ expand ]
06:39 [PhD][New]Matthieu Rivain On the Physical Security of Cryptographic Implementations[ expand ]


2011-02-14
20:55 [PhD][New]Marc Joye Security analysis of RSA-type cryptosystems[ expand ]
20:53 [PhD][New]Jean-Jacques Quisquater [ expand ]
18:27 [PhD][New]Pierre-Yvan Liardet Ingénierie cryptographique Implantations sécurisées[ expand ]
18:06 [PhD][New]Gildas Avoine Cryptography in Radio Frequency Identification and Fair Exchange Protocols[ expand ]
17:54 [PhD][New]Helger Lipmaa Secure and Efficient Time-Stamping Systems[ expand ]
17:53 [PhD][New]Mati Tombak [ expand ]
17:49 [PhD][New]Tim Güneysu Cryptography and Cryptanalysis on Reconfigurable Devices[ expand ]
17:49 [PhD][New]Andy Rupp Computational Aspects of Cryptography and Cryptanalysis[ expand ]
17:40 [PhD][New]Han Vinck [ expand ]
09:54 [PhD][New]Jacques Stern [ expand ]
09:53 [PhD][New]Jean-Sebastien Coron Cryptanalysis and security proofs of public-key schemes.[ expand ]
08:51 [PhD][New]Birgit Pfitzmann [ expand ]
08:51 [PhD][New]Thomas Gross Browser-based Identity Federation[ expand ]
06:33 [PhD][New]Ueli Maurer [ expand ]
06:29 [PhD][New]Albrecht Beutelspacher Teilfaserungen und Parallelismen in endlichdimensionalen projektiven Räumen[ expand ]
00:31 [PhD][New]Jörg Schwenk [ expand ]
00:26 [PhD][New]Ingrid Verbauwhede VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems[ expand ]


2011-02-13
18:28 [PhD][New]Benny Pinkas [ expand ]
18:27 [PhD][New]Thomas Schneider Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
16:27 [PhD][New]Benedikt Gierlichs Statistical and Information-Theoretic Methods for Power Analysis on Embedded Cryptography[ expand ]


2011-02-12
18:16 [PhD][New]Christopher Wolf Multivariate Quadratic Polynomials in Public Key Cryptography[ expand ]



2011-02-11
11:55 [PhD][New]Ahmad-Reza Sadeghi [ expand ]


2011-02-10
19:37 [PhD][New]Johannes Blömer [ expand ]
12:16 [PhD][New]Maike Ritzenhofen Efficiently Calculating Small Solutions of Systems of Polynomial Equations - Lattice-Based Methods and Applications to Cryptography[ expand ]
12:14 [PhD][New]Claus-Peter Schnorr [ expand ]
12:13 [PhD][New]Alexander May New RSA Vulnerabilities Using Lattice Reduction Methods[ expand ]


2011-02-07
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]
07:00 [Job][New]Postdoctoral Research Associate University of North Carolina at Greensboro[ expand ]


2011-02-04
07:00 [Job][New]Researchers (Ph.D. student/Post-Doc) (No. 39) Technische Universität Darmstadt, Dep.of Comp. Science, Chair f. Sec. in Inf. Techn. (Prof. Waidner)[ expand ]



2011-02-03
07:00 [Job][New]Professorship in Mathematics, specialized Cryptography (5 year term) Department of Mathematics University of Turku[ expand ]
07:00 [Job][New]Associate Research Fellow University of Wollongong, Australia[ expand ]


2011-01-31
07:00 [Job][New]Ph. D. student Gemalto, La Ciotat, France[ expand ]


2011-01-22
07:00 [Job][New]Ph.D. Student or Postdoc Darmstadt University of Technlogy, Germany[ expand ]


2011-01-17
07:00 [Job][New]PhD Scholarships University of Wollongong, Australia[ expand ]



2011-01-13
07:00 [Job][New]Postdoc position in cryptography and IT security University of Luxembourg[ expand ]


2011-01-12
07:00 [Job][New]Security Architect ST Microelectronics, Rousset, France[ expand ]


2011-01-11
07:00 [Job][New]Ph.D. student Universitat Pompeu Fabra, Barcelona (Spain)[ expand ]
07:00 [Job][New]PhD Studentships University of Bristol, Bristol, UK[ expand ]


2011-01-07
07:00 [Job][New]Three tenured or tenure track positions Aalto University School of Science, Helsinki, Finland[ expand ]



2011-01-04
07:00 [Job][New]Professor/Assoc Prof/Asst Prof in Cryptology Information Security Department at MCS, National University of Sciences and Technology, Pakistan[ expand ]


2011-01-03
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]


2010-12-20
07:00 [Job][New]Ph.D. student (open to Australian citizes and permanent residents) Macquarie University[ expand ]
07:00 [Job][New]Graduate Program in Cryptology Florida Atlantic University, CCIS, Boca Raton, Florida[ expand ]


2010-12-14
07:00 [Job][New]2 x Post-doctoral Research Positions Centre for Secure Information Technologies, Queens University Belfast[ expand ]



2010-12-09
07:00 [Job][New]Ph.D. student K.U.Leuven (Belgium)[ expand ]


2010-12-08
07:00 [Job][New]PostDoc in Cryptographic Protocols Norwegian University of Science and Technology (NTNU), Trondheim[ expand ]


2010-12-01
07:00 [Job][New]Full Professor Position in Cryptology GREYC - University of Caen, France[ expand ]


2010-11-29
07:00 [Job][New]Recruitment of Limited-term Researcher for April, 2011 National Institute of Information and Communications Technology (NICT)[ expand ]



2010-11-26
07:00 [Job][New]2 Ph.D. positions: Implementing Post-Quantum Algorithms Horst Görtz Institute, Ruhr University Bochum (Germany)[ expand ]


2010-11-25
07:00 [Job][New]Research Associate (postdoc) University College London[ expand ]


2010-11-23
07:00 [Job][New]Information Security and Cryptography Khalifa University, Abu Dhabi, UAE [ expand ]


2010-11-16
07:00 [Job][New]Post-Doc Boston University, Boston, MA, USA[ expand ]



2010-11-11
07:00 [Job][New]Lecturer, Senior Lecturer or Associate Professor Mathematics Department, University of Cape Town, Cape Town, South Africa[ expand ]


1970-01-01
00:00 3611[ expand ]
00:00 3610[ expand ]
00:00 3610[ expand ]
00:00 [ expand ]
00:00 [ expand ]
00:00 [ expand ]