International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 [ 5 ] 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
04:17 [Pub][ePrint]Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps, by Hao Wang[ expand ]
04:17 [Pub][ePrint]Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack, by Yuval Yarom and Naomi Benger[ expand ]

16:17 [Pub][ePrint]On the Phase Space of Block-Hiding Strategies, by Assaf Shomer[ expand ]

04:17 [Pub][ePrint]Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction, by Jae Hong Seo[ expand ]
04:17 [Pub][ePrint]Efficient, Oblivious Data Structures for MPC, by Marcel Keller and Peter Scholl[ expand ]
04:17 [Pub][ePrint]Isolated Execution on Many-core Architectures, by Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun[ expand ]
04:17 [Pub][ePrint]Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment, by Ding Wang, Ping Wang, and Debiao He[ expand ]
04:17 [Pub][ePrint]Kummer strikes back: new DH speed records, by Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe[ expand ]
04:17 [Pub][ePrint]Efficient Secure and Verifiable Outsourcing of Matrix Multiplications, by Yihua Zhang and Marina Blanton[ expand ]
04:17 [Pub][ePrint]Efficient Revocable Identity-Based Encryption via Subset Difference Methods, by Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park[ expand ]
04:17 [Pub][ePrint]Modelling After-the-fact Leakage for Key Exchange, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
04:17 [Pub][ePrint]Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis, by Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig[ expand ]
04:17 [Pub][ePrint]How to Use Bitcoin to Design Fair Protocols, by Iddo Bentov and Ranjit Kumaresan[ expand ]
04:17 [Pub][ePrint]Efficient Three-Party Computation from Cut-and-Choose, by Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas[ expand ]
04:17 [Pub][ePrint]Algebraic Properties of Modular Addition Modulo a Power of Two, by S. M. Dehnavi and Alireza Rahimipour[ expand ]
04:17 [Pub][ePrint]Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited, by Hui Cui, Yi Mu, Man Ho Au[ expand ]
04:17 [Pub][ePrint]Removing Erasures with Explainable Hash Proof Systems, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
04:17 [Pub][ePrint]Optimal Non-Perfect Uniform Secret Sharing Schemes, by Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró[ expand ]
04:17 [Pub][ePrint]FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
04:17 [Pub][ePrint]New Way to Construct Cryptographic Hash Function, by WANGYong[ expand ]
04:17 [Pub][ePrint]Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation, by Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi[ expand ]
01:17 [Pub][ePrint]Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version), by Weijin Wang, Yu Qin, Dengguo Feng[ expand ]

19:17 [Pub][ePrint]Breaking `128-bit Secure\' Supersingular Binary Curves (or how to solve discrete logarithms in $\\F_{2^{4 \\cdot 1223}}$ and $\\F_{2^{12 \\cdot 367}}$), by Robert Granger and Thorsten Kleinjung and Je[ expand ]

12:30 [Job][New]cryptologic product development team members and leads, TECHNA, Kolkata India[ expand ]
12:27 [Event][New]ACM TECS: ACM TECS: Embedded Platforms for Cryptography in the Coming Decade[ expand ]

15:48 [Job][New]Lecturer/Associate Professor/Researcher in Cryptology and Security, Hangzhou Normal University, China, Pacific Area[ expand ]

06:27 [Event][New]NSS 2014: The 8th International Conference on Network and System Security[ expand ]

22:17 [Pub][ePrint]Quantum position verification in the random oracle model, by Dominique Unruh[ expand ]
16:17 [Pub][ePrint]Optimal Algebraic Manipulation Detection Codes, by Ronald Cramer and Carles Padr{\\\'o} and Chaoping Xing[ expand ]
16:17 [Pub][ePrint]Comments on a novel user authentication and key agreement scheme, by Jia-Lun Tsai[ expand ]
16:17 [Pub][ePrint]Prover Anonymous and Deniable Distance-Bounding Authentication, by Sebastien Gambs and Cristina Onete and Jean-Marc Robert[ expand ]
16:17 [Pub][ePrint]Secure Compression: Theory \\& Practice, by James Kelley and Roberto Tamassia[ expand ]
16:17 [Pub][ePrint]Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, by Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich[ expand ]
16:17 [Pub][ePrint]A Note on the CLRW2 Tweakable Block Cipher Construction, by Gordon Procter[ expand ]
16:17 [Pub][ePrint]Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box, by Sourav Das[ expand ]
16:17 [Pub][ePrint]An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems, by Bjoern Grohmann[ expand ]

22:17 [Pub][ePrint]Diffusion Programmable Device : The device to prevent reverse engineering, by Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino[ expand ]
22:17 [Pub][ePrint]MJH: A Faster Alternative to MDC-2, by Jooyoung Lee and Martijn Stam[ expand ]
22:17 [Pub][ePrint]Key-Indistinguishable Message Authentication Codes, by Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov[ expand ]
20:12 [Job][New]PhD Position in Lattice-Based Cryptography, Technische Universität Darmstadt, Germany, Middle-Europe[ expand ]

19:17 [Pub][ePrint]Algorithms in HElib, by Shai Halevi and Victor Shoup[ expand ]
19:17 [Pub][ePrint]Reducing the Overhead of Cloud MPC, by Ashish Choudhury and Arpita Patra and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Space-efficient, byte-wise incremental and perfectly private encryption schemes, by Kévin Atighehchi[ expand ]
19:17 [Pub][ePrint]SHipher: Families of Block Ciphers based on SubSet-Sum Problem, by Xiali Hei and Binheng Song[ expand ]
19:17 [Pub][ePrint]Actively Secure Private Function Evaluation, by Payman Mohassel and Saeed Sadeghian and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Dishonest Majority Multi-Party Computation for Binary Circuits, by Enrique Larraia and Emmanuela Orsini and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Improved Slender-set Linear Cryptanalysis, by Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi[ expand ]
16:17 [Pub][ePrint]Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
16:17 [Pub][ePrint]Towards Characterizing Complete Fairness in Secure Two-Party Computation, by Gilad Asharov[ expand ]
16:17 [Pub][ePrint]A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups, by Koji Nuida[ expand ]
16:17 [Pub][ePrint]Tight security bounds for multiple encryption, by Yuanxi Dai, John Steinberger[ expand ]
16:17 [Pub][ePrint]Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures, by Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi[ expand ]
06:38 [PhD][New]Nizamuddin: On the Design of signcryption Schemes[ expand ]

05:56 [Job][New]Research Scientists, PhD, Institute for Infocomm Research, Singapore[ expand ]

09:02 [Job][Update]1 PhD student in Information Security, Chalmers University of Technology, Gothenburg, Sweden[ expand ]

16:17 [Pub][ePrint]Faster Bootstrapping with Polynomial Error, by Jacob Alperin-Sheriff and Chris Peikert[ expand ]
16:17 [Pub][ePrint]The Related-Key Analysis of Feistel Constructions, by Manuel Barbosa and Pooya Farshim[ expand ]
16:17 [Pub][ePrint]A new class of system oriented PKC, K(I)SOPKC., by Masao KASAHARA[ expand ]
16:17 [Pub][ePrint]On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
16:17 [Pub][ePrint]Cryptanalysis of KLEIN (Full version), by Virginie Lallemand and María Naya-Plasencia[ expand ]
16:17 [Pub][ePrint]Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version), by Anne Canteaut and Thomas Fuhr and Henri Gilbert and Maria Naya-Plasencia and Jean-René Reinhard[ expand ]
16:17 [Pub][ePrint]A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing, by Himanshu Tyagi and Shun Watanabe[ expand ]

16:17 [Pub][ePrint]AnoA: A Framework For Analyzing Anonymous Communication Protocols, by Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi[ expand ]
16:17 [Pub][ePrint]Randomized and Efficient Authentication in Mobile Environments, by Wei Jiang, Dan Lin, Feng Li, Elisa Bertino[ expand ]
16:17 [Pub][ePrint]Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer, by Aleksandra Mileva[ expand ]
16:17 [Pub][ePrint]RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms, by Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede[ expand ]
05:59 [Event][New]NSPW'14: 2014 New Security Paradigms Workshop[ expand ]

15:45 [Event][New]MPC14: Workshop on Theory and Practice of Secure Multiparty Computation[ expand ]
15:41 [Event][New]ECTCM 2014: Second International Workshop on Emerging Cyberthreats and Countermeasures[ expand ]

16:17 [Pub][ePrint]Garbled RAM Revisited, Part II, by Steve Lu and Rafail Ostrovsky[ expand ]
16:17 [Pub][ePrint]Garbled RAM Revisited, Part I, by Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs[ expand ]
16:17 [Pub][ePrint]Efficient Round Optimal Blind Signatures, by Sanjam Garg and Divya Gupta[ expand ]
16:17 [Pub][ePrint]A Full Characterization of Completeness for Two-party Randomized Function Evaluation, by Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai[ expand ]
05:44 [Job][New]Security Engineer, CloudFlare Inc. (San Francisco, USA and London, UK)[ expand ]

19:17 [Pub][ePrint]Unifying Leakage Models: from Probing Attacks to Noisy Leakage, by Alexandre Duc and Stefan Dziembowski and Sebastian Faust[ expand ]
19:17 [Pub][ePrint]Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers, by Ahmad Boorghany and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Mixcoin: Anonymity for Bitcoin with accountable mixes, by Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten[ expand ]
19:17 [Pub][ePrint]Certified Bitcoins, by Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros[ expand ]
19:17 [Pub][ePrint]Publicly Auditable Secure Multi-Party Computation, by Carsten Baum and Claudio Orlandi and Ivan Damgård[ expand ]
19:17 [Pub][ePrint]New and Improved Key-Homomorphic Pseudorandom Functions, by Abhishek Banerjee and Chris Peikert[ expand ]
19:17 [Pub][ePrint]Anonymous Authentication with Shared Secrets, by Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov[ expand ]
19:17 [Pub][ePrint]Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM, by Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann[ expand ]
16:17 [Pub][ePrint]Implementing Pairing-Based Cryptosystems in USB Tokens, by Zhaohui Cheng[ expand ]
16:17 [Pub][ePrint]Lattice Cryptography for the Internet, by Chris Peikert[ expand ]
16:17 [Pub][ePrint]One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks, by Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi[ expand ]
06:15 [Event][New]Post-quantum Cryptography Summer School[ expand ]

21:56 [Job][New]PhD Positions in Applied Cryptology, Worcester Polytechnic Institue, MA, USA[ expand ]
12:54 [Event][New]SAC'2014: Selected Areas in Cryptography[ expand ]
08:49 [Event][New]CANS 2014: 13rd International Conference on Cryptology and Network Security[ expand ]

13:17 [Pub][ePrint]Some security bounds for the DGHV scheme, by Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala[ expand ]

13:17 [Pub][ePrint]Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents, by Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey[ expand ]
13:17 [Pub][ePrint]A Subexponential Construction of Graph Coloring for Multiparty Computation, by Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld[ expand ]

16:17 [Pub][ePrint]Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case, by Palash Sarkar and Shashank Singh[ expand ]

19:17 [Pub][ePrint]A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems, by Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan[ expand ]
19:17 [Pub][ePrint]Cryptanalysis on \"Secure untraceable off-line electronic cash system\", by Yalin Chen and Jue-Sam Chou*[ expand ]
19:17 [Pub][ePrint]A Comparison of the Homomorphic Encryption Schemes FV and YASHE, by Tancrède Lepoint and Michael Naehrig[ expand ]
19:17 [Pub][ePrint]Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts, by Stefano Tessaro and David A. Wilson[ expand ]
19:17 [Pub][ePrint]Verifiable Computation in Multiparty Protocols with Honest Majority, by Peeter Laud and Alisa Pankova[ expand ]
13:17 [Pub][ePrint]Cuckoo Cycle; a memory-hard proof-of-work system, by John Tromp[ expand ]
04:48 [PhD][New]Claude Carlet[ expand ]
04:47 [PhD][New]Abdelaziz Elaabid: Side channel attacks: advanced experimentations on template attacks[ expand ]
04:47 [PhD][Update]Constantin Catalin Dragan: Security of CRT-based Secret Sharing Schemes[ expand ]

14:48 [Job][New]Postdoc in Cryptology, Technical University of Denmark, DTU[ expand ]
14:44 [Job][New]Post-Doc in Applied Cryptography, University of Trier, Germany[ expand ]
10:17 [Pub][ePrint]Cryptanalysis of FIDES, by Itai Dinur and Jérémy Jean[ expand ]
01:17 [Pub][ePrint]Computing Discrete Logarithms in F_{3^{6*137}} using Magma , by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez[ expand ]

22:17 [Pub][ePrint]Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, by Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang[ expand ]
22:17 [Pub][ePrint]Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics, by Younsung Choi[ expand ]
22:17 [Pub][ePrint]The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions, by Sugata Gangopadhyay and Pantelimon Stanica[ expand ]
22:17 [Pub][ePrint]Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, by Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert[ expand ]
14:59 [PhD][New]Constantin Catalin Dragan: Security of CRT-based Secret Sharing Schemes[ expand ]
14:59 [PhD][New]Ferucio Laurentiu Tiplea[ expand ]
14:58 [PhD][New]Ruxandra F. Olimid: Secret Sharing-based Group Key Establishment[ expand ]
14:58 [PhD][New]Adrian Atanasiu[ expand ]

13:26 [Job][New]Postdoctoral and Internship Positions, MICROSOFT RESEARCH, Redmond, Washington USA[ expand ]
13:26 [Job][New]Postdoc in Cryptography, Privacy and Information Security, University of Luxembourg, Luxembourg[ expand ]
13:24 [Event][New]DBSec'14: 28th IFIP WG 11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]

19:17 [Pub][ePrint]DAA-related APIs in TPM2.0 Revisited, by Li Xi[ expand ]
16:17 [Pub][ePrint]An Equivalence-Preserving Transformation of Shift Registers, by Elena Dubrova[ expand ]

16:17 [Pub][ePrint]Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication, by Daniel R. L. Brown[ expand ]
16:17 [Pub][ePrint]Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, by Neha tirthani and Ganesan[ expand ]
16:17 [Pub][ePrint]When a Boolean Function can be Expressed as the Sum of two Bent Functions, by Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li[ expand ]
09:48 [Event][New]CMS 2014: 15th Joint IFIP TC6 and TC11 Conf. on Communications and Multimedia Security[ expand ]

10:17 [Pub][ePrint]Down the Rabbit Hole: Revisiting the Shrinking Method, by Vivien Dubois[ expand ]
10:17 [Pub][ePrint]Crypto-analyses on \"user efficient recoverable off-line e-cashs scheme with fast anonymity revoking\", by Yalin Chen1 and Jue-Sam Chou*2[ expand ]
10:17 [Pub][ePrint]Human Assisted Randomness Generation Using Video Games, by Mohsen Alimomeni and Reihaneh Safavi-Naini[ expand ]

13:17 [Pub][ePrint]rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval, by Lichun Li and Michael Militzer and Anwitaman Datta[ expand ]
10:17 [Pub][ePrint]Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, by Mehdi Tibouchi[ expand ]
10:17 [Pub][ePrint]A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD, by Jintai Ding, Chengdong Tao[ expand ]

22:17 [Pub][ePrint]Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography, by Boaz Tsaban[ expand ]
16:49 [Event][New]BBIR: School on Black-Box Impossibility Results[ expand ]
16:17 [Pub][ePrint]A Fast Modular Reduction Method, by Zhengjun Cao and Ruizhong Wei and Xiaodong Lin[ expand ]
07:05 [PhD][Update]Serge Vaudenay: The Security of Cryptographic Primitives[ expand ]
04:17 [Pub][ePrint]Homomorphic AES Evaluation using NTRU, by Yarkin Doroz and Yin Hu and Berk Sunar[ expand ]

16:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf Küsters and Enrico Scapin and Tomasz Truderung and Jürgen Graf[ expand ]
13:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf K\\\"usters and Enrico Scapin and Tomasz Truderung and J\\\"urgen Graf[ expand ]
01:17 [Pub][ePrint]On the Security of the Pre-Shared Key Ciphersuites of TLS, by Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk[ expand ]

22:17 [Pub][ePrint]A Secure Text Messaging Protocol, by Gary Belvin[ expand ]

16:17 [Pub][ePrint]Authenticated Encryption with SPECK, by Chase Manny[ expand ]
16:17 [Pub][ePrint]Lattice-based Group Signature Scheme with Verifier-local Revocation, by Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]
16:17 [Pub][ePrint]Scale-Invariant Fully Homomorphic Encryption over the Integers, by Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results, by Yongge Wang[ expand ]
16:17 [Pub][ePrint]Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs, by Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.[ expand ]
16:17 [Pub][ePrint]General Impossibility of Group Homomorphic Encryption in the Quantum World, by Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter[ expand ]
16:17 [Pub][ePrint]Channel Equalization for Side Channel Attacks, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]

17:28 [Event][New]DASec 2014: The First International Workshop on Big Data Analytics for Security[ expand ]
10:17 [Pub][ePrint]Twisting Edwards curves with isogenies, by Mike Hamburg[ expand ]
10:17 [Pub][ePrint]Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System, by Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger [ expand ]

16:56 [Event][New]AsiaCCS-SCC: The Second International Workshop on Security in Cloud Computing[ expand ]
16:56 [Event][New]ASIAPKC 2014: 2nd ACM ASIA Public-Key Cryptography Workshop[ expand ]

19:17 [Pub][ePrint]Side-Channel Leakage through Static Power -Should We Care about in Practice?-, by Amir Moradi[ expand ]
19:17 [Pub][ePrint]An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation, by Ivan Damgård and Jesper Buus Nielsen[ expand ]
19:17 [Pub][ePrint]Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle, by Gengran Hu and Yanbin Pan and Feng Zhang[ expand ]
19:17 [Pub][ePrint]Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR, by Sourav Das[ expand ]
19:17 [Pub][ePrint]Online/Offline Attribute-Based Encryption, by Susan Hohenberger and Brent Waters[ expand ]
19:17 [Pub][ePrint](De-)Constructing TLS, by Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi[ expand ]
19:17 [Pub][ePrint]Lazy Modulus Switching for the BKW Algorithm on LWE, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]

22:00 [PhD][Update]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
10:17 [Pub][ePrint]Completeness for Symmetric Two-Party Functionalities - Revisited, by Yehuda Lindell and Eran Omri and Hila Zarosim[ expand ]
10:17 [Pub][ePrint]Two-round password-only authenticated key exchange in the three-party setting, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
10:17 [Pub][ePrint]Triple and Quadruple Encryption: Bridging the Gaps, by Bart Mennink and Bart Preneel[ expand ]
10:17 [Pub][ePrint]Tight Security Bounds for Triple Encryption, by Jooyoung Lee[ expand ]
10:17 [Pub][ePrint]Linkable Message Tagging: Solving the key distribution problem of signature schemes, by Felix Günther and Bertram Poettering[ expand ]
10:17 [Pub][ePrint]A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs, by Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol[ expand ]
10:17 [Pub][ePrint]Maximal Information Coefficient Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
10:17 [Pub][ePrint]Construction of New Families of ‎MDS‎ Diffusion Layers, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]

07:11 [PhD][New]Sebastian Pape: The Challenge of Authentication in Insecure Environments[ expand ]
07:11 [PhD][New]Lutz Wegner[ expand ]

15:50 [PhD][New]Emmanuelle Encrenaz[ expand ]
15:50 [PhD][New]Bruno Robisson[ expand ]
15:48 [PhD][New]Dong Hoon Lee[ expand ]
15:42 [PhD][New]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
15:34 [PhD][New]Amr Youssef[ expand ]
15:34 [PhD][New]Zachary Kissel: Verifiable Symmetric Searchable Encryption[ expand ]
15:34 [PhD][New]Jie Wang: Polynomial Time Creativity and its Applications (P-Creativity)[ expand ]
13:17 [Pub][ePrint]A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing, by Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh[ expand ]
13:17 [Pub][ePrint]Characterization of EME with Linear Mixing, by Mridul Nandi and Nilanjan Datta[ expand ]
13:17 [Pub][ePrint]A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis, by Annelie Heuser and Sylvain Guilley and Olivier Rioul[ expand ]
13:17 [Pub][ePrint]One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner., by Ethan Heilman[ expand ]
13:17 [Pub][ePrint]Efficient Non-Interactive Zero Knowledge Arguments for Set Operations, by Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang[ expand ]

17:27 [PhD][Update]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]

13:17 [Pub][ePrint]The analysis of the Keccak with the new method called parity, by Ghanei yakhdan.mostafa, Noruzi, zynolabedin[ expand ]
10:17 [Pub][ePrint]MaxMinMax problem and sparse equations over finite fields, by Igor Semaev[ expand ]

10:17 [Pub][ePrint]$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials, by Xi Xiong and Haining Fan[ expand ]
10:17 [Pub][ePrint]Pseudorandom Generator Based on Hard Lattice Problem, by Kuan Cheng[ expand ]

23:37 [Event][New]YACC 2014: Yet Another Conference on Cryptography[ expand ]
22:17 [Pub][ePrint]Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks, by Yalin Chen and Jue-Sam Chou[ expand ]
16:17 [Pub][ePrint]New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers, by Zhe Liu and Johann Gro{\\ss}sch{\\\"a}dl[ expand ]
16:17 [Pub][ePrint]Can Bitcoin Scale? Secure High-Rate Transaction Processing in The Bitcoin Network, by Yonatan Sompolinsky and Aviv Zohar[ expand ]
16:17 [Pub][ePrint]New Constructions of Revocable Identity-Based Encryption from Multilinear Maps, by Seunghwan Park and Kwangsu Lee and Dong Hoon Lee[ expand ]

06:37 [Job][New]Computer Engineering, Ariel University, Israel, Mediterranean[ expand ]

22:17 [Pub][ePrint]Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs, by Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng[ expand ]
22:17 [Pub][ePrint]MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature, by Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li[ expand ]
22:17 [Pub][ePrint]Succinct Non-Interactive Arguments for a von Neumann Architecture, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]

22:17 [Pub][ePrint]Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE, by Michael Clear and Ciaran McGoldrick[ expand ]
22:17 [Pub][ePrint]Public-Key Encryption with Lazy Parties, by Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction, by Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]Poly-Many Hardcore Bits for Any One-Way Function, by Mihir Bellare and Stefano Tessaro[ expand ]
13:17 [Pub][ePrint]PRE^{+}: Dual of Proxy Re-encryption and Its Application, by Xu An Wang and Yunlong Ge and Xiaoyuan Yang[ expand ]
13:17 [Pub][ePrint]A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities, by Weiqiang Wen and Libin Wang[ expand ]
13:17 [Pub][ePrint]A new class of hyper-bent functions and Kloosterman sums, by Chunming Tang, Yanfeng Qi[ expand ]
13:17 [Pub][ePrint]How to Fake Auxiliary Input, by Dimitar Jetchev and Krzysztof Pietrzak[ expand ]
13:17 [Pub][ePrint]Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft), by Lear Bahack[ expand ]
13:17 [Pub][ePrint]LHash: A Lightweight Hash Function (Full Version), by Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong[ expand ]
13:17 [Pub][ePrint]Compact Hardware Implementation of Ring-LWE Cryptosystems, by Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede[ expand ]
13:17 [Pub][ePrint]SNR to Success Rate: Reaching the Limit of Non-Profiling DPA, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs, by Adam Smith and Ye Zhang[ expand ]
13:17 [Pub][ePrint]Formal Treatment of Distributed Trust in Electronic Voting, by Stephan Neumann and Melanie Volkamer[ expand ]
13:17 [Pub][ePrint]How to Delegate Computations: The Power of No-Signaling Proofs, by Yael Tauman Kalai and Ran Raz and Ron Rothblum[ expand ]
13:17 [Pub][ePrint]Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments, by Muhammad Rizwan Asghar[ expand ]
13:17 [Pub][ePrint]On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input , by Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
13:17 [Pub][ePrint]Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications, by Sherman S.M. Chow and Matthew Franklin and Haibin Zhang[ expand ]
13:17 [Pub][ePrint]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, by Daniel Genkin and Adi Shamir and Eran Tromer[ expand ]

13:37 [Job][New]Research Fellow, University of Tartu, Estonia[ expand ]

16:48 [Job][New]Fully funded Ph.D., Ecole normale supérieure (Paris Area, France)[ expand ]
16:17 [Pub][ePrint]Tightly-Secure Signatures From Lossy Identification Schemes, by Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]Weaknesses in a Recently Proposed RFID Authentication Protocol, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
16:17 [Pub][ePrint]Multiple-Use Transferable E-Cash , by Pratik Sarkar[ expand ]

15:08 [Job][New]Post-Doc, EPFL, Switzerland[ expand ]
08:54 [Job][New]3 Phd Students in Trustworthy Hardware/Hardware Security, New York University Polytechnic School of Engineering, USA, North America[ expand ]

19:17 [Pub][ePrint]Automatic Search for Differential Trails in ARX Ciphers (Extended Version), by Alex Biryukov and Vesselin Velichkov[ expand ]
16:17 [Pub][ePrint]Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256, by Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang[ expand ]
16:17 [Pub][ePrint]Power and Timing Side Channels for PUFs and their Efficient Exploitation, by Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson[ expand ]
16:17 [Pub][ePrint]Secure Floating-Point Arithmetic and Private Satellite Collision Analysis, by Liina Kamm and Jan Willemson[ expand ]
16:17 [Pub][ePrint]Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
16:17 [Pub][ePrint]Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols, by Xi-Jun Lin and Lin Sun[ expand ]
16:17 [Pub][ePrint]Ultralightweight cryptography for passive RFID system, by Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed[ expand ]
16:17 [Pub][ePrint]A new attack on RSA with a composed decryption exponent, by Abderrahmane Nitaj and Mohamed Ould Douh[ expand ]
16:17 [Pub][ePrint]How to Keep a Secret: Leakage Deterring Public-key Cryptography, by Aggelos Kiayias and Qiang Tang[ expand ]
16:17 [Pub][ePrint]A generic view on trace-and-revoke broadcast encryption schemes, by Dennis Hofheinz and Christoph Striecks[ expand ]
16:17 [Pub][ePrint]A Study of Goldbach\'s conjecture and Polignac\'s conjecture equivalence issues, by Jian Ye and Chenglian Liu[ expand ]
16:17 [Pub][ePrint]Detecting Hidden Leakages, by Amir Moradi and Sylvain Guilley and Annelie Heuser[ expand ]

22:17 [Pub][ePrint]Trust Views for the Web PKI, by Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser[ expand ]
22:17 [Pub][ePrint](Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, by Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Z[ expand ]
22:17 [Pub][ePrint]Lattice Decoding Attacks on Binary LWE, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]An improved compression technique for signatures based on learning with errors, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]Fair Two-Party Computations via the BitCoin Deposits, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
22:17 [Pub][ePrint]Identity-Based Key-Encapsulation Mechanism from Multilinear Maps, by Hao Wang and Lei Wu Zhihua Zheng[ expand ]
19:17 [Pub][ePrint]A Modular Framework for Building Variable-Input Length Tweakable Ciphers, by Thomas Shrimpton and R. Seth Terashima[ expand ]
19:17 [Pub][ePrint]Keyless Signatures\' Infrastructure: How to Build Global Distributed Hash-Trees, by Ahto Buldas and Andres Kroonmaa and Risto Laanoja[ expand ]
19:17 [Pub][ePrint]Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions, by Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Practical Dynamic Searchable Encryption with Small Leakage, by Emil Stefanov and Charalampos Papamanthou and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Provable Security Proofs and their Interpretation in the Real World, by Vikram Singh[ expand ]
19:17 [Pub][ePrint]Is Bitcoin a Decentralized Currency?, by Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun[ expand ]
15:47 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Max Planck Institute for Software Systems, Saarbrücken, Germany[ expand ]
08:38 [Job][New]Ph.D student , Chalmers University of Technology, Sweden[ expand ]
08:07 [Event][New]IEEE Computer SI on Mobile App Sec: IEEE Computer SI on methodologies and solutions for mobile app. security[ expand ]

13:17 [Pub][ePrint]Decentralized Traceable Attribute-Based Signatures, by Ali El Kaafarani and Essam Ghadafi and Dalia Khader[ expand ]