International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 [ 52 ] 53 54 55 56 57 58 59 60 61 62 63 64
2011-12-20
15:46 [PhD][New]Arshad Ali: New Attacks on FCSR-based Stream Ciphers[ expand ]


2011-12-19
21:38 [PhD][New]Robert Granger: On Small Degree Extension Fields in Cryptology[ expand ]
06:36 [Event][Update]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:34 [Event][New]ANTS-X: Tenth Algorithmic Number Theory Symposium[ expand ]


2011-12-18
16:12 [Conf][EC]List of Accepted Papers[ expand ]
11:00 [Job][New]Research Assistant in Secure Software Engineering, European Center for Security and Privacy by Design, Darmstadt, Germany[ expand ]


2011-12-16
12:12 [Job][New]Security Engineer and Consultant for Germany , ESCRYPT GmbH, Bochum/Munich/Wolfsburg, Germany[ expand ]


2011-12-15
22:52 [Conf]188 Submissions at PKC 2012[ expand ]
14:20 [Event][New]esIoT: International Workshop on Extending Seamlessly to the Internet of Things[ expand ]
05:49 [Job][New]Ph.D. and postdoctoral positions, IMDEA Software Institute, Spain[ expand ]



2011-12-14
21:02 [Job][New]Postdoctoral/ Research Fellow - Information Security group, University of Calgary[ expand ]
15:15 [Job][New]Security Engineer and Consultant for USA, ESCRYPT Inc., Ann Arbor, Michigan, USA[ expand ]
14:26 [PhD][New]Filipe Beato: Privacy Preserving Information Sharing in Online communities[ expand ]
10:35 [Job][New]Post-Doc in Information Security, University of Twente[ expand ]
10:35 [Job][New]Post-Doc in Security of Industrial Control Systems, University of Twente[ expand ]
06:28 [Job][New]Post-Doctoral or Research Professor Positions , Seoul National University, Korea[ expand ]
06:27 [Job][New]Two fully funded PhD student positions in Information Security, University off Twente[ expand ]


2011-12-12
05:21 [Job][New]Tenure-Track position in Information Security , University of Twente, The Netherlands[ expand ]


2011-12-11
10:20 [PhD][New]Souradyuti Paul: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition[ expand ]


2011-12-10
19:01 [Event][New]ICDIPC2012: 2nd Inter. Conference on Digital Information Processing and Communications[ expand ]



2011-12-09
10:24 [Job][New]Ph.D. student scholarships, Center for Advanced Security Research Darmstadt (CASED), Germany[ expand ]
10:24 [Job][New]Full professor in Computer Security, KTH Royal Institute of Technology[ expand ]
08:42 [Conf][EC]Eurocrypt Stipends[ expand ]


2011-12-08
06:22 [PhD][New]Florian Mendel: Analysis of Cryptographic Hash Functions[ expand ]


2011-12-06
20:44 [Conf][FSE]Registration Now Open[ expand ]


2011-12-04
15:54 [Event][New]PAIRING 2012: 5th International Conference on Pairing-Based Cryptography[ expand ]
07:01 [PhD][New]Karim Abdellatif: Hardware Architectures for Cryptography[ expand ]
07:01 [PhD][New]Habib Mehrez[ expand ]



2011-12-03
10:26 [Job][New]Software Security Engineer (All Levels), Qualcomm Incorporated[ expand ]
10:25 [Event][New]Inscrypt'2012: The 8th China International Conference on Information Security and Cryptolo[ expand ]


2011-12-02
10:01 [Event][New]HOST'12: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST[ expand ]
07:45 [PhD][New]Christiane Peters: Curves, Codes, and Cryptography[ expand ]
05:17 [Event][Update]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]


2011-11-30
23:33 [Event][Update]TRUST 2012: 5th International Conference on Trust and Trustworthy Computing[ expand ]
23:32 [Event][New]RFIDSec'12: The 8th workshop of RFID security and privacy[ expand ]
23:30 [Job][New]PhD student, Norwegian Information Security Laboratory, GUC[ expand ]


2011-11-28
15:08 [Event][New]SECOTS 2012: Intl. Symposium on Security in Collaboration Technologies and Systems[ expand ]
15:06 [Job][New]Ph.D. Students and Post-Doc, University of Luxembourg[ expand ]



2011-11-25
13:58 [Conf][EC]Report on Eurocrypt 2011, May 15-19, 2011, Tallinn, Estonia [ expand ]
13:56 [Conf]Report on SECRYPT 2011, July 18-21, 2011, University of Seville, Spain[ expand ]
13:52 [Event][New]ARES 2012: 7th International Conference on Availability, Reliability and Security[ expand ]
09:42 [Event][New]ISCTURKEY2012: 5th International Conference on Information Security and Cryptology[ expand ]
08:20 [News]Newsletter Autumn 2011[ expand ]


2011-11-24
14:08 [Event][New]WISTP 2012: Sixth Workshop in Information Security Theory and Practice[ expand ]
06:17 [Job][New]Lecturer/Senior Lecturer, University of Wollongong, Australia[ expand ]


2011-11-23
09:42 [Conf][FSE]FSE 2012: 90 submissions received[ expand ]


2011-11-22
18:46 [Event][New]FIRST 2012: 24th Annual FIRST Conference on Computer Security and Incident Response[ expand ]



2011-11-20
16:32 [Job][New]Cryptography Architect, CipherCloud, Hyderabad, India[ expand ]
16:30 [Event][New]2nd Bar-Ilan Winter School on Cryptography: Lattice-Based Cryptography and[ expand ]


2011-11-18
06:49 [Event][Update]Is Cryptographic Theory Practically Relevant?[ expand ]
06:48 [Event][Update]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
06:44 [Event][New]Asiacrypt 2012[ expand ]
06:44 [Event][New]Crypto 2013[ expand ]
06:27 [Conf]Report on Theory of Cryptography Conference 2011 (TCC), March 28-30, 2011, Providence, RI, USA[ expand ]


2011-11-17
11:03 [Event][New]TRUST 2012[ expand ]
07:35 [Event][New]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:52 [Conf]Africacrypt 2012[ expand ]
06:22 [Election]Results 2011[ expand ]


2011-11-16
12:29 [PhD][New]Berkant Ustaoglu: Key establishment - security models, protocols and usage[ expand ]
12:00 [Conf][FSE]FSE submission server will close in 24 hours (Nov. 17, 11:59 AM UTC)[ expand ]



2011-11-15
10:13 [News]Eli Biham to hold Distinguished Lecture 2013[ expand ]
10:12 [News]Dan Boneh to hold Distinguished Lecture 2012[ expand ]


2011-11-14
18:09 [Job][New]Experienced Researchers in Cryptology, Galician Research and Development Center in Advanced Telecommunications (Gradiant), Vigo, Spain[ expand ]
10:02 [Job][New]IT Hardware Security Engineer – Smartcards, APPLUS - LGAI DIVISION Barcelona[ expand ]


2011-11-12
15:24 [Conf]Report on Fault Diagnosis and Tolerance in Cryptography Workshop (FDTC 2011) September 28, 2011, Nara, Japan (ICW)[ expand ]


2011-11-11
14:48 [Conf]Report on Africacrypt 2011 (ICW)[ expand ]
13:13 [Event][Update]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]
06:43 [Conf]Report on CHES 2011, Nara, Japan, Sept 28-Oct 1[ expand ]
06:40 [Conf]Report on Public Key Cryptography 2011 (PKC), March 6-9, 2011, Taormina, Italy[ expand ]



2011-11-08
06:46 [Conf]Report on Crypto 2011[ expand ]
06:07 [Event][New]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]


2011-11-07
16:34 [Event][New]CSP EU Forum: Cybersecurity and Privacy EU Forum 2012[ expand ]
10:56 [Conf]Report on SAC 2011, Ontario, Canada (ICW)[ expand ]


2011-11-04
12:47 [Job][New]Mathematicians , GCHQ, UK[ expand ]


2011-11-03
18:29 [PhD][New]Mark Manulis: Provably Secure Group Key Exchange[ expand ]
14:30 [Event][New]PST 2012: 10th Annual Conference on Privacy, Security and Trust[ expand ]
14:29 [Event][New]DBSEC 2012: 26th Annual WG 11.3 Conference on Data and Applications Security and Privac[ expand ]



2011-11-01
18:15 [Job][New]Mathematicians (graduate entry level), GCHQ, UK[ expand ]
16:34 [Event][New]SHA3@ISI: Hash Workshop on SHA3 Finalists[ expand ]


2011-10-29
15:29 [PhD][New]Yves Mathieu[ expand ]
15:26 [PhD][New]Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique[ expand ]


2011-10-28
17:41 [Job][New]Ph.D. Student, Signal Processing in Communications Group, University of Vigo, Spain[ expand ]
17:40 [Job][New]Technical Support Engineer - Encryption, Acumin[ expand ]


2011-10-27
20:38 [Conf]Report on InfoSecHiComNet 2011, October 19-22, Haldia, India[ expand ]



2011-10-25
19:31 [PhD][New]Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography[ expand ]


2011-10-24
15:44 [Event][New]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
15:34 [Event][New]SCC2012: Third international conference on Symbolic Computation and Cryptography[ expand ]
15:09 [Event][New]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]


2011-10-22
15:52 [Event][New]ACE-2012: Third International Conference on Advances in Computer Engineering - ACE 20[ expand ]
15:50 [Job][New]Post-Doc, Ben-Gurion university, Beer-Sheva, Israel[ expand ]


2011-10-21
08:00 [Conf][FSE]FSE 2012 deadline: November 17, 11:59 AM UTC[ expand ]



2011-10-14
08:25 [Job][New]Post-Doc, University of British Columbia, Vancouver, Canada[ expand ]


2011-10-13
20:20 [Event][Update]Crypto 2012[ expand ]
15:26 [Job][Update]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
15:25 [Job][New]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
12:01 [Event][New]ProvSec 2012: The Sixth International Conference on Provable Security[ expand ]
11:50 [Job][New]Two Post-Docs, University of Luxembourg[ expand ]
06:38 [PhD][New]Mehmet Sabir Kiraz: Secure and Fair Two-Party Computation[ expand ]
06:37 [PhD][New]Berry Schoenmakers[ expand ]


2011-10-12
06:53 [Job][New]Research Scientist, National University of Singapore, Singapore[ expand ]
05:50 [Event][New]SETA 2012: The 7th International Conference on Sequences and Their Applications[ expand ]


2011-10-11
12:28 [Event][New]SCN 2012: 8th Conference on Security and Cryptography for Networks[ expand ]



2011-10-10
12:15 [Event][Update]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]


2011-10-07
19:45 [Election]15.2% participation within the first week[ expand ]
13:16 [Job][Update]MSc student, University of Warsaw[ expand ]
13:12 [Job][New]MSc student, University of Warsaw[ expand ]


2011-10-06
06:20 [Event][New]ICACM 2012: International Conference on Applied and Computational Mathematics[ expand ]
06:08 [Event][New]WAIFI 2012: International Workshop on the Arithmetic of Finite Fields[ expand ]


2011-10-05
16:19 [Job][New]Post-Doc Position in Information Security (Quantum Key Distribution), ID Quantique, Geneva, Switzerland[ expand ]
16:19 [Job][New]Post-Doc, Tel Aviv Universaity, Israel[ expand ]



2011-10-04
17:59 [Conf][EC]194 submissions at Eurocrypt[ expand ]


2011-10-03
20:31 [Event][New]DICTAP 2012: 2nd Digital Information & Communication Technology & its Applicatiions Conf[ expand ]
15:53 [Event][New]Third SHA-3 Candidate Conference[ expand ]


2011-10-01
17:46 [Election]6.3% participation within 24h [ expand ]


2011-09-29
04:51 [Job][New]3 Security Experts in Network/SW and HW/Smartcards, LGAI Applus+, Barcelona, Spain[ expand ]
04:50 [Job][New]PhD Studentship, University of Cambridge[ expand ]
04:50 [Job][New]PhD Studentship in Mobile Payments, University of Cambridge[ expand ]



2011-09-28
05:58 [PhD][Update]Mark D. Ryan: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning[ expand ]
05:57 [PhD][New]Ben Smyth: Formal verification of cryptographic protocols with automated reasoning[ expand ]
05:57 [PhD][New]Mark D. Ryan[ expand ]


2011-09-27
22:01 [Job][New]Postdoc, Ruhr University Bochum[ expand ]


2011-09-25
16:07 [Election]List of Candidates Available[ expand ]
10:33 [Job][New]PhD in Network Security and Computer Forensics, University of Bristol[ expand ]


2011-09-23
11:48 [Job][New]Post-Doc, Computer Science and Technology Centre (CCTC) at Universidade do Minho, Braga, Portugal[ expand ]



2011-09-22
14:22 [Job][New]Four Post-Doc Positions in Security and Privacy, Universitat Rovira i Virgili[ expand ]
05:17 [Job][New]Post-Doc, University of Warsaw[ expand ]


2011-09-20
08:37 [PhD][New]Goutam Paul: Analysis and Design of RC4 and Its Variants[ expand ]
08:34 [Event][New]WiSec 2012: The Fifth ACM Conference on Wireless Network Security[ expand ]


2011-09-19
11:10 [Job][New]Ph.D. student, University of Luxembourg[ expand ]
08:22 [Job][New]Research Scientists , Institute for Infocomm Research, Singapore[ expand ]


2011-09-17
18:01 [Event][New]CFP - ISeCure Special Issue on Information Hiding[ expand ]



2011-09-16
16:27 [Job][Update]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]


2011-09-15
17:41 [PhD][New]Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques[ expand ]
17:38 [Job][New]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]
17:37 [Event][New]PSD 2012: Privacy in Statistical Databases[ expand ]


2011-09-14
09:25 [Event][Update]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
09:24 [Event][New]ACISP 2012: The 17th Australasian Conference on Information Security and Privacy[ expand ]


2011-09-12
13:48 [Job][New]Post-Doc, Ecole normale superieure, Paris, France[ expand ]



2011-09-09
22:25 [Event][New]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]
05:34 [Event][Update]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
05:33 [Event][New]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
04:50 [Job][New]PhD student , University Paris 7[ expand ]


2011-09-08
16:12 [Job][New]PhD or Post-Doc Position, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-09-07
11:03 [Job][New]Lecturer in Cybersecurity, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:02 [Job][Update]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:01 [Job][New]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen's University Belfast, UK[ expand ]
07:09 [Event][New]Stream Ciphers: Special Issue on "Stream Ciphers" in the journal CCDS, Springer[ expand ]
05:15 [Job][New]Senior Lecturer/Associate Professor, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-09-06
08:37 [Job][Update]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]



2011-09-05
10:53 [Job][New]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]


2011-09-04
14:50 [PhD][Update]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]


2011-09-03
20:31 [PhD][New]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]
17:50 [News]Distinguished Lectures Online: Gus Simmons and Ron Rivest[ expand ]


2011-09-02
17:26 [PhD][Update]Thomas Schneider: Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
14:08 [PhD][New]Hans Ulrich Simon[ expand ]



2011-09-01
05:03 [Job][New]Post-Doc in Software Security/Cryptography, University of Arizona, Tucson AZ[ expand ]


2011-08-31
16:49 [PhD][Update]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
16:24 [Event][New]ECRYPT Workshop on Lightweight Cryptography[ expand ]


2011-08-30
20:28 [PhD][New]Gene Tsudik[ expand ]
20:28 [PhD][New]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
13:46 [PhD][New]Nicky Mouha: Analysis and Design of Cryptographic Hash Functions[ expand ]
04:48 [Job][New]Ph.D. Scholarships, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-29
09:23 [PhD][New]Jens Hermans: Lightweight public-key cryptography[ expand ]
07:59 [Event][New]SCIS 2012: The 29th Symposium on Cryptography and Information Security[ expand ]



2011-08-28
17:54 [News]Message from the IACR Board to the Japanese cryptologic community[ expand ]
17:53 [News]Message from the IACR Board w.r.t. CHES 2011[ expand ]
11:38 [Event][New]Is Cryptographic Theory Practically Relevant?[ expand ]


2011-08-27
23:05 [News][Book]Books Available for Review[ expand ]
20:03 [News][Review]New Book Reviews Available[ expand ]
18:58 [News]Membership Meeting Crypto 2011[ expand ]
18:20 [News]New Entries at the Archive[ expand ]
11:43 [Event][New]SEC 2012: 27th IFIP International Information Security and Privacy Conference[ expand ]
11:42 [Event][New]2011 AlKindi: The 2011 AlKindi Student Workshop on Cryptology[ expand ]


2011-08-26
12:15 [Election]IACR Elections: Nominations possible until September 18[ expand ]


2011-08-24
18:44 [Job][New]2 - 3 Research Fellow Positions, Nanyang Technological University, Singapore[ expand ]
18:43 [Job][New]Assistant Professor, Stevens Institute of Technology, Hoboken, NJ, USA[ expand ]
08:19 [Event][New]ICITS 2012: Sixth International Conference on Information-Theoretic Security[ expand ]



2011-08-23
17:24 [PhD][New]Chun-Yuan Hsiao: BUTTERFLY EFFECT IN CRYPTOGRAPHY: CONSEQUENCES OF CHANGES IN DEFINITIONS[ expand ]
16:46 [Event][New]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]


2011-08-22
08:26 [Event][New]Inscrypt'2011: The 7th China International Conference on Information Security & Cryptolyo[ expand ]


2011-08-21
18:54 [Event][New]ISPEC 2012: The 8th Int. Conference on Information Security Practice and Experience[ expand ]


2011-08-20
10:16 [PhD][New]Pradeep Kumar Mishra: Studies on Efficient and Secure Implementation of Elliptic and Hyperelliptic Curve Cryptosystems[ expand ]
10:16 [PhD][New]Palash Sarkar[ expand ]
10:16 [PhD][New]Ero Balsa: Privacy in online social networks: analysis and solutions[ expand ]



2011-08-16
17:23 [PhD][New]Scott Russell: Communication and Query Privacy: Intrusion-Resilient Secure Channels and Private Database Queries[ expand ]
17:23 [PhD][New]Anthony Van Herrewege: Security components for trusted computer systems[ expand ]


2011-08-15
00:06 [Event][Update]TCC 2012: Ninth Theory of Cryptography Conference[ expand ]


2011-08-12
05:51 [Job][New]Postdoctoral Researcher, University of Maryland[ expand ]
05:50 [Job][New]Lecturer, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-10
17:27 [PhD][New]Rafi Chen: New Techniques for Cryptanalysis of Cryptographic Hash Functions[ expand ]



2011-08-09
17:45 [PhD][Update]: Provable Security of Symmetric Primitives[ expand ]


2011-08-08
18:09 [PhD][New]Miroslav Knezevic: Efficient Hardware Implementations of Cryptographic Primitives[ expand ]
18:09 [PhD][New]Bart Mennink: Provable Security of Symmetric Primitives[ expand ]
18:07 [PhD][New]Yoni De Mulder: Design and Cryptanalysis of White-Box Implementations[ expand ]
18:07 [PhD][Update]: On Fairness in Secure Computation[ expand ]
11:21 [PhD][New]Carmela Troncoso: Design and analysis methods for privacy technologies[ expand ]
11:21 [PhD][New]Claudia Diaz[ expand ]
11:20 [PhD][New]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-07
14:22 [PhD][Update]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-06
16:58 [PhD][New]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]
16:58 [PhD][Update]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]



2011-08-05
20:50 [PhD][New]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
20:50 [PhD][New]Rene Govaerts[ expand ]
20:50 [PhD][New]Joos Vandewalle[ expand ]
20:50 [PhD][Update]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
13:52 [PhD][New]Roel Peeters: Study and Design of a Security Architecture for Things That Think[ expand ]
13:12 [PhD][New]Dave Singelee: Study and Design of a Security Architecture for Wireless Personal Area Networks[ expand ]
12:54 [PhD][New]Sebastiaan Indesteege: Analysis and Design of Cryptographic Hash Functions[ expand ]
06:31 [PhD][Update]Debdeep Mukhopadhyay: Design and Analysis of Cellular Automata Based Cryptographic Algorithms[ expand ]


2011-08-04
05:05 [Event][New]FloCon 2012: FloCon 2012 the 8th Annual Conference for Network Flow Analysis[ expand ]


2011-08-03
16:17 [PhD][Update]Leonid Reyzin: Zero-Knowledge with Public Keys[ expand ]


2011-08-02
11:28 [Job][Update]Ph.D studentship, Newcastle University[ expand ]
11:27 [Job][New]Ph.D studentship, Newcastle University[ expand ]



2011-07-30
18:42 [News]One-Time Pad was invented 35 years earlier by Frank Miller, not Vernam and Mauborgne[ expand ]


2011-07-27
15:07 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]
14:57 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]


2011-07-25
10:14 [Event][Update]FSE 2012: 19th International Workshop on fast software encryption[ expand ]
10:14 [Event][New]FSE 2012: 19th International Workshop on fast software encryption[ expand ]


2011-07-21
22:16 [Job][New]Ph.D. Scholarships, CASED / Darmstadt University of Technlogy, Germany[ expand ]
22:04 [PhD][New]S. Dov Gordon: On Fairness in Secure Computation[ expand ]
10:42 [PhD][New]Michael Hutter: Secure and Efficient Implementation of RFID Tags Supporting Cryptography[ expand ]



2011-07-19
14:56 [PhD][New]Urs Hengartner[ expand ]
14:56 [PhD][New]Jeremy Clark: Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections[ expand ]


2011-07-18
14:56 [Event][New]The science of secrecy: ciphers to cyberspace[ expand ]
13:27 [Job][New]Senior Researcher, Fraunhofer-Institut für Sichere Informationstechnologie, Darmstadt[ expand ]


2011-07-13
07:00 [Job][New]Two Postdocs, Information Security Group, Royal Holloway, University of London[ expand ]


2011-07-11
20:04 [Event][New]NordSec 2011: 16th Nordic Conference in Secure IT Systems[ expand ]
13:38 [Job][New]Post-doc in Computer Science or related area - Claude Shannon Fellow Program, Technische Universitaet Darmstadt[ expand ]



2011-07-10
21:34 [PhD][New]Dipanwita Roychowdhury[ expand ]
21:34 [Event][New]ASCrypto 2011: The Sao Paulo Advanced School of Cryptography[ expand ]
21:28 [PhD][New]Debdeep Mukhopadhyay[ expand ]
21:24 [PhD][New]Santosh Ghosh: Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields[ expand ]


2011-07-07
08:06 [Job][Update]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]
08:06 [Job][New]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]


2011-07-06
20:51 [Event][New]HPGC'11: Workshop on Human centric computing, P2P, Grid and Cloud computing[ expand ]
20:51 [Event][New]NIAT 2011: Non-Invasive Attack Testing Workshop[ expand ]


2011-07-04
10:05 [Event][New]WSPCC: Workshop on Cloud Computing (WSPCC), IMSAA-2011 Conference [ expand ]



2011-07-03
19:05 [PhD][New]Stefan Brands: [ expand ]
19:05 [PhD][New]Mohamed Layouni: Privacy-preserving Personal Information Management[ expand ]


2011-06-30
23:21 [Event][New]DATE 2012: Design Automation and Test in Europe Conference[ expand ]
19:24 [Event][Update]Crypto 2012 (tentative)[ expand ]
07:43 [Event][New]Cryptology2012: The 3rd International Conference on Cryptology and Computer Security 2012[ expand ]


2011-06-29
09:17 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
09:16 [Event][Update]Crypto 2012 (tentative)[ expand ]
09:16 [Job][Update]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-28
07:59 [Job][New]Post-Doc, Universite Libre de Bruxelles[ expand ]



2011-06-27
18:39 [Event][New]CT-RSA 2012: Cryptographers' Track - RSA Conference 2012[ expand ]
05:38 [Job][New]Post-Doc, Data Storage Institute, A*STAR, Singapore[ expand ]


2011-06-26
14:57 [Event][New]10th International Conference on Applied Cryptography and Network Security (ACNS 2012)[ expand ]


2011-06-25
12:18 [Event][Update]Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011)[ expand ]


2011-06-23
16:37 [Job][Update]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]
16:37 [Job][New]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]



2011-06-22
12:21 [Job][Update]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
04:42 [Event][New]Third International Workshop on Managing Insider Security Threats (MIST'11)[ expand ]


2011-06-21
15:03 [Event][New]IEEE Systems Journal - S. I. on Security and Privacy in Complex Systems (IEEE-SPCS)[ expand ]
06:16 [Event][Update]15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012)[ expand ]


2011-06-20
09:28 [Job][New]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
08:12 [PhD][Update]Marc Girault: Analysis and design of cryptographic and data coding algorithms[ expand ]


2011-06-19
17:48 [PhD][New]Cetin K. Koc: [ expand ]
17:47 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
17:47 [PhD][New]Thomas A. Schmidt: [ expand ]



2011-06-18
22:18 [Event][Update]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]
14:32 [Event][New]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]


2011-06-17
10:09 [Event][New]The 14th International Conference on Information Security and Cryptology (ICISC 2011)[ expand ]


2011-06-15
15:57 [Event][New]1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011)[ expand ]


2011-06-14
15:46 [Event][Update]The 2nd Workshop on the Security of the Internet of Things (SecIoT 2011) (SecIoT11)[ expand ]
08:58 [Event][Update]Eurocrypt 2012[ expand ]



2011-06-13
11:22 [PhD][Update]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
11:22 [PhD][New]Louis Goubin [ expand ]
11:21 [PhD][New]Alexandre Berzati Cryptographic Analysis of Algorithm Corruptions[ expand ]
11:21 [PhD][Update]Alexandre BERZATI Cryptographic Analysis of Algorithm Corruptions[ expand ]


2011-06-11
14:22 [Event][New]Tenth Smart Card Research and Advanced Application Conference()[ expand ]


2011-06-10
10:51 [Event][New]3rd IEEE International Workshop on Privacy Aspects Of Data Mining(PADM 2011)[ expand ]


2011-06-09
19:57 [PhD][New]Francois Koeune Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators[ expand ]
19:57 [PhD][New]Christophe Petit Cryptographic hash functions from expander graphs[ expand ]
19:57 [PhD][New]Jean-Pierre Tignol [ expand ]
19:56 [PhD][Update]Jean-Pierre Tignol [ expand ]
15:56 [Event][New]8th European Workshop on Public Key Infrastructures, Services, and Applica ()[ expand ]



2011-06-08
08:35 [PhD][New]Juan González Nieto [ expand ]
08:34 [PhD][New]Colin Boyd [ expand ]
08:34 [PhD][Update]Juan González Nieto [ expand ]
08:34 [PhD][Update]Colin Boyd [ expand ]
08:34 [PhD][New]Malakondayya Choudary Gorantla Design and Analysis of Group Key Exchange Protocols[ expand ]
08:32 [Job][New]Product Securty Engineers (7 positions) ,Qualcomm Incorporated[ expand ]


2011-06-07
11:56 [Event][New]6th Data Privacy Management International Workshop()[ expand ]
11:56 [Event][New]4th International Workshop on Autonomous and Spontaneous Security()[ expand ]
09:57 [Event][New]Western European Workshop on Research in Cryptology()[ expand ]
09:34 [Event][New]Asian Workshop on Symmetric Key Cryptography(ASK 2011)[ expand ]
06:52 [PhD][New]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
06:34 [Event][New]Workshop on Information Security Applications()[ expand ]
05:09 [Event][New]Ninth Theory of Cryptography Conference()[ expand ]


2011-06-06
05:17 [Event][New]Symposium on Advances in Cryptography, Security and Applications()[ expand ]
05:17 [Event][New]2012 Financial Cryptography and Data Security Conference(FC'12)[ expand ]


2011-06-03
13:59 [Event][New]13th International Conference on Distributed Computing and Networking(ICDCN 2012)[ expand ]



2011-06-02
22:03 [PhD][New]Vassilis Zikas Generalized Corruption Models in Secure Multi-Party Computation[ expand ]


2011-06-01
16:58 [Event][New]Workshop on Security and Application for Embedded smart systems()[ expand ]
09:09 [PhD][New]Marina Samokhina The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
09:09 [PhD][New]Ernst Gabidulin [ expand ]
09:06 [Event][New]ACM Workshop on Digital Rights Management(DRM 2011)[ expand ]


2011-05-31
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-05-30
09:27 [PhD][Update]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
08:50 [Event][New]Workshop on Symmetric Cryptanalysis[ expand ]
08:07 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
08:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]



2011-05-27
14:49 [Event][New]Security Aspects in Info. Tech., High-Performance Computing & Networking()[ expand ]
14:22 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures.[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures.[ expand ]


2011-05-26
13:27 [Job][New]Associate Professor ,Information Security Institute, Queensland University of Technology[ expand ]


2011-05-25
15:30 [Event][New]6th International Conference on Risks and Security of Internet and Systems(CRiSIS 2011)[ expand ]
09:00 [Event][New]Eurocrypt 2012[ expand ]
05:18 [Job][New]Research Scientist ,Institute for Infocomm Research (I2R), Singapore[ expand ]


2011-05-20
22:21 [PhD][New]Frank Lauren Hitchcock [ expand ]
22:21 [PhD][New]Claude Elwood Shannon An Algebra for Theoretical Genetics[ expand ]
06:52 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
06:51 [PhD][New]Frans Kaashoek [ expand ]
06:48 [PhD][Update]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]



2011-05-17
08:02 [PhD][New]Julien Bringer Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory[ expand ]
07:59 [PhD][New]Philippe Langevin [ expand ]


2011-05-16
11:38 [PhD][New]Ehab Alnfrawy Towards an Efficient Public Key Cryptosystem[ expand ]
11:37 [PhD][New]Mohamed M. Abd-Eldayem [ expand ]
11:37 [PhD][New]Aly A. Fahmy [ expand ]


2011-05-15
05:40 [PhD][New]Eric Bone A Generalization of Pohlig-Hellman Simplification in Elliptic Curve Cryptography[ expand ]
05:38 [PhD][New]Fred Diamond [ expand ]


2011-05-12
13:12 [PhD][New]Jean Monnerat Short Undeniable Signatures: Design, Analysis, and Applications[ expand ]



2011-05-09
20:25 [PhD][New]Benny Chor [ expand ]
20:25 [PhD][New]Amos Beimel Secure Schemes for Secret Sharing and Key Distribution[ expand ]


2011-05-07
15:49 [PhD][New]Claude Barral Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography[ expand ]
15:48 [PhD][Update]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-05
06:30 [PhD][New]Dwaine Clarke Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]
06:29 [PhD][New]Srinivas Devadas [ expand ]
06:28 [PhD][New]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-04
11:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
06:00 [Job][New]Summer internship in applied security, encryption, and secure multiparty computation Ricoh Innovations[ expand ]



2011-05-03
11:15 [PhD][New]Jean-Luc Danger [ expand ]
06:00 [Job][New]Ph.D. or MS student Koç University, Turkey[ expand ]


2011-04-30
20:38 [PhD][New]Kerstin Lemke-Rust Models and Algorithms for Physical Cryptanalysis[ expand ]
20:38 [PhD][New]Patrick Longa High-Speed Elliptic Curve and Pairing-Based Cryptography[ expand ]


2011-04-29
18:09 [PhD][New]Sven Laur Cryptographic Protocol Design[ expand ]
18:08 [PhD][New]Kaisa Nyberg [ expand ]


2011-04-28
07:09 [PhD][New]Angus E. Taylor [ expand ]
07:09 [PhD][New]Lothrop Mittenthal Operator-Valued Polynomials in a Complex Variable, and, Generalizations of Spectral Theory[ expand ]
06:00 [Job][New]PhD Student ETH Zurich[ expand ]



2011-04-27
19:48 [PhD][New]Mohammad Mahmoody Studies in the Efficiency and (versus) Security of Cryptographic Tasks[ expand ]
19:48 [PhD][New]Boaz Barak [ expand ]
15:30 [PhD][New]Martin Simka Analysis and Implementation of Selected Blocks for Public-Key Cryptosystems in FPGAs[ expand ]
15:30 [PhD][New]Fischer Viktor Fast Methods of Digital Image Segmentation[ expand ]
15:30 [PhD][New]Drutarovsky Milos Signal Processors in Digital Signal Processing[ expand ]
15:27 [PhD][New]Yi Mu [ expand ]
15:26 [PhD][New]Andrew V. Sutherland Order Computations in Generic Groups[ expand ]
06:00 [Job][New]Teaching Fellow Royal Holloway, University of London[ expand ]


2011-04-26
12:12 [PhD][New]Mohammad Reza Reyhanitabar Contributions to the Theory and Application of Cryptographic Hash Functions[ expand ]
06:00 [Job][New]PhD Scholarship: CASED / Technische Universität Darmstadt[ expand ]


2011-04-25
14:47 [PhD][New]Qingsong Ye Privacy Preserving Dataset Operations[ expand ]
14:46 [PhD][New]Peter Schwabe High-Speed Cryptography and Cryptanalysis[ expand ]
14:46 [PhD][New]Daniel J. Bernstein [ expand ]
14:45 [PhD][New]Tanja Lange [ expand ]
14:25 [PhD][New]Susan Hohenberger Advances in Signatures, Encryption, and E-Cash from Bilinear Groups[ expand ]
14:25 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
14:24 [PhD][New]Simon L. Garfinkel Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable[ expand ]
14:24 [PhD][New]Moses Liskov New Tools in Cryptography: Mutually Independent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration[ expand ]
14:24 [PhD][New]Jonathan Herzog Computational Soundness for Standard Assumptions of Formal Cryptography[ expand ]
14:24 [PhD][New]Stanislaw Jarecki Efficient Threshold Cryptosystems[ expand ]
14:24 [PhD][New]Leonid Reyzin Zero-Knowledge with Public Keys[ expand ]
14:24 [PhD][New]Zulfikar Ramzan A Study of Luby-Rackoff Ciphers[ expand ]
14:23 [PhD][New]Yevgeniy Dodis Exposure-Resilient Cryptography[ expand ]
14:23 [PhD][New]Victor Boyko On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols[ expand ]
06:00 [Job][New]Systems Security Architect Qualcomm[ expand ]


2011-04-24
06:09 [PhD][New]Henri Gilbert [ expand ]
06:08 [PhD][New]Thomas Peyrin Analyse de fonctions de hachage cryptographiques[ expand ]



2011-04-22
20:57 [PhD][New]Michael de Mare Secure Set Membership Using 3SAT[ expand ]
20:55 [PhD][New]Rebecca Wright Achieving Perfect Secrecy Using Correlated Random Variables[ expand ]
19:05 [PhD][New]Michael Naehrig Constructive and Computational Aspects of Cryptographic Pairings[ expand ]
10:15 [PhD][New]Burton Stephen Kaliski Jr. Elliptic Curves and Cryptography: A Pseudorandom Bit Generator and Other Tools[ expand ]
10:14 [PhD][New]Ronald Linn Rivest [ expand ]
10:11 [PhD][New]Michael Sipser [ expand ]
06:00 [Job][New]Faculty positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]


2011-04-21
06:00 [Job][New]Post-doc Technische Universität Darmstadt[ expand ]
06:00 [Job][New]Two Post Doctoral Positions Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-04-20
15:29 [PhD][New]Dominique Schroeder On the Complexity of Blind Signatures[ expand ]
15:28 [PhD][New]Marc Fischlin [ expand ]
14:14 [PhD][New]Salil Vadhan A Study of Statistical Zero-Knowledge Proofs[ expand ]
14:13 [PhD][New]Deepak Kumar Dalai On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks[ expand ]
14:13 [PhD][New]Subhamoy Maitra [ expand ]
14:12 [PhD][New]Chiu Yuen Koo Studies on Fault-Tolerant Broadcast and Secure Computation[ expand ]
14:11 [PhD][New]Shien Jin Ong Unconditional Relationships within Zero Knowledge[ expand ]
14:11 [PhD][New]Shafi Goldwasser [ expand ]
14:09 [PhD][New]Andrey Bogdanov Analysis and Design of Block Cipher Constructions[ expand ]


2011-04-19
20:43 [PhD][New]Siamak Fayyaz Shahandashti Contributions to Secure and Privacy-Preserving Use of Electronic Credentials[ expand ]
20:42 [PhD][New]Vipul Goyal Stronger Notions of Secure Computation[ expand ]
20:41 [PhD][New]Amit Sahai [ expand ]
20:41 [PhD][New]Martin Novotný Time-Area Efficient Hardware Architectures for Cryptography and Cryptanalysis[ expand ]
20:40 [PhD][New]Jan Schmidt [ expand ]
13:30 [PhD][New]Kazuo Sakiyama Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems[ expand ]
12:40 [PhD][New]Ian Goldberg [ expand ]
12:39 [PhD][New]Aniket Kate Distributed Key Generation and Its Applications[ expand ]
10:02 [PhD][New]Pierre-Alain Fouque Le partage de clés cryptographiques: Théorie et Pratique[ expand ]
09:47 [PhD][New]Mike Rosulek The Structure of Secure Multi-Party Computation[ expand ]
09:46 [PhD][New]Alptekin Küpçü Efficient Cryptography for the Next Generation Secure Cloud[ expand ]
09:45 [PhD][New]Anna Lysyanskaya Signature Schemes and Applications to Cryptographic Protocol Design[ expand ]
09:45 [PhD][New]Claudio Orlandi Secure Computation in Untrusted Environments[ expand ]
09:45 [PhD][New]Jan Denef [ expand ]
09:45 [PhD][New]Renaud Pacalet [ expand ]
09:45 [PhD][New]Sylvain Guilley Geometrical Countermeasures to Side-Channel Attacks[ expand ]
09:44 [PhD][New]Jonathan Katz Efficient Cryptographic Protocols Preventing Man-in-the-Middle Attacks[ expand ]
09:43 [PhD][New]Zvi Galil [ expand ]
09:42 [PhD][New]Moti Yung [ expand ]
09:42 [PhD][New]Alejandro Hevia Anonymity and Independence in Multiparty Protocols[ expand ]
09:42 [PhD][New]Frederik Vercauteren Computing zeta functions of curves over finite fields[ expand ]
06:00 [Job][New]Two postdoctoral positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]



2011-04-18
15:30 [PhD][New]Marko Wolf Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications[ expand ]
15:30 [PhD][New]Andrea Röck Quantifying Studies of (Pseudo) Random Number Generation for Cryptography[ expand ]
15:29 [PhD][New]Nicolas Sendrier [ expand ]
15:29 [PhD][New]Martin Geisler Cryptographic Protocols: Theory and Implementation[ expand ]
15:28 [PhD][New]Ivan Damgård [ expand ]
15:28 [PhD][New]Brecht Wyseur White-Box Cryptography[ expand ]
15:27 [PhD][New]Bart Preneel Analysis and Design of Cryptographic Hash Functions[ expand ]
08:29 [PhD][New]Dalia Khader Attribute based authentication schemes[ expand ]
08:28 [PhD][New]Russell Bradford [ expand ]
08:28 [PhD][New]Sandeep S. Kumar Elliptic Curve Cryptography for Constrained Devices[ expand ]
08:27 [PhD][New]Christof Paar Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields[ expand ]
07:47 [PhD][New]Sylvain Pasini Secure communication using authenticated channels[ expand ]
07:47 [PhD][New]Jan Pelzl Practical Aspects of Curve-Based Cryptography and Cryptanalysis[ expand ]
06:00 [Job][New]Embedded Firmware Security Engineer Security Software Company, Israel (local)[ expand ]
05:48 [PhD][New]Crystal Lee Clough Square: A New Family of Multivariate Encryption Schemes[ expand ]
05:48 [PhD][New]Guomin Yang Security and Privacy in Wireless and Roaming Networks[ expand ]
05:48 [PhD][New]Duncan S. Wong [ expand ]
05:47 [PhD][New]Xiaotie Deng [ expand ]
05:46 [PhD][New]Andre Weimerskirch Authentication in Ad-hoc and Sensor Networks[ expand ]
05:44 [PhD][New]Dominique Unruh Protokollkomposition und Komplexität (Protocoll Composition and Complexity)[ expand ]
05:43 [PhD][New]Manoj Prabhakaran [ expand ]
05:43 [PhD][New]Michael Loui [ expand ]
05:40 [PhD][New]Jintai Ding [ expand ]
05:39 [PhD][New]Thomas Beth [ expand ]


2011-04-17
17:36 [PhD][New]Raminder Ruprai Improvements to the Gaudry-Schost Algorithm for Multidimensional discrete logarithm problems and Applications[ expand ]
17:35 [PhD][New]Manuel Blum [ expand ]
17:35 [PhD][New]Rene Peralta Three Results in Number Theory and Cryptography: 1. A New Algorithm to Compute Square Roots Modulo A Prime Number. 2. On the Bit Complexity of the Discrete Logarithm. 3. A Framew[ expand ]
12:22 [PhD][New]Huaxiong Wang [ expand ]
12:19 [PhD][New]Josef Pieprzyk [ expand ]
12:17 [PhD][New]Christophe Tartary Authentication for Multicast Authentication[ expand ]
10:47 [PhD][New]Wei Wu Cryptographic Protocols with Untrusted Third Party[ expand ]
10:47 [PhD][New]Willy Susilo Contributions to Fail-Stop Signature Schemes[ expand ]
10:45 [PhD][New]Turki F. Al-Somani Design and Analysis of Efficient and Secure Elliptic Curve Cryptoprocessors[ expand ]
10:45 [PhD][New]Alaaeldin A. Amin [ expand ]
10:44 [PhD][New]Elad Barkan Cryptanalysis of Ciphers and Protocols[ expand ]
10:44 [PhD][New]Eli Biham [ expand ]
10:44 [PhD][New]Stefano Tessaro Computational Indistinguishability Amplification[ expand ]
00:37 [PhD][New]Vijayakrishnan Pasupathinathan Hardware-based Identification and Authentication Systems[ expand ]
00:36 [PhD][New]Rungrat Wiangsripanawan Contributions to Mobility and Anonymity in IP Networks[ expand ]
00:36 [PhD][New]Xinyi Huang A Study of Undeniable Signatures and Their Variants[ expand ]
00:36 [PhD][New]Tsz Hon Yuen Contributions to Pairing-based Cryptography [ expand ]
00:33 [PhD][New]Rei Safavi-Naini [ expand ]


2011-04-16
23:24 [PhD][New]Man Ho Allen Au Contribution to Privacy-Preserving Cryptographic Techniques[ expand ]
23:10 [PhD][New]Waldyr Dias Benits Junior Applications of Fobenius Expansions in Elliptic Curve Cryptography[ expand ]
23:10 [PhD][New]Steven D. Galbraith [ expand ]
21:24 [PhD][New]Silvio Micali [ expand ]
21:19 [PhD][New]Brigitte Vallée [ expand ]
21:17 [PhD][New]David Pointcheval Proofs of Knowledge and Security Proofs (Les Preuves de Connaissance et leurs Preuves de Sécurité)[ expand ]
21:15 [PhD][New]Chris Peikert Cryptographic Error Correction[ expand ]
19:58 [PhD][New]M.L. Valarmathi [ expand ]
19:56 [PhD][New]R. Vimalathithan Cryptanalysis using Computational Intelligence[ expand ]
19:55 [PhD][New]Gil Segev The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks[ expand ]
19:54 [PhD][New]Moni Naor [ expand ]
19:54 [PhD][New]Claude Crépeau Correct and Private Reduction among Oblivious Transfers[ expand ]
19:15 [PhD][New]Mayank Varia Studies in Program Obfuscation[ expand ]
19:14 [PhD][New]Serge Vaudenay The Security of Cryptographic Primitives[ expand ]
19:12 [PhD][New]Marcio Juliato Fault Tolerant Cryptographic Primitives for Space Applications[ expand ]
19:12 [PhD][New]Catherine Gebotys [ expand ]
19:12 [PhD][New]Yevgeniy Vahlis Black Box and White Box Cryptography[ expand ]
19:12 [PhD][New]Charles Rackoff [ expand ]
19:12 [PhD][New]Jian Guo Analysis of Cryptographic Hash Functions[ expand ]
19:11 [PhD][New]Ran Canetti [ expand ]
19:11 [PhD][New]Rafail Ostrovsky Software Protection and Simulation on Oblivious RAMs. [ expand ]
19:10 [PhD][New]Josh Benaloh Verifiable Secret-Ballot Elections[ expand ]
19:09 [PhD][New]Michael Fischer [ expand ]
17:36 [PhD][New]Vadim Lyubashevsky Towards Practical Lattice-Based Cryptography[ expand ]
17:35 [PhD][New]Daniele Micciancio [ expand ]
17:22 [PhD][New]Alfred Menezes Elliptic Curve Cryptosystems[ expand ]
17:21 [PhD][New]Scott Vanstone [ expand ]
15:48 [PhD][New]Dr. A.Vinaya Babu [ expand ]


2011-04-15
05:45 [PhD][New]Dmitry Khovratovich New Approaches to the Cryptanalysis of Symmetric Primitives[ expand ]
05:44 [PhD][New]Alex Biryukov [ expand ]



2011-04-14
12:53 [PhD][New]Sunder Lal [ expand ]
12:52 [PhD][New]Douglas Stebila Classical Authenticated Key Exchange and Quantum Cryptography[ expand ]
12:52 [PhD][New]Michele Mosca [ expand ]
12:52 [PhD][New]Santosh Kumar Yadav Some Problems in Symmetric and Asymmetric Cryptography[ expand ]
06:00 [Job][New]Technical/Scientific Assistant University of Luxembourg[ expand ]


2011-04-13
06:00 [Job][New]Phd Position Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
06:00 [Job][New]Two Postdoc Positions in Security and Privacy Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]


2011-04-12
14:37 [PhD][New]Ashraf Masood [ expand ]
14:35 [PhD][New]Sondre Roenjom Cryptanalysis of Ciphers over Finite Cyclic Groups[ expand ]
14:34 [PhD][New]Tor Helleseth [ expand ]
11:25 [PhD][New]Santiago Zanella Beguelin Formal Certification of Game-Based Cryptographic Proofs[ expand ]


2011-04-11
15:26 [PhD][New]Sundar Lal [ expand ]
15:26 [PhD][New]Amit K Awasthi A Study of Some Delegated Digital Signature Schemes[ expand ]
14:59 [PhD][New]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
14:58 [PhD][New]Mehreen Afzal Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update[ expand ]
14:58 [PhD][New]Gaëtan Leurent Design and Analysis of Hash Functions[ expand ]
06:00 [Job][New]Senior Computer Security Researcher ICF International, Suburban Maryland near Washington, DC[ expand ]



2011-04-09
06:00 [Job][New]PhD students, Postdocs Aarhus University, Denmark[ expand ]


2011-04-07
06:00 [Job][New]5 years Post Doc position (3 years experience required) Computer Science and Technology Centre (CCTC) at Universidade do Minho, Portugal[ expand ]


2011-04-06
06:00 [Job][New]Full Professor (W3) chairing the research field Security of Integrated Hardware Technical University of Berlin[ expand ]


2011-04-05
06:00 [Job][New]PhD Studentship University of Bristol, Bristol, UK[ expand ]



2011-04-04
06:00 [Job][New]Post-Doc University of Luxembourg[ expand ]
06:00 [Job][New]Post-Doc Université catholique de Louvain (UCL, Belgium)[ expand ]
06:00 [Job][New]Associate or Assistant Professor in Cryptology Technical University of Denmark[ expand ]
06:00 [Job][New]Ph.D. student in Mathematics of Cryptography Macquarie University, Sydney, Australia[ expand ]


2011-03-22
06:00 [Job][New]Research Engineer Coding and Cryptography Research Group, Nanyang Technological University[ expand ]


2011-03-20
11:14 [PhD][New]Sungjun Park [ expand ]
11:13 [PhD][New]Jongin Lim [ expand ]
11:13 [PhD][New]Daejoon Hwang [ expand ]
11:13 [PhD][New]Jinwook Chung [ expand ]
11:13 [PhD][New]Dongho Won [ expand ]
11:13 [PhD][New]Seungjoo Kim Improved privacy and authenticity in digital signatures / key management[ expand ]


2011-03-16
20:05 [PhD][New]Fathy Helail [ expand ]
20:04 [PhD][New]Wafik Lotfallah [ expand ]
20:04 [PhD][New]Ghada Abdelhady New DES based on Elliptic Curve[ expand ]



2011-03-14
21:45 [PhD][New]Charles Bouillaguet Some attacks against hardness assumptions and cyptographic primitives[ expand ]
20:02 [PhD][New]Jayaprakash Kar Algorithms for Cryptographic Protocols Using Elliptic Curve Cryptography[ expand ]
06:00 [Job][New]Research Fellow Institute for Infocomm Research, Singapore[ expand ]


2011-03-10
07:00 [Job][New]Postdoc Macquarie Univ., Sydney[ expand ]


2011-03-09
22:13 [PhD][New]Markku-Juhani Olavi Saarinen Cryptanalysis of Dedicated Hash Functions[ expand ]
22:12 [PhD][New]Jiqiang Lu Cryptanalysis of block ciphers[ expand ]
22:10 [PhD][New]Chris Mitchell [ expand ]


2011-03-08
12:49 [PhD][New]Marc Girault [ expand ]
12:49 [PhD][New]Sébastien Canard Group signatures, variants and applications[ expand ]



2011-03-07
07:00 [Job][New]PhD. student Department of Computing, Macquarie University[ expand ]


2011-03-04
07:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-03-03
11:52 [PhD][New]Victor Lomne Power and Electro-Magnetic Side-Channel Attacks: threats and countermeasures[ expand ]
11:52 [PhD][New]Philippe Maurine [ expand ]
11:51 [PhD][New]Michel Robert [ expand ]


2011-03-01
07:09 [PhD][New]Ulrich Huber On Broadcast Encryption for Secure Software Delivery to Automobiles[ expand ]



2011-02-28
07:00 [Job][New]Assistant Professor, Cryptology and Information Security University of Versailles St-Quentin-en-Yvelines (France)[ expand ]


2011-02-25
07:00 [Job][New]PhD student CEA-LETI & UVSQ (Université de Versailles-St-Quentin-en-Yvelines)[ expand ]
06:17 [PhD][New]Yi Lu Applied Stream Ciphers in Mobile Communications[ expand ]


2011-02-24
19:02 [PhD][New]Luca De Feo Fast Algorithms for Towers of Finite Fields and Isogenies[ expand ]
19:02 [PhD][New]Éric Schost [ expand ]
19:01 [PhD][New]Marcos Antonio Simplicio Junior Message Authentication Algorithms for Wireless Sensor Networks[ expand ]
19:01 [PhD][New]François Morain [ expand ]


2011-02-23
07:00 [Job][New]1 PhD Position in Privacy-Oriented Cryptography (full-time researcher) Technische Universität Darmstadt, Center for Advanced Security Research Darmstadt, Germany[ expand ]



2011-02-22
10:26 [PhD][New]John Merriman [ expand ]
10:26 [PhD][New]Nigel Smart Computer Solution of Diophantine Equations[ expand ]


2011-02-20
15:57 [PhD][New]Keith Martin [ expand ]


2011-02-18
16:20 [PhD][New]Stefan Tillich Instruction Set Extensions for Support of Cryptography on Embedded Systems[ expand ]
10:13 [PhD][New]Joachim von zur Gathen [ expand ]
10:08 [PhD][New]Axel Poschmann Lightweight Cryptography - Cryptographic Engineering for a Pervasive Worls[ expand ]


2011-02-17
06:25 [PhD][New]Karl Christian Posch [ expand ]



2011-02-16
18:06 [PhD][New]Hae Yong Kim [ expand ]
17:06 [PhD][New]Jean-Philippe Aumasson Design and analysis of symmetric cryptographic algorithms [ expand ]
17:06 [PhD][New]Thomas Baignères Quantitative security of block ciphers: designs and cryptanalysis tools[ expand ]
17:06 [PhD][New]Joern Schweisgut Elektronische Wahlen unter dem Einsatz kryptografischer Observer - Electronic Elections with Cryptographic Observers[ expand ]
15:39 [PhD][New]Atefeh Mashatan Message Authentication and Recognition Protocols Using Two-Chanel Cryptography.[ expand ]
15:38 [PhD][New]Simon Fischer Analysis of lightweight stream ciphers[ expand ]
08:25 [PhD][New]Martin Vuagnoux Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
08:24 [PhD][New]Pascal Junod Statistical cryptanalysis of block ciphers[ expand ]
08:21 [PhD][New]Willi Meier [ expand ]
08:21 [PhD][New]David Mandell Freeman Constructing abelian varieties for pairing-based cryptography[ expand ]
08:20 [PhD][New]Edward Schaefer [ expand ]
08:20 [PhD][New]Kenneth Ribet [ expand ]


2011-02-15
18:04 [PhD][New]Ben Adida Advances in Cryptographic Voting Systems[ expand ]
17:59 [PhD][New]Edlyn Teske [ expand ]
17:58 [PhD][New]Douglas Stinson [ expand ]
17:58 [PhD][New]Stephen Weis New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing[ expand ]
07:00 [Job][New]PhD Studentships Centre for Secure Information Technologies (CSIT), Queens University Belfast, Belfast, UK[ expand ]
06:47 [PhD][New]Gilles Barthe [ expand ]
06:39 [PhD][New]Matthieu Rivain On the Physical Security of Cryptographic Implementations[ expand ]


2011-02-14
20:55 [PhD][New]Marc Joye Security analysis of RSA-type cryptosystems[ expand ]
20:53 [PhD][New]Jean-Jacques Quisquater [ expand ]
18:27 [PhD][New]Pierre-Yvan Liardet Ingénierie cryptographique Implantations sécurisées[ expand ]
18:06 [PhD][New]Gildas Avoine Cryptography in Radio Frequency Identification and Fair Exchange Protocols[ expand ]
17:54 [PhD][New]Helger Lipmaa Secure and Efficient Time-Stamping Systems[ expand ]
17:53 [PhD][New]Mati Tombak [ expand ]
17:49 [PhD][New]Tim Güneysu Cryptography and Cryptanalysis on Reconfigurable Devices[ expand ]
17:49 [PhD][New]Andy Rupp Computational Aspects of Cryptography and Cryptanalysis[ expand ]
17:40 [PhD][New]Han Vinck [ expand ]
09:54 [PhD][New]Jacques Stern [ expand ]
09:53 [PhD][New]Jean-Sebastien Coron Cryptanalysis and security proofs of public-key schemes.[ expand ]
08:51 [PhD][New]Birgit Pfitzmann [ expand ]
08:51 [PhD][New]Thomas Gross Browser-based Identity Federation[ expand ]
06:33 [PhD][New]Ueli Maurer [ expand ]
06:29 [PhD][New]Albrecht Beutelspacher Teilfaserungen und Parallelismen in endlichdimensionalen projektiven Räumen[ expand ]
00:31 [PhD][New]Jörg Schwenk [ expand ]
00:26 [PhD][New]Ingrid Verbauwhede VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems[ expand ]


2011-02-13
18:28 [PhD][New]Benny Pinkas [ expand ]
18:27 [PhD][New]Thomas Schneider Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
16:27 [PhD][New]Benedikt Gierlichs Statistical and Information-Theoretic Methods for Power Analysis on Embedded Cryptography[ expand ]



2011-02-12
18:16 [PhD][New]Christopher Wolf Multivariate Quadratic Polynomials in Public Key Cryptography[ expand ]


2011-02-11
11:55 [PhD][New]Ahmad-Reza Sadeghi [ expand ]


2011-02-10
19:37 [PhD][New]Johannes Blömer [ expand ]
12:16 [PhD][New]Maike Ritzenhofen Efficiently Calculating Small Solutions of Systems of Polynomial Equations - Lattice-Based Methods and Applications to Cryptography[ expand ]
12:14 [PhD][New]Claus-Peter Schnorr [ expand ]
12:13 [PhD][New]Alexander May New RSA Vulnerabilities Using Lattice Reduction Methods[ expand ]


2011-02-07
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]
07:00 [Job][New]Postdoctoral Research Associate University of North Carolina at Greensboro[ expand ]



2011-02-04
07:00 [Job][New]Researchers (Ph.D. student/Post-Doc) (No. 39) Technische Universität Darmstadt, Dep.of Comp. Science, Chair f. Sec. in Inf. Techn. (Prof. Waidner)[ expand ]


2011-02-03
07:00 [Job][New]Professorship in Mathematics, specialized Cryptography (5 year term) Department of Mathematics University of Turku[ expand ]
07:00 [Job][New]Associate Research Fellow University of Wollongong, Australia[ expand ]


2011-01-31
07:00 [Job][New]Ph. D. student Gemalto, La Ciotat, France[ expand ]


2011-01-22
07:00 [Job][New]Ph.D. Student or Postdoc Darmstadt University of Technlogy, Germany[ expand ]



2011-01-17
07:00 [Job][New]PhD Scholarships University of Wollongong, Australia[ expand ]


2011-01-13
07:00 [Job][New]Postdoc position in cryptography and IT security University of Luxembourg[ expand ]


2011-01-12
07:00 [Job][New]Security Architect ST Microelectronics, Rousset, France[ expand ]


2011-01-11
07:00 [Job][New]Ph.D. student Universitat Pompeu Fabra, Barcelona (Spain)[ expand ]
07:00 [Job][New]PhD Studentships University of Bristol, Bristol, UK[ expand ]



2011-01-07
07:00 [Job][New]Three tenured or tenure track positions Aalto University School of Science, Helsinki, Finland[ expand ]


2011-01-04
07:00 [Job][New]Professor/Assoc Prof/Asst Prof in Cryptology Information Security Department at MCS, National University of Sciences and Technology, Pakistan[ expand ]


2011-01-03
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]


2010-12-20
07:00 [Job][New]Ph.D. student (open to Australian citizes and permanent residents) Macquarie University[ expand ]
07:00 [Job][New]Graduate Program in Cryptology Florida Atlantic University, CCIS, Boca Raton, Florida[ expand ]



2010-12-14
07:00 [Job][New]2 x Post-doctoral Research Positions Centre for Secure Information Technologies, Queens University Belfast[ expand ]


2010-12-09
07:00 [Job][New]Ph.D. student K.U.Leuven (Belgium)[ expand ]


2010-12-08
07:00 [Job][New]PostDoc in Cryptographic Protocols Norwegian University of Science and Technology (NTNU), Trondheim[ expand ]


2010-12-01
07:00 [Job][New]Full Professor Position in Cryptology GREYC - University of Caen, France[ expand ]



2010-11-29
07:00 [Job][New]Recruitment of Limited-term Researcher for April, 2011 National Institute of Information and Communications Technology (NICT)[ expand ]


2010-11-26
07:00 [Job][New]2 Ph.D. positions: Implementing Post-Quantum Algorithms Horst Görtz Institute, Ruhr University Bochum (Germany)[ expand ]


2010-11-25
07:00 [Job][New]Research Associate (postdoc) University College London[ expand ]


2010-11-23
07:00 [Job][New]Information Security and Cryptography Khalifa University, Abu Dhabi, UAE [ expand ]



2010-11-16
07:00 [Job][New]Post-Doc Boston University, Boston, MA, USA[ expand ]


2010-11-11
07:00 [Job][New]Lecturer, Senior Lecturer or Associate Professor Mathematics Department, University of Cape Town, Cape Town, South Africa[ expand ]


1970-01-01
00:00 3611[ expand ]
00:00 3610[ expand ]
00:00 3610[ expand ]
00:00 [ expand ]
00:00 [ expand ]
00:00 [ expand ]