International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 [ 55 ] 56 57 58 59 60 61 62 63
2011-08-08
18:07 [PhD][Update]: On Fairness in Secure Computation[ expand ]
11:21 [PhD][New]Carmela Troncoso: Design and analysis methods for privacy technologies[ expand ]
11:21 [PhD][New]Claudia Diaz[ expand ]
11:20 [PhD][New]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-07
14:22 [PhD][Update]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-06
16:58 [PhD][New]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]
16:58 [PhD][Update]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]


2011-08-05
20:50 [PhD][New]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
20:50 [PhD][New]Rene Govaerts[ expand ]
20:50 [PhD][New]Joos Vandewalle[ expand ]
20:50 [PhD][Update]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
13:52 [PhD][New]Roel Peeters: Study and Design of a Security Architecture for Things That Think[ expand ]
13:12 [PhD][New]Dave Singelee: Study and Design of a Security Architecture for Wireless Personal Area Networks[ expand ]
12:54 [PhD][New]Sebastiaan Indesteege: Analysis and Design of Cryptographic Hash Functions[ expand ]
06:31 [PhD][Update]Debdeep Mukhopadhyay: Design and Analysis of Cellular Automata Based Cryptographic Algorithms[ expand ]


2011-08-04
05:05 [Event][New]FloCon 2012: FloCon 2012 the 8th Annual Conference for Network Flow Analysis[ expand ]



2011-08-03
16:17 [PhD][Update]Leonid Reyzin: Zero-Knowledge with Public Keys[ expand ]


2011-08-02
11:28 [Job][Update]Ph.D studentship, Newcastle University[ expand ]
11:27 [Job][New]Ph.D studentship, Newcastle University[ expand ]


2011-07-30
18:42 [News]One-Time Pad was invented 35 years earlier by Frank Miller, not Vernam and Mauborgne[ expand ]


2011-07-27
15:07 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]
14:57 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]



2011-07-25
10:14 [Event][Update]FSE 2012: 19th International Workshop on fast software encryption[ expand ]
10:14 [Event][New]FSE 2012: 19th International Workshop on fast software encryption[ expand ]


2011-07-21
22:16 [Job][New]Ph.D. Scholarships, CASED / Darmstadt University of Technlogy, Germany[ expand ]
22:04 [PhD][New]S. Dov Gordon: On Fairness in Secure Computation[ expand ]
10:42 [PhD][New]Michael Hutter: Secure and Efficient Implementation of RFID Tags Supporting Cryptography[ expand ]


2011-07-19
14:56 [PhD][New]Urs Hengartner[ expand ]
14:56 [PhD][New]Jeremy Clark: Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections[ expand ]


2011-07-18
14:56 [Event][New]The science of secrecy: ciphers to cyberspace[ expand ]
13:27 [Job][New]Senior Researcher, Fraunhofer-Institut für Sichere Informationstechnologie, Darmstadt[ expand ]



2011-07-13
07:00 [Job][New]Two Postdocs, Information Security Group, Royal Holloway, University of London[ expand ]


2011-07-11
20:04 [Event][New]NordSec 2011: 16th Nordic Conference in Secure IT Systems[ expand ]
13:38 [Job][New]Post-doc in Computer Science or related area - Claude Shannon Fellow Program, Technische Universitaet Darmstadt[ expand ]


2011-07-10
21:34 [PhD][New]Dipanwita Roychowdhury[ expand ]
21:34 [Event][New]ASCrypto 2011: The Sao Paulo Advanced School of Cryptography[ expand ]
21:28 [PhD][New]Debdeep Mukhopadhyay[ expand ]
21:24 [PhD][New]Santosh Ghosh: Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields[ expand ]


2011-07-07
08:06 [Job][Update]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]
08:06 [Job][New]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]



2011-07-06
20:51 [Event][New]HPGC'11: Workshop on Human centric computing, P2P, Grid and Cloud computing[ expand ]
20:51 [Event][New]NIAT 2011: Non-Invasive Attack Testing Workshop[ expand ]


2011-07-04
10:05 [Event][New]WSPCC: Workshop on Cloud Computing (WSPCC), IMSAA-2011 Conference [ expand ]


2011-07-03
19:05 [PhD][New]Stefan Brands: [ expand ]
19:05 [PhD][New]Mohamed Layouni: Privacy-preserving Personal Information Management[ expand ]


2011-06-30
23:21 [Event][New]DATE 2012: Design Automation and Test in Europe Conference[ expand ]
19:24 [Event][Update]Crypto 2012 (tentative)[ expand ]
07:43 [Event][New]Cryptology2012: The 3rd International Conference on Cryptology and Computer Security 2012[ expand ]



2011-06-29
09:17 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
09:16 [Event][Update]Crypto 2012 (tentative)[ expand ]
09:16 [Job][Update]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-28
07:59 [Job][New]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-27
18:39 [Event][New]CT-RSA 2012: Cryptographers' Track - RSA Conference 2012[ expand ]
05:38 [Job][New]Post-Doc, Data Storage Institute, A*STAR, Singapore[ expand ]


2011-06-26
14:57 [Event][New]10th International Conference on Applied Cryptography and Network Security (ACNS 2012)[ expand ]



2011-06-25
12:18 [Event][Update]Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011)[ expand ]


2011-06-23
16:37 [Job][Update]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]
16:37 [Job][New]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]


2011-06-22
12:21 [Job][Update]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
04:42 [Event][New]Third International Workshop on Managing Insider Security Threats (MIST'11)[ expand ]


2011-06-21
15:03 [Event][New]IEEE Systems Journal - S. I. on Security and Privacy in Complex Systems (IEEE-SPCS)[ expand ]
06:16 [Event][Update]15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012)[ expand ]



2011-06-20
09:28 [Job][New]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
08:12 [PhD][Update]Marc Girault: Analysis and design of cryptographic and data coding algorithms[ expand ]


2011-06-19
17:48 [PhD][New]Cetin K. Koc: [ expand ]
17:47 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
17:47 [PhD][New]Thomas A. Schmidt: [ expand ]


2011-06-18
22:18 [Event][Update]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]
14:32 [Event][New]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]


2011-06-17
10:09 [Event][New]The 14th International Conference on Information Security and Cryptology (ICISC 2011)[ expand ]



2011-06-15
15:57 [Event][New]1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011)[ expand ]


2011-06-14
15:46 [Event][Update]The 2nd Workshop on the Security of the Internet of Things (SecIoT 2011) (SecIoT11)[ expand ]
08:58 [Event][Update]Eurocrypt 2012[ expand ]


2011-06-13
11:22 [PhD][Update]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
11:22 [PhD][New]Louis Goubin [ expand ]
11:21 [PhD][New]Alexandre Berzati Cryptographic Analysis of Algorithm Corruptions[ expand ]
11:21 [PhD][Update]Alexandre BERZATI Cryptographic Analysis of Algorithm Corruptions[ expand ]


2011-06-11
14:22 [Event][New]Tenth Smart Card Research and Advanced Application Conference()[ expand ]



2011-06-10
10:51 [Event][New]3rd IEEE International Workshop on Privacy Aspects Of Data Mining(PADM 2011)[ expand ]


2011-06-09
19:57 [PhD][New]Francois Koeune Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators[ expand ]
19:57 [PhD][New]Christophe Petit Cryptographic hash functions from expander graphs[ expand ]
19:57 [PhD][New]Jean-Pierre Tignol [ expand ]
19:56 [PhD][Update]Jean-Pierre Tignol [ expand ]
15:56 [Event][New]8th European Workshop on Public Key Infrastructures, Services, and Applica ()[ expand ]


2011-06-08
08:35 [PhD][New]Juan González Nieto [ expand ]
08:34 [PhD][New]Colin Boyd [ expand ]
08:34 [PhD][Update]Juan González Nieto [ expand ]
08:34 [PhD][Update]Colin Boyd [ expand ]
08:34 [PhD][New]Malakondayya Choudary Gorantla Design and Analysis of Group Key Exchange Protocols[ expand ]
08:32 [Job][New]Product Securty Engineers (7 positions) ,Qualcomm Incorporated[ expand ]


2011-06-07
11:56 [Event][New]6th Data Privacy Management International Workshop()[ expand ]
11:56 [Event][New]4th International Workshop on Autonomous and Spontaneous Security()[ expand ]
09:57 [Event][New]Western European Workshop on Research in Cryptology()[ expand ]
09:34 [Event][New]Asian Workshop on Symmetric Key Cryptography(ASK 2011)[ expand ]
06:52 [PhD][New]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
06:34 [Event][New]Workshop on Information Security Applications()[ expand ]
05:09 [Event][New]Ninth Theory of Cryptography Conference()[ expand ]



2011-06-06
05:17 [Event][New]Symposium on Advances in Cryptography, Security and Applications()[ expand ]
05:17 [Event][New]2012 Financial Cryptography and Data Security Conference(FC'12)[ expand ]


2011-06-03
13:59 [Event][New]13th International Conference on Distributed Computing and Networking(ICDCN 2012)[ expand ]


2011-06-02
22:03 [PhD][New]Vassilis Zikas Generalized Corruption Models in Secure Multi-Party Computation[ expand ]


2011-06-01
16:58 [Event][New]Workshop on Security and Application for Embedded smart systems()[ expand ]
09:09 [PhD][New]Marina Samokhina The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
09:09 [PhD][New]Ernst Gabidulin [ expand ]
09:06 [Event][New]ACM Workshop on Digital Rights Management(DRM 2011)[ expand ]



2011-05-31
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-05-30
09:27 [PhD][Update]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
08:50 [Event][New]Workshop on Symmetric Cryptanalysis[ expand ]
08:07 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
08:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]


2011-05-27
14:49 [Event][New]Security Aspects in Info. Tech., High-Performance Computing & Networking()[ expand ]
14:22 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures.[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures.[ expand ]


2011-05-26
13:27 [Job][New]Associate Professor ,Information Security Institute, Queensland University of Technology[ expand ]



2011-05-25
15:30 [Event][New]6th International Conference on Risks and Security of Internet and Systems(CRiSIS 2011)[ expand ]
09:00 [Event][New]Eurocrypt 2012[ expand ]
05:18 [Job][New]Research Scientist ,Institute for Infocomm Research (I2R), Singapore[ expand ]


2011-05-20
22:21 [PhD][New]Frank Lauren Hitchcock [ expand ]
22:21 [PhD][New]Claude Elwood Shannon An Algebra for Theoretical Genetics[ expand ]
06:52 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
06:51 [PhD][New]Frans Kaashoek [ expand ]
06:48 [PhD][Update]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]


2011-05-17
08:02 [PhD][New]Julien Bringer Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory[ expand ]
07:59 [PhD][New]Philippe Langevin [ expand ]


2011-05-16
11:38 [PhD][New]Ehab Alnfrawy Towards an Efficient Public Key Cryptosystem[ expand ]
11:37 [PhD][New]Mohamed M. Abd-Eldayem [ expand ]
11:37 [PhD][New]Aly A. Fahmy [ expand ]



2011-05-15
05:40 [PhD][New]Eric Bone A Generalization of Pohlig-Hellman Simplification in Elliptic Curve Cryptography[ expand ]
05:38 [PhD][New]Fred Diamond [ expand ]


2011-05-12
13:12 [PhD][New]Jean Monnerat Short Undeniable Signatures: Design, Analysis, and Applications[ expand ]


2011-05-09
20:25 [PhD][New]Benny Chor [ expand ]
20:25 [PhD][New]Amos Beimel Secure Schemes for Secret Sharing and Key Distribution[ expand ]


2011-05-07
15:49 [PhD][New]Claude Barral Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography[ expand ]
15:48 [PhD][Update]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]



2011-05-05
06:30 [PhD][New]Dwaine Clarke Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]
06:29 [PhD][New]Srinivas Devadas [ expand ]
06:28 [PhD][New]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-04
11:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
06:00 [Job][New]Summer internship in applied security, encryption, and secure multiparty computation Ricoh Innovations[ expand ]


2011-05-03
11:15 [PhD][New]Jean-Luc Danger [ expand ]
06:00 [Job][New]Ph.D. or MS student Koç University, Turkey[ expand ]


2011-04-30
20:38 [PhD][New]Kerstin Lemke-Rust Models and Algorithms for Physical Cryptanalysis[ expand ]
20:38 [PhD][New]Patrick Longa High-Speed Elliptic Curve and Pairing-Based Cryptography[ expand ]



2011-04-29
18:09 [PhD][New]Sven Laur Cryptographic Protocol Design[ expand ]
18:08 [PhD][New]Kaisa Nyberg [ expand ]


2011-04-28
07:09 [PhD][New]Angus E. Taylor [ expand ]
07:09 [PhD][New]Lothrop Mittenthal Operator-Valued Polynomials in a Complex Variable, and, Generalizations of Spectral Theory[ expand ]
06:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-04-27
19:48 [PhD][New]Mohammad Mahmoody Studies in the Efficiency and (versus) Security of Cryptographic Tasks[ expand ]
19:48 [PhD][New]Boaz Barak [ expand ]
15:30 [PhD][New]Martin Simka Analysis and Implementation of Selected Blocks for Public-Key Cryptosystems in FPGAs[ expand ]
15:30 [PhD][New]Fischer Viktor Fast Methods of Digital Image Segmentation[ expand ]
15:30 [PhD][New]Drutarovsky Milos Signal Processors in Digital Signal Processing[ expand ]
15:27 [PhD][New]Yi Mu [ expand ]
15:26 [PhD][New]Andrew V. Sutherland Order Computations in Generic Groups[ expand ]
06:00 [Job][New]Teaching Fellow Royal Holloway, University of London[ expand ]


2011-04-26
12:12 [PhD][New]Mohammad Reza Reyhanitabar Contributions to the Theory and Application of Cryptographic Hash Functions[ expand ]
06:00 [Job][New]PhD Scholarship: CASED / Technische Universität Darmstadt[ expand ]



2011-04-25
14:47 [PhD][New]Qingsong Ye Privacy Preserving Dataset Operations[ expand ]
14:46 [PhD][New]Peter Schwabe High-Speed Cryptography and Cryptanalysis[ expand ]
14:46 [PhD][New]Daniel J. Bernstein [ expand ]
14:45 [PhD][New]Tanja Lange [ expand ]
14:25 [PhD][New]Susan Hohenberger Advances in Signatures, Encryption, and E-Cash from Bilinear Groups[ expand ]
14:25 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
14:24 [PhD][New]Simon L. Garfinkel Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable[ expand ]
14:24 [PhD][New]Moses Liskov New Tools in Cryptography: Mutually Independent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration[ expand ]
14:24 [PhD][New]Jonathan Herzog Computational Soundness for Standard Assumptions of Formal Cryptography[ expand ]
14:24 [PhD][New]Stanislaw Jarecki Efficient Threshold Cryptosystems[ expand ]
14:24 [PhD][New]Leonid Reyzin Zero-Knowledge with Public Keys[ expand ]
14:24 [PhD][New]Zulfikar Ramzan A Study of Luby-Rackoff Ciphers[ expand ]
14:23 [PhD][New]Yevgeniy Dodis Exposure-Resilient Cryptography[ expand ]
14:23 [PhD][New]Victor Boyko On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols[ expand ]
06:00 [Job][New]Systems Security Architect Qualcomm[ expand ]


2011-04-24
06:09 [PhD][New]Henri Gilbert [ expand ]
06:08 [PhD][New]Thomas Peyrin Analyse de fonctions de hachage cryptographiques[ expand ]


2011-04-22
20:57 [PhD][New]Michael de Mare Secure Set Membership Using 3SAT[ expand ]
20:55 [PhD][New]Rebecca Wright Achieving Perfect Secrecy Using Correlated Random Variables[ expand ]
19:05 [PhD][New]Michael Naehrig Constructive and Computational Aspects of Cryptographic Pairings[ expand ]
10:15 [PhD][New]Burton Stephen Kaliski Jr. Elliptic Curves and Cryptography: A Pseudorandom Bit Generator and Other Tools[ expand ]
10:14 [PhD][New]Ronald Linn Rivest [ expand ]
10:11 [PhD][New]Michael Sipser [ expand ]
06:00 [Job][New]Faculty positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]


2011-04-21
06:00 [Job][New]Post-doc Technische Universität Darmstadt[ expand ]
06:00 [Job][New]Two Post Doctoral Positions Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]



2011-04-20
15:29 [PhD][New]Dominique Schroeder On the Complexity of Blind Signatures[ expand ]
15:28 [PhD][New]Marc Fischlin [ expand ]
14:14 [PhD][New]Salil Vadhan A Study of Statistical Zero-Knowledge Proofs[ expand ]
14:13 [PhD][New]Deepak Kumar Dalai On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks[ expand ]
14:13 [PhD][New]Subhamoy Maitra [ expand ]
14:12 [PhD][New]Chiu Yuen Koo Studies on Fault-Tolerant Broadcast and Secure Computation[ expand ]
14:11 [PhD][New]Shien Jin Ong Unconditional Relationships within Zero Knowledge[ expand ]
14:11 [PhD][New]Shafi Goldwasser [ expand ]
14:09 [PhD][New]Andrey Bogdanov Analysis and Design of Block Cipher Constructions[ expand ]


2011-04-19
20:43 [PhD][New]Siamak Fayyaz Shahandashti Contributions to Secure and Privacy-Preserving Use of Electronic Credentials[ expand ]
20:42 [PhD][New]Vipul Goyal Stronger Notions of Secure Computation[ expand ]
20:41 [PhD][New]Amit Sahai [ expand ]
20:41 [PhD][New]Martin Novotný Time-Area Efficient Hardware Architectures for Cryptography and Cryptanalysis[ expand ]
20:40 [PhD][New]Jan Schmidt [ expand ]
13:30 [PhD][New]Kazuo Sakiyama Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems[ expand ]
12:40 [PhD][New]Ian Goldberg [ expand ]
12:39 [PhD][New]Aniket Kate Distributed Key Generation and Its Applications[ expand ]
10:02 [PhD][New]Pierre-Alain Fouque Le partage de clés cryptographiques: Théorie et Pratique[ expand ]
09:47 [PhD][New]Mike Rosulek The Structure of Secure Multi-Party Computation[ expand ]
09:46 [PhD][New]Alptekin Küpçü Efficient Cryptography for the Next Generation Secure Cloud[ expand ]
09:45 [PhD][New]Anna Lysyanskaya Signature Schemes and Applications to Cryptographic Protocol Design[ expand ]
09:45 [PhD][New]Claudio Orlandi Secure Computation in Untrusted Environments[ expand ]
09:45 [PhD][New]Jan Denef [ expand ]
09:45 [PhD][New]Renaud Pacalet [ expand ]
09:45 [PhD][New]Sylvain Guilley Geometrical Countermeasures to Side-Channel Attacks[ expand ]
09:44 [PhD][New]Jonathan Katz Efficient Cryptographic Protocols Preventing Man-in-the-Middle Attacks[ expand ]
09:43 [PhD][New]Zvi Galil [ expand ]
09:42 [PhD][New]Moti Yung [ expand ]
09:42 [PhD][New]Alejandro Hevia Anonymity and Independence in Multiparty Protocols[ expand ]
09:42 [PhD][New]Frederik Vercauteren Computing zeta functions of curves over finite fields[ expand ]
06:00 [Job][New]Two postdoctoral positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]


2011-04-18
15:30 [PhD][New]Marko Wolf Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications[ expand ]
15:30 [PhD][New]Andrea Röck Quantifying Studies of (Pseudo) Random Number Generation for Cryptography[ expand ]
15:29 [PhD][New]Nicolas Sendrier [ expand ]
15:29 [PhD][New]Martin Geisler Cryptographic Protocols: Theory and Implementation[ expand ]
15:28 [PhD][New]Ivan Damgård [ expand ]
15:28 [PhD][New]Brecht Wyseur White-Box Cryptography[ expand ]
15:27 [PhD][New]Bart Preneel Analysis and Design of Cryptographic Hash Functions[ expand ]
08:29 [PhD][New]Dalia Khader Attribute based authentication schemes[ expand ]
08:28 [PhD][New]Russell Bradford [ expand ]
08:28 [PhD][New]Sandeep S. Kumar Elliptic Curve Cryptography for Constrained Devices[ expand ]
08:27 [PhD][New]Christof Paar Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields[ expand ]
07:47 [PhD][New]Sylvain Pasini Secure communication using authenticated channels[ expand ]
07:47 [PhD][New]Jan Pelzl Practical Aspects of Curve-Based Cryptography and Cryptanalysis[ expand ]
06:00 [Job][New]Embedded Firmware Security Engineer Security Software Company, Israel (local)[ expand ]
05:48 [PhD][New]Crystal Lee Clough Square: A New Family of Multivariate Encryption Schemes[ expand ]
05:48 [PhD][New]Guomin Yang Security and Privacy in Wireless and Roaming Networks[ expand ]
05:48 [PhD][New]Duncan S. Wong [ expand ]
05:47 [PhD][New]Xiaotie Deng [ expand ]
05:46 [PhD][New]Andre Weimerskirch Authentication in Ad-hoc and Sensor Networks[ expand ]
05:44 [PhD][New]Dominique Unruh Protokollkomposition und Komplexität (Protocoll Composition and Complexity)[ expand ]
05:43 [PhD][New]Manoj Prabhakaran [ expand ]
05:43 [PhD][New]Michael Loui [ expand ]
05:40 [PhD][New]Jintai Ding [ expand ]
05:39 [PhD][New]Thomas Beth [ expand ]


2011-04-17
17:36 [PhD][New]Raminder Ruprai Improvements to the Gaudry-Schost Algorithm for Multidimensional discrete logarithm problems and Applications[ expand ]
17:35 [PhD][New]Manuel Blum [ expand ]
17:35 [PhD][New]Rene Peralta Three Results in Number Theory and Cryptography: 1. A New Algorithm to Compute Square Roots Modulo A Prime Number. 2. On the Bit Complexity of the Discrete Logarithm. 3. A Framew[ expand ]
12:22 [PhD][New]Huaxiong Wang [ expand ]
12:19 [PhD][New]Josef Pieprzyk [ expand ]
12:17 [PhD][New]Christophe Tartary Authentication for Multicast Authentication[ expand ]
10:47 [PhD][New]Wei Wu Cryptographic Protocols with Untrusted Third Party[ expand ]
10:47 [PhD][New]Willy Susilo Contributions to Fail-Stop Signature Schemes[ expand ]
10:45 [PhD][New]Turki F. Al-Somani Design and Analysis of Efficient and Secure Elliptic Curve Cryptoprocessors[ expand ]
10:45 [PhD][New]Alaaeldin A. Amin [ expand ]
10:44 [PhD][New]Elad Barkan Cryptanalysis of Ciphers and Protocols[ expand ]
10:44 [PhD][New]Eli Biham [ expand ]
10:44 [PhD][New]Stefano Tessaro Computational Indistinguishability Amplification[ expand ]
00:37 [PhD][New]Vijayakrishnan Pasupathinathan Hardware-based Identification and Authentication Systems[ expand ]
00:36 [PhD][New]Rungrat Wiangsripanawan Contributions to Mobility and Anonymity in IP Networks[ expand ]
00:36 [PhD][New]Xinyi Huang A Study of Undeniable Signatures and Their Variants[ expand ]
00:36 [PhD][New]Tsz Hon Yuen Contributions to Pairing-based Cryptography [ expand ]
00:33 [PhD][New]Rei Safavi-Naini [ expand ]



2011-04-16
23:24 [PhD][New]Man Ho Allen Au Contribution to Privacy-Preserving Cryptographic Techniques[ expand ]
23:10 [PhD][New]Waldyr Dias Benits Junior Applications of Fobenius Expansions in Elliptic Curve Cryptography[ expand ]
23:10 [PhD][New]Steven D. Galbraith [ expand ]
21:24 [PhD][New]Silvio Micali [ expand ]
21:19 [PhD][New]Brigitte Vallée [ expand ]
21:17 [PhD][New]David Pointcheval Proofs of Knowledge and Security Proofs (Les Preuves de Connaissance et leurs Preuves de Sécurité)[ expand ]
21:15 [PhD][New]Chris Peikert Cryptographic Error Correction[ expand ]
19:58 [PhD][New]M.L. Valarmathi [ expand ]
19:56 [PhD][New]R. Vimalathithan Cryptanalysis using Computational Intelligence[ expand ]
19:55 [PhD][New]Gil Segev The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks[ expand ]
19:54 [PhD][New]Moni Naor [ expand ]
19:54 [PhD][New]Claude Crépeau Correct and Private Reduction among Oblivious Transfers[ expand ]
19:15 [PhD][New]Mayank Varia Studies in Program Obfuscation[ expand ]
19:14 [PhD][New]Serge Vaudenay The Security of Cryptographic Primitives[ expand ]
19:12 [PhD][New]Marcio Juliato Fault Tolerant Cryptographic Primitives for Space Applications[ expand ]
19:12 [PhD][New]Catherine Gebotys [ expand ]
19:12 [PhD][New]Yevgeniy Vahlis Black Box and White Box Cryptography[ expand ]
19:12 [PhD][New]Charles Rackoff [ expand ]
19:12 [PhD][New]Jian Guo Analysis of Cryptographic Hash Functions[ expand ]
19:11 [PhD][New]Ran Canetti [ expand ]
19:11 [PhD][New]Rafail Ostrovsky Software Protection and Simulation on Oblivious RAMs. [ expand ]
19:10 [PhD][New]Josh Benaloh Verifiable Secret-Ballot Elections[ expand ]
19:09 [PhD][New]Michael Fischer [ expand ]
17:36 [PhD][New]Vadim Lyubashevsky Towards Practical Lattice-Based Cryptography[ expand ]
17:35 [PhD][New]Daniele Micciancio [ expand ]
17:22 [PhD][New]Alfred Menezes Elliptic Curve Cryptosystems[ expand ]
17:21 [PhD][New]Scott Vanstone [ expand ]
15:48 [PhD][New]Dr. A.Vinaya Babu [ expand ]


2011-04-15
05:45 [PhD][New]Dmitry Khovratovich New Approaches to the Cryptanalysis of Symmetric Primitives[ expand ]
05:44 [PhD][New]Alex Biryukov [ expand ]


2011-04-14
12:53 [PhD][New]Sunder Lal [ expand ]
12:52 [PhD][New]Douglas Stebila Classical Authenticated Key Exchange and Quantum Cryptography[ expand ]
12:52 [PhD][New]Michele Mosca [ expand ]
12:52 [PhD][New]Santosh Kumar Yadav Some Problems in Symmetric and Asymmetric Cryptography[ expand ]
06:00 [Job][New]Technical/Scientific Assistant University of Luxembourg[ expand ]


2011-04-13
06:00 [Job][New]Phd Position Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
06:00 [Job][New]Two Postdoc Positions in Security and Privacy Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]



2011-04-12
14:37 [PhD][New]Ashraf Masood [ expand ]
14:35 [PhD][New]Sondre Roenjom Cryptanalysis of Ciphers over Finite Cyclic Groups[ expand ]
14:34 [PhD][New]Tor Helleseth [ expand ]
11:25 [PhD][New]Santiago Zanella Beguelin Formal Certification of Game-Based Cryptographic Proofs[ expand ]


2011-04-11
15:26 [PhD][New]Sundar Lal [ expand ]
15:26 [PhD][New]Amit K Awasthi A Study of Some Delegated Digital Signature Schemes[ expand ]
14:59 [PhD][New]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
14:58 [PhD][New]Mehreen Afzal Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update[ expand ]
14:58 [PhD][New]Gaëtan Leurent Design and Analysis of Hash Functions[ expand ]
06:00 [Job][New]Senior Computer Security Researcher ICF International, Suburban Maryland near Washington, DC[ expand ]


2011-04-09
06:00 [Job][New]PhD students, Postdocs Aarhus University, Denmark[ expand ]


2011-04-07
06:00 [Job][New]5 years Post Doc position (3 years experience required) Computer Science and Technology Centre (CCTC) at Universidade do Minho, Portugal[ expand ]



2011-04-06
06:00 [Job][New]Full Professor (W3) chairing the research field Security of Integrated Hardware Technical University of Berlin[ expand ]


2011-04-05
06:00 [Job][New]PhD Studentship University of Bristol, Bristol, UK[ expand ]


2011-04-04
06:00 [Job][New]Post-Doc University of Luxembourg[ expand ]
06:00 [Job][New]Post-Doc Université catholique de Louvain (UCL, Belgium)[ expand ]
06:00 [Job][New]Associate or Assistant Professor in Cryptology Technical University of Denmark[ expand ]
06:00 [Job][New]Ph.D. student in Mathematics of Cryptography Macquarie University, Sydney, Australia[ expand ]


2011-03-22
06:00 [Job][New]Research Engineer Coding and Cryptography Research Group, Nanyang Technological University[ expand ]



2011-03-20
11:14 [PhD][New]Sungjun Park [ expand ]
11:13 [PhD][New]Jongin Lim [ expand ]
11:13 [PhD][New]Daejoon Hwang [ expand ]
11:13 [PhD][New]Jinwook Chung [ expand ]
11:13 [PhD][New]Dongho Won [ expand ]
11:13 [PhD][New]Seungjoo Kim Improved privacy and authenticity in digital signatures / key management[ expand ]


2011-03-16
20:05 [PhD][New]Fathy Helail [ expand ]
20:04 [PhD][New]Wafik Lotfallah [ expand ]
20:04 [PhD][New]Ghada Abdelhady New DES based on Elliptic Curve[ expand ]


2011-03-14
21:45 [PhD][New]Charles Bouillaguet Some attacks against hardness assumptions and cyptographic primitives[ expand ]
20:02 [PhD][New]Jayaprakash Kar Algorithms for Cryptographic Protocols Using Elliptic Curve Cryptography[ expand ]
06:00 [Job][New]Research Fellow Institute for Infocomm Research, Singapore[ expand ]


2011-03-10
07:00 [Job][New]Postdoc Macquarie Univ., Sydney[ expand ]



2011-03-09
22:13 [PhD][New]Markku-Juhani Olavi Saarinen Cryptanalysis of Dedicated Hash Functions[ expand ]
22:12 [PhD][New]Jiqiang Lu Cryptanalysis of block ciphers[ expand ]
22:10 [PhD][New]Chris Mitchell [ expand ]


2011-03-08
12:49 [PhD][New]Marc Girault [ expand ]
12:49 [PhD][New]Sébastien Canard Group signatures, variants and applications[ expand ]


2011-03-07
07:00 [Job][New]PhD. student Department of Computing, Macquarie University[ expand ]


2011-03-04
07:00 [Job][New]PhD Student ETH Zurich[ expand ]



2011-03-03
11:52 [PhD][New]Victor Lomne Power and Electro-Magnetic Side-Channel Attacks: threats and countermeasures[ expand ]
11:52 [PhD][New]Philippe Maurine [ expand ]
11:51 [PhD][New]Michel Robert [ expand ]


2011-03-01
07:09 [PhD][New]Ulrich Huber On Broadcast Encryption for Secure Software Delivery to Automobiles[ expand ]


2011-02-28
07:00 [Job][New]Assistant Professor, Cryptology and Information Security University of Versailles St-Quentin-en-Yvelines (France)[ expand ]


2011-02-25
07:00 [Job][New]PhD student CEA-LETI & UVSQ (Université de Versailles-St-Quentin-en-Yvelines)[ expand ]
06:17 [PhD][New]Yi Lu Applied Stream Ciphers in Mobile Communications[ expand ]



2011-02-24
19:02 [PhD][New]Luca De Feo Fast Algorithms for Towers of Finite Fields and Isogenies[ expand ]
19:02 [PhD][New]Éric Schost [ expand ]
19:01 [PhD][New]Marcos Antonio Simplicio Junior Message Authentication Algorithms for Wireless Sensor Networks[ expand ]
19:01 [PhD][New]François Morain [ expand ]


2011-02-23
07:00 [Job][New]1 PhD Position in Privacy-Oriented Cryptography (full-time researcher) Technische Universität Darmstadt, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-02-22
10:26 [PhD][New]John Merriman [ expand ]
10:26 [PhD][New]Nigel Smart Computer Solution of Diophantine Equations[ expand ]


2011-02-20
15:57 [PhD][New]Keith Martin [ expand ]



2011-02-18
16:20 [PhD][New]Stefan Tillich Instruction Set Extensions for Support of Cryptography on Embedded Systems[ expand ]
10:13 [PhD][New]Joachim von zur Gathen [ expand ]
10:08 [PhD][New]Axel Poschmann Lightweight Cryptography - Cryptographic Engineering for a Pervasive Worls[ expand ]


2011-02-17
06:25 [PhD][New]Karl Christian Posch [ expand ]


2011-02-16
18:06 [PhD][New]Hae Yong Kim [ expand ]
17:06 [PhD][New]Jean-Philippe Aumasson Design and analysis of symmetric cryptographic algorithms [ expand ]
17:06 [PhD][New]Thomas Baignères Quantitative security of block ciphers: designs and cryptanalysis tools[ expand ]
17:06 [PhD][New]Joern Schweisgut Elektronische Wahlen unter dem Einsatz kryptografischer Observer - Electronic Elections with Cryptographic Observers[ expand ]
15:39 [PhD][New]Atefeh Mashatan Message Authentication and Recognition Protocols Using Two-Chanel Cryptography.[ expand ]
15:38 [PhD][New]Simon Fischer Analysis of lightweight stream ciphers[ expand ]
08:25 [PhD][New]Martin Vuagnoux Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
08:24 [PhD][New]Pascal Junod Statistical cryptanalysis of block ciphers[ expand ]
08:21 [PhD][New]Willi Meier [ expand ]
08:21 [PhD][New]David Mandell Freeman Constructing abelian varieties for pairing-based cryptography[ expand ]
08:20 [PhD][New]Edward Schaefer [ expand ]
08:20 [PhD][New]Kenneth Ribet [ expand ]


2011-02-15
18:04 [PhD][New]Ben Adida Advances in Cryptographic Voting Systems[ expand ]
17:59 [PhD][New]Edlyn Teske [ expand ]
17:58 [PhD][New]Douglas Stinson [ expand ]
17:58 [PhD][New]Stephen Weis New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing[ expand ]
07:00 [Job][New]PhD Studentships Centre for Secure Information Technologies (CSIT), Queens University Belfast, Belfast, UK[ expand ]
06:47 [PhD][New]Gilles Barthe [ expand ]
06:39 [PhD][New]Matthieu Rivain On the Physical Security of Cryptographic Implementations[ expand ]



2011-02-14
20:55 [PhD][New]Marc Joye Security analysis of RSA-type cryptosystems[ expand ]
20:53 [PhD][New]Jean-Jacques Quisquater [ expand ]
18:27 [PhD][New]Pierre-Yvan Liardet Ingénierie cryptographique Implantations sécurisées[ expand ]
18:06 [PhD][New]Gildas Avoine Cryptography in Radio Frequency Identification and Fair Exchange Protocols[ expand ]
17:54 [PhD][New]Helger Lipmaa Secure and Efficient Time-Stamping Systems[ expand ]
17:53 [PhD][New]Mati Tombak [ expand ]
17:49 [PhD][New]Tim Güneysu Cryptography and Cryptanalysis on Reconfigurable Devices[ expand ]
17:49 [PhD][New]Andy Rupp Computational Aspects of Cryptography and Cryptanalysis[ expand ]
17:40 [PhD][New]Han Vinck [ expand ]
09:54 [PhD][New]Jacques Stern [ expand ]
09:53 [PhD][New]Jean-Sebastien Coron Cryptanalysis and security proofs of public-key schemes.[ expand ]
08:51 [PhD][New]Birgit Pfitzmann [ expand ]
08:51 [PhD][New]Thomas Gross Browser-based Identity Federation[ expand ]
06:33 [PhD][New]Ueli Maurer [ expand ]
06:29 [PhD][New]Albrecht Beutelspacher Teilfaserungen und Parallelismen in endlichdimensionalen projektiven Räumen[ expand ]
00:31 [PhD][New]Jörg Schwenk [ expand ]
00:26 [PhD][New]Ingrid Verbauwhede VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems[ expand ]


2011-02-13
18:28 [PhD][New]Benny Pinkas [ expand ]
18:27 [PhD][New]Thomas Schneider Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
16:27 [PhD][New]Benedikt Gierlichs Statistical and Information-Theoretic Methods for Power Analysis on Embedded Cryptography[ expand ]


2011-02-12
18:16 [PhD][New]Christopher Wolf Multivariate Quadratic Polynomials in Public Key Cryptography[ expand ]


2011-02-11
11:55 [PhD][New]Ahmad-Reza Sadeghi [ expand ]



2011-02-10
19:37 [PhD][New]Johannes Blömer [ expand ]
12:16 [PhD][New]Maike Ritzenhofen Efficiently Calculating Small Solutions of Systems of Polynomial Equations - Lattice-Based Methods and Applications to Cryptography[ expand ]
12:14 [PhD][New]Claus-Peter Schnorr [ expand ]
12:13 [PhD][New]Alexander May New RSA Vulnerabilities Using Lattice Reduction Methods[ expand ]


2011-02-07
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]
07:00 [Job][New]Postdoctoral Research Associate University of North Carolina at Greensboro[ expand ]


2011-02-04
07:00 [Job][New]Researchers (Ph.D. student/Post-Doc) (No. 39) Technische Universität Darmstadt, Dep.of Comp. Science, Chair f. Sec. in Inf. Techn. (Prof. Waidner)[ expand ]


2011-02-03
07:00 [Job][New]Professorship in Mathematics, specialized Cryptography (5 year term) Department of Mathematics University of Turku[ expand ]
07:00 [Job][New]Associate Research Fellow University of Wollongong, Australia[ expand ]



2011-01-31
07:00 [Job][New]Ph. D. student Gemalto, La Ciotat, France[ expand ]


2011-01-22
07:00 [Job][New]Ph.D. Student or Postdoc Darmstadt University of Technlogy, Germany[ expand ]


2011-01-17
07:00 [Job][New]PhD Scholarships University of Wollongong, Australia[ expand ]


2011-01-13
07:00 [Job][New]Postdoc position in cryptography and IT security University of Luxembourg[ expand ]



2011-01-12
07:00 [Job][New]Security Architect ST Microelectronics, Rousset, France[ expand ]


2011-01-11
07:00 [Job][New]Ph.D. student Universitat Pompeu Fabra, Barcelona (Spain)[ expand ]
07:00 [Job][New]PhD Studentships University of Bristol, Bristol, UK[ expand ]


2011-01-07
07:00 [Job][New]Three tenured or tenure track positions Aalto University School of Science, Helsinki, Finland[ expand ]


2011-01-04
07:00 [Job][New]Professor/Assoc Prof/Asst Prof in Cryptology Information Security Department at MCS, National University of Sciences and Technology, Pakistan[ expand ]



2011-01-03
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]


2010-12-20
07:00 [Job][New]Ph.D. student (open to Australian citizes and permanent residents) Macquarie University[ expand ]
07:00 [Job][New]Graduate Program in Cryptology Florida Atlantic University, CCIS, Boca Raton, Florida[ expand ]


2010-12-14
07:00 [Job][New]2 x Post-doctoral Research Positions Centre for Secure Information Technologies, Queens University Belfast[ expand ]


2010-12-09
07:00 [Job][New]Ph.D. student K.U.Leuven (Belgium)[ expand ]



2010-12-08
07:00 [Job][New]PostDoc in Cryptographic Protocols Norwegian University of Science and Technology (NTNU), Trondheim[ expand ]


2010-12-01
07:00 [Job][New]Full Professor Position in Cryptology GREYC - University of Caen, France[ expand ]


2010-11-29
07:00 [Job][New]Recruitment of Limited-term Researcher for April, 2011 National Institute of Information and Communications Technology (NICT)[ expand ]


2010-11-26
07:00 [Job][New]2 Ph.D. positions: Implementing Post-Quantum Algorithms Horst Görtz Institute, Ruhr University Bochum (Germany)[ expand ]



2010-11-25
07:00 [Job][New]Research Associate (postdoc) University College London[ expand ]


2010-11-23
07:00 [Job][New]Information Security and Cryptography Khalifa University, Abu Dhabi, UAE [ expand ]


2010-11-16
07:00 [Job][New]Post-Doc Boston University, Boston, MA, USA[ expand ]


2010-11-11
07:00 [Job][New]Lecturer, Senior Lecturer or Associate Professor Mathematics Department, University of Cape Town, Cape Town, South Africa[ expand ]



1970-01-01
00:00 3567[ expand ]
00:00 3567[ expand ]
00:00 3566[ expand ]
00:00 [ expand ]
00:00 [ expand ]
00:00 [ expand ]