International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 [ 7 ] 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
04:48 [PhD][New]Claude Carlet[ expand ]
04:47 [PhD][New]Abdelaziz Elaabid: Side channel attacks: advanced experimentations on template attacks[ expand ]
04:47 [PhD][Update]Constantin Catalin Dragan: Security of CRT-based Secret Sharing Schemes[ expand ]

14:48 [Job][New]Postdoc in Cryptology, Technical University of Denmark, DTU[ expand ]
14:44 [Job][New]Post-Doc in Applied Cryptography, University of Trier, Germany[ expand ]
10:17 [Pub][ePrint]Cryptanalysis of FIDES, by Itai Dinur and Jérémy Jean[ expand ]
01:17 [Pub][ePrint]Computing Discrete Logarithms in F_{3^{6*137}} using Magma , by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez[ expand ]

22:17 [Pub][ePrint]Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, by Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang[ expand ]
22:17 [Pub][ePrint]Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics, by Younsung Choi[ expand ]
22:17 [Pub][ePrint]The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions, by Sugata Gangopadhyay and Pantelimon Stanica[ expand ]
22:17 [Pub][ePrint]Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, by Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert[ expand ]
14:59 [PhD][New]Constantin Catalin Dragan: Security of CRT-based Secret Sharing Schemes[ expand ]
14:59 [PhD][New]Ferucio Laurentiu Tiplea[ expand ]
14:58 [PhD][New]Ruxandra F. Olimid: Secret Sharing-based Group Key Establishment[ expand ]
14:58 [PhD][New]Adrian Atanasiu[ expand ]

13:26 [Job][New]Postdoctoral and Internship Positions, MICROSOFT RESEARCH, Redmond, Washington USA[ expand ]
13:26 [Job][New]Postdoc in Cryptography, Privacy and Information Security, University of Luxembourg, Luxembourg[ expand ]
13:24 [Event][New]DBSec'14: 28th IFIP WG 11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]

19:17 [Pub][ePrint]DAA-related APIs in TPM2.0 Revisited, by Li Xi[ expand ]
16:17 [Pub][ePrint]An Equivalence-Preserving Transformation of Shift Registers, by Elena Dubrova[ expand ]

16:17 [Pub][ePrint]Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication, by Daniel R. L. Brown[ expand ]
16:17 [Pub][ePrint]Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, by Neha tirthani and Ganesan[ expand ]
16:17 [Pub][ePrint]When a Boolean Function can be Expressed as the Sum of two Bent Functions, by Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li[ expand ]
09:48 [Event][New]CMS 2014: 15th Joint IFIP TC6 and TC11 Conf. on Communications and Multimedia Security[ expand ]

10:17 [Pub][ePrint]Down the Rabbit Hole: Revisiting the Shrinking Method, by Vivien Dubois[ expand ]
10:17 [Pub][ePrint]Crypto-analyses on \"user efficient recoverable off-line e-cashs scheme with fast anonymity revoking\", by Yalin Chen1 and Jue-Sam Chou*2[ expand ]
10:17 [Pub][ePrint]Human Assisted Randomness Generation Using Video Games, by Mohsen Alimomeni and Reihaneh Safavi-Naini[ expand ]

13:17 [Pub][ePrint]rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval, by Lichun Li and Michael Militzer and Anwitaman Datta[ expand ]
10:17 [Pub][ePrint]Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, by Mehdi Tibouchi[ expand ]
10:17 [Pub][ePrint]A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD, by Jintai Ding, Chengdong Tao[ expand ]

22:17 [Pub][ePrint]Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography, by Boaz Tsaban[ expand ]
16:49 [Event][New]BBIR: School on Black-Box Impossibility Results[ expand ]
16:17 [Pub][ePrint]A Fast Modular Reduction Method, by Zhengjun Cao and Ruizhong Wei and Xiaodong Lin[ expand ]
07:05 [PhD][Update]Serge Vaudenay: The Security of Cryptographic Primitives[ expand ]
04:17 [Pub][ePrint]Homomorphic AES Evaluation using NTRU, by Yarkin Doroz and Yin Hu and Berk Sunar[ expand ]

16:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf Küsters and Enrico Scapin and Tomasz Truderung and Jürgen Graf[ expand ]
13:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf K\\\"usters and Enrico Scapin and Tomasz Truderung and J\\\"urgen Graf[ expand ]
01:17 [Pub][ePrint]On the Security of the Pre-Shared Key Ciphersuites of TLS, by Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk[ expand ]

22:17 [Pub][ePrint]A Secure Text Messaging Protocol, by Gary Belvin[ expand ]

16:17 [Pub][ePrint]Authenticated Encryption with SPECK, by Chase Manny[ expand ]
16:17 [Pub][ePrint]Lattice-based Group Signature Scheme with Verifier-local Revocation, by Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]
16:17 [Pub][ePrint]Scale-Invariant Fully Homomorphic Encryption over the Integers, by Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results, by Yongge Wang[ expand ]
16:17 [Pub][ePrint]Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs, by Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.[ expand ]
16:17 [Pub][ePrint]General Impossibility of Group Homomorphic Encryption in the Quantum World, by Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter[ expand ]
16:17 [Pub][ePrint]Channel Equalization for Side Channel Attacks, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]

17:28 [Event][New]DASec 2014: The First International Workshop on Big Data Analytics for Security[ expand ]
10:17 [Pub][ePrint]Twisting Edwards curves with isogenies, by Mike Hamburg[ expand ]
10:17 [Pub][ePrint]Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System, by Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger [ expand ]

16:56 [Event][New]AsiaCCS-SCC: The Second International Workshop on Security in Cloud Computing[ expand ]
16:56 [Event][New]ASIAPKC 2014: 2nd ACM ASIA Public-Key Cryptography Workshop[ expand ]

19:17 [Pub][ePrint]Side-Channel Leakage through Static Power -Should We Care about in Practice?-, by Amir Moradi[ expand ]
19:17 [Pub][ePrint]An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation, by Ivan Damgård and Jesper Buus Nielsen[ expand ]
19:17 [Pub][ePrint]Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle, by Gengran Hu and Yanbin Pan and Feng Zhang[ expand ]
19:17 [Pub][ePrint]Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR, by Sourav Das[ expand ]
19:17 [Pub][ePrint]Online/Offline Attribute-Based Encryption, by Susan Hohenberger and Brent Waters[ expand ]
19:17 [Pub][ePrint](De-)Constructing TLS, by Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi[ expand ]
19:17 [Pub][ePrint]Lazy Modulus Switching for the BKW Algorithm on LWE, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]

22:00 [PhD][Update]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
10:17 [Pub][ePrint]Completeness for Symmetric Two-Party Functionalities - Revisited, by Yehuda Lindell and Eran Omri and Hila Zarosim[ expand ]
10:17 [Pub][ePrint]Two-round password-only authenticated key exchange in the three-party setting, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
10:17 [Pub][ePrint]Triple and Quadruple Encryption: Bridging the Gaps, by Bart Mennink and Bart Preneel[ expand ]
10:17 [Pub][ePrint]Tight Security Bounds for Triple Encryption, by Jooyoung Lee[ expand ]
10:17 [Pub][ePrint]Linkable Message Tagging: Solving the key distribution problem of signature schemes, by Felix Günther and Bertram Poettering[ expand ]
10:17 [Pub][ePrint]A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs, by Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol[ expand ]
10:17 [Pub][ePrint]Maximal Information Coefficient Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
10:17 [Pub][ePrint]Construction of New Families of ‎MDS‎ Diffusion Layers, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]

07:11 [PhD][New]Sebastian Pape: The Challenge of Authentication in Insecure Environments[ expand ]
07:11 [PhD][New]Lutz Wegner[ expand ]

15:50 [PhD][New]Emmanuelle Encrenaz[ expand ]
15:50 [PhD][New]Bruno Robisson[ expand ]
15:48 [PhD][New]Dong Hoon Lee[ expand ]
15:42 [PhD][New]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
15:34 [PhD][New]Amr Youssef[ expand ]
15:34 [PhD][New]Zachary Kissel: Verifiable Symmetric Searchable Encryption[ expand ]
15:34 [PhD][New]Jie Wang: Polynomial Time Creativity and its Applications (P-Creativity)[ expand ]
13:17 [Pub][ePrint]A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing, by Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh[ expand ]
13:17 [Pub][ePrint]Characterization of EME with Linear Mixing, by Mridul Nandi and Nilanjan Datta[ expand ]
13:17 [Pub][ePrint]A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis, by Annelie Heuser and Sylvain Guilley and Olivier Rioul[ expand ]
13:17 [Pub][ePrint]One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner., by Ethan Heilman[ expand ]
13:17 [Pub][ePrint]Efficient Non-Interactive Zero Knowledge Arguments for Set Operations, by Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang[ expand ]

17:27 [PhD][Update]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]

13:17 [Pub][ePrint]The analysis of the Keccak with the new method called parity, by Ghanei yakhdan.mostafa, Noruzi, zynolabedin[ expand ]
10:17 [Pub][ePrint]MaxMinMax problem and sparse equations over finite fields, by Igor Semaev[ expand ]

10:17 [Pub][ePrint]$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials, by Xi Xiong and Haining Fan[ expand ]
10:17 [Pub][ePrint]Pseudorandom Generator Based on Hard Lattice Problem, by Kuan Cheng[ expand ]

23:37 [Event][New]YACC 2014: Yet Another Conference on Cryptography[ expand ]
22:17 [Pub][ePrint]Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks, by Yalin Chen and Jue-Sam Chou[ expand ]
16:17 [Pub][ePrint]New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers, by Zhe Liu and Johann Gro{\\ss}sch{\\\"a}dl[ expand ]
16:17 [Pub][ePrint]Can Bitcoin Scale? Secure High-Rate Transaction Processing in The Bitcoin Network, by Yonatan Sompolinsky and Aviv Zohar[ expand ]
16:17 [Pub][ePrint]New Constructions of Revocable Identity-Based Encryption from Multilinear Maps, by Seunghwan Park and Kwangsu Lee and Dong Hoon Lee[ expand ]

06:37 [Job][New]Computer Engineering, Ariel University, Israel, Mediterranean[ expand ]

22:17 [Pub][ePrint]Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs, by Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng[ expand ]
22:17 [Pub][ePrint]MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature, by Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li[ expand ]
22:17 [Pub][ePrint]Succinct Non-Interactive Arguments for a von Neumann Architecture, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]

22:17 [Pub][ePrint]Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE, by Michael Clear and Ciaran McGoldrick[ expand ]
22:17 [Pub][ePrint]Public-Key Encryption with Lazy Parties, by Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction, by Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]Poly-Many Hardcore Bits for Any One-Way Function, by Mihir Bellare and Stefano Tessaro[ expand ]
13:17 [Pub][ePrint]PRE^{+}: Dual of Proxy Re-encryption and Its Application, by Xu An Wang and Yunlong Ge and Xiaoyuan Yang[ expand ]
13:17 [Pub][ePrint]A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities, by Weiqiang Wen and Libin Wang[ expand ]
13:17 [Pub][ePrint]A new class of hyper-bent functions and Kloosterman sums, by Chunming Tang, Yanfeng Qi[ expand ]
13:17 [Pub][ePrint]How to Fake Auxiliary Input, by Dimitar Jetchev and Krzysztof Pietrzak[ expand ]
13:17 [Pub][ePrint]Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft), by Lear Bahack[ expand ]
13:17 [Pub][ePrint]LHash: A Lightweight Hash Function (Full Version), by Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong[ expand ]
13:17 [Pub][ePrint]Compact Hardware Implementation of Ring-LWE Cryptosystems, by Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede[ expand ]
13:17 [Pub][ePrint]SNR to Success Rate: Reaching the Limit of Non-Profiling DPA, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs, by Adam Smith and Ye Zhang[ expand ]
13:17 [Pub][ePrint]Formal Treatment of Distributed Trust in Electronic Voting, by Stephan Neumann and Melanie Volkamer[ expand ]
13:17 [Pub][ePrint]How to Delegate Computations: The Power of No-Signaling Proofs, by Yael Tauman Kalai and Ran Raz and Ron Rothblum[ expand ]
13:17 [Pub][ePrint]Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments, by Muhammad Rizwan Asghar[ expand ]
13:17 [Pub][ePrint]On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input , by Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
13:17 [Pub][ePrint]Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications, by Sherman S.M. Chow and Matthew Franklin and Haibin Zhang[ expand ]
13:17 [Pub][ePrint]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, by Daniel Genkin and Adi Shamir and Eran Tromer[ expand ]

13:37 [Job][New]Research Fellow, University of Tartu, Estonia[ expand ]

16:48 [Job][New]Fully funded Ph.D., Ecole normale supérieure (Paris Area, France)[ expand ]
16:17 [Pub][ePrint]Tightly-Secure Signatures From Lossy Identification Schemes, by Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]Weaknesses in a Recently Proposed RFID Authentication Protocol, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
16:17 [Pub][ePrint]Multiple-Use Transferable E-Cash , by Pratik Sarkar[ expand ]

15:08 [Job][New]Post-Doc, EPFL, Switzerland[ expand ]
08:54 [Job][New]3 Phd Students in Trustworthy Hardware/Hardware Security, New York University Polytechnic School of Engineering, USA, North America[ expand ]

19:17 [Pub][ePrint]Automatic Search for Differential Trails in ARX Ciphers (Extended Version), by Alex Biryukov and Vesselin Velichkov[ expand ]
16:17 [Pub][ePrint]Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256, by Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang[ expand ]
16:17 [Pub][ePrint]Power and Timing Side Channels for PUFs and their Efficient Exploitation, by Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson[ expand ]
16:17 [Pub][ePrint]Secure Floating-Point Arithmetic and Private Satellite Collision Analysis, by Liina Kamm and Jan Willemson[ expand ]
16:17 [Pub][ePrint]Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
16:17 [Pub][ePrint]Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols, by Xi-Jun Lin and Lin Sun[ expand ]
16:17 [Pub][ePrint]Ultralightweight cryptography for passive RFID system, by Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed[ expand ]
16:17 [Pub][ePrint]A new attack on RSA with a composed decryption exponent, by Abderrahmane Nitaj and Mohamed Ould Douh[ expand ]
16:17 [Pub][ePrint]How to Keep a Secret: Leakage Deterring Public-key Cryptography, by Aggelos Kiayias and Qiang Tang[ expand ]
16:17 [Pub][ePrint]A generic view on trace-and-revoke broadcast encryption schemes, by Dennis Hofheinz and Christoph Striecks[ expand ]
16:17 [Pub][ePrint]A Study of Goldbach\'s conjecture and Polignac\'s conjecture equivalence issues, by Jian Ye and Chenglian Liu[ expand ]
16:17 [Pub][ePrint]Detecting Hidden Leakages, by Amir Moradi and Sylvain Guilley and Annelie Heuser[ expand ]

22:17 [Pub][ePrint]Trust Views for the Web PKI, by Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser[ expand ]
22:17 [Pub][ePrint](Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, by Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Z[ expand ]
22:17 [Pub][ePrint]Lattice Decoding Attacks on Binary LWE, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]An improved compression technique for signatures based on learning with errors, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]Fair Two-Party Computations via the BitCoin Deposits, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
22:17 [Pub][ePrint]Identity-Based Key-Encapsulation Mechanism from Multilinear Maps, by Hao Wang and Lei Wu Zhihua Zheng[ expand ]
19:17 [Pub][ePrint]A Modular Framework for Building Variable-Input Length Tweakable Ciphers, by Thomas Shrimpton and R. Seth Terashima[ expand ]
19:17 [Pub][ePrint]Keyless Signatures\' Infrastructure: How to Build Global Distributed Hash-Trees, by Ahto Buldas and Andres Kroonmaa and Risto Laanoja[ expand ]
19:17 [Pub][ePrint]Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions, by Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Practical Dynamic Searchable Encryption with Small Leakage, by Emil Stefanov and Charalampos Papamanthou and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Provable Security Proofs and their Interpretation in the Real World, by Vikram Singh[ expand ]
19:17 [Pub][ePrint]Is Bitcoin a Decentralized Currency?, by Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun[ expand ]
15:47 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Max Planck Institute for Software Systems, Saarbrücken, Germany[ expand ]
08:38 [Job][New]Ph.D student , Chalmers University of Technology, Sweden[ expand ]
08:07 [Event][New]IEEE Computer SI on Mobile App Sec: IEEE Computer SI on methodologies and solutions for mobile app. security[ expand ]

13:17 [Pub][ePrint]Decentralized Traceable Attribute-Based Signatures, by Ali El Kaafarani and Essam Ghadafi and Dalia Khader[ expand ]
12:10 [Job][New]Research Assistent, Institute for Security in Information Technology, Technische Universitaet Muenchen; Munich (Germany)[ expand ]
05:43 [Job][New]Assistant Professor, Simon Fraser University, Burnaby, Canada, North America[ expand ]

06:42 [Job][New]Post-Doctoral Position in Systems Security, Network Security, Cryptography or Tech Policy, Boston University, Boston, MA, USA[ expand ]

17:51 [Event][New]IEEE IoT Journal, Special Issue on Security for IoT: the State of the Art[ expand ]
16:12 [Job][New]Digital Security Expert, Philips Research, Eindhoven, the Netherlands[ expand ]

22:17 [Pub][ePrint]Lower Bounds in the Hardware Token Model, by Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen[ expand ]
22:17 [Pub][ePrint]Secure multi-party data analysis: end user validation and practical experiments, by Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt[ expand ]
22:17 [Pub][ePrint]EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen, by Alberto Peinado and Jorge Munilla and Amparo Fúster[ expand ]
22:17 [Pub][ePrint]Fair and Efficient Secure Multiparty Computation with Reputation Systems, by Gilad Asharov and Yehuda Lindell and Hila Zarosim[ expand ]
22:17 [Pub][ePrint]Another Look at XCB, by {Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar[ expand ]
22:17 [Pub][ePrint]Leakage Resilient Fully Homomorphic Encryption, by Alexandra Berkoff and Feng-Hao Liu[ expand ]
22:17 [Pub][ePrint]Errorless Smooth Projective Hash Function based on LWE, by Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan[ expand ]
22:17 [Pub][ePrint]On the Security of Recently Proposed RFID Protocols, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
22:17 [Pub][ePrint]Safe enclosures: towards cryptographic techniques for server protection, by Sergiu Bursuc and Julian P. Murphy[ expand ]
22:17 [Pub][ePrint]On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography, by Roberto De Prisco and Alfredo De Santis[ expand ]
22:17 [Pub][ePrint]Interactive Encryption, Message Authentication, and Anonymous Key Exchange, by Yevgeniy Dodis and Dario Fiore[ expand ]
22:17 [Pub][ePrint]Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes, by Shay Gueron and Vlad Krasnov[ expand ]
22:17 [Pub][ePrint]Iterated group products and leakage resilience against NC^1, by Eric Miles[ expand ]
22:17 [Pub][ePrint]RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases, by Lil Maria Rodriguez-Henriquez and Debrup Chakraborty[ expand ]
22:17 [Pub][ePrint]Multi-ciphersuite security and the SSH protocol, by Benjamin Dowling and Florian Giesen and Florian Kohlar and Jörg Schwenk and Douglas Stebila[ expand ]
22:17 [Pub][ePrint]A Note on Bilinear Groups of a Large Composite Order, by Zhengjun Cao and Lihua Liu[ expand ]
22:17 [Pub][ePrint]Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol, by Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto[ expand ]
22:17 [Pub][ePrint]Formal Analysis of CRT-RSA Vigilant\'s Countermeasure Against the BellCoRe Attack, by Pablo Rauzy and Sylvain Guilley[ expand ]
22:17 [Pub][ePrint]Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing, by Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk[ expand ]
22:17 [Pub][ePrint]Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness, by Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing[ expand ]
22:17 [Pub][ePrint]Distributed Key Generation for Secure Encrypted Deduplication, by Yitao Duan[ expand ]
16:19 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Center for IT-Security, Privacy and Accountability, Saarland University, Saarbrücken, Germany[ expand ]
09:52 [Job][New]Ph.D. Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg, Luxembourg[ expand ]

15:40 [Job][New]Two Ph.D. Positions in Cryptography/IT Security, University of Luxembourg[ expand ]
08:57 [Event][New]IWSEC 2014: 9th International Workshop on Security[ expand ]
08:57 [Event][New]IEICE Trans. Fundamentals: Special Section on Cryptography and Information Secur[ expand ]

12:41 [PhD][New]Nicolas Moro: Complex security strategies for secure embedded circuits[ expand ]
12:41 [PhD][New]Amitabh Das: Differential Scan-Based Side-Channel Attacks and Countermeasures[ expand ]
11:22 [PhD][Update]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
11:19 [PhD][New]Aleksandar Kircanski: Cryptanalysis of Symmetric Cryptographic Primitives[ expand ]
07:17 [Pub][ePrint](Anonymous) Compact HIBE From Standard Assumptions, by Somindu C. Ramanna and Palash Sarkar[ expand ]
07:17 [Pub][ePrint]Proofs of Space: When Space is of the Essence, by Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi[ expand ]

14:16 [Event][New]PETS'14: Privacy Enhancing Technologies Symposium[ expand ]
13:28 [Job][New]Research Associate (Post-Doc), University College London, United Kingdom[ expand ]

19:17 [Pub][ePrint]Group Signature with relaxed-privacy and revocability for VANET, by Mohammad Saiful Islam Mamun and Atsuko Miyaji[ expand ]
19:17 [Pub][ePrint]Fully, (Almost) Tightly Secure IBE from Standard Assumptions, by Jie Chen and Hoeteck Wee[ expand ]
19:17 [Pub][ePrint]Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function, by Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications, by Dario Catalano and Antonio Marcedone and Orazio Puglisi[ expand ]
19:17 [Pub][ePrint]Algebraic Properties of the Cube Attack, by Frank-M. Quedenfeld and Christopher Wolf[ expand ]
19:17 [Pub][ePrint]New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography, by Gilles Macario-Rat and Jérôme Plût and Henri Gilbert[ expand ]
19:17 [Pub][ePrint]A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System, by Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu[ expand ]
19:17 [Pub][ePrint]Tamper Resilient Circuits: The Adversary at the Gates, by Aggelos Kiayias and Yiannis Tselekounis[ expand ]
19:17 [Pub][ePrint]Proofs of Space, by Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak[ expand ]
19:17 [Pub][ePrint]Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications, by Xi-Jun Lin and Lin Sun[ expand ]
19:17 [Pub][ePrint]Behind the Scene of Side Channel Attacks, by Victor Lomn\\\'{e}, Emmanuel Prouff, and Thomas Roche[ expand ]

07:17 [Pub][ePrint]A fast integer-based batch full-homomorphic encryption scheme over finite field, by Long Zhang and Qiuling Yue[ expand ]
07:17 [Pub][ePrint]Improved Authenticity Bound of EAX, and Refinements, by Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata[ expand ]
07:17 [Pub][ePrint]APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography, by Elena Andreeva and Beg\\\"ul Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Parallelizable and Authenticated Online Ciphers, by Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Proofs of Data Possession and Retrievability Based on MRD Codes, by Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu[ expand ]
07:17 [Pub][ePrint]Improvement of Lin-Tzeng Solution to Yao\'s Millionaires Problem and Its Cheating Advantage Analysis, by Zhengjun Cao and Lihua Liu[ expand ]
07:17 [Pub][ePrint]Wide-weak Privacy Preserving RFID Mutual Authentication Protocol, by Raghuvir Songhela and Manik Lal Das[ expand ]
07:17 [Pub][ePrint]Tree Based Symmetric Key Broadcast Encryption, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
04:17 [Pub][ePrint]Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model, by Fei Tang, Hongda Li, Qihua Niu, and Bei Liang[ expand ]
04:17 [Pub][ePrint]Secure Multiparty Computations on BitCoin, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
04:17 [Pub][ePrint]ECC-Based Non-Interactive Deniable Authentication with Designated Verifier, by Yalin Chen and Jue-Sam Chou2[ expand ]

13:44 [Event][New]CTCrypt 2014: 3rd Workshop on Current Trends in Cryptology[ expand ]

10:25 [Event][New]CSF'14: 27th IEEE Computer Security Foundations Symposium[ expand ]
10:24 [Job][New]Maitre Assistant(e) - Senior Assistant (postdoc), University of Neuchatel, Switzerland[ expand ]
10:23 [Job][New]Post-Doc, Royal Holloway, University of London, UK[ expand ]
08:03 [News]IACR Ethics Committee[ expand ]
07:58 [Event][New]SCN 2014: Ninth Conference on Security and Cryptography for Networks[ expand ]

22:17 [Pub][ePrint]How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?, by Dorit Ron and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Obfuscation from Semantically-Secure Multi-linear Encodings, by Rafael Pass and Sidharth Telang and Karn Seth[ expand ]
22:17 [Pub][ePrint]A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester, by Nasser Ramazani Darmian[ expand ]
22:17 [Pub][ePrint]Distributed Group Authentication for RFID Supply Management, by Mike Burmester and Jorge Munilla[ expand ]
22:17 [Pub][ePrint]Multi-Stage Fault Attacks on Block Ciphers, by Philipp Jovanovic and Martin Kreuzer and Ilia Polian[ expand ]
22:17 [Pub][ePrint]Construction of Multiplicative Monotone Span Program, by Yuenai Chen and Chunming Tang[ expand ]
22:17 [Pub][ePrint]Location Leakage in Distance Bounding: Why Location Privacy does not Work, by Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay[ expand ]
22:17 [Pub][ePrint]Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro, by Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu[ expand ]
22:17 [Pub][ePrint]Multi-Input Functional Encryption, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\\phi$ Functions, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor, by Wuqiang Shen and Shaohua Tang[ expand ]
22:17 [Pub][ePrint]Efficient Template Attacks, by Omar Choudary and Markus G. Kuhn[ expand ]
22:17 [Pub][ePrint]Broadcast Amplification, by Martin Hirt and Ueli Maurer and Pavel Raykov[ expand ]
22:17 [Pub][ePrint]VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4, by Bartosz Zoltak[ expand ]
22:17 [Pub][ePrint]Misuse Resistant Parallel Authenticated Encryptions, by Mridul Nandi and Nilanjan Datta[ expand ]
19:17 [Pub][ePrint]RankSign : an efficient signature algorithm based on the rank metric, by P. Gaborit and O. Ruatta and J. Schrek and G. Zémor[ expand ]
05:40 [Event][New]Cryptology2014: 4th International Cryptology and Information Security Conference 2014[ expand ]

22:17 [Pub][ePrint]Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited, by Kaoru Kurosawa and Le Trieu Phong[ expand ]
22:17 [Pub][ePrint]Dynamic Countermeasure Against the Zero Power Analysis, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
19:17 [Pub][ePrint]Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting, by Yutaka Kawai and Katsuyuki Takashima[ expand ]
19:17 [Pub][ePrint]Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency, by Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung[ expand ]
19:17 [Pub][ePrint]Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince, by Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati[ expand ]
19:17 [Pub][ePrint]On cross joining de Bruijn sequences, by Johannes Mykkeltveit and Janusz Szmidt[ expand ]
19:17 [Pub][ePrint]Vectorization of ChaCha Stream Cipher, by Martin Goll and Shay Gueron[ expand ]
08:41 [News]Deadline for Nominations of IACR Fellows[ expand ]

19:17 [Forum][IACR Publication Reform] An early/mid career perspective by brentwaters[ expand ]

10:57 [Election]IACR 2013 Election Results[ expand ]
10:09 [Event][New]WISTP 2014: 8th Workshop in Information Security Theory and Practice[ expand ]

04:17 [Pub][ePrint]A Meet-in-the-middle Attack on Round-Reduced mCrypton, by Yonglin Hao, Dongxia Bai[ expand ]
04:17 [Pub][ePrint]Improving security and efficiency for multi-authority access control system in cloud storage, by Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong[ expand ]
04:17 [Pub][ePrint]Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP, by Omkant Pandey and Manoj Prabhakaran and Amit Sahai[ expand ]
04:17 [Pub][ePrint]Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures, by Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele [ expand ]
04:17 [Pub][ePrint]On the Power of Rewinding Simulators in Functional Encryption, by Angelo De Caro and Vincenzo Iovino[ expand ]
04:17 [Pub][ePrint]Using Hamiltonian Totems as Passwords, by Herv\\\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache[ expand ]
04:17 [Pub][ePrint]Fully Deniable Mutual Authentication Protocol Based on RSA Signature, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Efficient CCA-secure Threshold Public-Key Encryption Scheme, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Plaintext Recovery Attacks Against WPA/TKIP, by Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt[ expand ]
04:17 [Pub][ePrint]Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks, by Jayaprakash Kar[ expand ]
04:17 [Pub][ePrint]Asymptotically Efficient Lattice-Based Digital Signatures, by Vadim Lyubashevsky and Daniele Miccicancio[ expand ]
04:17 [Pub][ePrint]Asynchronous MPC with t< n/2 Using Non-equivocation, by Michael Backes, Fabian Bendun, Ashish Choudhury and Aniket Kate[ expand ]
04:17 [Pub][ePrint]Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results, by Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumar[ expand ]
04:17 [Pub][ePrint]Privacy Preserving Unique Statistics in a Smart Grid, by Iraklis Leontiadis, Melek Önen, Refik Molva[ expand ]
04:17 [Pub][ePrint]Dipl.-Math., by Jürgen Müller[ expand ]
04:17 [Pub][ePrint]Fast Software Implementation of Binary Elliptic Curve Cryptography, by Manuel Bluhm and Shay Gueron[ expand ]
04:17 [Pub][ePrint]A Revocable Online-Offline Certificateless Signature Scheme without Pairing, by Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek [ expand ]
04:17 [Pub][ePrint]Practical Signatures from the Partial Fourier Recovery Problem, by Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte[ expand ]
01:17 [Pub][ePrint]An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II), by Gérald Gavin[ expand ]

10:45 [Event][New]CloudCom 2013: IEEE CloudCom 2013 (5th IEEE International Conference on Cloud Computing)[ expand ]

19:17 [Pub][ePrint]On the Resilience and Uniqueness of CPA for Secure Broadcast, by Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
12:18 [Job][New]Tenure-track Assistant/Associate Professor, University of Connecticut, USA[ expand ]
07:17 [Pub][ePrint]Elliptic Curve Cryptography in Practice, by Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow[ expand ]
07:17 [Pub][ePrint]A Key Compromise Impersonation attack against Wang\'s Provably Secure Identity-based Key Agreement Protocol, by Maurizio Adriano Strangio[ expand ]
07:17 [Pub][ePrint]SSS-V2: Secure Similarity Search, by Hyun-A Park[ expand ]
07:17 [Pub][ePrint]Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez[ expand ]
07:17 [Pub][ePrint]TRS-80 With A Keccak Sponge Cake, by Jean-Marie Chauvet[ expand ]
07:17 [Pub][ePrint]Masking Tables---An Underestimated Security Risk, by Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald[ expand ]

07:17 [Pub][ePrint]Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited, by Yongqiang Li and Mingsheng Wang and Yuyin Yu[ expand ]
07:17 [Pub][ePrint]Stamp \\& Extend -- Instant but Undeniable Timestamping based on Lazy Trees, by {\\L}ukasz Krzywiecki and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
07:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities, by Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai[ expand ]
07:17 [Pub][ePrint]Modified Alternating Step Generators, by Robert Wicik and Tomasz Rachwalik[ expand ]
07:17 [Pub][ePrint]Multi-Input Functional Encryption, by Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai[ expand ]

13:47 [Event][New]LATINCRYPT 2014: Third International Conference on Cryptology and Information Security[ expand ]

08:54 [Event][New]IWSEC 2013: The 8th International Workshop on Security (Poster Session)[ expand ]
08:50 [Job][New]Security Engineer, CloudFlare Inc., San Francisco, CA, USA, the Northern Hemisphere[ expand ]
08:48 [Job][New]Ph.D. Scholarships, University of Salerno, Italy[ expand ]

07:17 [Pub][ePrint]Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack, by Chihong Joo and Aaram Yun[ expand ]
07:17 [Pub][ePrint]Mobile Transaction over NFC and GSM, by Muhammad Qasim Saeed and Pardis Pourghomi[ expand ]
07:17 [Pub][ePrint]Verifiable Set Operations over Outsourced Databases, by Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos[ expand ]
07:17 [Pub][ePrint]Amplifying Privacy in Privacy Amplification, by Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin[ expand ]
07:17 [Pub][ePrint]The Realm of the Pairings, by Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini[ expand ]
07:17 [Pub][ePrint]Deep Attacks of a Certificateless Signature Scheme, by Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li[ expand ]

18:12 [Job][New]PhD studentships, Royal Holloway, University of London, UK[ expand ]
14:47 [Job][New]PhD student, SnT, University of Luxembourg, Luxembourg[ expand ]

07:43 [Job][New]Professor (Open Rank), Worcester Polytechnic Institute, MA, USA, below Canada[ expand ]

13:39 [Event][New]Joint MPIM and B-IT workshop on Number Theory and Cryptography[ expand ]
13:00 [Event][New]ASIACCS 2014: 9th ACM Symposium on Information, Computer and Communications Security[ expand ]
13:00 [Event][New]RFIDSec'14: The 10th Workshop on RFID Security[ expand ]
04:17 [Pub][ePrint]Outsourced Symmetric Private Information Retrieval, by Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]

22:17 [Pub][ePrint]Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited, by Sandro Coretti and Ueli Maurer and Björn Tackmann[ expand ]
22:17 [Pub][ePrint]NTRU-KE: A Lattice-based Public Key Exchange Protocol, by Xinyu Lei and Xiaofeng Liao[ expand ]
22:17 [Pub][ePrint]NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
22:17 [Pub][ePrint]A Secure Obfuscator for Encrypted Blind Signature Functionality, by Xiao Feng and Zheng Yuan[ expand ]
19:17 [Pub][ePrint]Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir[ expand ]
19:17 [Pub][ePrint]Method to secure data in the cloud while preserving summary statistics, by Sanchita Barman, Bimal Roy[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Zorro, by Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang[ expand ]
19:17 [Pub][ePrint]PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage, by Daisuke Moriyama and Shin\'ichiro Matsuo and Moti Yung[ expand ]
19:17 [Pub][ePrint]Ambiguous One-Move Nominative Signature Without Random Oracles, by Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang[ expand ]
19:17 [Pub][ePrint]An Approach to Reduce Storage for Homomorphic Computations, by Jung Hee Cheon and Jinsu Kim[ expand ]
19:17 [Pub][ePrint]Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \\& Concurrent Quantum Attacks, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Key Derivation Without Entropy Waste, by Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]A reduction of semigroup DLP to classic DLP, by Matan Banin and Boaz Tsaban[ expand ]
19:17 [Pub][ePrint]How to Certify the Leakage of a Chip?, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon[ expand ]
19:17 [Pub][ePrint]Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation, by Clemens Heuberger and Michela Mazzoli[ expand ]
19:17 [Pub][ePrint]Adaptive Witness Encryption and Asymmetric Password-based Cryptography, by Mihir Bellare and Viet Tung Hoang[ expand ]
19:17 [Pub][ePrint]Limits of Extractability Assumptions with Distributional Auxiliary Input, by Elette Boyle and Rafael Pass[ expand ]

09:30 [Job][New]CEO / General Manager, ESCRYPT Inc., Ann Arbor, USA, North America[ expand ]

21:17 [Pub][ePrint]Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits, by Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Higher Order Masking of Look-up Tables, by Jean-Sebastien Coron[ expand ]
21:17 [Pub][ePrint]Bootstrapping Obfuscators via Fast Pseudorandom Functions, by Benny Applebaum[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks, by Xi-Jun Lin and Lin Sun[ expand ]
21:17 [Pub][ePrint]A More Efficient AES Threshold Implementation, by Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
21:17 [Pub][ePrint]Examination of a New Defense Mechanism: Honeywords, by Ziya Genc, Süleyman Kardas, and Mehmet Sabir Kiraz[ expand ]
21:17 [Pub][ePrint]AEGIS: A Fast Authenticated Encryption Algorithm, by Hongjun Wu and Bart Preneel[ expand ]
21:17 [Pub][ePrint]Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data, by Lichun Li and Anwitaman Datta[ expand ]
21:17 [Pub][ePrint]Secure Key Exchange and Sessions Without Credentials, by Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis[ expand ]
21:17 [Pub][ePrint]Faster Compact Diffie-Hellman: Endomorphisms on the x-line, by Craig Costello and Huseyin Hisil and Benjamin Smith[ expand ]
21:17 [Pub][ePrint]Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]

18:17 [Pub][ePrint]Obfuscation ==> (IND-CPA Security =/=> Circular Security), by Antonio Marcedone and Claudio Orlandi[ expand ]
18:17 [Pub][ePrint]Differing-Inputs Obfuscation and Applications, by Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Unbalancing Pairing-Based Key Exchange Protocols, by Michael Scott[ expand ]
18:17 [Pub][ePrint]How to Compress (Reusable) Garbled Circuits, by Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy[ expand ]
18:17 [Pub][ePrint]New abstractions in applied pi-calculus and automated verification of protected executions, by Shiwei Xu and Sergiu Bursuc and Julian P. Murphy[ expand ]
18:17 [Pub][ePrint]Solving shortest and closest vector problems: The decomposition approach, by Anja Becker, Nicolas Gama and Antoine Joux[ expand ]
18:17 [Pub][ePrint]Fully Bideniable Public-Key Encryption, by Marcel Sebek[ expand ]
12:17 [Pub][ePrint]Separations in Circular Security for Arbitrary Length Key Cycles, by Venkata Koppula and Kim Ramchen and Brent Waters[ expand ]
12:17 [Pub][ePrint]Secret Key Cryptosystem based on Non-Systematic Polar Codes, by Reza Hooshmand[ expand ]
12:17 [Pub][ePrint]Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks, by Damien Vergnaud and David Xiao[ expand ]
12:17 [Pub][ePrint]A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme, by Dana Dachman-Soled[ expand ]
12:17 [Pub][ePrint]Formal verification of a software countermeasure against instruction skip attacks, by Karine Heydemann and Nicolas Moro and Emmanuelle Encrenaz and Bruno Robisson[ expand ]
12:17 [Pub][ePrint]Universally composable privacy preserving finite automata execution with low online and offline complexity, by Peeter Laud and Jan Willemson[ expand ]
12:17 [Pub][ePrint]Bounded Tamper Resilience: How to go beyond the Algebraic Barrier, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others, by Siwei Sun, Lei Hu, Peng Wang[ expand ]
09:17 [Pub][ePrint]A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher, by Tomer Ashur and Orr Dunkelman[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, by Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Traps to the BGJT-Algorithm for Discrete Logarithms, by Qi Cheng and Daqing Wan and Jincheng Zhuang[ expand ]
09:17 [Pub][ePrint]Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, by Benjamin Smith[ expand ]
09:17 [Pub][ePrint]Robust Pseudorandom Generators, by Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman[ expand ]
09:17 [Pub][ePrint]Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces, by Charanjit Jutla and Arnab Roy[ expand ]
09:17 [Pub][ePrint]Attribute-Based Encryption for Arithmetic Circuits, by Dan Boneh and Valeria Nikolaenko and Gil Segev[ expand ]