International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

05:16 [Event][New] IJCSS: International Journal of Computer Science and Security

  Submission: 31 July 2012
Notification: 15 September 2012
From October 31 to October 31
More Information:

21:15 [Conf][Crypto]


05:16 [Event][New] PKC 2013: Public Key Cryptography 2013

  Submission: 10 September 2012
From February 26 to March 1
Location: Nara, Japan
More Information:

05:42 [Event][New] DATE 2013: Design Automation and Test in Europe - Topic Track on Secure Systems

  Submission: 9 September 2012
Notification: 16 November 2012
From March 18 to March 22
Location: Grenoble, France
More Information:

00:17 [Pub][JoC] Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles


Abstract  We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles. Our constructions derive from a novel application of a recent signature scheme due to Waters. Signatures in our aggregate signature scheme are sequentially constructed, but knowledge of the order in which messages were signed is not necessary for verification. The aggregate signatures obtained are shorter than Lysyanskaya et al.’s sequential aggregates and can be verified more efficiently than Boneh et al.’s aggregates. We also consider applications to secure routing and proxy signatures.

  • Content Type Journal Article
  • Pages 1-34
  • DOI 10.1007/s00145-012-9126-5
  • Authors

    • Steve Lu, Los Angeles, CA, USA
    • Rafail Ostrovsky, Los Angeles, CA, USA
    • Amit Sahai, Los Angeles, CA, USA
    • Hovav Shacham, La Jolla, CA, USA
    • Brent Waters, Austin, TX, USA

    • Journal Journal of Cryptology
    • Online ISSN 1432-1378
    • Print ISSN 0933-2790

From: Fri, 22 Jun 2012 14:01:59 GMT

10:50 [Event][New] TCC2013: The Tenth Theoretical Cryptography Conference

  Submission: 1 September 2013
Notification: 1 December 2013
From March 3 to March 6
Location: Tokyo, Japan
More Information:

09:29 [PhD][New] Billy Bob Brumley: Covert Timing Channels, Caching, and Cryptography

  Name: Billy Bob Brumley
Topic: Covert Timing Channels, Caching, and Cryptography
Category: implementation

Description: Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption or timing measurements. This is a young but very active field within applied cryptography. Modern processors are equipped with numerous mechanisms to improve the average performance of a program, including but not limited to caches. These mechanisms can often be used as side-channels to attack software implementations of cryptosystems. This area within side-channel analysis is called microarchitecture attacks, and those dealing with caching mechanisms cache-timing attacks. This dissertation presents a number of contributions to the field of side-channel analysis. The introductory portion consists of a review of common cache architectures, a literature survey of covert channels focusing mostly on covert timing channels, and a literature survey of cache-timing attacks, including selective related results that are more generally categorized as side-channel attacks such as traditional timing attacks. This dissertation includes eight publications relating to this field. They contain contributions in areas such as side-channel analysis, data cache-timing attacks, instruction cache-timing attacks, traditional timing attacks, and fault attacks. Fundamental themes also include attack mitigations and efficient yet secure software implementation of cryptosystems. Concrete results include, but are not limited to, four practical side-channel attacks against OpenSSL, each implemented and leading to full key recovery.[...]

10:42 [PhD][New] Sujoy Sinha Roy: Design and Analysis of Elliptic Curve Cryptosystems on FPGAs

  Name: Sujoy Sinha Roy
Topic: Design and Analysis of Elliptic Curve Cryptosystems on FPGAs
Category: implementation

Description: The thesis explores compact and efficient iplementation of elliptic curve cryptography (ECC) on hardware platforms over extended binary fields. \r\nEfficiency of an elliptic curve cryptoprocessor is largely affected by the underlying finite field primitives and by the architecture of the elliptic curve scalar multiplier (ECSM). The work presented in this thesis contributes in designing efficient finite field algorithms by utilizing the Lookup Tables (LUTs) present in FPGAs. The thesis develops a generalization of the Itoh-Tsujii inversion algorithm (ITA) to use higher exponentiation circuits instead of the conventional squaring circuits. Finally the thesis integrates efficient finite field primitives and explores the concept of pipelining to develop a high speed ECSM architecture. The delay of the critical paths of the ECSM architecture have been estimated by a theoretical model and have been split into optimal delay stages. The thesis develops optimal scheduling technique for pipelined ECSM architecture. The work analyzes the effect of increase in number of pipeline stages on the scalar multiplication time and estimates the optimal\r\nnumber of pipelined stages in the ECSM architecture for a given finite field. Finally detailed analysis, supported with experimental results have been provided to design the fastest reported scalar multiplier in GF(2^163). The proposed design has a three stage pipeline and takes less than 13 us, as compared to 20 us required in the previous best design by Chelton and Benaissa on Virtex 4 FPGAs. Notably, the current design has an area requirement of only 56% compared with the reported work, owing to the better LUT utilizations of the underlying finite field primitives.[...]

08:09 [Conf][EC] Videos from Eurocrypt 2012

  Videos and presentations from Eurocrypt 2012 are now online.

15:41 [Event][Update] Indocrypt 2012

  Submission: 23 July 2012
From December 9 to December 12
Location: Kolkata, India
More Information:

15:41 [Event][Update] Crypto 2013

  From August 19 to August 23
Location: Santa Barbara, CA, USA
More Information: