International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

23:05 [News][Book] Books Available for Review

  The following books are looking for a reviewer. If you want to review one of these, please contact Axel Poschmann via books/at/ You find more information at

CRC Press/Taylor & Francis Group

New arrivals (2011-03-24):

  1. Liu: Security and Policy Driven Computing
  2. Stanoyevitch: Discrete Structures with Contemporary Applications

Available previously:

  1. Blanchet-Sadri: Algorithmic Combinatorics on Partial Words
  2. Brualdi: A Combinatorial Approach to Matrix Theory and Its Applications
  3. Chartrand: Chromatic Graph Theory
  4. Gross: Combinatorial Methods with Computer Applications
  5. Gould: Mathematics in Games, Sports, and Gambling
  6. Johnson: Handbook of Finite Translation Planes
  7. Lindner: Design Theory, Second Edition
  8. Moldovyan: Data-driven Block Ciphers for Fast Telecommunication Systems
  9. Paulsen: Abstract Algebra. An interactive Approach
  10. Peeva: Syzygies and Hilbert Functions
  11. Szabo: Factoring Groups into Subsets
  12. Thuraisingham: Secure Semantic Service-Oriented Systems
  13. Wallis: Introduction to Combinatorial Designs, Second Edition
  14. Xiao: Security in Distributed, Grid, Mobile, and Pervasive Computing


New arrivals (2011-03-24):

  1. Aycock: Spyware and Adware
  2. Bard: Algebraic Cryptanalysis
  3. Bauer: Origins and Foundations of Computing
  4. Böhme: Advanced Statistical Steganalysis
  5. Dietzfelbinger: Primality Testing in Polynomial Time
  6. Sadeghi: Towards Hardware-Intrinsic Security

Available previously:

  1. Adjeroh: The Burrows-Wheeler Transform
  2. Buchmann: Binary Quadratic Forms
  3. Camp: Economics of Identity Theft
  4. Dietzfelbinger: Primality Testing in Polynomial Time
  5. Di Pietro: Intrusion Detection Systems
  6. Fine: Number Theory
  7. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  8. Hromkovic: Algorithmic Adventures
  9. Kuo: Precoding Techniques for Digital Communication Systems
  10. Li: An Introduction to Kolmogorov Complexity and Its Applications
  11. Mehlhorn: Algorithms and Data Structures
  12. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  13. Robshaw: New Stream Cipher Designs
  14. Rosen: Concurrent Zero-Knowledge
  15. Salomon: A Concise Introduction to Data Compression
  16. Sammes: Forensic Computing
  17. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  18. Shi: Transactions on Data Hiding and Multimedia Security III
  19. Traynor: Security for Telecommunications Networks
  20. Vöcking: Taschenbuch der Algorithmen [German]
  21. Yeung: Information Theory and Network Coding

20:03 [News][Review] New Book Reviews Available

  The following book reviews are now available:
  • Al Sakib Khan Pathan: "Security of Self-Organizing Networks", 2011.
    Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-4398-1919-7
    Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2011-08-16)

  • Mark S. Merkow and Lakshmikanth Raghavan: "Secure and Resilient Software Development", 2010.
    Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-4398-2696-6
    Review written by Emin Islam Tatli (Daimler TSS, Germany). (Date: 2011-08-02)

  • Syed A. Ahson and Mohammad Ilyas: "Cloud Computing and Software Services - Theory and Techniques", 2011.
    Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-4398-0315-8
    Review written by Dominik Birk (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2011-07-06)

  • Rowan Garnier and John Taylor: "Discrete Mathematics", 2010.
    Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-4398-1280-8
    Review written by Gregory Kohring (Inversik Laboratories, Germany). (Date: 2011-07-01)

  • Nguyen and Vallee: "The LLL Algorithm", 2010.
    Publisher: Springer. ISBN: 978-3-642-02294-4
    Review written by Steven Galbraith (University of Auckland, New Zealand). (Date: 2011-07-01)

18:58 [News] Membership Meeting Crypto 2011

  The membership meeting at Crypto 2011 has dealt with the following questions:
  • About IACR & Your Board
  • Membership & Elections
  • Conferences & Workshops
  • IACR Fellows
  • Publications
  • Current Board Activities
The full set of slides (PDF, 60 MB) is available via

18:20 [News] New Entries at the Archive

  The latest entries at the IACR Archive are
  • Theory of Cryptography 2008
  • Fast Software Encryption 2008
  • Public Key Cryptography 2008
  • Eurocrypt 2008
  • Crypto 2008
  • Cryptographic Hardware and Embedded Systems (CHES) 2008
  • Asiacrypt 2008
  • Theory of Cryptography 2009
  • Fast Software Encryption 2009
  • EUROCRYPT 2009
  • Public Key Cryptography 2009
You can access all the articles of all these workshops and conferences in full text and without charge at the IACR Archive.

11:43 [Event][New] SEC 2012: 27th IFIP International Information Security and Privacy Conference


11:42 [Event][New] 2011 AlKindi: The 2011 AlKindi Student Workshop on Cryptology


12:15 [Election] IACR Elections: Nominations possible until September 18

  The 2011 election is being held to fill three of nine IACR Director positions. The election is again run electronically and further information will be available on the IACR website. Nominations are now open. They are due by September 18. A nomination form is available at Nominations are due by September 18. Election of Directors The three directors whose terms are expiring are Josh Benaloh, Stuart Haber, and Antoine Joux. The election committee Serge Vaudenay (Chair), Greg Rose, Martijn Stam

18:44 [Job][New] 2 - 3 Research Fellow Positions, Nanyang Technological University, Singapore

  Coding and Cryptograph Research Group ( at Nanyang Technological University, Singapore, is seeking candidates for 2-3 research fellow positions in the areas of lattice based cryptography, security multiparty computation and symmetric key cryptography. Interested applicants should send their CVs to ccrg_postdoc (at)

The positions are to be filled as soon as possible.

18:43 [Job][New] Assistant Professor, Stevens Institute of Technology, Hoboken, NJ, USA

  The Computer Science Department at Stevens Institute of Technology invites applications for a tenure-track position beginning in August 2012. Special consideration will be given to candidates in machine learning or secure systems at the assistant professor level. However, outstanding applicants at other levels and/or in other areas of Computer Science may also be considered. Applicants are expected to have a Ph.D. in Computer Science or a closely related field, a record that suggests the potential to achieve national prominence in research, and a strong commitment to teaching. A successful candidate will be expected to conduct a vigorous, externally funded research program and to teach and innovate curricula at both the undergraduate and graduate levels.

Stevens Institute of Technology is a private university located in Hoboken, New Jersey. The 55-acre campus is on the Hudson river across from midtown Manhattan within a few minutes from NYC via public transportation. Hoboken is an upscale small city, the residence of choice for many professionals working in NYC. Faculty live in Hoboken, Manhattan, and in suburban communities in Northern New Jersey along commuter train lines to Hoboken and NYC. Stevens\\\' location offers excellent opportunities for collaborations with nearby universities such as NYU, Princeton, Columbia, and Rutgers/DIMACS as well as major industrial research laboratories such as Bell Labs, AT&T Labs, IBM Research, Google New York, Siemens, and the Sarnoff Corporation. Stevens is an Affirmative Action/Equal Opportunity employer.

Review of applications will begin on September 15, 2011.

08:19 [Event][New] ICITS 2012: Sixth International Conference on Information-Theoretic Security



  Chun-Yuan Hsiao

Modern cryptography places a great deal of emphasis on de nitions, because a precise\r\nde nition formalizes our intuition about a cryptographic primitive.\r\n\r\nThis dissertation consists of two parts. The first part demonstrates the importance of\r\nde nitional precision by examining a previously overlooked subtlety in de ning a widelyused\r\nprimitive: the Collision Resistant Hash Function, or CRHF. The subtlety lies in the\r\nmethod by which the CRHF key is generated: namely, whether a trusted party needs to\r\nperform key generation (the \"secret-coin\" variant), or whether any public random string\r\ncan be used as the key (the \"public-coin\" variant). Adding a new technique to the so-called \"black-box separation\" methodology, this thesis shows that these two variants of CRHF, which were sometimes used interchangeably, are actually distinct in general. However, they are also equivalent under certain conditions; the thesis identi es a precise and broad set of such conditions.\r\n\r\nThe second part of this dissertation investigates two known de nitions of entropy. Shannon has shown the equivalence of these two de nitions by proving that the shortest compression length of [...]