International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

13:56 [Conf] Report on SECRYPT 2011, July 18-21, 2011, University of Seville, Spain

  SECRYPT 2011 - The International Conference on Security and Cryptography July 18-21, 2011, University of Seville, Spain.

SECRYPT 2011 was integrated in ICETE (International Conference on e-Business and Telecommunications) a joint conference combining six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security processing and multimedia applications, and wireless networks.

This year SECRYPT received 160 submissions. After a strict selection process, the SECRYPT program included 22 papers as full papers (13.75% of submissions) and 16 as short papers (10% of submissions). Additionally, 20 papers were accepted for poster presentation. With these acceptance ratios, SECRYPT 2011 continues the tradition of previous conferences, a quality conference with high caliber.

The best papers of SECRYPT will be invited to appear in a post-conference book that will be published by Springer-Verlag composed by a selection of papers from ICETE.

In addition to the presentation sessions, SECRYPT 2011 included four outstanding keynote lectures, which are relevant to today’s lines of research and technical innovation. These talks were presented by internationally distinguished researchers, namely: Han-Chieh Chao, National Ilan University, Taiwan ”WiMAX?- A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks“, by Vincenzo Piuri, Università degli Studi di Milano, Italy “Biometrics Privacy: Technologies and Applications”, by Enrique Cabello, University Rey Juan Carlos, Spain “Face Biometrics without Intrusion in Airport” and by Winfried Lamersdorf, University of Hamburg, Germany “Paradigms of Distributed Software Systems: Services, Processes, and Self-Organization” who helped enhancing the overall quality of this conference with their contributions.

The papers were organized in 15 sessions ranging the hot topics of nowadays such as statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.

The organizing committee included the ICETE conference co-Chairs Prof. Mohammad S. Obaidat, Monmouth University, USA and Professor José Sevillano, University of Seville, Spain and the SECRYPT program chairs Prof. Pierangela Samarati, Università degli Studi di Milano, Italy and Prof. Javier Lopez, University of Malaga, Spain.

SECRYPT 2011 was sponsored by INSTICC (The Institute for Systems and Technologies of Information, Control and Communication) and technically co-sponsored by IEEE- Institute of Electrical and Electronics Engineers and IEEE Systems Council. The conference was held in cooperation with IACR (International Association for Cryptologic Research), IEICE (The Institute of Electronics, Information and Communication Engineers), SWIM (IEICE Special Interest Group on Software Interprise Modelling), ATI (Associación de Técnicos de Informática), CEPIS( Council of European Professional Informatics Societies), FIDETIA (Fundación para la Investigación y el Desarollo de las Tecnologías de la Información en Andalucía), INES (Iniciativa Española de Software y Servicios), ACM SIGMIS (Special Interest Group on Management Information Systems), ACM SIGSAC (Special Interest Group on Security, Audit and Control), ACM SIGMM (Special Interest Group on Multimedia).

Regarding the best paper award, SECRYPT has recognized the paper, "BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl" from Kazumaro Aoki, Günther Roland, Yu Sasaki and Martin Schläffer as the best paper of the conference. As the best Student Paper Award, SECRYPT acknowledged the paper untitled “A Method for Flexible Reduction over Binary Fields Using a Field Multiplier” by Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan and S. K. Nandy as the best student paper presented at the conference.

13:52 [Event][New] ARES 2012: 7th International Conference on Availability, Reliability and Security

  Submission: 1 March 2012
Notification: 1 May 2012
From August 20 to August 24
Location: Prague, Czech Republic
More Information:

09:42 [Event][New] ISCTURKEY2012: 5th International Conference on Information Security and Cryptology

  Submission: 1 March 2012
Notification: 31 March 2012
From May 17 to May 19
Location: Ankara, Turkey
More Information:

08:20 [News] Newsletter Autumn 2011

  The current version of the newsletter is available. It has been sent out 25 November 2011 to all members.

14:08 [Event][New] WISTP 2012: Sixth Workshop in Information Security Theory and Practice

  Submission: 31 January 2012
Notification: 24 February 2012
From June 19 to June 20
Location: London, UK
More Information:

06:17 [Job][New] Lecturer/Senior Lecturer, University of Wollongong, Australia

  The School of Computer Science and Software Engineering (SCSSE)

Lecturer/Senior Lecturer in Computer Science


SCSSE is one of Australia’s leading teaching and research schools. Applications are invited for a continuing position at Lecturer level B/C. The appointee will participate in the teaching of computer science, software engineering and information security subjects.

Applicants must have completed a PhD in Computer Science or a closely related discipline and have teaching experience in computer science, software engineering, or information security. Applicants must have a strong research record of information security and cryptography and has ability to collaborate across the research themes of the School is highly desirable.

Candidates must address the criteria specified in the relevant Position Description which is available from our website. For further information about these roles please contact Associate Professor Yi Mu, Head, School of Computer Science and Software Engineering on +61 2 4221 5881 or email ymu (at)

Applications Close 18 December 2011

Quote Ref No. 24101

How to Apply: Please go to our website

to submit your application online & for more information about the position.

09:42 [Conf][FSE] FSE 2012: 90 submissions received

  Notification of decision: January 23, 2012
Workshop: March 19-21, 2012

18:46 [Event][New] FIRST 2012: 24th Annual FIRST Conference on Computer Security and Incident Response

  From June 17 to June 22
Location: St. Julians, Malta
More Information:

16:32 [Job][New] Cryptography Architect, CipherCloud, Hyderabad, India


CipherCloud provides cloud data encryption solutions with award-winning technology. CipherCloud protects enterprise data using encryption, tokenization, and masking in any private or public cloud environment without impacting functionality or usability. CipherCloud eliminates data privacy, data residency, security and regulatory compliance concerns and accelerates cloud adoption.


Cryptography Architect will lead and contribute to our core technology. This senior engineering position requires demonstrated capabilities in cryptography, encryption, programming, and the associated computational sciences, while also serving the role of cryptography lead for the product teams. The position also requires leading associated research and patent activities and staging of foundational cryptographic technologies for security products, and offers an excellent opportunity for a high energy and results-oriented individual to make significant contributions to CipherCloud’s expanding market presence and industry leadership. In this strategic position, candidate will also work with customers and product management to identify customer requirements and contribute to product strategy.


  • BS, MS, PhD, or equivalent in a related discipline.
  • In-depth development experience in cryptography algorithms, encryption and key management techniques
  • Good knowledge of symmetric encryption algorithms such as AES, Triple DES
  • Understanding of Homomorphic and such symmetric encryption techniques
  • Experience with character encoding such as Base64
  • Hands-on programming experience in C or Java. Java development experience is a plus
  • Entrepreneurial drive and work ethnic, self-motivated, results oriented and demonstrated ability to add value and succeed in a fast paced environment.
  • Team player with strong communications and writing skills.

16:30 [Event][New] 2nd Bar-Ilan Winter School on Cryptography: Lattice-Based Cryptography and

  From February 19 to February 22
Location: Ramat Gan, Israel
More Information:

06:49 [Event][Update] Is Cryptographic Theory Practically Relevant?

  Submission: 31 January 2011
From January 31 to February 2
Location: Cambridge, UK
More Information: