International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 [ 10 ] 11 12
2015-09-17
15:17 [Pub][ePrint]On the Impact of Known-Key Attacks on Hash Functions, by Bart Mennink, Bart Preneel[ expand ]
15:17 [Pub][ePrint]Linear Distinguishers in the Key-less Setting: Application to PRESENT, by Martin M. Lauridsen and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Cryptographic Assumptions: A Position Paper, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
15:17 [Pub][ePrint]RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors, by Adnan Baysal and Suhap Sahin[ expand ]
15:17 [Pub][ePrint]Mapping the Intel Last-Level Cache, by Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser[ expand ]
15:17 [Pub][ePrint]Almost-tight Identity Based Encryption against Selective Opening Attack, by Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen[ expand ]
15:17 [Pub][ePrint]A Note on the Indifferentiability of the 10-Round Feistel Construction, by Yannick Seurin[ expand ]
15:17 [Pub][ePrint]Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques, by Kexin Qiao and Lei Hu and Siwei Sun[ expand ]
04:36 [Event][New]CBCW'15: Code Based Crypto Workshop 2015[ expand ]
04:35 [Event][New]AsiaPKC 2016: The 3rd ACM ASIA Public-Key Cryptography Workshop[ expand ]


2015-09-16
15:17 [Pub][ePrint]A Unified Approach to MPC with Preprocessing using OT, by Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl[ expand ]
15:17 [Pub][ePrint]New Results on Identity-based Encryption from Quadratic Residuosity, by Ferucio Laurentiu Tiplea and Emil Simion[ expand ]
15:17 [Pub][ePrint]Privacy-preserving Attribute Based Searchable Encryption, by Payal Chaudhari and Maniklal Das[ expand ]
15:17 [Pub][ePrint]Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud, by Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
01:35 [Event][New]ICITS 2016: 9th International Conference on Information Theoretic Security[ expand ]


2015-09-15
09:17 [Pub][ePrint]Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography, by Prosanta Gope[ expand ]
09:17 [Pub][ePrint]Improved Attacks on Reduced-Round Camellia-128/192/256, by Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang[ expand ]
09:17 [Pub][ePrint]Rogue Decryption Failures: Reconciling AE Robustness Notions, by Guy Barwell and Dan Page and Martijn Stam[ expand ]
09:17 [Pub][ePrint]Comparison of cube attacks over different vector spaces, by Richard Winter and Ana Salagean and Raphael C.-W. Phan[ expand ]
09:17 [Pub][ePrint]Robust Authenticated Encryption and the Limits of Symmetric Cryptography, by Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann[ expand ]
09:17 [Pub][ePrint]Security Against Related Randomness Attacks via Reconstructive Extractors, by Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy, by S\\\'ebastien Canard and Viet Cuong Trinh[ expand ]
09:17 [Pub][ePrint]MI-T-HFE, a New Multivariate Signature Scheme, by Wenbin Zhang and Chik How Tan[ expand ]


2015-09-14
09:17 [Pub][ePrint]Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, by Ana Maria Costache and Nigel P. Smart[ expand ]
09:17 [Pub][ePrint]Tweak-Length Extension for Tweakable Blockciphers, by Kazuhiko Minematsu and Tetsu Iwata[ expand ]


2015-09-13
21:17 [Pub][ePrint]Round-Optimal Token-Based Secure Computation, by Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam[ expand ]
21:17 [Pub][ePrint]Applying Cryptographic Acceleration Techniques to Error Correction, by R\\\'emi G\\\'eraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion[ expand ]
21:17 [Pub][ePrint]A New Standard of Ukraine: The Kupyna Hash Function, by Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and O[ expand ]
21:17 [Pub][ePrint]General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security, by Avijit Dutta and Goutam Paul[ expand ]
21:17 [Pub][ePrint]A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography, by Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm[ expand ]
21:17 [Pub][ePrint]Generic Security of NMAC and HMAC with Input Whitening, by Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro[ expand ]
21:17 [Pub][ePrint]Generic Efficient Dynamic Proofs of Retrievability, by Mohammad Etemad and Alptekin Küpçü[ expand ]
21:17 [Pub][ePrint]Computing information on domain parameters from public keys selected uniformly at random, by Martin Ekerå[ expand ]
21:17 [Pub][ePrint]Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model, by Edward Eaton and Fang Song[ expand ]
21:17 [Pub][ePrint]Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule, by Christophe Clavier and Julien Francq and Antoine Wurcker[ expand ]
21:17 [Pub][ePrint]10-Round Feistel is Indifferentiable from an Ideal Cipher, by Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam[ expand ]
21:17 [Pub][ePrint]Bent and Semi-bent Functions via Linear Translators, by Ne\\c{s}e Ko\\c{c}ak, Sihem Mesnager and Ferruh \\\"{O}zbudak[ expand ]
21:17 [Pub][ePrint]Feistel Networks: Indifferentiability at 10 Rounds, by Yuanxi Dai and John Steinberger[ expand ]
21:17 [Pub][ePrint]On the Diffusion property of iterated functions, by J. Liu, S. Mesnager, and L. Chen[ expand ]
21:17 [Pub][ePrint]Traceability Improvements of a New RFID Protocol Based On EPC C1G2, by Seyed Slman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mimohseni[ expand ]
21:17 [Pub][ePrint]A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family, by Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmei[ expand ]
12:43 [Job][New]PhD Position, COSIC - KU Leuven[ expand ]



2015-09-12
01:14 [Job][New]Senior Security Engineer, IOT Business Unit, ARM Ltd[ expand ]


2015-09-10
23:17 [Event][New]6th BIU Winter School: Crypto in the Cloud – Verifiable Comp. & Special Enc[ expand ]
23:16 [Job][New]Assistant/Associate/Full Professor, Northern Arizona University[ expand ]
23:14 [Job][New]PhD student fully funded, Chalmers University of Technology, Sweden [ expand ]
04:32 [Job][New]Postdoctoral Position in Post Quantum Cryptography, KAIST – Daejeon, Korea[ expand ]


2015-09-08
12:43 [Job][Update]Symphony.com Ethical Hacker / Security Penetration Tester, Symphony.com[ expand ]
12:42 [Job][Update]Head of Security Product Management, Symphony.com[ expand ]
09:17 [Forum][2014 Reports] 2014/946 by SBouftass[ expand ]
06:17 [Pub][ePrint]Gambling, Computational Information and Encryption Security, by Mohammad Hajiabadi and Bruce M. Kapron[ expand ]
06:17 [Pub][ePrint]New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators, by Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs[ expand ]
06:17 [Pub][ePrint]Optimally Secure Block Ciphers from Ideal Primitives, by Stefano Tessaro[ expand ]
06:17 [Pub][ePrint]Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue[ expand ]
06:17 [Pub][ePrint]Graded Encoding, Variations on a Scheme, by Shai Halevi[ expand ]
06:17 [Pub][ePrint]Card-based Cryptographic Protocols Using a Minimal Number of Cards, by Alexander Koch and Stefan Walzer and Kevin Härtel[ expand ]
06:17 [Pub][ePrint]Encryption Performance Improvements of the Paillier Cryptosystem, by Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets[ expand ]
06:17 [Pub][ePrint]Is There an Oblivious RAM Lower Bound?, by Elette Boyle and Moni Naor[ expand ]
06:17 [Pub][ePrint]Idealizing Identity-Based Encryption, by Dennis Hofheinz and Christian Matt and Ueli Maurer[ expand ]


2015-09-07
09:37 [Event][New]DIAC 2015: Directions in Authenticated Ciphers 2015[ expand ]
00:17 [Pub][ePrint]A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers, by Chun Guo and Dongdai Lin[ expand ]
00:17 [Pub][ePrint]Selective Opening Security for Receivers, by Carmit Hazay and Arpita Patra and Bogdan Warinschi[ expand ]
00:17 [Pub][ePrint]Factor Base Discrete Logarithms in Kummer Extensions, by Dianyan Xiao and Jincheng Zhuang and Qi Cheng[ expand ]
00:17 [Pub][ePrint]Group Signatures Without q-Assumptions, by Olivier Blazy and Saqib A. Kakvi[ expand ]
00:17 [Pub][ePrint]Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, by Benjamin Fuller and Ariel Hamlin[ expand ]
00:17 [Pub][ePrint]MGR HASH FUNCTION, by Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass[ expand ]
00:17 [Pub][ePrint]A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks, by GANESH YELLAPU[ expand ]
00:17 [Pub][ePrint]Secure Sketch Metamorphosis: Tight Unified Bounds, by Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu[ expand ]
00:17 [Pub][ePrint]Standard Security Does Imply Security Against Selective Opening for Markov Distributions, by Felix Heuer and Eike Kiltz and Krzysztof Pietrzak[ expand ]



2015-09-06
08:47 [Job][New]Postdoctoral Position in Cybersecurity, Fordham University, NY[ expand ]
08:47 [Job][New]PhD student , Chalmers University of Technology, Sweden [ expand ]
08:47 [Job][New]Ph.D. student, fully funded (CIFRE) positions, Huawei Technologies, Paris[ expand ]


2015-09-03
09:17 [Pub][ePrint]Analysis of a key exchange protocol based on tropical matrix algebra, by Matvei Kotov and Alexander Ushakov[ expand ]
00:50 [Job][New]Ph.D. student, Post-Doc, Software Engineer, IBM Research - Zurich[ expand ]


2015-09-02
15:17 [Pub][ePrint]Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing, by Benoît Cogliati and Yannick Seurin[ expand ]
15:17 [Pub][ePrint]Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable, by Zhen Liu and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]Regulating the Pace of von Neumann Correctors, by Houda Ferradi, R\\\'emi G\\\'eraud, Diana Maimu\\c{t}, David Naccache, and Amaury de Wargny[ expand ]
15:17 [Pub][ePrint]The Multiplicative Complexity of Boolean Functions on Four and Five Variables, by Meltem Sonmez Turan and Rene Peralta[ expand ]
15:17 [Pub][ePrint]Exploring Energy Efficiency of Lightweight Block Ciphers, by Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni[ expand ]
15:17 [Pub][ePrint]Characterization of Secure Multiparty Computation Without Broadcast, by Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem[ expand ]


2015-09-01
19:19 [Event][New]ASK 2015: Asian Workshop on Symmetric Key Cryptography 2015 (School)[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of the Quadratic Zero-Testing of GGH, by Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi[ expand ]



2015-08-31
18:17 [Pub][ePrint]Related-key Impossible Differential Analysis of Full Khudra, by Qianqian Yang and Lei Hu and Siwei Sun and Ling Song[ expand ]
18:17 [Pub][ePrint]Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?, by David Wong[ expand ]
18:17 [Pub][ePrint]Offline Witness Encryption, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
18:17 [Pub][ePrint]Multi-Variate High-Order Attacks of Shuffled Tables Recomputation, by Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA[ expand ]
18:17 [Pub][ePrint]DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte[ expand ]
18:17 [Pub][ePrint]Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes, by David Derler and Daniel Slamanig[ expand ]
18:17 [Pub][ePrint]On Linkability and Malleability in Self-blindable Credentials, by Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers[ expand ]
18:17 [Pub][ePrint]An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices, by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]


2015-08-29
08:51 [Job][New]Research Scientists on Cyber-Physical Security, Institute for Infocomm Research, Singapore[ expand ]


2015-08-28
21:17 [Pub][ePrint]On near prime-order elliptic curves with small embedding degrees, by Duc-Phong Le and Nadia El Mrabet and Chik How Tan[ expand ]
21:17 [Pub][ePrint]Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys, by Benjamin Wesolowski and Pascal Junod[ expand ]
18:17 [Pub][ePrint]Authentication Using Side-Channel Information, by Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata[ expand ]
18:17 [Pub][ePrint]Efficient Key Authentication Service for Secure End-to-end Communications, by Mohammad Etemad and Alptekin Küpçü[ expand ]
18:17 [Pub][ePrint]Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices, by David McCann, Kerstin Eder, Elisabeth Oswald[ expand ]
01:37 [Event][New]WISE 2015: Workshop on Implementation: Security and Evaluation[ expand ]


2015-08-26
18:17 [Pub][ePrint]M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors, by Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and [ expand ]
18:17 [Pub][ePrint]Unique Signature with Short Output from CDH Assumption, by Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng[ expand ]
18:17 [Pub][ePrint]Reducing Multilinear Map Levels in Constrained PRFs and ABE, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
15:17 [Pub][ePrint]State-recovery analysis of Spritz, by Ralph Ankele and Stefan Koelbl and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation, by Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys, by Dario Catalano and Dario Fiore and Luca Nizzardo[ expand ]



2015-08-24
21:17 [Pub][ePrint]The Emperor\'s New Password Creation Policies, by Ding Wang and Ping Wang[ expand ]
15:17 [Pub][ePrint]Efficient Fully Structure-Preserving Signatures for Large Messages, by Jens Groth[ expand ]
15:17 [Pub][ePrint]Efficient (ideal) lattice sieving using cross-polytope LSH, by Anja Becker and Thijs Laarhoven[ expand ]
13:25 [Job][New]Applied cryptographer, ID Quantique [ expand ]
13:24 [Job][Update]Ph.D. student, Ruhr University Bochum[ expand ]
13:24 [Job][New]Ph.D. student, Ruhr University Bochum[ expand ]


2015-08-22
13:10 [Event][New]RWC2016: Real World Cryptography 2016[ expand ]


2015-08-21
15:17 [Pub][ePrint]A general framework for building noise-free homomorphic cryptosystems, by Gérald Gavin[ expand ]
15:17 [Pub][ePrint]Extended Nested Dual System Groups, Revisited, by Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang[ expand ]
15:17 [Pub][ePrint]Efficiently Obfuscating Re-Encryption Program under DDH Assumption, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
03:56 [Event][New]Workshop on Tools for Asymmetric Cryptanalysis[ expand ]
03:56 [Event][New]ASIACCS 2016: The 11th ACM Asia Conference on Computer and Communications Security[ expand ]
03:56 [Event][New]ACNS 2016: 14th International Conference on Applied Cryptography and Network Security[ expand ]
03:55 [Event][New]Future Directions in Computing on Encrypted Data[ expand ]


2015-08-20
23:22 [Event][New]PKC: Public Key Cryptography 2017[ expand ]
23:21 [Event][New]CHES: Cryptographic Hardware and Embedded Systems 2016[ expand ]
23:19 [Event][New]Asiacrypt: Asiacrypt 2017[ expand ]
23:17 [Event][New]Eurocrypt: Eurocrypt 2017[ expand ]



2015-08-18
18:17 [Pub][ePrint]Improving the Big Mac Attack on Elliptic Curve Cryptography, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
18:17 [Pub][ePrint]cuHE: A Homomorphic Encryption Accelerator Library, by Wei Dai and Berk Sunar[ expand ]
18:17 [Pub][ePrint]Secure Multi-party Graph Computation, by Varsha Bhat and Harsimran Singh and Sudarshan Iyengar[ expand ]
18:17 [Pub][ePrint]Analysis of Keyless Massive MIMO-based Cryptosystem Security, by Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev[ expand ]
06:50 [Job][Update]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]
06:48 [Job][New]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]