International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 [ 10 ] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128
17:34 [Job][New]PhD positions, International Max Planck Research School for Computer Science, Saarbrücken[ expand ]
17:34 [Event][New]CCSW 2016: 8rd ACM Cloud Computing Security Workshop[ expand ]

21:41 [Job][New]Crypto Expert, Cyber Security Practice - United Arab Emirates[ expand ]
02:52 [Event][New]COST-IACR School on Randomness in Cryptography[ expand ]

23:23 [Job][New]Research Scientist on Cyber-Physical Security , Institute for Infocomm Research, Singapore[ expand ]

23:51 [Event][New]Workshop on Secret Sharing for Secure Network Storage[ expand ]
23:51 [Event][New]SPC 2016: 2nd IEEE Workshop on Security and Privacy in the Cloud[ expand ]
23:50 [Job][New]10 Ph.D. students, Gran Sasso Science Institute[ expand ]
01:52 [Job][New]PhD studentship in Privacy Preserving Continuous Authentication, University College London[ expand ]
01:52 [Job][New]Postdoctoral opening (security of cloud storage systems), New Jersey Institute of Technology, Newark, USA[ expand ]
01:51 [Job][New]PhD Scholarship, Control System Security, Queensland University of Technology[ expand ]

17:59 [Job][New]Ph.D. student, IRISA, Rennes, France[ expand ]

16:05 [Job][New]Ph.D. student, University of Bergen, Norway[ expand ]

15:58 [Job][New]Postdoc, University College London[ expand ]
15:58 [Job][New]Post-Doctoral Position in Privacy and Security, EPFL, Lausanne, Switzeland[ expand ]

18:28 [Job][New]PhD Studentship in IoT Security & Privacy, University of Surrey, UK[ expand ]
16:12 [Job][New]Post-Docs and PhD Students, IBM Research - Zurich, Switzerland[ expand ]

06:24 [Job][New]Lecturer (teaching focussed) in Information Security; five year, full time, Information Security Group, Royal Holloway, University of London[ expand ]
06:24 [Job][New]Lecturer in Information Security (= Assistant Prof in North America or Junior Prof in Europe), Information Security Group, Royal Holloway, University of London[ expand ]
06:24 [Job][New]Postdoc / Interdisciplinary Coordinator, Ruhr-University Bochum, Horst Görtz Institute / UbiCrypt[ expand ]

04:20 [Event][New]C2SI 2017: International Conference in "Codes, Cryptology and Information Security"[ expand ]
04:20 [Event][New]SPMED: Real-World Security and Privacy for Collaborative Medical Analytics[ expand ]

23:31 [Job][New]Lecturer, School of Computing and Information Technology, University of Wollongong, Australia[ expand ]

16:28 [Event][New]PPPM: 4th international conference on Personalized Medicine[ expand ]
16:26 [Event][New]SPRO 2016: 2nd International Workshop on Software PROtection[ expand ]

16:24 [Event][New]GameSec 2016: Conference on Decision and Game Theory for Security[ expand ]
16:24 [Event][New]DPM 2016: 11th International Workshop on Data Privacy Management[ expand ]
16:24 [Job][New]Software Cryptographic Researcher, CableLabs - Louisville, CO[ expand ]

22:12 [Event][New]New Directions in Cryptography and Applications to Cyber-Security[ expand ]
22:12 [Event][New]ANTS-XII: Twelfth Algorithmic Number Theory Symposium[ expand ]
22:09 [Job][New]Two new Research Fellow positions in Security at the University of Surrey, University of Surrey[ expand ]
16:42 [Job][New]Lecturer/Senior Lecturer Cyber Security, Monash University, Australia[ expand ]

14:11 [Job][New]Post-Doc, Grace team, INRIA Saclay et Ecole polytechnique, Palaiseau, Paris greater area, France[ expand ]
14:00 [Event][New]ICISC 2016: 19th Annual International Conference on Information Security and Cryptology[ expand ]
14:00 [Event][New]IACR-SEAMS School "Cryptography: Foundations and New Directions"[ expand ]
14:00 [Event][New]CARDIS 2016: 15th Smart Card Research and Advanced Application Conference[ expand ]
14:00 [Event][New]ECC2016 Computational Algebraic Number Theory School[ expand ]
04:14 [Job][New]Software Cryptographic Researcher, CableLabs[ expand ]
04:14 [Job][New]Director, Cybersecurity, Hong Kong Applied Science and Technology Research Institute[ expand ]

03:18 [Event][New]FSE 2017: Fast Software Encryption[ expand ]

20:18 [Job][New]Cryptographic Researcher, Input Output HK (IOHK), Japan and Remote[ expand ]
16:06 [Job][New]Senior Engineers/Software Engineers (Information Security, Multiple Openings), Hong Kong Applied Science and technology Research Institute Company Limited[ expand ]
16:06 [Job][New]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings), Hong Kong Applied Science and Technologu Research Institute Company Limited[ expand ]
16:06 [Job][New]Fully Funded PhD Student position in Cryptography, Chalmers University of Technology, Sweden[ expand ]

16:25 [Job][New]Post-Doc , ENS de Lyon, France[ expand ]
16:24 [Event][New]MIST'16: 8th ACM CCS International Workshop on Managing Insider Security Threats[ expand ]

22:57 [Event][New]CryptoBG*2016: International Summer School on Cryptology and Cyber Resilience - Bulgaria[ expand ]
01:54 [Event][New]WISA 2016: The 17th World Conference on Information Security Applications[ expand ]

17:48 [Job][New]Ph.D. student in FinCrypto, PETs, SymCrypto, University of Luxembourg, SnT/Cryptolux[ expand ]

17:49 [Job][New]Applied Cryptographer / PKI developer, AET Europe, Netherlands[ expand ]

16:58 [Event][New]International Cyber Security Workshop and Certificate Program[ expand ]

16:58 [Event][New]Crypto-CO: First Summer School on Cryptology in Colombia[ expand ]

18:46 [Job][New]PhD student, Universitat Pompeu Fabra, Barcelona, Spain[ expand ]
18:46 [Event][New]TrustED 2016: Sixth International Workshop on Trustworthy Embedded Devices[ expand ]

17:21 [Event][New]Theory of Implementation Security Workshop[ expand ]
07:56 [Job][New]Post-Doc, Nanyang Technological University[ expand ]

20:32 [Event][New]Indocrypt '16: 17th International Conference on Cryptology in India[ expand ]
20:31 [Job][New]Research Associate or Senior Research Associate in Cryptography , University of Bristol[ expand ]
20:31 [Job][New]Post-doctoral Researcher, Instituto de Telecomunicações [ expand ]

16:05 [Job][New]Crypto Experts, Cyber Security Practise - United Arab Emirates[ expand ]

20:30 [Event][New]DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation[ expand ]
16:14 [Event][New]Workshop on Cryptographic protocols for small devices[ expand ]
16:14 [Job][New]Post-Doc, Newcastle University[ expand ]
16:13 [Job][New]Post Doc, Embedded System Security Group, Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France[ expand ]

16:45 [Event][New]UbiCrypt Summer School crypt@b-it 2016, 25-29 July 2016, Bonn, Germany.[ expand ]
16:45 [Event][New]EuroUSEC: The 1st European Workshop on Usable Security[ expand ]

16:14 [Event][New]E-Vote-ID 2016: International Joint Conference on Electronic Voting[ expand ]

04:14 [Job][New]Senior Security Analyst (Native Code), UK or France[ expand ]
04:14 [Job][New]Senior Security Analyst (Open Platform), UK or France[ expand ]
04:14 [Job][New]Post-Doc, Guangzhou University, Guangzhou, China; The University of Hong Kong, Hong Kong[ expand ]

20:13 [Event][New]T-DSC: Special Issue on Paradigm Shifts in Cryptographic Engineering[ expand ]
19:21 [Event][New]PLLS2016: First international workshop on the Protection of Long-Lived Systems[ expand ]

22:30 [Event][New]Inside Dark Web[ expand ]

05:07 [PhD][New]Liran Lerman: A Machine Learning Approach for Automatic and Generic Side-Channel Attacks[ expand ]
00:04 [Event][New]ICISS 2016: 12th International Conference on Information Systems Security[ expand ]
00:04 [Event][New]ICMC 2017: 3rd International Conference on Mathematics and Computing[ expand ]

04:16 [Job][New]Post-Doc Researcher, CryptoExperts, Paris, France[ expand ]
04:15 [Job][New]Lecturer/Researcher in Security, University of Oxford[ expand ]
04:14 [Job][New]Ph.D. Student in Cryptographic Engineering/Post-quantum Cryptography, Rochester Institute of Technology, Rochester, NY, USA[ expand ]
04:14 [Event][New]CloudCom'16: 8th IEEE International Conference on Cloud Computing Technology and Science[ expand ]

23:30 [Event][New]CrossFyre 2016[ expand ]
23:30 [Job][New]Senior Engineer/Software Engineer, Information Security,, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]

19:03 [Job][New]Visiting Assistant Professor, University of Cincinnati[ expand ]

22:22 [Job][New]Professor in Secure Systems, University of Surrey[ expand ]
22:22 [Job][New]Cryptographic Researcher, National Institute of Standards and Technology (NIST)[ expand ]
22:22 [Job][New]Lecturer/Senior Lecturer/Reader/Professor, School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, UK[ expand ]

23:15 [Event][New]NordSec 2016: The 21st Nordic Conference on Secure IT Systems[ expand ]

23:10 [Job][New]Senior Security Engineer, Ministry of Justice -Digital & Technology - London[ expand ]
23:08 [Job][New]Systems Security Architect - Standards Team, Qualcomm Incorporated - San, Diego, CA, USA[ expand ]
23:04 [Event][New]WAIFI: International Workshop on the Arithmetic of Finite Fields[ expand ]
23:04 [Event][New]SCN 2016: 10th Conference on Security and Cryptography for Networks[ expand ]
23:03 [Event][New]LightSec'16: International Workshop on Lightweight Cryptography for Security & Privacy[ expand ]

10:08 [Job][New]Post-Doc position, Universite Libre de Bruxelles[ expand ]

16:21 [Job][New]Ph.D. student in Privacy, IMDEA Software Institute[ expand ]
16:20 [Job][New]Ph.D. / M.Sc. Scholarships, PostDoc Positions, and Summer Internships, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turke[ expand ]

18:20 [Job][New]Research Scientist, PACE, Nanyang Technological University, Singapore[ expand ]
18:20 [Job][New]Ph.D. / M.Sc. Scholarships, PostDoc Positions, and Summer Internships, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey[ expand ]

03:08 [Job][New]Cryptography Engineer, CloudFlare, Inc. / San Francisco[ expand ]

15:47 [Event][New]11th IFIP Summer School on Privacy and Identity Management[ expand ]

20:45 [Event][New]WHEAT2016: Workshop HEAT Homomorphic Encryption Applications and Technology[ expand ]

20:01 [Event][New]TRUST 2016: The 9th International Conference on Trust & Trustworthy Computing[ expand ]
20:01 [Job][New]Ph.D. student, Eindhoven University of Technology. The Netherlands.[ expand ]
20:01 [Job][New]Fully Funded Ph.D. Student, Karlsruhe Institute of Technology[ expand ]

17:28 [Job][New]Ph.D. student, Institute of Information Engineering?CAS[ expand ]
17:28 [Job][New]Postdoctoral researcher, Boston University, MIT, Northeastern, and UConn[ expand ]

20:16 [Job][New]Lecturer in the Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX UK[ expand ]

17:57 [Event][New]ECC 2016: 20th Workshop on Elliptic Curve Cryptography[ expand ]
17:56 [Job][New]Postdoctoral Fellow within Cryptology, University of Bergen, Norway[ expand ]
17:56 [Job][New]Senior Engineer/Engineer, Cyber-Security Assessment, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]

20:08 [Event][New]IEEE International Symposium on Hardware Oriented Security and Trust (HOST)[ expand ]

17:24 [Job][New]Post-Doc, Indian Institute of Technology Kharagpur[ expand ]
02:44 [Event][New]60th SWoID: Symposium on the Work of Ivan Damgård[ expand ]

00:32 [Job][New]Postdoctoral researcher, University of Michigan, Ann Arbor[ expand ]
00:32 [Event][New]Theory and Practice of Multiparty Computation[ expand ]
00:32 [Event][New]CEWIT2016: 13th International Conference on Emerging Technologies for a Smarter World[ expand ]

18:41 [Job][New]PhD student in Boolean functions and applications, University of Bergen, Norway[ expand ]
15:28 [Event][New]FDTC'16: Workshop on Fault Diagnosis and Tolerance in Cryptography[ expand ]
05:07 [Event][New]IWDW 2016: 15th International Workshop on Digital Forensics and Watermarking[ expand ]
05:07 [Event][New]WISTP: WISTP International Conference on Information Security Theory and Practice[ expand ]
05:07 [Event][New]Random Bit Generation Workshop 2016[ expand ]

23:33 [Event][New]T-DSC: Special Issue on ***Paradigm Shifts in Cryptographic Engineering***[ expand ]
20:44 [Event][New]ISPEC 2016: The 12th International Conf on Information Security Practice and Experience[ expand ]

02:21 [Event][New]Asiacrypt 2016: Asiacrypt 2016[ expand ]
02:20 [Job][New]Ph.D. student in Cryptography, Security and Privacy, University of Luxembourg, Cryptolux team[ expand ]
02:20 [Job][New]Senior Security Analyst x 2, United Kingdom or France[ expand ]

17:33 [Event][New]AWACS 2016: A Workshop About Cryptographic Standards[ expand ]
17:09 [Job][New]Cryptography Team Leader, United Kingdom[ expand ]
00:39 [Event][New]SecureComm: 12th EAI International Conference on Security and Privacy in Communication[ expand ]
00:39 [Job][New]Postdoctoral Researcher, University College Cork, Ireland[ expand ]
00:38 [Job][New]Ph.D. student, Karlsruhe Institute of Technology (KIT), Germany[ expand ]

18:02 [Event][New]CyberSciTech'16: 2016 IEEE Cyber Science and Technology Congress[ expand ]
18:02 [Event][New]CITS'16: The 2016 Int'l Conf. on Computer, Information &Telecommunication Systems[ expand ]

09:42 [PhD][Update]Marko Wolf: Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications[ expand ]

17:18 [Job][New]Research Associate, Post-doctoral Fellow, University of Waterloo, Canada[ expand ]
17:15 [Event][New]SECRYPT'201: 13th International Conference on Security and Cryptography[ expand ]
17:15 [Event][New]CANS 2016: 15th International Conference on Cryptology and Network Security[ expand ]

18:37 [Event][New]Blockchain Technologies; from cryptographic e-cash to modern cryptocurrency[ expand ]
14:57 [Job][Update]Assistant Professor, Télécom ParisTech, Paris[ expand ]

22:14 [Job][New]Assistant Professor, Télécom ParisTech, Paris[ expand ]
20:06 [Event][New]SSACSGC: 2nd Round Call for Chapters: Book on Smart Grid Security, IGI Global USA[ expand ]
20:05 [Event][New]ACM-CCS'16: 23rd ACM Conference on Computer and Communications Security[ expand ]

03:47 [Event][New]DCCL 2016: Distributed Cryptocurrencies and Consensus Ledgers[ expand ]

17:32 [Event][New]SPACE 2016: Sixth International Conference on Security, Privacy and Applied Cryptograph[ expand ]

23:29 [Event][New]ARES2016: International Conference on Availability, Reliability and Security[ expand ]
23:29 [Event][New]ARES EU Projects Symposium 2016[ expand ]

14:42 [PhD][New]Behrooz khadem: A Chaotic Self-Synchronizing Stream Cipher and Its Application in Image Encryption[ expand ]

19:10 [Job][New]Research Associate, City University London, London, United Kingdom[ expand ]

17:31 [Event][New]DIPDMWC: The Third International Conference on Digital Information Processing, Data[ expand ]
17:30 [Job][New]Departmental Lecturer in Theoretical Computer Science, University of Oxford[ expand ]
17:30 [Job][New]Postdoc in Security Analytics [Capability of Speaking German Required], University of Mannheim, Germany[ expand ]

17:57 [Job][New]Security expert and cryptographer for IoT (m/f) (ideally Post-Doc), itrust consulting sàrl[ expand ]
17:55 [Event][New]ECRYPT-NET Workshop on Cryptography Design for the Internet of Things[ expand ]
17:54 [Event][New]NSS 2016: 10th International Conference on Network and System Security[ expand ]
12:11 [PhD][New]Keisuke Tanaka[ expand ]
12:10 [PhD][Update]Luk Bettale: Algebraic Cryptanalysis: Tools and Applications[ expand ]
12:08 [PhD][Update]Seungjoo Kim: Improved privacy and authenticity in digital signatures / key management[ expand ]
12:08 [PhD][Update]Martin Vuagnoux: Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
12:07 [PhD][Update]Nizamud Din: Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves[ expand ]

20:24 [Event][New]ISC: Information Security Conference[ expand ]
05:33 [Event][New]ProvSec 2016: The Tenth International Conference on Provable Security[ expand ]

17:12 [Event][New]CITS'16: 2016 International Conf. on Computer Information & Telecommunication System[ expand ]
17:12 [Job][New]Senior Engineers/Software Engineers (Information Security), Multiple Openings, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:12 [Job][New]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]

18:41 [Job][New]Principle Cryptographer, CipherQ, Toronto, Canada [ expand ]

15:22 [Event][New]YACC'2016: Yet Another Conference on Cryptography 2016[ expand ]

17:31 [Job][New]IT Security Researcher, NEC Laboratories Europe, Heidelberg, Germany[ expand ]
17:30 [Event][New]DSD 2016: 19th Euromicro Conference on Digital System Design,[ expand ]

17:17 [Event][New]CECC '16: The 16th Central European Conference on Cryptology[ expand ]

22:45 [Job][New]Assistant Professor, Graduate School of Engineering, Osaka University, Japan[ expand ]

17:43 [Event][New]MSPN'2016: International Conference on Mobile, Secure and Programmable Networking[ expand ]

19:05 [Job][New]Ph.D. student in Side-Channel Analysis, Ruhr University Bochum[ expand ]

17:26 [Job][Update]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:25 [Job][New]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:22 [Job][Update]PhD Postion in Cloud Security and Privacy, University of Westminster, Computer Science Department, London, UK[ expand ]

19:08 [Event][New]DBSec 2016: 30th Annual IFIP WG 11.3 Working Conf. on Data and Applications Security[ expand ]
16:13 [Job][New]PhD Postion in Cloud Security and Privacy, University of Westminster, Computer Science Department, London, UK[ expand ]
00:45 [Job][New]Lecturer/Senior Lecturer Computer Science, Department of Computer Science: University of Bristol[ expand ]

18:23 [Job][New]Positions in Applied Cryptography, Hong Kong Applied Science And Technology Research Institute Company Limited[ expand ]

16:30 [Job][New]professor, tenure track or tenured position , Aalto University, Department of Computer Science, Helsinki, Finland[ expand ]
16:30 [Job][New]Tenure-track Assistant Professor in Cryptology, Florida Atlantic University[ expand ]

16:47 [Job][Update]Fully Funded PhD Student position, Chalmers University of Technology, Sweden[ expand ]
16:45 [Event][New]Spring School on Symmetric Cryptography[ expand ]

20:22 [Job][New]PhD studentship (Decision Analytics for Security), University College Cork[ expand ]
00:40 [Event][New]AsiaJCIS 2016: The 11th Asia Joint Conference on Information Security[ expand ]

20:35 [Job][New]Doctoral / Post-doctoral Fellow in Hardware Security (with teaching load), University of Passau, Germany[ expand ]
20:35 [Job][New]PhD and Postdoc Positions in Cryptography, Cryptographic Algorithms, Saarland University[ expand ]

21:33 [Job][New]Post-Doc in Cryptography, Ecole Normale Supérieure, Paris, France[ expand ]
07:10 [PhD][New]Serge Vaudenay[ expand ]
07:07 [PhD][New]Michael R. Clark: The Theory and Application of Privacy-Preserving Computation[ expand ]

21:43 [Job][New]Tenure-track Faculty Position, University of Utah, Salt Lake City[ expand ]
12:41 [PhD][New]Janaka Alawatugoda: On the leakage resilience of secure channel establishment[ expand ]
12:20 [PhD][New]Alireza Jolfaei: Robust Encryption Schemes for 3D Content Protection[ expand ]
12:19 [PhD][New]Mario Larangeira: Programmable and Non-programmable Models in Security Proofs[ expand ]

03:08 [Event][New]BalkanCryptSec 2016: International Conference on Cryptography and Information Securit[ expand ]
03:07 [Job][New]Ph.D. student, RA, TA, University of Nebraska Lincoln[ expand ]

15:17 [Job][New]Tenure-track Position in Data Science and Engineering, Oregon State University, Corvallis OR, USA[ expand ]

21:33 [Job][New]PhD and Postdoc Positions in Cryptography, Institute of Science and Technology Austria (IST Austria)[ expand ]

22:38 [Job][New]Postdoctoral Scholar, Northern Arizona University, Flagstaff, Arizona USA[ expand ]
15:20 [Job][New]Post-Doc in Lattice-Based Cryptography, CWI Amsterdam, The Netherlands[ expand ]
15:20 [Event][New]SECITC 2016: 9th Int. Conference on Security for Information Technology & Communications[ expand ]

23:50 [Event][New]DATICS-FUTURETECH 2016: DATICS workshop in FutureTech 2016[ expand ]
23:49 [Event][New]DATICS-IMECS 2016: DATICS workshop in IMECS 2016[ expand ]

22:56 [Job][Update]Principle Cryptographer, CipherQ, Toronto, Canada[ expand ]
22:39 [Job][New]Principle Cryptographer, CipherQ, Toronto, Canada[ expand ]
03:50 [Job][New]Tenure-track Faculty Positions (2), North Carolina State University[ expand ]

23:25 [Event][New]CyberSciTech'16: 2016 Cyber Science and Technology Congress[ expand ]

14:20 [Event][New]ACM CPSS'16: 2nd ACM Cyber-Physical System Security Workshop (with ACM AsiaCCS'16)[ expand ]
07:17 [Pub][ePrint]Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security, by Takanori Yasuda and Xavier Dahan and Kouichi Sakurai[ expand ]
07:17 [Pub][ePrint]Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud, by Marc Green and Thomas Eisenbarth[ expand ]
07:17 [Pub][ePrint]SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains, by Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena[ expand ]
07:17 [Pub][ePrint]Constraining Pseudorandom Functions Privately, by Dan Boneh and Kevin Lewi and David J. Wu[ expand ]
07:17 [Pub][ePrint]Ceremonies for End-to-End Verifiable Elections, by Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang[ expand ]
04:17 [Pub][ePrint]Meet-in-the-Middle Attacks on Reduced-Round Midori-64, by Li Lin and Wenling Wu[ expand ]

18:41 [Job][Update]Postdoc and PhD student in Cryptography (Mix-Nets), University of Tartu, Estonia[ expand ]
18:30 [Job][New]Postdoctoral researcher in Cryptography, IMDEA Software Institute, Madrid, Spain[ expand ]

02:44 [Job][New]Post-doc, Université catholique de Louvain, Louvain-la-Neuve, Belgium[ expand ]
02:32 [Event][New]IEEE TC SCA: IEEE Trans Computers - Special Section on Secure Computer Architectures[ expand ]

22:17 [Pub][ePrint]Beyond Bitcoin - Part I: A critical look at blockchain-based systems, by Pasquale Forte and Diego Romano and Giovanni Schmid[ expand ]
22:17 [Pub][ePrint]A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher, by Mehmet Özen and Mustafa Çoban and Ferhat Karakoç[ expand ]
18:35 [Job][New]Multiple Ph.D. Positions in Applied Cryptography and Network Security (Fully funded), Oregon State University, Computer Science, Corvallis, OR, USA[ expand ]
04:17 [Event][New]IWSEC 2016: The 11th International Workshop on Security[ expand ]
04:16 [Event][New]QCrypt 2016: 6th International Conference on Quantum Cryptography[ expand ]
03:57 [Election]IACR 2015 election results[ expand ]
01:17 [Pub][ePrint]The Moral Character of Cryptographic Work, by Phillip Rogaway[ expand ]
01:17 [Pub][ePrint]Cyber and Physical Access Control in Legacy System Using Passwords, by Jia Xu and Jianying Zhou and Liming Lu[ expand ]
01:17 [Pub][ePrint]Cryptanalysis of multi-HFE, by Yasufumi Hashimoto[ expand ]
01:17 [Pub][ePrint]Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation, by Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste[ expand ]
01:08 [Event][New]PSC: Post-Snowden Cryptography[ expand ]

13:51 [Job][Update]PhD/MSc Scholarships, Post-Doctoral Positions, and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, Istanbul, Turkey[ expand ]
13:49 [Job][New]Ph.D. / M.Sc. Scholarships, Post-Doctoral Positions, and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey[ expand ]
09:38 [Job][New]PhD Position on Privacy, Technische Universität Darmstadt, Germany[ expand ]
03:51 [Pub][ePrint]Double-Authentication-Preventing Signatures from Trapdoor Identification, by Mihir Bellare and Douglas Stebila[ expand ]
03:51 [Pub][ePrint]An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks, by Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan[ expand ]
03:51 [Pub][ePrint]Cross Processor Cache Attacks, by Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
03:51 [Pub][ePrint]NORX8 and NORX16: Authenticated Encryption for Low-End Systems, by Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves[ expand ]
01:17 [Pub][ePrint]A note on the optimality of frequency analysis vs. $\\ell_p$-optimization, by Marie-Sarah Lacharit\\\'{e} and Kenneth G. Paterson[ expand ]

12:34 [Job][New]Postdoctoral Researcher (Security in Cyber Physical Systems), University College Cork, Ireland[ expand ]
03:00 [Event][New]TCC 2016-B: Theory of Cryptography Conference[ expand ]
01:36 [Pub][ePrint]From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS, by Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila[ expand ]
01:17 [Pub][ePrint]Obliv-C: A Language for Extensible Data-Oblivious Computation, by Samee Zahur and David Evans[ expand ]

22:17 [Pub][ePrint]Fully Leakage-Resilient Codes, by Antonio Faonio and Jesper Buus Nielsen[ expand ]
19:17 [Pub][ePrint]Privacy-preserving Friendship-based Recommender Systems, by Qiang Tang and Jun Wang[ expand ]
15:38 [Job][New]PhD Position in Cryptology, University of Bergen, Norway[ expand ]
07:17 [Pub][ePrint]A Note on Perfect Correctness by Derandomization, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
04:17 [Pub][ePrint]On the Usability of Two-Factor Authentication, by Ding Wang and Ping Wang[ expand ]
01:17 [Pub][ePrint]Tighter Security for Efficient Lattice Cryptography via the R\\\'{e}nyi Divergence of Optimized Orders, by Katsuyuki Takashima and Atsushi Takayasu[ expand ]

22:17 [Pub][ePrint]Comment on ``Realization of a scalable Shor algorithm\", by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]$\\Lambda \\circ \\lambda$: A Functional Library for Lattice Cryptography, by Eric Crockett and Chris Peikert[ expand ]
16:17 [Pub][ePrint]Midori: A Block Cipher for Low Energy (Extended Version), by Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni[ expand ]
13:17 [Pub][ePrint]A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE, by Zhigang Chen and Xinxia Song[ expand ]
10:17 [Pub][ePrint]Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions, by Olivier Blazy and Céline Chevalier and Damien Vergnaud[ expand ]
07:17 [Pub][ePrint]Lattice Attacks on the DGHV Homomorphic Encryption Scheme, by Abderrahmane Nitaj and Tajjeeddine Rachidi[ expand ]
04:17 [Pub][ePrint]libgroupsig: An extensible C library for group signatures, by Jesus Diaz and David Arroyo and Francisco B. Rodriguez[ expand ]
01:17 [Pub][ePrint]Collusion Resistant Aggregation from Convertible Tags, by Iraklis Leontiadis and Ming Li[ expand ]

22:17 [Pub][ePrint]An Inverse-free Single-Keyed Tweakable Enciphering Scheme, by Ritam Bhaumik and Mridul Nandi[ expand ]
19:17 [Pub][ePrint]An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
16:17 [Pub][ePrint]On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks, by Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata[ expand ]
13:17 [Pub][ePrint]Multi-Input Functional Encryption for Unbounded Arity Functions, by Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai[ expand ]
10:17 [Pub][ePrint]A New Factoring Attack on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng and Honggang Hu[ expand ]
10:16 [Job][New]Positions in Applied Cryptography (Based in Hong Kong), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
10:10 [Job][New]PhD student, University of Bristol, Cryptography Group, Side Channel Lab[ expand ]
07:17 [Pub][ePrint]Lightweight CRC-based Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
04:17 [Pub][ePrint]Secret Sharing Schemes with General Access Structures (Full version), by Jian Liu, Sihem Mesnager, and Lusheng Chen[ expand ]
01:17 [Pub][ePrint]Modular Inversion Hidden Number Problem- A Lattice Approach, by Pranjal Dutta[ expand ]

22:17 [Pub][ePrint]Amplifying Side Channels Through Performance Degradation, by Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom[ expand ]
09:25 [Event][New]School on Symmetric Cryptography[ expand ]
09:24 [Event][New]IWSEC'16: The 11th International Workshop on Security[ expand ]

22:17 [Forum][2014 Reports] 2015/1087 may not be secure by zzhang[ expand ]

22:17 [Pub][ePrint]Lucky Microseconds: A Timing Attack on Amazon\'s s2n Implementation of TLS, by Martin R. Albrecht and Kenneth G. Paterson[ expand ]
22:17 [Pub][ePrint]New directions in nearest neighbor searching with applications to lattice sieving, by Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven[ expand ]
10:17 [Pub][ePrint]Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups, by Mikhail Anokhin[ expand ]
05:16 [Event][New]School on Design for a Secure IoT[ expand ]
05:15 [Event][New]ArcticCrypt 2016[ expand ]

22:17 [Pub][ePrint]A Practical Oblivious Map Data Structure with Secure Deletion and History Independence, by Daniel S. Roche and Adam J. Aviv and Seung Geol Choi[ expand ]
22:17 [Pub][ePrint]Practical Order-Revealing Encryption with Limited Leakage, by Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu[ expand ]
16:17 [Pub][ePrint]A Linear Code and its Application into Secret Sharing, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]

01:17 [Pub][ePrint]On Basing Private Information Retrieval on NP-Hardness, by Tianren Liu and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]Gaussian Sampling Precision and Information Leakage in Lattice Cryptography, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, by Anamaria Costache and Nigel P. Smart[ expand ]
01:17 [Pub][ePrint]Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, by Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng[ expand ]
01:17 [Pub][ePrint]Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings, by Hao Chen[ expand ]
01:17 [Pub][ePrint]Unconditionally Secure Computation with Reduced Interaction, by Ivan Damg{\\aa}rd and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen[ expand ]
01:17 [Pub][ePrint]Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Shweta Agrawal and Benoit Libert and Damien Stehle[ expand ]
01:17 [Pub][ePrint]Spacemint: A Cryptocurrency Based on Proofs of Space, by Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gazi[ expand ]
01:17 [Pub][ePrint]Scalable and private media consumption with Popcorn, by Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish[ expand ]
01:17 [Pub][ePrint]Random Linear Code Based Public Key Encryption Scheme RLCE, by Yongge Wang[ expand ]
01:17 [Pub][ePrint]Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM, by Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs[ expand ]
01:17 [Pub][ePrint]Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
01:17 [Pub][ePrint]The BRUTUS Automatic Cryptanalytic Framework: Testing CAESAR Authenticated Encryption Candidates for Weaknesses, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications, by Ming Li and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]The Adjacency Graphs of Some Feedback Shift Registers, by Ming Li and Yupeng Jiang and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs, by Helger Lipmaa[ expand ]
01:17 [Pub][ePrint]Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, by Koji Nuida[ expand ]
01:17 [Pub][ePrint]Efficient Cryptosystems From $2^k$-th Power Residue Symbols, by Fabrice Benhamouda and Javier Herranz and Marc Joye and and Benoît Libert[ expand ]
01:17 [Pub][ePrint]SL2 homomorphic hash functions: Worst case to average case reduction and short collision search, by Ciaran Mullan and Boaz Tsaban[ expand ]
01:17 [Pub][ePrint]Secret Sharing, Rank Inequalities, and Information Inequalities, by Sebastia Martin and Carles Padro and An Yang[ expand ]
01:17 [Pub][ePrint]Algebraic Complexity Reduction and Cryptanalysis of GOST, by Nicolas T. Courtois[ expand ]

15:40 [Job][New]Assistant/Associate/Full Professor (Tenure Track), UConn, Storrs[ expand ]
15:39 [Job][New]Post-Doc, Zhejiang University City College[ expand ]

22:17 [Pub][ePrint]Practical, Predictable Lattice Basis Reduction, by Daniele Micciancio and Michael Walter[ expand ]
22:17 [Pub][ePrint]Schnorr Signatures in the Multi-User Setting, by Eike Kiltz and Daniel Masny and Jiaxin Pan[ expand ]
22:17 [Pub][ePrint]On the First Fall Degree of Algebraic Equations, by Stavros Kousidis and Andreas Wiemers[ expand ]
22:17 [Pub][ePrint]Even More Practical Key Exchanges for the Internet using Lattice Cryptography, by Vikram Singh and Arjun Chopra[ expand ]
13:17 [Pub][ePrint]On the Possibility of Non-Interactive E-Voting in the Public-key Setting, by Rosario Giustolisi and Vincenzo Iovino and Peter B. Rønne[ expand ]
13:17 [Pub][ePrint]Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers, by Zhenzhen Bao and Peng Luo and Dongdai Lin[ expand ]
11:44 [Event][New]COSADE: Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
10:48 [Job][New]Lecturer in Cryptography (fixed-term, full-time for 4 years), Queensland University of Technology, Brisbane, Queensland, Australia[ expand ]

10:17 [Pub][ePrint]Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers, by Zhenzhen Bao and Wentao Zhang and Peng Luo and Dongdai Lin[ expand ]
10:17 [Pub][ePrint]Efficient implementation of AND, OR and NOT operators for ABCs, by Antonio de la Piedra[ expand ]
10:17 [Pub][ePrint]Constant Communication ORAM without Encryption, by Tarik Moataz and Erik-Oliver Blass and Travis Mayberry[ expand ]
10:17 [Pub][ePrint]Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters, by Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu[ expand ]
10:17 [Pub][ePrint]Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension, by Michał Wroński[ expand ]
10:17 [Pub][ePrint]Multi-Input Functional Encryption with Unbounded-Message Security, by Vipul Goyal and Aayush Jain and Adam O\' Neill[ expand ]
10:17 [Pub][ePrint]Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles, by Prastudy Fauzi and Helger Lipmaa[ expand ]
10:17 [Pub][ePrint]Comparison of TERO-cell implementations and characterisation on SRAM FPGAs, by Cedric Marchand and Lilian Bossuet and AbdelKarim Cherkaoui[ expand ]
10:17 [Pub][ePrint]Privacy-Aware Authentication in the Internet of Things, by Hannes Gross and Marko Hölbl and Daniel Slamanig and Raphael Spreitzer[ expand ]
10:17 [Pub][ePrint]Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems, by Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi[ expand ]
10:17 [Pub][ePrint]Recommender Systems and their Security Concerns, by Jun Wang and Qiang Tang[ expand ]
10:17 [Pub][ePrint]Concurrent Secure Computation via Non-Black Box Simulation, by Vipul Goyal and Divya Gupta and Amit Sahai[ expand ]
10:17 [Pub][ePrint]POPE: Partial Order-Preserving Encoding, by Daniel Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich[ expand ]
02:24 [Event][New]FSP-16: The 2016 International Workshop on Future Security and Privacy[ expand ]

22:06 [Job][New]Ph.D Postion in Computer/Network Security, University of Westminster, London, UK[ expand ]

16:17 [Pub][ePrint]Selene: Voting with Transparent Verifiability and Coercion-Mitigation, by Peter Y A Ryan andPeter B Roenne and Vincenzo Iovino[ expand ]
16:17 [Pub][ePrint]Computing Jacobi\'s \\theta in quasi-linear time, by Hugo Labrande[ expand ]
16:17 [Pub][ePrint]Linear codes with few weights from weakly regular bent functions based on a generic construction, by Sihem Mesnager[ expand ]
16:17 [Pub][ePrint]A Practical Cryptanalysis of the Algebraic Eraser, by Adi Ben-Zvi and Simon R. Blackburn and Boaz Tsaban[ expand ]
16:17 [Pub][ePrint]Virtual Smart Cards: How to Sign with a Password and a Server, by Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin[ expand ]
16:17 [Pub][ePrint]Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves., by Anissa Sghaier and Loubna Ghammam and Medyen Zeghid and Sylvain Duquesne and Mohsen Machhout.[ expand ]

12:10 [Event][New]INFOS 2016: The 10th International Conference on Informatics and Systems[ expand ]
12:08 [Event][New]CTCrypt 2016: 5th Workshop on Current Trends in Cryptology[ expand ]
12:06 [Job][New]lecturer/senior-lecturer, The Australian National University[ expand ]

13:37 [Job][New]Three research fellowship positions at PhD/postdoctoral level, NTNU, Trondheim and University of Bergen, Norway[ expand ]
13:17 [Pub][ePrint]Device-Enhanced Password Protocols with Optimal Online-Offline Protection, by Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena[ expand ]
08:55 [Job][New]Research Scientist, Nanyang Technological University, Singapore[ expand ]

14:27 [Job][Update]Senior Engineer, Cyber Security, Hong Kong Applied Science and Technology Research Institute Co., Ltd[ expand ]
14:25 [Job][New]Fully Funded PhD Student position, Chalmers University of Technology, Sweden[ expand ]
14:25 [Job][New]Postdoc in Wireless Security, NTNU, Trondheim[ expand ]
10:17 [Pub][ePrint]Ring SIgnature Confidential Transactions for Monero, by Shen Noether[ expand ]
10:17 [Pub][ePrint]On the Communication required for Unconditionally Secure Multiplication, by Ivan Damgård, Jesper Buus Nielsen, and Antigoni Polychroniadou[ expand ]

19:17 [Pub][ePrint]Watermarking Cryptographic Capabilities, by Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs, by Vipul Goyal and Aayush Jain and Dakshita Khurana[ expand ]
19:17 [Pub][ePrint]Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification, by Divesh Aggarwal and Kaave Hosseini and Shachar Lovett[ expand ]
19:17 [Pub][ePrint]How to Use SNARKs in Universally Composable Protocols, by Ahmed Kosba and Zhichao Zhao and Andrew Miller and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Post-quantum key exchange - a new hope, by Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe[ expand ]
19:17 [Pub][ePrint]Construction for de Bruijn Sequences with Large Orders, by Junwu Dong and Dingyi Pei[ expand ]
19:17 [Pub][ePrint]Do Distributed Differentially-Private Protocols Require Oblivious Transfer?, by Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai[ expand ]
09:47 [Job][Update]Faculty Position (Professur, W3) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]
09:40 [Job][Update]Faculty Position (Professur, W2) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]
09:35 [Job][New]Post-Doc, University College London[ expand ]
09:35 [Job][New]Senior Engineer, Cyber Security, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]

10:30 [Job][New]Ph.D. students, Horst Görtz Institut, Ruhr University Bochum[ expand ]
10:17 [Pub][ePrint]Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions, by Ronald Cramer and Ivan Bjerre Damgård and Nico Döttling and Serge Fehr and Gabriele Spini[ expand ]
10:17 [Pub][ePrint]Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015, by Eiichiro Fujisaki and Keita Xagawa[ expand ]
10:17 [Pub][ePrint]Efficient Signature Schemes from R-LWE, by Ting Wang and Jianping Yu and Guoqiang Han and Peng Zhang[ expand ]
10:17 [Pub][ePrint]Chicken or the Egg - Computational Data Attacks or Physical Attacks, by Julien Allibert and Benoit Feix and Georges Gagnerot and Ismael Kane and Hugues Thiebeauld and Tiana Razafindralambo[ expand ]
10:17 [Pub][ePrint]Malicious Keccak, by Pawel Morawiecki[ expand ]
10:17 [Pub][ePrint]Patchable Obfuscation, by Prabhanjan Ananth and Abhishek Jain and Amit Sahai[ expand ]
10:17 [Pub][ePrint]Implementation Attacks on Post-Quantum Cryptographic Schemes, by Mostafa Taha and Thomas Eisenbarth[ expand ]
10:17 [Pub][ePrint]Delegating RAM Computations with Adaptive Soundness and Privacy, by Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin[ expand ]
10:17 [Pub][ePrint]NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture, by Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, and Howon Kim[ expand ]

10:17 [Pub][ePrint]De Bruijn Sequences from Symmetric Shift Registers, by Ming Li and Mingxing Wang and Dongdai Lin[ expand ]
10:17 [Pub][ePrint]On the Exact Cryptographic Hardness of Finding a Nash Equilibrium, by Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan[ expand ]

13:17 [Pub][ePrint]Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn, by Dibyendu Roy and Sourav Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]An appendix for a recent paper of Kim, by Razvan Barbulescu[ expand ]
13:17 [Pub][ePrint]Cybersecurity in an era with quantum computers: will we be ready?, by Michele Mosca[ expand ]
13:17 [Pub][ePrint]Succinct Adaptive Garbled RAM, by Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova[ expand ]
13:17 [Pub][ePrint]Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower, by David Derler and Daniel Slamanig[ expand ]
13:17 [Pub][ePrint]Quantum One-Time Memories from Stateless Hardware, by Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou[ expand ]
13:17 [Pub][ePrint]Fairness in Secure Two-Party Computation with Rational Players, by Arpita Maitra, Goutam Paul and Asim K. Pal[ expand ]

13:17 [Pub][ePrint]Barriers to Black-Box Constructions of Traitor Tracing Systems, by Bo Tang and Jiapeng Zhang[ expand ]
02:51 [Job][New]a tenured or tenure track faculty position, Indiana University Bloomington[ expand ]

10:17 [Pub][ePrint]Feistel Networks: Indifferentiability at 8 Rounds, by Yuanxi Dai and John Steinberger[ expand ]
10:17 [Pub][ePrint]Black-Box Parallel Garbled RAM, by Steve Lu and Rafail Ostrovsky[ expand ]
10:17 [Pub][ePrint]Public Verifiability in the Covert Model (Almost) for Free, by Vladimir Kolesnikov and Alex J. Malozemoff[ expand ]

22:56 [Job][New]Research fellow, Institute of Computer Science, University of Tartu, Estonia[ expand ]
19:17 [Forum][2014 Reports] 2014/879 by v_rudskoy[ expand ]
13:17 [Pub][ePrint]Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential, by Haipeng Qu, Peng Shang, Xi-Jun Lin, and Lin Sun[ expand ]
13:17 [Pub][ePrint]Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM, by Christopher Fletcher and Muhammad Naveed and Ling Ren and Elaine Shi and Emil Stefanov[ expand ]
13:17 [Pub][ePrint]Déjà Q: Encore! Un Petit IBE, by Hoeteck Wee[ expand ]

13:02 [Job][New]Faculty positions in cybersecurity, The Hong Kong University of Science and Technology, Hong Kong[ expand ]
13:01 [Job][New]Faculty Positions in Computer Science and Engineering with Specialization in Cybersecurity, Department of Computer Science and Engineering, The Hong Kong University of Science and Technology[ expand ]

21:17 [Pub][ePrint]Optimal Computational Split-state Non-malleable Codes, by Divesh Aggarwal; Shashank Agrawal; Divya Gupta; Hemanta K. Maji; Omkant Pandey; Manoj Prabhakaran[ expand ]
21:17 [Pub][ePrint]Lower Bounds on Assumptions behind Indistinguishability Obfuscation, by Mohammad Mahmoody; Ameer Mohammed; Soheil Nematihaji; Rafael Pass; Abhi Shelat[ expand ]
21:17 [Pub][ePrint]On Basing Cryptography on NP-hardness: The Case of Single-Server Private Information Retrieval, by Tianren Liu; Vinod Vaikuntanathan[ expand ]
21:17 [Pub][ePrint]Complete addition formulas for prime order elliptic curves, by Joost Renes and Craig Costello and Lejla Batina[ expand ]
21:17 [Pub][ePrint]A General Framework for Redactable Signatures and New Constructions, by David Derler and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig[ expand ]
21:17 [Pub][ePrint]Rational Sumchecks, by Siyao Guo; Pavel Hubacek; Alon Rosen; Margarita Vald[ expand ]
21:17 [Pub][ePrint]The Complexity of Computing the Optimal Composition of Differential Privacy, by Jack Murtagh, Salil Vadhan[ expand ]
21:17 [Pub][ePrint]Information-theoretic Local Non-malleable Codes and their Applications, by Nishanth Chandran; Bhavana Kanukurthi; Srinivasan Raghuraman[ expand ]
21:17 [Pub][ePrint]Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits, by Yuval Ishai; Mor Weiss; Guang Yang[ expand ]
21:17 [Pub][ePrint]Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS, by HUI ZHAO and Kouichi Sakurai[ expand ]
21:17 [Pub][ePrint]Oblivious Parallel RAM: Improved Efficiency and Generic Constructions, by Binyi Chen; Huijia Lin; Stefano Tessaro[ expand ]
21:17 [Pub][ePrint]PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management, by Chenglu Jin and Xiaolin Xu and Wayne Burleson and Ulrich Rührmair and Marten van Dijk[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme, by Jayaprakash Kar[ expand ]
21:17 [Pub][ePrint]Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem, by Thuraya M. Qaradaghi and Newroz N. Abdulrazaq[ expand ]
05:44 [Event][New]IoTPTS 2016: 2nd ACM International Workshop on IoT Privacy, Trust, and Security[ expand ]
00:17 [Pub][ePrint]Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, by Thomas Peyrin and Yannick Seurin[ expand ]
00:17 [Pub][ePrint]Verifiable Random Functions from Standard Assumptions, by Dennis Hofheinz; Tibor Jager[ expand ]
00:17 [Pub][ePrint]Reconfigurable Cryptography: A flexible approach to long-term security, by Julia Hesse and Dennis Hofheinz and Andy Rupp[ expand ]
00:17 [Pub][ePrint]From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back, by Benny Applebaum; Pavel Raykov[ expand ]
00:17 [Pub][ePrint]Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs, by Gefei Li and Yuval Yarom and Damith C. Ranasinghe[ expand ]

15:39 [Job][New]Faculty Position (Professur, W3) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]
15:39 [Job][New]Post-Doc in Cryptography/E-Voting, University of Trier, Germany[ expand ]
15:37 [Job][New]Faculty Position (Professur, W2) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]

21:17 [Pub][ePrint]Homomorphic evaluation requires depth, by Andrej Bogdanov; Chin Ho Lee[ expand ]
21:17 [Pub][ePrint]The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle, by Subhamoy Maitra[ expand ]
21:17 [Pub][ePrint]ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM, by Andreas Hülsing and Joost Rijneveld and Peter Schwabe[ expand ]
21:17 [Pub][ePrint]The Number of Boolean Functions with Multiplicative Complexity 2, by Magnus Gausdal Find and Daniel Smith-Tone and Meltem Sonmez Turan[ expand ]
21:17 [Pub][ePrint]Fully Homomorphic Encryption with Composite Number Modulus, by Masahiro Yagisawa[ expand ]
21:17 [Pub][ePrint]Maturity and Performance of Programmable Secure Computation, by David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen[ expand ]
03:17 [Pub][ePrint]Revisiting LEGOs: Optimizations, Analysis, and their Limit, by Yan Huang and Ruiyu Zhu[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of GGH15 Multilinear Maps, by Jean-Sebastien Coron[ expand ]
03:17 [Pub][ePrint]Patterson-Wiedemann Type Functions on 21 Variables, by Selcuk Kavut and Subhamoy Maitra[ expand ]
03:17 [Pub][ePrint]CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite, by Britta Hale and Christopher Carr and Danilo Gligoroski[ expand ]

15:17 [Pub][ePrint]Real time detection of cache-based side-channel attacks using Hardware Performance Counters, by Marco Chiappetta and Erkay Savas and Cemal Yilmaz[ expand ]
15:17 [Pub][ePrint]The Ultimate Transposition Cipher (UTC), by Gideon Samid[ expand ]

21:17 [Pub][ePrint]Essentially Optimal Robust Secret Sharing with Maximal Corruptions, by Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]Secure Dating with Four or Fewer Cards, by Antonio Marcedone and Zikai Wen and Elaine Shi[ expand ]
18:17 [Pub][ePrint]The Energy Budget for Wireless Security: Extended Version, by Dave Singel\\\'ee and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede[ expand ]
18:17 [Pub][ePrint]Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3, by Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska[ expand ]
18:17 [Pub][ePrint]Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case, by Taechan Kim[ expand ]
18:17 [Pub][ePrint]Hardness Estimation of LWE via Band Pruning, by Yoshinori Aono and Le Trieu Phong and Lihua Wang[ expand ]
18:17 [Pub][ePrint]PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers, by Dieter Schmidt[ expand ]

14:20 [Job][New]PhD position, Graz University of Technology[ expand ]
06:17 [Pub][ePrint]Parallel Implementation of Number Theoretic Transform, by Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Taehwan Park and Howon Kim[ expand ]
06:17 [Pub][ePrint]Indistinguishability Obfuscation with Constant Size Overhead, by Prabhanjan Ananth and Abhishek Jain and Amit Sahai[ expand ]
06:17 [Pub][ePrint]Recent progress on the elliptic curve discrete logarithm problem, by Steven D. Galbraith and Pierrick Gaudry[ expand ]
06:17 [Pub][ePrint]New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application, by Katsuyuki Takashima[ expand ]
06:17 [Pub][ePrint]Attacking the Network Time Protocol, by Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg[ expand ]
06:17 [Pub][ePrint]Speed-Security Tradeoffs in Blockchain Protocols, by Aggelos Kiayias and Giorgos Panagiotakos[ expand ]

09:10 [Job][New]Assistant Research Scientist: Engineering Cybersecurity, University of Michigan Transportation Institute, Ann Arbor, USA[ expand ]
09:09 [Event][New]CS2-2016: Third Workshop on Cryptography and Security in Computing Systems[ expand ]
03:17 [Pub][ePrint]A Riddle Wrapped in an Enigma, by N. Koblitz and A. Menezes[ expand ]
03:17 [Pub][ePrint]Functional Encryption: Decentralised and Delegatable, by Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai[ expand ]
03:17 [Pub][ePrint]Lifting the Security of NI-MAC Beyond Birthday Bound, by Avijit Dutta and Goutam Paul[ expand ]

13:51 [Job][New]Doctoral student, Aalto University, Finland[ expand ]
08:53 [Event][New]SAC 2018: Conference on Selected Areas in Cryptography[ expand ]
08:52 [Event][New]SAC 2017: Conference on Selected Areas in Cryptography[ expand ]

21:17 [Pub][ePrint]On Bitcoin as a public randomness source, by Joseph Bonneau and Jeremy Clark and Steven Goldfeder[ expand ]
21:17 [Pub][ePrint]Fast Fourier Orthogonalization, by Léo Ducas and Thomas Prest[ expand ]
21:17 [Pub][ePrint]Inception Makes Non-malleable Codes Stronger, by Divesh Aggarwal and Tomasz Kazana and Maciej Obremski[ expand ]
21:17 [Pub][ePrint]An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks, by Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan[ expand ]
21:17 [Pub][ePrint]Hierarchical Functional Encryption, by Zvika Brakerski and Gil Segev[ expand ]
21:17 [Pub][ePrint]TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption, by Sanjam Garg and Payman Mohassel and Charalampos Papamanthou[ expand ]
21:17 [Pub][ePrint]Applications of Key Recovery Cube-attack-like, by Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny[ expand ]
18:17 [Pub][ePrint]Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges, by Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh[ expand ]
15:42 [Job][New]PhD Internship, Microsoft Research, Redmond, Washington[ expand ]

14:39 [Job][New]13 PhD Studentships, MSCA Privacy&Us ITN[ expand ]

14:28 [Job][New]Embedded Cryptography Engineer, Kiwi Ki GmbH, Berlin, Germany[ expand ]

18:17 [Pub][ePrint]How to Vote Privately Using Bitcoin, by Zhichao Zhao and T-H. Hubert Chan[ expand ]
18:17 [Pub][ePrint]Confidential Benchmarking based on Multiparty Computation, by Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft[ expand ]
18:17 [Pub][ePrint]Cryptanalysis of Yasuda, Takagi and Sakurai\'s Signature Scheme Using Invariant Subspaces, by Wenbin Zhang and Chik How Tan[ expand ]
18:17 [Pub][ePrint]Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices, by Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi[ expand ]
18:17 [Pub][ePrint]Results on polynomial interpolation with mixed modular operations and unknown moduli, by Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen[ expand ]

21:17 [Pub][ePrint]got HW crypto? On the (in)security of a Self-Encrypting Drive series, by Gunnar Alendal and Christian Kison and modg[ expand ]
21:17 [Pub][ePrint]Dismantling real-world ECC \\\\ with Horizontal and Vertical Template Attacks, by Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guille[ expand ]
21:17 [Pub][ePrint]Factoring as a Service, by Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger[ expand ]

18:17 [Pub][ePrint]Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption, by Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves[ expand ]
18:17 [Pub][ePrint]All or Nothing at All, by Paolo D\'Arco and Navid Nasr Esfahan and Douglas R. Stinson[ expand ]
18:17 [Pub][ePrint]Incremental Program Obfuscation, by Sanjam Garg and Omkant Pandey[ expand ]
18:17 [Pub][ePrint]Multi-user Schnorr security, revisited, by Daniel J. Bernstein[ expand ]
18:17 [Pub][ePrint]Updates on Sorting of Fully Homomorphic Encrypted Data, by Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed[ expand ]

21:17 [Pub][ePrint]An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card, by Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding[ expand ]
21:17 [Pub][ePrint]Bi-Deniable Inner Product Encryption from LWE, by Daniel Apon and Xiong Fan and Feng-Hao Liu[ expand ]
21:17 [Pub][ePrint]Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency, by Jinsu Kim and Sungwook Kim and Jae Hong Seo[ expand ]
21:17 [Pub][ePrint]Ed3363 (HighFive) -- An alternative Elliptic Curve, by Mike Scott[ expand ]
21:17 [Pub][ePrint]Encryption Switching Protocols, by Geoffroy Couteau, Thomas Peters, David Pointcheval[ expand ]
21:17 [Pub][ePrint]Fast Oblivious AES\\\\A decicated application of the MiniMac protocol, by Ivan Damgård and Rasmus Winther Zakarias[ expand ]
21:17 [Pub][ePrint]Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48, by Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gaurav[ expand ]
21:17 [Forum][IACR Publication Reform] 2014/879 by v_rudskoy[ expand ]
14:56 [Event][New]CXQS16: 1st CROSSING Winter School on Quantum Security[ expand ]
11:49 [Job][New]Ph.D. student in Crypto-Finance, Cybersecurity and Privacy, University of Luxembourg, Cryptolux team[ expand ]
06:17 [Pub][ePrint]Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries, by Yehuda Lindell and Ben Riva[ expand ]
00:17 [Pub][ePrint]Bit Coincidence Mining Algorithm, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Complexity of ECDLP under the First Fall Degree Assumption, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes, by Ping Ngai Chung and Craig Costello and Benjamin Smith[ expand ]
00:17 [Pub][ePrint]A note on constructions of bent functions from involutions, by Sihem Mesnager[ expand ]

21:17 [Pub][ePrint]Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud, by Ayantika Chatterjee and Indranil Sengupta[ expand ]
21:17 [Pub][ePrint]Analysis of an RFID Authentication Protocol in Accordance with EPC Standards, by Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Guidelines for Using the CryptDB Systems Securely, by Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan[ expand ]
21:17 [Pub][ePrint]The OPTLS Protocol and TLS 1.3, by Hugo Krawczyk and Hoeteck Wee[ expand ]
21:17 [Pub][ePrint]Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³), by Michał Wroński[ expand ]
21:17 [Pub][ePrint]On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure, by Alex Biryukov and Léo Perrin[ expand ]
21:17 [Pub][ePrint]Extended Functionality in Verifiable Searchable Encryption, by James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick[ expand ]

03:17 [Pub][ePrint]The Conjoined Microprocessor, by Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R\\\'emi G\\\'eraud David Naccache and Jean Vuillemin[ expand ]

21:17 [Pub][ePrint]Multilinear Maps over the Integers Using Modulus Switching, by Gu Chunsheng[ expand ]
21:17 [Pub][ePrint]Zero-Knowledge Interactive Proof Systems for New Lattice Problems, by Claude Crepéau and Raza Ali Kazmi[ expand ]
21:17 [Pub][ePrint]Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey, by Gaëtan Leurent[ expand ]
21:17 [Pub][ePrint]Freestart collision on full SHA-1, by Marc Stevens and Pierre Karpman and Thomas Peyrin[ expand ]
21:17 [Pub][ePrint]Vulnerabilities of ``McEliece in the World of Escher\", by Dustin Moody and Ray Perlner[ expand ]
21:17 [Pub][ePrint]Some Cryptanalytic Results on Zipper Hash and Concatenated Hash, by Ashwin Jha and Mridul Nandi[ expand ]
21:17 [Pub][ePrint]Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash, by David Pointcheval and Olivier Sanders and Jacques Traoré[ expand ]
21:17 [Pub][ePrint]Attacks on Search RLWE, by Hao Chen, Kristin Lauter, and Katherine E. Stange[ expand ]

21:17 [Pub][ePrint]Private Genome Analysis through Homomorphic Encryption, by Miran Kim and Kristin Lauter[ expand ]
21:17 [Pub][ePrint]Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN, by Danping Shi and Lei Hu and Siwei Sun and Ling Song[ expand ]
09:46 [Job][New]Ph.D. student, CryptoExperts, Paris, France[ expand ]

18:04 [Job][New]Postdoc on Multilinear Maps , Royal Holloway, University of London, UK[ expand ]