International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 [ 11 ] 12
2015-09-08
12:43 [Job][Update]Symphony.com Ethical Hacker / Security Penetration Tester, Symphony.com[ expand ]
12:42 [Job][Update]Head of Security Product Management, Symphony.com[ expand ]
09:17 [Forum][2014 Reports] 2014/946 by SBouftass[ expand ]
06:17 [Pub][ePrint]Gambling, Computational Information and Encryption Security, by Mohammad Hajiabadi and Bruce M. Kapron[ expand ]
06:17 [Pub][ePrint]New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators, by Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs[ expand ]
06:17 [Pub][ePrint]Optimally Secure Block Ciphers from Ideal Primitives, by Stefano Tessaro[ expand ]
06:17 [Pub][ePrint]Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue[ expand ]
06:17 [Pub][ePrint]Graded Encoding, Variations on a Scheme, by Shai Halevi[ expand ]
06:17 [Pub][ePrint]Card-based Cryptographic Protocols Using a Minimal Number of Cards, by Alexander Koch and Stefan Walzer and Kevin Härtel[ expand ]
06:17 [Pub][ePrint]Encryption Performance Improvements of the Paillier Cryptosystem, by Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets[ expand ]
06:17 [Pub][ePrint]Is There an Oblivious RAM Lower Bound?, by Elette Boyle and Moni Naor[ expand ]
06:17 [Pub][ePrint]Idealizing Identity-Based Encryption, by Dennis Hofheinz and Christian Matt and Ueli Maurer[ expand ]


2015-09-07
09:37 [Event][New]DIAC 2015: Directions in Authenticated Ciphers 2015[ expand ]
00:17 [Pub][ePrint]A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers, by Chun Guo and Dongdai Lin[ expand ]
00:17 [Pub][ePrint]Selective Opening Security for Receivers, by Carmit Hazay and Arpita Patra and Bogdan Warinschi[ expand ]
00:17 [Pub][ePrint]Factor Base Discrete Logarithms in Kummer Extensions, by Dianyan Xiao and Jincheng Zhuang and Qi Cheng[ expand ]
00:17 [Pub][ePrint]Group Signatures Without q-Assumptions, by Olivier Blazy and Saqib A. Kakvi[ expand ]
00:17 [Pub][ePrint]Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, by Benjamin Fuller and Ariel Hamlin[ expand ]
00:17 [Pub][ePrint]MGR HASH FUNCTION, by Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass[ expand ]
00:17 [Pub][ePrint]A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks, by GANESH YELLAPU[ expand ]
00:17 [Pub][ePrint]Secure Sketch Metamorphosis: Tight Unified Bounds, by Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu[ expand ]
00:17 [Pub][ePrint]Standard Security Does Imply Security Against Selective Opening for Markov Distributions, by Felix Heuer and Eike Kiltz and Krzysztof Pietrzak[ expand ]


2015-09-06
08:47 [Job][New]Postdoctoral Position in Cybersecurity, Fordham University, NY[ expand ]
08:47 [Job][New]PhD student , Chalmers University of Technology, Sweden [ expand ]
08:47 [Job][New]Ph.D. student, fully funded (CIFRE) positions, Huawei Technologies, Paris[ expand ]


2015-09-03
09:17 [Pub][ePrint]Analysis of a key exchange protocol based on tropical matrix algebra, by Matvei Kotov and Alexander Ushakov[ expand ]
00:50 [Job][New]Ph.D. student, Post-Doc, Software Engineer, IBM Research - Zurich[ expand ]


2015-09-02
15:17 [Pub][ePrint]Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing, by Benoît Cogliati and Yannick Seurin[ expand ]
15:17 [Pub][ePrint]Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable, by Zhen Liu and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]Regulating the Pace of von Neumann Correctors, by Houda Ferradi, R\\\'emi G\\\'eraud, Diana Maimu\\c{t}, David Naccache, and Amaury de Wargny[ expand ]
15:17 [Pub][ePrint]The Multiplicative Complexity of Boolean Functions on Four and Five Variables, by Meltem Sonmez Turan and Rene Peralta[ expand ]
15:17 [Pub][ePrint]Exploring Energy Efficiency of Lightweight Block Ciphers, by Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni[ expand ]
15:17 [Pub][ePrint]Characterization of Secure Multiparty Computation Without Broadcast, by Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem[ expand ]



2015-09-01
19:19 [Event][New]ASK 2015: Asian Workshop on Symmetric Key Cryptography 2015 (School)[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of the Quadratic Zero-Testing of GGH, by Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi[ expand ]


2015-08-31
18:17 [Pub][ePrint]Related-key Impossible Differential Analysis of Full Khudra, by Qianqian Yang and Lei Hu and Siwei Sun and Ling Song[ expand ]
18:17 [Pub][ePrint]Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?, by David Wong[ expand ]
18:17 [Pub][ePrint]Offline Witness Encryption, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
18:17 [Pub][ePrint]Multi-Variate High-Order Attacks of Shuffled Tables Recomputation, by Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA[ expand ]
18:17 [Pub][ePrint]DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte[ expand ]
18:17 [Pub][ePrint]Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes, by David Derler and Daniel Slamanig[ expand ]
18:17 [Pub][ePrint]On Linkability and Malleability in Self-blindable Credentials, by Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers[ expand ]
18:17 [Pub][ePrint]An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices, by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]


2015-08-29
08:51 [Job][New]Research Scientists on Cyber-Physical Security, Institute for Infocomm Research, Singapore[ expand ]


2015-08-28
21:17 [Pub][ePrint]On near prime-order elliptic curves with small embedding degrees, by Duc-Phong Le and Nadia El Mrabet and Chik How Tan[ expand ]
21:17 [Pub][ePrint]Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys, by Benjamin Wesolowski and Pascal Junod[ expand ]
18:17 [Pub][ePrint]Authentication Using Side-Channel Information, by Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata[ expand ]
18:17 [Pub][ePrint]Efficient Key Authentication Service for Secure End-to-end Communications, by Mohammad Etemad and Alptekin Küpçü[ expand ]
18:17 [Pub][ePrint]Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices, by David McCann, Kerstin Eder, Elisabeth Oswald[ expand ]
01:37 [Event][New]WISE 2015: Workshop on Implementation: Security and Evaluation[ expand ]



2015-08-26
18:17 [Pub][ePrint]M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors, by Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and [ expand ]
18:17 [Pub][ePrint]Unique Signature with Short Output from CDH Assumption, by Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng[ expand ]
18:17 [Pub][ePrint]Reducing Multilinear Map Levels in Constrained PRFs and ABE, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
15:17 [Pub][ePrint]State-recovery analysis of Spritz, by Ralph Ankele and Stefan Koelbl and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation, by Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys, by Dario Catalano and Dario Fiore and Luca Nizzardo[ expand ]


2015-08-24
21:17 [Pub][ePrint]The Emperor\'s New Password Creation Policies, by Ding Wang and Ping Wang[ expand ]
15:17 [Pub][ePrint]Efficient Fully Structure-Preserving Signatures for Large Messages, by Jens Groth[ expand ]
15:17 [Pub][ePrint]Efficient (ideal) lattice sieving using cross-polytope LSH, by Anja Becker and Thijs Laarhoven[ expand ]
13:25 [Job][New]Applied cryptographer, ID Quantique [ expand ]
13:24 [Job][Update]Ph.D. student, Ruhr University Bochum[ expand ]
13:24 [Job][New]Ph.D. student, Ruhr University Bochum[ expand ]


2015-08-22
13:10 [Event][New]RWC2016: Real World Cryptography 2016[ expand ]


2015-08-21
15:17 [Pub][ePrint]A general framework for building noise-free homomorphic cryptosystems, by Gérald Gavin[ expand ]
15:17 [Pub][ePrint]Extended Nested Dual System Groups, Revisited, by Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang[ expand ]
15:17 [Pub][ePrint]Efficiently Obfuscating Re-Encryption Program under DDH Assumption, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
03:56 [Event][New]Workshop on Tools for Asymmetric Cryptanalysis[ expand ]
03:56 [Event][New]ASIACCS 2016: The 11th ACM Asia Conference on Computer and Communications Security[ expand ]
03:56 [Event][New]ACNS 2016: 14th International Conference on Applied Cryptography and Network Security[ expand ]
03:55 [Event][New]Future Directions in Computing on Encrypted Data[ expand ]



2015-08-20
23:22 [Event][New]PKC: Public Key Cryptography 2017[ expand ]
23:21 [Event][New]CHES: Cryptographic Hardware and Embedded Systems 2016[ expand ]
23:19 [Event][New]Asiacrypt: Asiacrypt 2017[ expand ]
23:17 [Event][New]Eurocrypt: Eurocrypt 2017[ expand ]