International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 [ 12 ]
21:17 [Pub][ePrint]The Emperor\'s New Password Creation Policies, by Ding Wang and Ping Wang[ expand ]
15:17 [Pub][ePrint]Efficient Fully Structure-Preserving Signatures for Large Messages, by Jens Groth[ expand ]
15:17 [Pub][ePrint]Efficient (ideal) lattice sieving using cross-polytope LSH, by Anja Becker and Thijs Laarhoven[ expand ]
13:25 [Job][New]Applied cryptographer, ID Quantique [ expand ]
13:24 [Job][Update]Ph.D. student, Ruhr University Bochum[ expand ]
13:24 [Job][New]Ph.D. student, Ruhr University Bochum[ expand ]

13:10 [Event][New]RWC2016: Real World Cryptography 2016[ expand ]

15:17 [Pub][ePrint]A general framework for building noise-free homomorphic cryptosystems, by Gérald Gavin[ expand ]
15:17 [Pub][ePrint]Extended Nested Dual System Groups, Revisited, by Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang[ expand ]
15:17 [Pub][ePrint]Efficiently Obfuscating Re-Encryption Program under DDH Assumption, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
03:56 [Event][New]Workshop on Tools for Asymmetric Cryptanalysis[ expand ]
03:56 [Event][New]ASIACCS 2016: The 11th ACM Asia Conference on Computer and Communications Security[ expand ]
03:56 [Event][New]ACNS 2016: 14th International Conference on Applied Cryptography and Network Security[ expand ]
03:55 [Event][New]Future Directions in Computing on Encrypted Data[ expand ]

23:22 [Event][New]PKC: Public Key Cryptography 2017[ expand ]
23:21 [Event][New]CHES: Cryptographic Hardware and Embedded Systems 2016[ expand ]
23:19 [Event][New]Asiacrypt: Asiacrypt 2017[ expand ]
23:17 [Event][New]Eurocrypt: Eurocrypt 2017[ expand ]

18:17 [Pub][ePrint]Improving the Big Mac Attack on Elliptic Curve Cryptography, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
18:17 [Pub][ePrint]cuHE: A Homomorphic Encryption Accelerator Library, by Wei Dai and Berk Sunar[ expand ]
18:17 [Pub][ePrint]Secure Multi-party Graph Computation, by Varsha Bhat and Harsimran Singh and Sudarshan Iyengar[ expand ]
18:17 [Pub][ePrint]Analysis of Keyless Massive MIMO-based Cryptosystem Security, by Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev[ expand ]
06:50 [Job][Update]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]
06:48 [Job][New]Ph.D. student or Post-Doc, KU Leuven Cosic Leuven[ expand ]

18:17 [Pub][ePrint]On the Power of Hierarchical Identity-Based Encryption, by Mohammad Mahmoody and Ameer Mohammedy[ expand ]
18:17 [Pub][ePrint]CLKS: Certificateless Keyword Search on Encrypted Data, by Qingji Zheng and Xiangxue Li and Aytac Azgin[ expand ]
18:17 [Pub][ePrint]Revisiting Turning Online Cipher Off, by Ritam Bhaumik and Mridul Nandi[ expand ]
15:57 [Event][New]TCC 2016-A: Thirteenth Theory of Cryptography Conference[ expand ]