International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 [ 3 ] 4 5 6 7
2016-01-25
17:30 [Job][New]Departmental Lecturer in Theoretical Computer Science, University of Oxford[ expand ]
17:30 [Job][New]Postdoc in Security Analytics [Capability of Speaking German Required], University of Mannheim, Germany[ expand ]


2016-01-22
17:57 [Job][New]Security expert and cryptographer for IoT (m/f) (ideally Post-Doc), itrust consulting sàrl[ expand ]
17:55 [Event][New]ECRYPT-NET Workshop on Cryptography Design for the Internet of Things[ expand ]
17:54 [Event][New]NSS 2016: 10th International Conference on Network and System Security[ expand ]
12:11 [PhD][New]Keisuke Tanaka[ expand ]
12:10 [PhD][Update]Luk Bettale: Algebraic Cryptanalysis: Tools and Applications[ expand ]
12:08 [PhD][Update]Seungjoo Kim: Improved privacy and authenticity in digital signatures / key management[ expand ]
12:08 [PhD][Update]Martin Vuagnoux: Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
12:07 [PhD][Update]Nizamud Din: Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves[ expand ]


2016-01-20
20:24 [Event][New]ISC: Information Security Conference[ expand ]
05:33 [Event][New]ProvSec 2016: The Tenth International Conference on Provable Security[ expand ]


2016-01-19
17:12 [Event][New]CITS'16: 2016 International Conf. on Computer Information & Telecommunication System[ expand ]
17:12 [Job][New]Senior Engineers/Software Engineers (Information Security), Multiple Openings, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:12 [Job][New]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]


2016-01-18
18:41 [Job][New]Principle Cryptographer, CipherQ, Toronto, Canada [ expand ]



2016-01-15
15:22 [Event][New]YACC'2016: Yet Another Conference on Cryptography 2016[ expand ]


2016-01-14
17:31 [Job][New]IT Security Researcher, NEC Laboratories Europe, Heidelberg, Germany[ expand ]
17:30 [Event][New]DSD 2016: 19th Euromicro Conference on Digital System Design,[ expand ]


2016-01-11
17:17 [Event][New]CECC '16: The 16th Central European Conference on Cryptology[ expand ]


2016-01-10
22:45 [Job][New]Assistant Professor, Graduate School of Engineering, Osaka University, Japan[ expand ]



2016-01-07
17:43 [Event][New]MSPN'2016: International Conference on Mobile, Secure and Programmable Networking[ expand ]


2016-01-06
19:05 [Job][New]Ph.D. student in Side-Channel Analysis, Ruhr University Bochum[ expand ]


2016-01-05
17:26 [Job][Update]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:25 [Job][New]Senior Engineer/Engineer (Cyber-Security Assessment, Multiple Openings, Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
17:22 [Job][Update]PhD Postion in Cloud Security and Privacy, University of Westminster, Computer Science Department, London, UK[ expand ]


2016-01-04
19:08 [Event][New]DBSec 2016: 30th Annual IFIP WG 11.3 Working Conf. on Data and Applications Security[ expand ]
16:13 [Job][New]PhD Postion in Cloud Security and Privacy, University of Westminster, Computer Science Department, London, UK[ expand ]
00:45 [Job][New]Lecturer/Senior Lecturer Computer Science, Department of Computer Science: University of Bristol[ expand ]



2015-12-31
18:23 [Job][New]Positions in Applied Cryptography, Hong Kong Applied Science And Technology Research Institute Company Limited[ expand ]


2015-12-27
16:30 [Job][New]professor, tenure track or tenured position , Aalto University, Department of Computer Science, Helsinki, Finland[ expand ]
16:30 [Job][New]Tenure-track Assistant Professor in Cryptology, Florida Atlantic University[ expand ]


2015-12-23
16:47 [Job][Update]Fully Funded PhD Student position, Chalmers University of Technology, Sweden[ expand ]
16:45 [Event][New]Spring School on Symmetric Cryptography[ expand ]


2015-12-22
20:22 [Job][New]PhD studentship (Decision Analytics for Security), University College Cork[ expand ]
00:40 [Event][New]AsiaJCIS 2016: The 11th Asia Joint Conference on Information Security[ expand ]



2015-12-21
20:35 [Job][New]Doctoral / Post-doctoral Fellow in Hardware Security (with teaching load), University of Passau, Germany[ expand ]
20:35 [Job][New]PhD and Postdoc Positions in Cryptography, Cryptographic Algorithms, Saarland University[ expand ]


2015-12-20
21:33 [Job][New]Post-Doc in Cryptography, Ecole Normale Supérieure, Paris, France[ expand ]
07:10 [PhD][New]Serge Vaudenay[ expand ]
07:07 [PhD][New]Michael R. Clark: The Theory and Application of Privacy-Preserving Computation[ expand ]


2015-12-17
21:43 [Job][New]Tenure-track Faculty Position, University of Utah, Salt Lake City[ expand ]
12:41 [PhD][New]Janaka Alawatugoda: On the leakage resilience of secure channel establishment[ expand ]
12:20 [PhD][New]Alireza Jolfaei: Robust Encryption Schemes for 3D Content Protection[ expand ]
12:19 [PhD][New]Mario Larangeira: Programmable and Non-programmable Models in Security Proofs[ expand ]


2015-12-16
03:08 [Event][New]BalkanCryptSec 2016: International Conference on Cryptography and Information Securit[ expand ]
03:07 [Job][New]Ph.D. student, RA, TA, University of Nebraska Lincoln[ expand ]



2015-12-15
15:17 [Job][New]Tenure-track Position in Data Science and Engineering, Oregon State University, Corvallis OR, USA[ expand ]


2015-12-11
21:33 [Job][New]PhD and Postdoc Positions in Cryptography, Institute of Science and Technology Austria (IST Austria)[ expand ]


2015-12-10
22:38 [Job][New]Postdoctoral Scholar, Northern Arizona University, Flagstaff, Arizona USA[ expand ]
15:20 [Job][New]Post-Doc in Lattice-Based Cryptography, CWI Amsterdam, The Netherlands[ expand ]
15:20 [Event][New]SECITC 2016: 9th Int. Conference on Security for Information Technology & Communications[ expand ]


2015-12-09
23:50 [Event][New]DATICS-FUTURETECH 2016: DATICS workshop in FutureTech 2016[ expand ]
23:49 [Event][New]DATICS-IMECS 2016: DATICS workshop in IMECS 2016[ expand ]



2015-12-08
22:56 [Job][Update]Principle Cryptographer, CipherQ, Toronto, Canada[ expand ]
22:39 [Job][New]Principle Cryptographer, CipherQ, Toronto, Canada[ expand ]
03:50 [Job][New]Tenure-track Faculty Positions (2), North Carolina State University[ expand ]


2015-12-07
23:25 [Event][New]CyberSciTech'16: 2016 Cyber Science and Technology Congress[ expand ]


2015-12-05
14:20 [Event][New]ACM CPSS'16: 2nd ACM Cyber-Physical System Security Workshop (with ACM AsiaCCS'16)[ expand ]
07:17 [Pub][ePrint]Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security, by Takanori Yasuda and Xavier Dahan and Kouichi Sakurai[ expand ]
07:17 [Pub][ePrint]Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud, by Marc Green and Thomas Eisenbarth[ expand ]
07:17 [Pub][ePrint]SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains, by Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena[ expand ]
07:17 [Pub][ePrint]Constraining Pseudorandom Functions Privately, by Dan Boneh and Kevin Lewi and David J. Wu[ expand ]
07:17 [Pub][ePrint]Ceremonies for End-to-End Verifiable Elections, by Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang[ expand ]
04:17 [Pub][ePrint]Meet-in-the-Middle Attacks on Reduced-Round Midori-64, by Li Lin and Wenling Wu[ expand ]


2015-12-04
18:41 [Job][Update]Postdoc and PhD student in Cryptography (Mix-Nets), University of Tartu, Estonia[ expand ]
18:30 [Job][New]Postdoctoral researcher in Cryptography, IMDEA Software Institute, Madrid, Spain[ expand ]



2015-12-03
02:44 [Job][New]Post-doc, Université catholique de Louvain, Louvain-la-Neuve, Belgium[ expand ]
02:32 [Event][New]IEEE TC SCA: IEEE Trans Computers - Special Section on Secure Computer Architectures[ expand ]


2015-12-02
22:17 [Pub][ePrint]Beyond Bitcoin - Part I: A critical look at blockchain-based systems, by Pasquale Forte and Diego Romano and Giovanni Schmid[ expand ]
22:17 [Pub][ePrint]A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher, by Mehmet Özen and Mustafa Çoban and Ferhat Karakoç[ expand ]
18:35 [Job][New]Multiple Ph.D. Positions in Applied Cryptography and Network Security (Fully funded), Oregon State University, Computer Science, Corvallis, OR, USA[ expand ]
04:17 [Event][New]IWSEC 2016: The 11th International Workshop on Security[ expand ]
04:16 [Event][New]QCrypt 2016: 6th International Conference on Quantum Cryptography[ expand ]
03:57 [Election]IACR 2015 election results[ expand ]
01:17 [Pub][ePrint]The Moral Character of Cryptographic Work, by Phillip Rogaway[ expand ]
01:17 [Pub][ePrint]Cyber and Physical Access Control in Legacy System Using Passwords, by Jia Xu and Jianying Zhou and Liming Lu[ expand ]
01:17 [Pub][ePrint]Cryptanalysis of multi-HFE, by Yasufumi Hashimoto[ expand ]
01:17 [Pub][ePrint]Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation, by Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste[ expand ]
01:08 [Event][New]PSC: Post-Snowden Cryptography[ expand ]


2015-12-01
13:51 [Job][Update]PhD/MSc Scholarships, Post-Doctoral Positions, and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, Istanbul, Turkey[ expand ]
13:49 [Job][New]Ph.D. / M.Sc. Scholarships, Post-Doctoral Positions, and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey[ expand ]
09:38 [Job][New]PhD Position on Privacy, Technische Universität Darmstadt, Germany[ expand ]
03:51 [Pub][ePrint]Double-Authentication-Preventing Signatures from Trapdoor Identification, by Mihir Bellare and Douglas Stebila[ expand ]
03:51 [Pub][ePrint]An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks, by Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan[ expand ]
03:51 [Pub][ePrint]Cross Processor Cache Attacks, by Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
03:51 [Pub][ePrint]NORX8 and NORX16: Authenticated Encryption for Low-End Systems, by Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves[ expand ]
01:17 [Pub][ePrint]A note on the optimality of frequency analysis vs. $\\ell_p$-optimization, by Marie-Sarah Lacharit\\\'{e} and Kenneth G. Paterson[ expand ]


2015-11-30
12:34 [Job][New]Postdoctoral Researcher (Security in Cyber Physical Systems), University College Cork, Ireland[ expand ]
03:00 [Event][New]TCC 2016-B: Theory of Cryptography Conference[ expand ]
01:36 [Pub][ePrint]From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS, by Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila[ expand ]
01:17 [Pub][ePrint]Obliv-C: A Language for Extensible Data-Oblivious Computation, by Samee Zahur and David Evans[ expand ]



2015-11-29
22:17 [Pub][ePrint]Fully Leakage-Resilient Codes, by Antonio Faonio and Jesper Buus Nielsen[ expand ]
19:17 [Pub][ePrint]Privacy-preserving Friendship-based Recommender Systems, by Qiang Tang and Jun Wang[ expand ]
15:38 [Job][New]PhD Position in Cryptology, University of Bergen, Norway[ expand ]
07:17 [Pub][ePrint]A Note on Perfect Correctness by Derandomization, by Nir Bitansky and Vinod Vaikuntanathan[ expand ]
04:17 [Pub][ePrint]On the Usability of Two-Factor Authentication, by Ding Wang and Ping Wang[ expand ]
01:17 [Pub][ePrint]Tighter Security for Efficient Lattice Cryptography via the R\\\'{e}nyi Divergence of Optimized Orders, by Katsuyuki Takashima and Atsushi Takayasu[ expand ]


2015-11-28
22:17 [Pub][ePrint]Comment on ``Realization of a scalable Shor algorithm\", by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]$\\Lambda \\circ \\lambda$: A Functional Library for Lattice Cryptography, by Eric Crockett and Chris Peikert[ expand ]
16:17 [Pub][ePrint]Midori: A Block Cipher for Low Energy (Extended Version), by Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni[ expand ]
13:17 [Pub][ePrint]A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE, by Zhigang Chen and Xinxia Song[ expand ]
10:17 [Pub][ePrint]Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions, by Olivier Blazy and Céline Chevalier and Damien Vergnaud[ expand ]
07:17 [Pub][ePrint]Lattice Attacks on the DGHV Homomorphic Encryption Scheme, by Abderrahmane Nitaj and Tajjeeddine Rachidi[ expand ]
04:17 [Pub][ePrint]libgroupsig: An extensible C library for group signatures, by Jesus Diaz and David Arroyo and Francisco B. Rodriguez[ expand ]
01:17 [Pub][ePrint]Collusion Resistant Aggregation from Convertible Tags, by Iraklis Leontiadis and Ming Li[ expand ]


2015-11-27
22:17 [Pub][ePrint]An Inverse-free Single-Keyed Tweakable Enciphering Scheme, by Ritam Bhaumik and Mridul Nandi[ expand ]
19:17 [Pub][ePrint]An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
16:17 [Pub][ePrint]On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks, by Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata[ expand ]
13:17 [Pub][ePrint]Multi-Input Functional Encryption for Unbounded Arity Functions, by Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai[ expand ]
10:17 [Pub][ePrint]A New Factoring Attack on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng and Honggang Hu[ expand ]
10:16 [Job][New]Positions in Applied Cryptography (Based in Hong Kong), Hong Kong Applied Science and Technology Research Institute Company Limited[ expand ]
10:10 [Job][New]PhD student, University of Bristol, Cryptography Group, Side Channel Lab[ expand ]
07:17 [Pub][ePrint]Lightweight CRC-based Message Authentication, by Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist[ expand ]
04:17 [Pub][ePrint]Secret Sharing Schemes with General Access Structures (Full version), by Jian Liu, Sihem Mesnager, and Lusheng Chen[ expand ]
01:17 [Pub][ePrint]Modular Inversion Hidden Number Problem- A Lattice Approach, by Pranjal Dutta[ expand ]


2015-11-26
22:17 [Pub][ePrint]Amplifying Side Channels Through Performance Degradation, by Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom[ expand ]
09:25 [Event][New]School on Symmetric Cryptography[ expand ]
09:24 [Event][New]IWSEC'16: The 11th International Workshop on Security[ expand ]



2015-11-24
22:17 [Forum][2014 Reports] 2015/1087 may not be secure by zzhang[ expand ]


2015-11-23
22:17 [Pub][ePrint]Lucky Microseconds: A Timing Attack on Amazon\'s s2n Implementation of TLS, by Martin R. Albrecht and Kenneth G. Paterson[ expand ]
22:17 [Pub][ePrint]New directions in nearest neighbor searching with applications to lattice sieving, by Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven[ expand ]
10:17 [Pub][ePrint]Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups, by Mikhail Anokhin[ expand ]
05:16 [Event][New]School on Design for a Secure IoT[ expand ]
05:15 [Event][New]ArcticCrypt 2016[ expand ]


2015-11-22
22:17 [Pub][ePrint]A Practical Oblivious Map Data Structure with Secure Deletion and History Independence, by Daniel S. Roche and Adam J. Aviv and Seung Geol Choi[ expand ]
22:17 [Pub][ePrint]Practical Order-Revealing Encryption with Limited Leakage, by Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu[ expand ]
16:17 [Pub][ePrint]A Linear Code and its Application into Secret Sharing, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]


2015-11-21
01:17 [Pub][ePrint]On Basing Private Information Retrieval on NP-Hardness, by Tianren Liu and Vinod Vaikuntanathan[ expand ]
01:17 [Pub][ePrint]Gaussian Sampling Precision and Information Leakage in Lattice Cryptography, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, by Anamaria Costache and Nigel P. Smart[ expand ]
01:17 [Pub][ePrint]Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, by Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng[ expand ]
01:17 [Pub][ePrint]Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings, by Hao Chen[ expand ]
01:17 [Pub][ePrint]Unconditionally Secure Computation with Reduced Interaction, by Ivan Damg{\\aa}rd and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen[ expand ]
01:17 [Pub][ePrint]Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Shweta Agrawal and Benoit Libert and Damien Stehle[ expand ]
01:17 [Pub][ePrint]Spacemint: A Cryptocurrency Based on Proofs of Space, by Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gazi[ expand ]
01:17 [Pub][ePrint]Scalable and private media consumption with Popcorn, by Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish[ expand ]
01:17 [Pub][ePrint]Random Linear Code Based Public Key Encryption Scheme RLCE, by Yongge Wang[ expand ]
01:17 [Pub][ePrint]Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM, by Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs[ expand ]
01:17 [Pub][ePrint]Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
01:17 [Pub][ePrint]The BRUTUS Automatic Cryptanalytic Framework: Testing CAESAR Authenticated Encryption Candidates for Weaknesses, by Markku-Juhani O. Saarinen[ expand ]
01:17 [Pub][ePrint]A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications, by Ming Li and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]The Adjacency Graphs of Some Feedback Shift Registers, by Ming Li and Yupeng Jiang and Dongdai Lin[ expand ]
01:17 [Pub][ePrint]Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs, by Helger Lipmaa[ expand ]
01:17 [Pub][ePrint]Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, by Koji Nuida[ expand ]
01:17 [Pub][ePrint]Efficient Cryptosystems From $2^k$-th Power Residue Symbols, by Fabrice Benhamouda and Javier Herranz and Marc Joye and and Benoît Libert[ expand ]
01:17 [Pub][ePrint]SL2 homomorphic hash functions: Worst case to average case reduction and short collision search, by Ciaran Mullan and Boaz Tsaban[ expand ]
01:17 [Pub][ePrint]Secret Sharing, Rank Inequalities, and Information Inequalities, by Sebastia Martin and Carles Padro and An Yang[ expand ]
01:17 [Pub][ePrint]Algebraic Complexity Reduction and Cryptanalysis of GOST, by Nicolas T. Courtois[ expand ]



2015-11-20
15:40 [Job][New]Assistant/Associate/Full Professor (Tenure Track), UConn, Storrs[ expand ]