International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 [ 36 ] 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
2014-11-20
19:17 [Pub][ePrint]Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, by Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda[ expand ]


2014-11-19
23:51 [Job][New]PhD students and Postdoctoral Fellowships in Post-Quantum Cryptography, University of Waterloo[ expand ]
13:17 [Pub][ePrint]Simplification/complication of the basis of prime Boolean ideal, by Alexander Rostovtsev and Anna Shustrova[ expand ]
13:17 [Pub][ePrint]Lattice Point Enumeration on Block Reduced Bases, by Michael Walter[ expand ]
13:17 [Pub][ePrint]The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers, by Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers[ expand ]
13:17 [Pub][ePrint]On a new fast public key cryptosystem, by Samir Bouftass.[ expand ]
13:17 [Pub][ePrint]Boomerang Attack on Step-Reduced SHA-512, by Hongbo Yu, Dongxia Bai[ expand ]
13:17 [Pub][ePrint]EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes, by Georg Fuchsbauer and Christian Hanser and Daniel Slamanig[ expand ]


2014-11-18
19:17 [Pub][ePrint]HaTCh: Hardware Trojan Catcher, by Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk[ expand ]
19:17 [Pub][ePrint]Public-Coin Differing-Inputs Obfuscation and Its Applications, by Yuval Ishai, Omkant Pandey, Amit Sahai[ expand ]
19:17 [Pub][ePrint]Garbled RAM From One-Way Functions, by Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro[ expand ]
19:17 [Pub][ePrint]Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
19:17 [Pub][ePrint]Security Analysis of an Authentication Scheme Using Smart Cards, by Gaurav Tiwari and Amit K. Awasthi and Neha Shukla[ expand ]
19:17 [Pub][ePrint]Trapdoor Computational Fuzzy Extractors, by Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas[ expand ]
19:17 [Pub][ePrint]Analysis of Lewko-Sahai-Waters Revocation System , by Zhengjun Cao and Lihua Liu[ expand ]
19:17 [Pub][ePrint]Outsourcing Secure Two-Party Computation as a Black Box, by Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler[ expand ]
19:17 [Pub][ePrint]Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, by Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia[ expand ]


2014-11-17
18:10 [Election]IACR election 2014 results[ expand ]


2014-11-16
23:09 [Event][New]RFIDsec 2015: 11th Workshop on RFID Security[ expand ]



2014-11-15
15:53 [Job][New]PhD Studentship in Security/Privacy, University College London[ expand ]
15:52 [Job][New]Visiting Post-Doc or Ph.D. student, Aalto University School of Science, Helsinki, Finland[ expand ]


2014-11-14
16:17 [Pub][ePrint]Efficient Generic Zero-Knowledge Proofs from Commitments, by Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias[ expand ]
16:17 [Pub][ePrint]Certificateless Proxy Re-Encryption Without Pairing, by Akshayaram Srinivasan and C. Pandu Rangan[ expand ]
16:17 [Pub][ePrint]Bicliques with Minimal Data and Time Complexity for AES (Extended Version $\\star$), by Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya[ expand ]
16:17 [Pub][ePrint]Cryptanalysis of JAMBU, by Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang[ expand ]


2014-11-13
17:11 [Event][New]Lightweight Cryptography Workshop 2015[ expand ]
10:17 [Pub][ePrint]Immunizing Multilinear Maps Against Zeroizing Attacks, by Dan Boneh and David J. Wu and Joe Zimmerman[ expand ]
10:17 [Pub][ePrint]Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero, by Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai[ expand ]
10:17 [Pub][ePrint]Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices, by Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois[ expand ]


2014-11-12
10:17 [Pub][ePrint]Physical functions : the common factor of side-channel and fault attacks ?, by Bruno Robisson and Hélène Le Bouder[ expand ]
03:52 [Event][New]WiSec 2015: 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks[ expand ]



2014-11-11
17:50 [Event][New]FSP 2015: The 2015 International Workshop on Future Security and Privacy[ expand ]
13:17 [Pub][ePrint]Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results, by Keita Emura and Takuya Hayashi[ expand ]
13:17 [Pub][ePrint]Indistinguishability Obfuscation for Turing Machines with Unbounded Memory, by Venkata Koppula and Allison Bishop Lewko and Brent Waters[ expand ]
13:17 [Pub][ePrint]Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields, by Antoine Joux and Cécile Pierrot[ expand ]
13:17 [Pub][ePrint]New Cryptosystem Using The CRT And The Jordan Normal Form, by Hemlata Nagesh and Birendra Kumar Sharma[ expand ]
13:17 [Pub][ePrint]Differential Analysis of Block Ciphers SIMON and SPECK, by Alex Biryukov and Arnab Roy and Vesselin Velichkov[ expand ]


2014-11-10
18:03 [Job][New]Post-Doc (Research Fellow), University of Birmingham[ expand ]
18:03 [Job][New]PhD student, Swedish Institute of Computer Science, Security Lab and Lund University[ expand ]
07:17 [Pub][ePrint]Batch NFS, by Daniel J. Bernstein and Tanja Lange[ expand ]
07:17 [Pub][ePrint]Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, by Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert[ expand ]
07:17 [Pub][ePrint]Experimenting with Shuffle Block Cipher and SMT Solvers, by Martin Stanek[ expand ]
07:17 [Pub][ePrint]Web Tap Payment Authentication and Encryption With Zero Customer Effort, by Henry Ng[ expand ]
07:17 [Pub][ePrint]The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically, by Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan[ expand ]


2014-11-07
20:58 [Event][New]ACISP 2014: 20th Australasian Conference on Information Security and Privacy[ expand ]
17:32 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Arlington, VA[ expand ]


2014-11-06
19:17 [Pub][ePrint]Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi[ expand ]
19:17 [Pub][ePrint]The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan[ expand ]
19:17 [Pub][ePrint]Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai[ expand ]
19:17 [Pub][ePrint]Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi[ expand ]
06:48 [Event][New]Asiacrypt: Asiacrypt 2016[ expand ]
06:48 [Event][New]Eurocrypt: Eurocrypt 2016[ expand ]
06:40 [Event][New]Asiacrypt: Asiacrypt 2015[ expand ]



2014-11-05
13:17 [Pub][ePrint]Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri[ expand ]
13:17 [Pub][ePrint]A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman[ expand ]
13:17 [Pub][ePrint]Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao[ expand ]
13:17 [Pub][ePrint]Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro[ expand ]
13:17 [Pub][ePrint]Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro[ expand ]


2014-11-04
13:17 [Pub][ePrint]Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol[ expand ]


2014-11-03
13:17 [Pub][ePrint]Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\\\'e[ expand ]
01:17 [Pub][ePrint]Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv[ expand ]


2014-11-01
22:46 [Event][New]Security of symmetric ciphers in network protocols[ expand ]
21:52 [Event][New]Genopri 2015: Genopri 2015 (2nd International Workshop on Genome Privacy and Security[ expand ]
03:17 [Pub][ePrint]How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz[ expand ]
00:17 [Pub][ePrint]Falcon Codes: Fast, Authenticated LT Codes, by Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos[ expand ]



2014-10-31
16:43 [Event][New][Extension] SI Security and Privacy in Unified Communications[ expand ]
16:42 [Job][New]Principal Solution Specialist - Encryption, SafeNet [ expand ]
16:41 [Job][New]Post-Doc, Nanyang Technological University, Singapore[ expand ]
15:17 [Pub][ePrint]The Power of Negations in Cryptography, by Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen[ expand ]
00:17 [Pub][ePrint]A Practical Attack Against the HIVE Hidden Volume Encryption System, by Kenneth G. Paterson and Mario Strefler[ expand ]
00:17 [Pub][ePrint]Some Security Results of the RC4 + Stream Cipher, by Subhadeep Banik and Sonu Jha[ expand ]


2014-10-30
15:17 [Pub][ePrint]Side Channel Power Analysis of an AES-256 Bootloader, by Colin O\'Flynn and Zhizhang Chen[ expand ]
15:17 [Pub][ePrint]A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme, by Eduardo Morais and Ricardo Dahab[ expand ]
15:17 [Pub][ePrint]Leveled Fully Homomorphic Signatures from Standard Lattices, by Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Efficiently Making Secure Two-Party Computation Fair, by Handan Kılınç and Alptekin Küpçü[ expand ]
15:17 [Pub][ePrint]Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion, by Kerry A. McKay and Poorvi L. Vora[ expand ]
15:17 [Pub][ePrint]THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS, by Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan[ expand ]
15:17 [Pub][ePrint]Advanced Algebraic Attack on Trivium, by Frank Quedenfeld and Christopher Wolf[ expand ]
15:17 [Pub][ePrint]Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014, by Georg Fuchsbauer[ expand ]
15:17 [Pub][ePrint]Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity, by Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures, by Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings, by Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]Distance Lower Bounding, by Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi[ expand ]
15:17 [Pub][ePrint]Hardware Implementation of Secure Shamir\'s Secret Sharing Scheme , by Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky[ expand ]
15:17 [Pub][ePrint]Accountable Storage, by Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia[ expand ]
15:17 [Pub][ePrint]Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, by Omar Choudary and Markus G. Kuhn[ expand ]
15:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack , by Pei Luo and Yunsi Fei[ expand ]


2014-10-29
18:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]


2014-10-28
21:17 [Pub][ePrint]Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack, by Pei Luo and Yunsi Fei[ expand ]
21:17 [Pub][ePrint]Obfuscation of Probabilistic Circuits and Applications, by Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan[ expand ]
21:17 [Pub][ePrint]Overview of the Candidates for the Password Hashing Competition -- And their Resistance against Garbage-Collector Attacks, by Stefan Lucks and Jakob Wenzel[ expand ]
21:17 [Pub][ePrint]Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective, by Joppe W. Bos and Michael Naehrig and Joop van de Pol[ expand ]
21:17 [Pub][ePrint]Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Protecting obfuscation against arithmetic attacks, by Eric Miles and Amit Sahai and Mor Weiss[ expand ]
18:17 [Pub][ePrint]CM55: special prime-field elliptic curves almost optimizing den Boer\'s reduction between Diffie-Hellman and discrete logs, by Daniel R. L. Brown[ expand ]
18:17 [Pub][ePrint]UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model, by Mihir Bellare and Viet Tung Hoang[ expand ]
16:08 [Event][New]DBSec 2015: 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]
16:02 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA-i_SW Corp, Arlington, VA[ expand ]
03:55 [News]Video of IACR Distinguished Lecture[ expand ]



2014-10-27
18:38 [Job][New]Senior Cryptographic/Software Obfuscation Engineer, DARPA- i_SW Corporation[ expand ]


2014-10-25
17:20 [Event][New]CECC '15: 15th Central European Conference on Cryptology[ expand ]
06:17 [Pub][ePrint]Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES, by Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding[ expand ]


2014-10-23
00:17 [Pub][ePrint]Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas[ expand ]


2014-10-22
21:17 [Pub][ePrint]Bootstrapping for HElib, by Shai Halevi and Victor Shoup[ expand ]
21:17 [Pub][ePrint]Recent Results in Scalable Multi-Party Computation, by Jared Saia and Mahdi Zamani[ expand ]
21:17 [Pub][ePrint]An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov[ expand ]
21:17 [Pub][ePrint]Dynamic Behavior of RS latches using FIB processing and probe connection, by Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto[ expand ]
21:17 [Pub][ePrint]Exponent Blinding May Not Prevent Timing Attacks on RSA, by Werner Schindler[ expand ]
21:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions, by Ilan Komargodski and Gil Segev and Eylon Yogev[ expand ]
21:17 [Pub][ePrint]Random Oracle Uninstantiability from Indistinguishability Obfuscation, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Bj\\\"orn Tackmann and Daniele Venturi[ expand ]
21:17 [Pub][ePrint]Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation, by Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti[ expand ]
21:17 [Pub][ePrint]How to Choose Interesting Points for Template Attack More Effectively?, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng[ expand ]
21:17 [Pub][ePrint]A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation, by Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou[ expand ]
21:17 [Pub][ePrint]Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -, by Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts[ expand ]
21:17 [Pub][ePrint]Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın[ expand ]
21:17 [Pub][ePrint]Differential Factors: Improved Attacks on SERPENT, by Cihangir Tezcan and Ferruh Özbudak[ expand ]
21:17 [Pub][ePrint]Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system, by SK Hafizul Islam, G. P. Biswas[ expand ]
21:17 [Pub][ePrint]Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao[ expand ]
21:17 [Pub][ePrint]Pseudonymous Secure Computation from Time-Lock Puzzles, by Jonathan Katz and Andrew Miller and Elaine Shi[ expand ]
21:17 [Pub][ePrint]Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware, by Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou[ expand ]
20:56 [Job][New]PhD student, Chalmers University of Technology, Sweden[ expand ]
18:17 [Pub][ePrint]Relating Undisturbed Bits to Other Properties of Substitution Boxes, by Rusydi H. Makarim and Cihangir Tezcan[ expand ]
18:17 [Pub][ePrint]Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs, by Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli[ expand ]
18:17 [Pub][ePrint]Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătă[ expand ]
18:17 [Pub][ePrint]Faster ECC over $\\mathbb{F}_{2^{521}-1}$, by Robert Granger and Michael Scott[ expand ]
18:17 [Pub][ePrint]Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang[ expand ]
18:17 [Pub][ePrint]BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita[ expand ]
15:17 [Pub][ePrint]Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, by Nicolas T. Courtois and Pinar Emi[ expand ]
15:17 [Pub][ePrint]Reflections on Slide with a Twist Attacks, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
13:45 [Event][New]IWSEC 2015: The 10th International Workshop on Security[ expand ]



2014-10-21
06:17 [Pub][ePrint]Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Michael Walfish and Victor Vu[ expand ]
03:17 [Pub][ePrint]Adaptively Secure Two-party Computation From Indistinguishability Obfuscation , by Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya[ expand ]
03:17 [Pub][ePrint]Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Antigoni Polychroniadou[ expand ]


2014-10-20
16:33 [Event][New]SECITC '15: 8th Int'l Conference on Security for Information Technology&Communications[ expand ]
16:33 [Job][New]Postdoctoral Researcher (Drone Security), University College Cork, Ireland[ expand ]
15:17 [Pub][ePrint]Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator, by Jun Xu, Lei Hu, Zhangjie Huang[ expand ]
15:17 [Pub][ePrint]Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
15:17 [Pub][ePrint]Constrained PRFs for Unbounded Inputs, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
15:17 [Pub][ePrint]A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa[ expand ]
15:17 [Pub][ePrint]SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, by Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]An Improved Transformation between HILL and Metric Conditional Pseudoentropy, by Maciej Skorski[ expand ]
15:17 [Pub][ePrint]Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism, by David Galindo and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek[ expand ]
15:17 [Pub][ePrint]Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation, by Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman[ expand ]
12:17 [Pub][ePrint]Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi[ expand ]


2014-10-19
17:13 [Event][New]CS2 2015: Second Workshop on Cryptography and Security in Computing Systems[ expand ]


2014-10-16
18:17 [Pub][ePrint]Requirements for Standard Elliptic Curves, by Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze[ expand ]
16:50 [Job][New]Post-Doc, Commissariat à l\'Energie Atomique (French DoE), Paris area, France[ expand ]
16:02 [News]IACR webserver no longer supports SSLv2 and SSLv3[ expand ]
03:18 [Event][New]CHES 2015: Cryptographic Hardware and Embedded Systems[ expand ]



2014-10-15
17:44 [Election]IACR 2014 Election: Vote now![ expand ]


2014-10-14
20:00 [Event][New]IEEE S&P 2015: IEEE Symposium on Security and Privacy[ expand ]
09:05 [Job][New]PhD Student, RMIT University, Melbourne, Australia[ expand ]


2014-10-13
14:16 [Job][New]Post-Doc Fully Homomorphic Encryption, University of Bristol[ expand ]
12:17 [Pub][ePrint]Tweaks and Keys for Block Ciphers: the TWEAKEY Framework, by Jérémy Jean and Ivica Nikolić and Thomas Peyrin[ expand ]
12:17 [Pub][ePrint]Adaptively Secure UC Constant Round Multi-Party Computation Protocols, by Ivan Damgaard and Antigoni Polychroniadou and Vanishree Rao[ expand ]
12:17 [Pub][ePrint]Additively Homomorphic UC commitments with Optimal Amortized Overhead, by Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti[ expand ]
12:17 [Pub][ePrint]Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor\'s Algorithm, by Zhengjun Cao and Zhenfu Cao and Lihua Liu[ expand ]
09:38 [Job][Update]Tenure-Track Faculty Positions, Shanghai Jiao Tong University, Shanghai, China[ expand ]
09:34 [Job][New]Post Doc, Université de Caen Basse-Normandie[ expand ]


2014-10-12
15:17 [Forum][2013 Reports] 2013/235 by Ben.Smyth[ expand ]
03:17 [Pub][ePrint]Interactive Coding for Interactive Proofs, by Yevgeniy Dodis and Allison Bishop Lewko[ expand ]
03:17 [Pub][ePrint]Learning with Errors in the Exponent, by Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert[ expand ]
03:17 [Pub][ePrint]Towards Optimal Bounds for Implicit Factorization Problem, by Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin[ expand ]
03:17 [Pub][ePrint]Accountable Tracing Signatures, by Markulf Kohlweiss and Ian Miers[ expand ]
03:17 [Pub][ePrint]On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries, by Rafael Dowsley and Anderson C. A. Nascimento[ expand ]
03:17 [Pub][ePrint]Ballot secrecy with malicious bulletin boards, by Ben Smyth[ expand ]
03:17 [Pub][ePrint]Non-malleable Reductions and Applications, by Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski[ expand ]
03:17 [Pub][ePrint]Operational Signature Schemes, by Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schroeder[ expand ]
03:17 [Pub][ePrint]Riding on Asymmetry: Efficient ABE for Branching Programs, by Sergey Gorbunov and Dhinakaran Vinayagamurthy[ expand ]
00:17 [Pub][ePrint]Circulant Matrices and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Optimized Karatsuba Squaring on 8-bit AVR Processors, by Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim[ expand ]
00:17 [Pub][ePrint]FHE Bootstrapping in less than a second, by Léo Ducas and Daniele Micciancio[ expand ]
00:17 [Pub][ePrint]A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves, by Palash Sarkar and Shashank Singh[ expand ]
00:17 [Pub][ePrint]Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing, by Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina[ expand ]
00:17 [Pub][ePrint]Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, by Dario Catalano and Dario Fiore[ expand ]
00:17 [Pub][ePrint]Search-and-compute on Encrypted Data, by Jung Hee Cheon and Miran Kim and Myungsun Kim[ expand ]
00:17 [Pub][ePrint]A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems, by Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae[ expand ]
00:17 [Pub][ePrint]Simulation-Based Secure Functional Encryption in the Random Oracle Model, by Vincenzo Iovino and Karol Zebrowski[ expand ]
00:17 [Pub][ePrint]Server-Aided Two-Party Computation with Simultaneous Corruption, by Ignacio Cascudo and Ivan Damgård and Samuel Ranellucci[ expand ]
00:17 [Pub][ePrint]Online/Off-line Ring Signature Scheme with Provable Security, by Jayaprakash Kar[ expand ]
00:17 [Pub][ePrint]Leakage-resilient non-malleable codes, by Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski[ expand ]
00:17 [Pub][ePrint]Summation polynomial algorithms for elliptic curves in characteristic two, by Steven D. Galbraith and Shishay W. Gebregiyorgis[ expand ]
00:17 [Pub][ePrint]Dual-System Simulation-Soundness with Applications to UC-PAKE and More, by Charanjit S. Jutla and Arnab Roy[ expand ]
00:17 [Pub][ePrint]Short Signatures from Homomorphic Trapdoor Functions, by Jacob Alperin-Sheriff[ expand ]



2014-10-10
15:17 [Pub][ePrint]A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov[ expand ]
15:17 [Pub][ePrint]Physical Characterization of Arbiter PUFs, by Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich[ expand ]
15:17 [Pub][ePrint]Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties, by Georgi Ivanov and Nikolay Nikolov and Svetla Nikova[ expand ]
12:30 [Job][Update]Associate professor (lecturer) in Computer Security., University of Birmingham, UK[ expand ]
12:20 [Job][New]Tenure-Track Faculty Positions, Shanghai Jiao Tong University, Shanghai, China[ expand ]
06:17 [Pub][ePrint]Efficient Pairings and ECC for Embedded Systems, by Thomas Unterluggauer and Erich Wenger[ expand ]
06:17 [Pub][ePrint]Verifiable Random Functions from Weaker Assumptions, by Tibor Jager[ expand ]
06:17 [Pub][ePrint]Multi-Identity and Multi-Key Leveled FHE from Learning with Errors, by Michael Clear and Ciar\\\'{a}n McGoldrick[ expand ]
06:17 [Pub][ePrint]Tightly-Secure Authenticated Key Exchange, by Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li[ expand ]
06:17 [Pub][ePrint]Distributed Cryptography Based on the Proofs of Work, by Marcin Andrychowicz and Stefan Dziembowski[ expand ]
06:17 [Pub][ePrint]SPHINCS: practical stateless hash-based signatures, by Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Peter Schwabe a[ expand ]
06:17 [Pub][ePrint]Efficient Identity-Based Encryption over NTRU Lattices, by Léo Ducas and Vadim Lyubashevsky and Thomas Prest[ expand ]
06:17 [Pub][ePrint]Robust Authenticated-Encryption: AEZ and the Problem that it Solves, by Viet Tung Hoang and Ted Krovetz and Phillip Rogaway[ expand ]
06:17 [Pub][ePrint]Classification of the CAESAR Candidates, by Farzaneh Abed and Christian Forler and Stefan Lucks[ expand ]
06:17 [Pub][ePrint]Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof, by Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan[ expand ]
06:17 [Pub][ePrint]Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses, by Sarani Bhattacharya and Debdeep Mukhopadhyay[ expand ]


2014-10-09
09:44 [Job][New]Associate professor (lecturer) in Computer Security., University of Birmingham, UK[ expand ]


2014-10-08
23:53 [Event][New]DAC: Design Automation Conference - Hardware Software Security Track[ expand ]
23:53 [Event][New]COSADE 2015: 6th Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
09:23 [Event][New]5th Bar-Ilan Winter School on Cryptography: Advances in Practical MPC[ expand ]


2014-10-07
15:25 [Job][New]Two full-time PhD or Postdoc positions in the area of Wireless Sensor Networks (WSN) Security, Universität Mannheim (Germany) and Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany)[ expand ]
13:29 [Job][New]4 Research Scientists, Temasek Laboratories at Nanyang Technological University, Singapore[ expand ]
06:17 [Pub][ePrint]Statistical Properties of the Square Map Modulo a Power of Two, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha[ expand ]
06:17 [Pub][ePrint]Tuning GaussSieve for Speed, by Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang[ expand ]
03:17 [Pub][ePrint]Another Tor is possible, by Amadou Moctar Kane[ expand ]
03:17 [Pub][ePrint]On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation, by Chun Guo and Dongdai Lin[ expand ]
03:17 [Pub][ePrint]Divisible E-Cash Made Practical, by Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré[ expand ]
03:17 [Pub][ePrint]Weak Instances of PLWE, by Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter[ expand ]
00:17 [Pub][ePrint]Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware, by Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian[ expand ]
00:17 [Pub][ePrint]Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis, by Raghavan Kumar and Philipp Jovanovic and Ilia Polian[ expand ]



2014-10-06
12:52 [Event][New]SI Security and Privacy in Unified Communications: Challenges and Solutions[ expand ]


2014-10-05
06:17 [Pub][ePrint]Simple-looking joint decoders for traitor tracing and group testing, by Boris Skoric[ expand ]
06:17 [Pub][ePrint]Deterministic Public-Key Encryption under Continual Leakage, by Venkata Koppula,Omkant Pandey,Yannis Rouselakis,Brent Waters[ expand ]
06:17 [Pub][ePrint]Implementing Cryptographic Program Obfuscation, by Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff[ expand ]
06:17 [Pub][ePrint]Anonymous IBE from Quadratic Residuosity with Improved Performance, by Michael Clear and Hitesh Tewari and Ciar\\\'{a}n McGoldrick[ expand ]


2014-10-04
06:17 [Pub][ePrint](Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, by Koji Nuida and Kaoru Kurosawa[ expand ]


2014-10-03
10:28 [Job][Update]Lecturer/Senior Lecturer (Chancellor\'s Fellowship), University of Strathclyde, UK[ expand ]
10:28 [Job][New]Lecturer/Senior Lecturer (Chancellor\'s Fellowship), University of Strathclyde, UK[ expand ]



2014-10-01
06:17 [Pub][ePrint]Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation, by Artur Mariano, Shahar Timnat and Christian Bischof[ expand ]
06:17 [Pub][ePrint]Automated Analysis and Synthesis of Block-Cipher Modes of Operation, by Alex J. Malozemoff and Jonathan Katz and Matthew D. Green[ expand ]
06:17 [Pub][ePrint]Obfuscating Low-Rank Matrix Branching Programs, by Amit Sahai and Mark Zhandry[ expand ]
06:17 [Pub][ePrint]Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps, by Nuttapong Attrapadung[ expand ]
06:17 [Pub][ePrint]How to Obfuscate Programs Directly, by Joe Zimmerman[ expand ]
01:22 [Event][New]PASSWORDS '14: The 7th International Conference on Passwords, Norway[ expand ]


2014-09-30
15:17 [Pub][ePrint]Succinct Randomized Encodings and their Applications, by Nir Bitansky and Sanjam Garg and Sidharth Telang[ expand ]
15:17 [Pub][ePrint]AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation, by Takaaki Mizuki and Yu-ichi Hayashi[ expand ]
15:17 [Pub][ePrint]Indistinguishability Obfuscation of Iterated Circuits and RAM Programs, by Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation, by Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu[ expand ]
15:17 [Pub][ePrint]Algebraic Attacks on Human Identification Protocols, by Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk[ expand ]
15:17 [Pub][ePrint]Succinct Garbling Schemes and Applications, by Huijia Lin and Rafael Pass[ expand ]
15:17 [Pub][ePrint]The Bitcoin Backbone Protocol: Analysis and Applications, by Juan Garay and Aggelos Kiayias and Nikos Leonardos[ expand ]
15:17 [Pub][ePrint]One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin, by Jens Groth and Markulf Kohlweiss[ expand ]
15:17 [Pub][ePrint]On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin clients, by Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]Access Control in Publicly Verifiable Outsourced Computation, by James Alderman and Carlos Cid and Jason Crampton and Christian Janson[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of Reduced-round SIMON32 and SIMON48, by Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo[ expand ]
14:42 [Job][New]Ph.D. student (3 positions), Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]


2014-09-29
17:14 [PhD][New]Florian Legendre: Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques[ expand ]
12:08 [Event][New]ECC '15: 19th Workshop on Elliptic Curve Cryptography[ expand ]
09:17 [Pub][ePrint]Montgomery Modular Multiplication on ARM-NEON Revisited, by Hwajeong Seo, Zhe Liu, Johann Groschadl, Jongseok Choi, and Howon Kim[ expand ]
09:17 [Pub][ePrint]How to Efficiently Evaluate RAM Programs with Malicious Security, by Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek[ expand ]
09:17 [Pub][ePrint]Cryptographic Reverse Firewalls, by Ilya Mironov and Noah Stephens-Davidowitz[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Broadcast Encryption with Small System Parameters, by Mark Zhandry[ expand ]
09:17 [Pub][ePrint]Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates, by Samee Zahur and Mike Rosulek and David Evans[ expand ]
09:17 [Pub][ePrint]Computing Mod Without Mod, by Mark A. Will and Ryan K. L. Ko[ expand ]
09:17 [Pub][ePrint]Bilinear Entropy Expansion from the Decisional Linear Assumption, by Lucas Kowalczyk and Allison Bishop Lewko[ expand ]
09:17 [Pub][ePrint]Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication, by Alonso Gonzalez-Ulloa and Alejandro Hevia[ expand ]
09:17 [Pub][ePrint][ expand ]
09:17 [Pub][ePrint]Higher-Order Threshold Implementations, by Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
09:17 [Pub][ePrint]Hardware Trojan Horses in Cryptographic IP Cores, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage[ expand ]


2014-09-26
11:33 [Job][New]postdoc and PhD student, Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland[ expand ]
09:17 [Pub][ePrint]Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations, by Mehmet Sabır Kiraz and Osmanbey Uzunkol[ expand ]
09:17 [Pub][ePrint]Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications, by Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma,[ expand ]
09:17 [Pub][ePrint]Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM, by Daniel E. Holcomb and Kevin Fu[ expand ]
09:17 [Pub][ePrint]Decoy-based information security, by Vladimir Shpilrain[ expand ]
09:17 [Pub][ePrint]Universal Signature Aggregators, by Susan Hohenberger and Venkata Koppula and Brent Waters[ expand ]
09:17 [Pub][ePrint]Sieving for shortest vectors in lattices using angular locality-sensitive hashing, by Thijs Laarhoven[ expand ]
09:17 [Pub][ePrint]Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security, by Benoit Libert and Marc Joye and Moti Yung and Thomas Peters[ expand ]
09:17 [Pub][ePrint]A survey of Fault Attacks in Pairing Based Cryptography, by Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes[ expand ]
09:17 [Pub][ePrint]Eliminating Leakage in Reverse Fuzzy Extractors, by André Schaller, Boris Skoric, Stefan Katzenbeisser[ expand ]



2014-09-24
13:26 [Event][New]PETS: Privacy Enhancing Technologies Symposium[ expand ]
13:26 [Event][New]InTrust 2014: The 6th International conference on Trustworthy Computing[ expand ]


2014-09-23
09:17 [Pub][ePrint]Non-existence of [n; 5] type Generalized Bent function., by Shashi Kant Pandey and P.R Mishra and B.K Dass[ expand ]
09:17 [Pub][ePrint]SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers, by Smile Markovski and Aleksandra Mileva and Vesna Dimitrova[ expand ]
09:17 [Pub][ePrint]A Very Compact FPGA Implementation of LED and PHOTON, by N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann[ expand ]


2014-09-22
15:54 [Event][New]Summer school on real-world crypto and privacy[ expand ]


2014-09-21
14:37 [PhD][New][ expand ]
14:37 [PhD][Update]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]



2014-09-20
18:17 [Pub][ePrint]Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings, by SK Hafizul Islam and Abhishek Singh[ expand ]
00:17 [Pub][ePrint]Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function, by Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
00:17 [Pub][ePrint]Dealer-Leakage Resilient Verifiable Secret Sharing, by Ruxandra F. Olimid[ expand ]
00:17 [Pub][ePrint]S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?, by Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedr[ expand ]
00:17 [Pub][ePrint]Augmented Learning with Errors: The Untapped Potential of the Error Term, by Rachid El Bansarkhani and Özgür Dagdelen and Johannes Buchmann[ expand ]
00:17 [Pub][ePrint]Resizable Tree-Based Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass[ expand ]
00:17 [Pub][ePrint]Secure modular password authentication for the web using channel bindings, by Mark Manulis and Douglas Stebila and Nick Denham[ expand ]
00:17 [Pub][ePrint]Differentially Private Linear Algebra in the Streaming Model, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]Faster Binary-Field Multiplication and Faster Binary-Field MACs, by Daniel J. Bernstein and Tung Chou[ expand ]
00:17 [Pub][ePrint]Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol, by Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and[ expand ]
00:17 [Pub][ePrint]The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves, by Benjamin Smith[ expand ]
00:17 [Pub][ePrint]CIARP: A RISC Processor For Cryptography Applications, by Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi[ expand ]
00:17 [Pub][ePrint]Efficient Software Implementation of Ring-LWE Encryption, by Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede[ expand ]


2014-09-17
21:17 [Pub][ePrint]Protecting Encrypted Cookies from Compression Side-Channel Attacks, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
06:31 [Event][New]IoTPTS 2015: ASIACCS Workshop on IoT Privacy, Trust, and Security[ expand ]


2014-09-16
21:17 [Pub][ePrint]Crypto-analyses on \"secure and efficient privacy-preserving public auditing scheme for cloud storage\", by Yalin Chen and Jue-Sam Chou*[ expand ]
18:17 [Pub][ePrint]Differential Cryptanalysis of SipHash, by Christoph Dobraunig and Florian Mendel and Martin Schläffer[ expand ]
18:17 [Pub][ePrint]On Shor\'s Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers, by Zhengjun Cao and Zhenfu Cao[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Constrained Pseudorandom Functions, by Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters[ expand ]
18:17 [Pub][ePrint]Bivariate Polynomials Modulo Composites and their Applications, by Dan Boneh and Henry Corrigan-Gibbs[ expand ]
18:17 [Pub][ePrint]Square Span Programs with Applications to Succinct NIZK Arguments, by George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss[ expand ]
18:17 [Pub][ePrint]How to Split a Secret into Unknown Shares, by Ruxandra F. Olimid[ expand ]
18:17 [Pub][ePrint]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment, by Amir Moradi[ expand ]
18:17 [Pub][ePrint]Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment\', by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]
18:17 [Pub][ePrint]A comprehensive empirical comparison of parallel ListSieve and GaussSieve, by Artur Mariano and Ozgur Dagdelen and Christian Bischof[ expand ]
09:18 [Job][New]Research Fellowship Scheme, Queen’s University Belfast, UK[ expand ]
07:44 [Pub]Proceedings of CHES 2014 available online[ expand ]


2014-09-15
15:17 [Event][New]Eurocrypt 2015: Eurocrypt 2015[ expand ]
01:14 [Job][New]PhD Positions, Southern Illinois University Carbondale, USA[ expand ]



2014-09-12
09:17 [Pub][ePrint]Co-Location-Resistant Clouds, by Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd[ expand ]
09:17 [Pub][ePrint]Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks, by Mohammad Wazid[ expand ]


2014-09-11
09:17 [Pub][ePrint]New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\\mathbb{F}_2$, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle, by Yehuda Lindell[ expand ]
01:42 [Event][New]CPSS'15: 1st Cyber-Physical System Security Workshop[ expand ]


2014-09-10
16:02 [News]President\'s message 9/2014[ expand ]
15:17 [PhD][New]Elisabeth Oswald: On Side-Channel Attacks and the Application of Algorithmic Countermeasures[ expand ]
15:15 [PhD][New]Carolyn Whitnall: Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation[ expand ]


2014-09-09
09:17 [Pub][ePrint]A Note on Quantum Security for Post-Quantum Cryptography, by Fang Song[ expand ]
09:17 [Pub][ePrint]Formal Treatment of Privacy-Enhancing Credential Systems, by Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen[ expand ]
09:17 [Pub][ePrint]Analysis Of Variance and CPA in SCA, by Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philipp[ expand ]
09:17 [Pub][ePrint]The Feasibility of Outsourced Database Search in the Plain Model, by Carmit Hazay and Hila Zarosim[ expand ]
09:17 [Pub][ePrint]Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lu[ expand ]
03:15 [Job][New]Ph.D. student in Theoretical Computer Science, CWI / University of Amsterdam[ expand ]



2014-09-08
01:39 [PhD][Update][ expand ]


2014-09-05
21:17 [Pub][ePrint]Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version), by Christina Boura and Mar\\\'ia Naya-Plasencia and Valentin Suder[ expand ]
21:17 [Pub][ePrint]HIMMO security, by Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Domingo Gomez-Perez and Jaime Gutierrez[ expand ]
21:17 [Pub][ePrint]A Fully Homomorphic Encryption Scheme with Better Key Size, by Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song[ expand ]
21:17 [Pub][ePrint]Linearity Measures for MQ Cryptography, by Simona Samardjiska and Danilo Gligoroski[ expand ]
21:17 [Pub][ePrint]Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques, by Benoit Feix and Hugues Thiebeauld[ expand ]
21:17 [Pub][ePrint]An Practical Iterative Side Channel Cube Attack on AES-128/256, by Erfan Aghaee and Majid Rahimi and Hamed Yusefi[ expand ]
21:17 [Pub][ePrint]Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures, by Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu[ expand ]


2014-09-04
17:47 [Event][New]SCC '15: The Third International Workshop on Security in Cloud Computing[ expand ]
16:53 [Event][New]RWC2015: Real World Cryptography Workshop 2015[ expand ]
12:17 [Pub][ePrint]Security Proofs for the BLT Signature Scheme, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
12:17 [Pub][ePrint]Proof of Proximity of Knowledge, by Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Malicious Hashing: Eve\'s Variant of SHA-1, by Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
09:17 [Pub][ePrint]Optimal Proximity Proofs, by Ioana Boureanu and Serge Vaudenay[ expand ]
09:17 [Pub][ePrint]Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead, by Enrique Larraia[ expand ]
09:17 [Pub][ePrint]Integration of hardware tokens in the Idemix library, by Antonio de la Piedra[ expand ]
06:17 [Pub][ePrint]Efficient Interval Check in the Presence of Malicious Adversaries, by Genqiang Wu and Yeping He and Yi Lu and Liping Ding[ expand ]
06:17 [Pub][ePrint]Efficient Implementation of Keyless Signatures with Hash Sequence Authentication, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
06:17 [Pub][ePrint]Analytic Toolbox for White-Box Implementations: Limitation and Perspectives, by Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong[ expand ]
06:17 [Pub][ePrint]Reducing the Complexity of Normal Basis Multiplication, by Omer Egecioglu and Cetin Kaya Koc[ expand ]


2014-09-02
17:02 [Event][New]ACNS'15: 13th International Conference on Applied Cryptography and Network Security[ expand ]
16:56 [Event][New]Crypto: Crypto 2016[ expand ]
16:56 [Event][New]Crypto: Crypto 2015[ expand ]
09:17 [Pub][ePrint]The Adjacency Graph of Some LFSRs, by Ming Li and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Bits Security of the CDH Problems over Finite Fields, by Mingqiang Wang and Tao Zhan and Haibin Zhang[ expand ]
07:12 [Event][New]ASK 2014: The Fourth Asian Workshop on Symmetric Key Cryptography - Cryptology School[ expand ]
07:03 [Event][New]School on Cryptographic Attacks[ expand ]



2014-09-01
16:33 [Job][New]Ph.D. student or Post-Doc (cryptographic protocols and/or electronic voting), University of Trier, Germany[ expand ]
15:17 [Pub][ePrint]Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards, by Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers[ expand ]
15:17 [Pub][ePrint]Error-Tolerant Algebraic Side-Channel Attacks Using BEE, by Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao[ expand ]
15:17 [Pub][ePrint]A Unified Formalism for Physical Attacks, by Hélène Le Bouder , Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria[ expand ]


2014-08-31
15:17 [Pub][ePrint]Improved Linear Cryptanalysis of Round Reduced SIMON, by Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram and Martin M. Lauridsen[ expand ]
15:17 [Pub][ePrint]Remarks on the Cryptographic Primitive of Attribute-based Encryption, by Zhengjun Cao and Lihua Liu[ expand ]
15:17 [Pub][ePrint]A Counterexample to the Chain Rule for Conditional HILL Entropy, by Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs[ expand ]


2014-08-30
18:17 [Pub][ePrint]Attacks in Stream Ciphers: A Survey, by Gustavo Banegas[ expand ]
15:17 [Pub][ePrint]Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, by Zhen Liu and Zhenfu Cao and Duncan S. Wong[ expand ]
12:17 [Pub][ePrint]The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function, by Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang[ expand ]
00:17 [Pub][ePrint]Efficient RAM and control flow in verifiable outsourced computation, by Riad S. Wahby and Srinath Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish[ expand ]
00:17 [Pub][ePrint]How to Estimate the Success Rate of Higher-Order Side-Channel Attacks, by Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard[ expand ]
00:17 [Pub][ePrint]Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound, by Xiao Shaun Wang and T-H. Hubert Chan and Elaine Shi[ expand ]
00:17 [Pub][ePrint]SCORAM: Oblivious RAM for Secure Computation, by Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi[ expand ]


2014-08-29
02:53 [Event][New]8th International Conference on Cryptology Africacrypt 2015[ expand ]
00:17 [Pub][ePrint]DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity, by Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis[ expand ]
00:17 [Pub][ePrint]On the Communication Complexity of Secure Function Evaluation with Long Output, by Pavel Hubacek and Daniel Wichs[ expand ]
00:17 [Pub][ePrint]Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation, by Ran Cohen and Yehuda Lindell[ expand ]
00:17 [Pub][ePrint]Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings, by Yehuda Lindell and Ben Riva[ expand ]
00:17 [Pub][ePrint]Fully Secure Functional Encryption without Obfuscation, by Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry[ expand ]
00:17 [Pub][ePrint]Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, by Julien Bringer and Claude Carlet and Hervé Chaba[ expand ]
00:17 [Pub][ePrint]On the Optimal Pre-Computation of Window $\\tau$NAF for Koblitz Curves, by William R. Trost and Guangwu Xu[ expand ]
00:17 [Pub][ePrint]Locally Decodable and Updatable Non-Malleable Codes and Their Applications, by Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
00:17 [Pub][ePrint]Outsourced Pattern Matching, by Sebastian Faust and Carmit Hazay and Daniele Venturi[ expand ]
00:17 [Pub][ePrint]One-Round Deniable Key Exchange with Perfect Forward Security, by Weiqiang Wen and Libin Wang and Min Xie[ expand ]



2014-08-28
20:13 [Job][New]Cryptography Engineer, CloudFlare Inc.[ expand ]
15:28 [Event][New]TOC2014: RISC Seminar on Theory of Cryptography[ expand ]


2014-08-27
15:02 [Job][New]Post-Doc, LORIA-CNRS, University of Lorraine, Nancy, France[ expand ]
14:33 [Job][Update]Doctoral Researcher in the collaborative research center CROSSING, Technische Universität Darmstadt, Germany[ expand ]
09:17 [Pub][ePrint]On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks\', by Ashok Kumar Das[ expand ]
09:17 [Pub][ePrint]Balanced permutations Even-Mansour ciphers, by Shoni Gilboa and Shay Gueron[ expand ]
09:17 [Pub][ePrint]The Multiple Number Field Sieve with Conjugation Method, by Cécile Pierrot[ expand ]
09:17 [Pub][ePrint]Revocation in Publicly Verifiable Outsourced Computation, by James Alderman and Carlos Cid and Jason Crampton and Christian Janson[ expand ]
09:17 [Pub][ePrint]Interactive Proofs under Continual Memory Leakage, by Prabhanjan Ananth and Vipul Goyal and Omkant Pandey[ expand ]
09:17 [Pub][ePrint]On the Primitivity of Trinomials over Small Finite Fields, by YUjuan Li and Jinhua Zhao and Huaifu Wang[ expand ]
09:17 [Pub][ePrint]A Class of FSRs and Their Adjacency Graphs, by Ming Li and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]On the cycle decomposition of the WG-NLFSR, by YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou[ expand ]
09:17 [Pub][ePrint]Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE, by Itai Dinur[ expand ]
09:17 [Pub][ePrint]Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms, by Bo Zhu and Xinxin Fan and Guang Gong[ expand ]
09:17 [Pub][ePrint]Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions, by Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay[ expand ]
09:17 [Pub][ePrint]Mersenne factorization factory, by Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra[ expand ]
09:17 [Pub][ePrint]A Dynamic Cube Attack on $105$ round Grain v1, by Subhadeep Banik[ expand ]
09:17 [Pub][ePrint]A note on CCA2-protected McEliece Cryptosystem with a systematic public key, by Pavol Zajac[ expand ]
09:17 [Pub][ePrint]Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model, by Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk[ expand ]
09:17 [Pub][ePrint]FPGA Trojans through Detecting and Weakening of Cryptographic Primitives, by Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar[ expand ]
09:17 [Pub][ePrint]An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\\gf_{2^{2k}}$ from the Inverse Function, by Xi Chen, Yazhi Deng, Min Zhu and Longjiang Qu[ expand ]
09:17 [Pub][ePrint]Universally Composable Secure Group Communication, by TIAN Youliang, PENG Changgen[ expand ]
09:17 [Pub][ePrint]High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems, by Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Dere[ expand ]
09:17 [Pub][ePrint]Graded Multilinear Maps from Lattices, by Craig Gentry and Sergey Gorbunov and Shai Halevi[ expand ]
09:17 [Pub][ePrint]Side Channel Attacks: Vulnerability Analysis of \\texttt{PRINCE} and \\texttt{RECTANGLE} using DPA, by Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai[ expand ]


2014-08-26
18:47 [Event][New]ICITS 2015: 8th International Conference on Information Theoretic Security[ expand ]


2014-08-25
03:14 [Event][New]DIMACS Workshop on The Mathematics of Post-Quantum Cryptography[ expand ]



2014-08-22
03:47 [Event][New]Design and security of crypto algorithms and devices for real-world applications[ expand ]
03:28 [Event][New]Design and security of crypto algorithms and devices for real-world applic.[ expand ]


2014-08-21
15:56 [Event][New]nullcon International Security Conference[ expand ]
03:17 [Pub][ePrint]Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines, by Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas[ expand ]
03:17 [Pub][ePrint]Pattern Matching Encryption, by Melissa Chase and Emily Shen[ expand ]
03:17 [Pub][ePrint]Generic Hardness of the Multiple Discrete Logarithm Problem, by Aaram Yun[ expand ]
03:17 [Pub][ePrint]Improved Timing Attacks on ECDSA, by Vikram Singh[ expand ]
03:17 [Pub][ePrint]Type 2 Structure-Preserving Signature Schemes Revisited, by Sanjit Chatterjee and Alfred Menezes[ expand ]
03:17 [Pub][ePrint]Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP, by Hongda Li, Qihua Niu, Guifang Huang[ expand ]
03:17 [Pub][ePrint]Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity, by Ran Canetti and Abhishek Jain and Omer Paneth[ expand ]
03:17 [Pub][ePrint]Verifiable Member and Order Queries on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia[ expand ]
03:17 [Pub][ePrint]Zipf\'s Law in Passwords, by Ding Wang, Gaopeng Jian, Haibo Cheng, Qianchen Gu, Chen Zhu, Ping Wang[ expand ]


2014-08-20
23:42 [Election]IACR 2014 Election: Nominations open[ expand ]
21:17 [Pub][ePrint]Efficient Oblivious Parallel Array Reads and Writes for Secure Multiparty Computation, by Peeter Laud[ expand ]
21:17 [Pub][ePrint]Realizing two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger[ expand ]
21:17 [Pub][ePrint]An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency, by Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai[ expand ]
21:17 [Pub][ePrint]On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption, by Debrup Chakraborty and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs, by Daniel Genkin and Itamar Pipman and Eran Tromer[ expand ]
01:05 [Event][New]HOST '15: IEEE International Symposium on Hardware-Oriented Security and Trust[ expand ]


2014-08-18
15:54 [Job][New]Postdoc position at the Center for the Theory of Interactive Computation (CTIC), Aarhus University[ expand ]
15:54 [Event][New]EEETEM2015: The International Conference on Electrical and Electronic Engineering Telec[ expand ]



2014-08-17
02:17 [Event][New]DIPDMWC: The International Conference on Digital Information Processing, Data Mining[ expand ]


2014-08-15
15:17 [Pub][ePrint]Pretty Understandable Democracy 2.0, by Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach[ expand ]


2014-08-14
18:18 [Job][New]Security Architect, Nagravision, Cheseaux - Switzerland[ expand ]
00:17 [Pub][ePrint]Fully Secure Attribute Based Encryption from Multilinear Maps, by Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry[ expand ]
00:17 [Pub][ePrint]Privacy and Imperfect Randomness, by Yevgeniy Dodis and Yanqing Yao[ expand ]
00:17 [Pub][ePrint]Expressive and Secure Searchable Encryption in the Public Key Setting, by Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng[ expand ]
00:17 [Pub][ePrint]A Security Analysis of the Composition of ChaCha20 and Poly1305, by Gordon Procter[ expand ]
00:17 [Pub][ePrint]Nearly Practical and Privacy-Preserving Proofs on Authenticated Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
00:17 [Pub][ePrint]KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes, by Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao[ expand ]
00:17 [Pub][ePrint]The M3dcrypt Password Scheme, by Isaiah Makwakwa[ expand ]
00:17 [Pub][ePrint]THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER, by Mohammad Sadegh Nemati Nia, Ali Payandeh[ expand ]
00:17 [Pub][ePrint]Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender, by Florian Böhl and Simon Greiner and Patrik Scheidecker[ expand ]
00:17 [Pub][ePrint]Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe, by zhen Liu and Duncan S. Wong[ expand ]
00:17 [Pub][ePrint]Attribute-Based Encryption Optimized for Cloud Computing, by Máté Horváth[ expand ]
00:17 [Pub][ePrint]Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality, by Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ost[ expand ]
00:17 [Pub][ePrint](Nothing else) MATor(s): Monitoring the Anonymity of Tor\'s Path Selection, by Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi[ expand ]
00:17 [Pub][ePrint]Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation, by Shlomi Dolev and Niv Giboa and Ximing Li[ expand ]
00:17 [Pub][ePrint]Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation, by Craig Gentry[ expand ]


2014-08-13
21:17 [Pub][ePrint]Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps, by Ferucio Laurentiu Tiplea and Constantin Catalin Dragan[ expand ]
21:17 [Pub][ePrint]Adding Controllable Linkability to Pairing-Based Group Signatures For Free, by Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer[ expand ]
21:17 [Pub][ePrint]A Multi-Function Provable Data Possession Scheme in Cloud Computing, by Xiaojun Yu and Qiaoyan Wen[ expand ]
21:17 [Pub][ePrint]On the Limits of Computational Fuzzy Extractors, by Kenji Yasunaga and Kosuke Yuzawa[ expand ]
21:17 [Pub][ePrint]SPOKE: Simple Password-Only Key Exchange in the Standard Model, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
21:17 [Pub][ePrint]Private Web Search with Constant Round Efficiency, by Heeyeon Joo and Myungsun Kim[ expand ]



2014-08-11
15:17 [Pub][ePrint]Recursive Trees for Practical ORAM, by Tarik Moataz and Erik-Oliver Blass and Guevara Noubir[ expand ]
06:17 [Pub][ePrint]DTKI: a new formalized PKI with no trusted parties, by Jiangshan Yu and Vincent Cheval and Mark Ryan[ expand ]
06:17 [Pub][ePrint]A Cryptographic Study of Tokenization Systems, by Sandra D\\\'iaz-Santiago and Lil Mar\\\'ia Rodr\\\'iguez-Henr\\\'iquez and Debrup Chakraborty[ expand ]
06:17 [Pub][ePrint]Adaptive versus Static Security in the UC Model, by Ivan Damgård and Jesper Buus Nielsen[ expand ]


2014-08-10
15:54 [Event][New]Inscrypt 2014: The 10th International Conference on Information Security and Cryptology[ expand ]


2014-08-08
23:09 [Event][New]WCC 2015: The 9th International Workshop on Coding and Cryptography[ expand ]


2014-08-07
17:28 [Event][New]CT-RSA 2015: RSA Conference 2015 Cryptographers' Track[ expand ]
16:59 [Job][New]Cryptography Engineer, Nagravision, Cheseaux - Switzerland[ expand ]
16:58 [Job][Update]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:58 [Job][New]PhD and PostDoc positions in applied cryptography, Radboud University Nijmegen, The Netherlands[ expand ]
16:57 [Event][New]EBECEGC2015: The International Conference on Electrical and Bio-medical Engineering, Cle[ expand ]



2014-08-05
21:17 [Pub][ePrint]Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, by Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Garbled Circuits Without Privacy with Applications To Efficient Zero-Knowledge, by Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi[ expand ]
21:17 [Pub][ePrint]Strong Externalized Universal Composabilit / Generalized UC Revisited, by Jesper Buus Nielsen and Mario Strefler[ expand ]
21:17 [Pub][ePrint]Secure Fingerprint Identification of High Accuracy, by Marina Blanton and Siddharth Saraph[ expand ]
21:17 [Pub][ePrint]Scalable Zero Knowledge via Cycles of Elliptic Curves, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]


2014-08-04
21:40 [Job][New]Ph.D. student, Department of Informatics, University of Bergen, Norway[ expand ]
00:17 [Pub][ePrint]Oblivious Parallel RAM, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]


2014-08-03
13:39 [Job][Update]30+ Open Positions in Crypto & Security, NXP Semiconductors[ expand ]


2014-07-31
21:42 [Event][New]TCC: Theoretical Cryptography Conference[ expand ]
21:17 [Pub][ePrint]Improved Exponential-time Algorithms for Inhomogeneous-SIS, by Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield[ expand ]
21:17 [Pub][ePrint]Multiprecision multiplication on AVR revisited, by Michael Hutter and Peter Schwabe[ expand ]
12:17 [Pub][ePrint]Compact and Side Channel Secure Discrete Gaussian Sampling, by Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede[ expand ]
12:17 [Pub][ePrint]Automated algebraic analysis of structure-preserving signature schemes, by Joeri de Ruiter[ expand ]



2014-07-30
09:17 [Pub][ePrint]Authenticated Key Exchange from Ideal Lattices, by Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook[ expand ]
09:17 [Pub][ePrint]A Punctured Programming Approach to Adaptively Secure Functional Encryption, by Brent Waters[ expand ]
09:17 [Pub][ePrint]Non-interactive zero-knowledge proofs in the quantum random oracle model, by Dominique Unruh[ expand ]
09:17 [Pub][ePrint]An Algebraic Approach to Non-Malleability, by Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald[ expand ]
09:17 [Pub][ePrint]The SPEKE Protocol Revisited, by Feng Hao and Siamak F. Shahandashti[ expand ]
09:17 [Pub][ePrint]Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
09:17 [Pub][ePrint]Template Attacks Based On Priori Knowledge, by Guangjun Fan and Yongbin Zhou and Dengguo Feng[ expand ]
09:17 [Pub][ePrint]NSEC5: Provably Preventing DNSSEC Zone Enumeration, by Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv[ expand ]
09:17 [Pub][ePrint](Hierarchical) Identity-Based Encryption from Affine Message Authentication, by Olivier Blazy and Eike Kiltz and Jiaxin Pan[ expand ]


2014-07-29
18:09 [Job][New]Research Associate, Faculty of Computer Science, University of New Brunswick, Fredericton, Canada[ expand ]
03:52 [Event][New]ICCICS2014: The International Conference on Cyber-Crime Investigation and Cyber Securit[ expand ]
03:52 [Event][New]EECEA2014: The International Conference on Electrical, Electronics, Computer Engineeri[ expand ]


2014-07-27
09:57 [Job][New]Post-Doc, HASLab, INESC TEC, Braga, Portugal[ expand ]


2014-07-25
15:17 [Pub][ePrint]The Hunting of the SNARK, by Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer[ expand ]
15:17 [Pub][ePrint]Scan Based Side Channel Attack on Grain v1, by Sonu Kumar Jha[ expand ]
13:35 [Event][New]COST Action IC1306 - School on Cryptographic Attacks[ expand ]



2014-07-24
15:17 [Pub][ePrint]The Exact PRF-Security of NMAC and HMAC, by Peter Gazi and Krzysztof Pietrzak and Michal Rybár[ expand ]
15:17 [Pub][ePrint]Reducing Communication Overhead of the Subset Difference Scheme, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
15:17 [Pub][ePrint]Vernam Two, by Dan P. Milleville[ expand ]
15:17 [Pub][ePrint]Simple AEAD Hardware Interface (S{\\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor, by Markku-Juhani O. Saarinen[ expand ]
15:17 [Pub][ePrint]Security Analysis of Multilinear Maps over the Integers, by Hyung Tae Lee and Jae Hong Seo[ expand ]
15:17 [Pub][ePrint]A new public key system based on Polynomials over finite fields GF(2), by Gurgen Khachatrian[ expand ]
15:17 [Pub][ePrint]On the Optimality of Differential Fault Analyses on CLEFIA, by Juliane Krämer and Anke Stüber and Ágnes Kiss[ expand ]
15:17 [Pub][ePrint]How to manipulate curve standards: a white paper for the black hat, by Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\\\"ulsing and Tanja Lange and Ruben Niederhagen an[ expand ]
15:17 [Pub][ePrint]Deja Q: Using Dual Systems to Revisit q-Type Assumptions, by Melissa Chase and Sarah Meiklejohn[ expand ]


2014-07-23
00:17 [Pub][ePrint]Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter[ expand ]


2014-07-22
09:17 [Pub][ePrint]New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\\Sigma \\Pi$PKC, by Masao KASAHARA[ expand ]
09:17 [Pub][ePrint]Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai[ expand ]
09:17 [Pub][ePrint]Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz[ expand ]
01:45 [Event][New]FC '15: Financial Cryptography and Data Security 2015[ expand ]


2014-07-21
18:17 [Pub][ePrint]Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker[ expand ]
06:29 [Event][New]NWC: National Workshop on Cryptology[ expand ]



2014-07-19
18:17 [Pub][ePrint]A Security Definition for Multi Secret Sharing and a Scheme Based on LWE, by Massoud Hadian Dehkordi and Reza Ghasemi[ expand ]
06:16 [Job][New]Tenure Track Positions in Computer Eng, CS and IT, University of Washington, Tacoma[ expand ]


2014-07-18
21:17 [Pub][ePrint]Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA, by Aleksandar Kircanski[ expand ]
21:17 [Pub][ePrint]hHB: a Harder HB+ Protocol, by Ka Ahmad Khoureich[ expand ]
21:17 [Pub][ePrint]Performance Increasing Approaches For Binary Field Inversion, by Vladislav Kovtun and Maria Bulakh[ expand ]
21:17 [Pub][ePrint]An Investigation of Some Forward Security Properties for PEKS and IBE, by Qiang Tang[ expand ]
21:17 [Pub][ePrint]Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Double shielded Public Key Cryptosystems, by Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang[ expand ]
21:17 [Pub][ePrint]Round-Efficient Black-Box Construction of Composable Multi-Party Computation, by Susumu Kiyoshima[ expand ]
15:17 [Pub][ePrint]Securing Cloud Data in the New Attacker Model, by Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]General Statistically Secure Computation with Bounded-Resettable Hardware Tokens, by Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges[ expand ]
15:17 [Pub][ePrint]On Virtual Grey Box Obfuscation for General Circuits, by Nir Bitansky and Ran Caentti and Yael Tauman-Kalai and Omer Paneth[ expand ]
15:17 [Pub][ePrint]A Simpler Variant of Universally Composable Security for Standard Multiparty Computation, by Ran Canetti and Asaf Cohen and Yehuda Lindell[ expand ]
15:17 [Pub][ePrint]Efficient Record-Level Keyless Signatures for Audit Logs, by Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards[ expand ]
09:17 [Pub][ePrint]Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation, by Daniel Augot and Pierre-Alain Fouque and Pierre Karpman[ expand ]
09:17 [Pub][ePrint]Function-Private Functional Encryption in the Private-Key Setting, by Zvika Brakerski and Gil Segev[ expand ]
09:17 [Pub][ePrint]New Attacks on the RSA Cryptosystem, by Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig[ expand ]
09:17 [Pub][ePrint]Implicit factorization of unbalanced RSA moduli, by Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin[ expand ]
09:17 [Pub][ePrint]Authentication Schemes Based on Resilient Maps, by Juan Carlos Ku-Cauich and Guillermo Morales-Luna[ expand ]
09:17 [Pub][ePrint]Anonymous and Publicly Linkable Reputation Systems, by Johannes Blömer and Jakob Juhnke and Christina Kolb[ expand ]
09:17 [Pub][ePrint]Solving closest vector instances using an approximate shortest independent vectors oracle, by Chengliang Tian and Wei Wei and Dongdai Lin[ expand ]
09:17 [Pub][ePrint]Secure Mutual Testing Strategy for Cryptographic SoCs, by Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede[ expand ]
09:17 [Pub][ePrint]A Practical Second-Order Fault Attack against a Real-World Pairing Implementation, by Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert[ expand ]
09:17 [Pub][ePrint]On the Multi-output Filtering Model and Its Applications, by Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu[ expand ]
09:17 [Pub][ePrint]EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor, by Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto[ expand ]
09:17 [Pub][ePrint]Optimized Architecture for AES, by Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey[ expand ]
09:17 [Pub][ePrint]Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption, by Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang[ expand ]
09:17 [Pub][ePrint]A Secure Cloud-based NFC Mobile Payment Protocol , by pardis pourghomi and muhammad qasim saeed and george ghinea[ expand ]


2014-07-16
15:25 [Job][New][ expand ]


2014-07-15
19:09 [Job][New]Lecturer and Reader (2 positions); PhD positions, The School of Informatics, University of Edinburgh, UK[ expand ]



2014-07-14
16:55 [Job][Update]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
13:55 [Job][New]PhD Student and Post-Doc, IBM Research - Zurich, Switzerland[ expand ]
11:54 [Event][New]Security and Privacy in Unified Communications: Challenges and Solutions[ expand ]


2014-07-13
13:32 [PhD][New][ expand ]


2014-07-11
11:49 [Event][New]TrustED 2014: International Workshop on Trustworthy Embedded Devices[ expand ]


2014-07-10
16:05 [Job][Update]Research Associate, University of New Brunswick, Fredericton, Canada[ expand ]
16:05 [Job][New][ expand ]
15:17 [Job][New][ expand ]
15:16 [Job][New]Full-Time PhD Position in Cryptographic Protocol Design, University of Twente, The Netherlands[ expand ]
08:40 [Event][New]Cryptography Summer School[ expand ]
08:34 [Event][New]AsiaCCS'15: 10th ACM Symposium on Information, Computer and Communications Security[ expand ]
08:06 [Event][New]FSE 2015: 22nd International Workshop on Fast Software Encryption[ expand ]



2014-07-09
18:17 [Pub][ePrint]Constrained Verifiable Random Functions, by Georg Fuchsbauer[ expand ]
18:17 [Pub][ePrint]On Decomposition of an NFSR into a Cascade Connection of Two Smaller, by Tian Tian and Wen-Feng Qi[ expand ]
18:17 [Pub][ePrint]On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes, by Massimo Chenal and Qiang Tang[ expand ]


2014-07-08
15:17 [Pub][ePrint]Differential Power Analysis of a McEliece Cryptosystem, by Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt[ expand ]
15:17 [Pub][ePrint]Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions, by Jaiganesh Balasundaram[ expand ]
09:17 [Pub][ePrint]On the Pitfalls of using Arbiter-PUFs as Building Blocks, by Georg T. Becker[ expand ]
09:17 [Pub][ePrint]Spatial Bloom Filters: Enabling Privacy in Location-aware Applications, by Paolo Palmieri and Luca Calderoni and Dario Maio[ expand ]
09:17 [Pub][ePrint]FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison, by Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap[ expand ]
09:17 [Pub][ePrint]Leakage-Resilient Signatures with Graceful Degradation, by Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel[ expand ]
09:17 [Pub][ePrint]Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups, by Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin[ expand ]


2014-07-07
12:17 [Forum][2014 Reports] Re: 2014/377 by Boaz123[ expand ]
09:17 [Pub][ePrint]Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory, by Annelie Heuser and Olivier Rioul and Sylvain Guilley[ expand ]
09:17 [Pub][ePrint]Curve41417: Karatsuba revisited, by Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange[ expand ]
09:17 [Pub][ePrint]Differential Analysis on Block Cipher PRIDE, by Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong[ expand ]
09:17 [Pub][ePrint]Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice, by Chunming Tang and Yanfeng Q[ expand ]
09:17 [Pub][ePrint]Fully Secure and Fast Signing from Obfuscation, by Kim Ramchen and Brent Waters[ expand ]
09:17 [Pub][ePrint]Constrained Pseudorandom Functions: Verifiable and Delegatable, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model, by Susan Hohenberger and Venkata Koppula and Brent Waters[ expand ]


2014-07-03
18:17 [Pub][ePrint]On powers of codes, by Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z\\\'emor[ expand ]
18:17 [Pub][ePrint]Realizing Pico: Finally No More Passwords!, by Jens Hermans and Roel Peeters[ expand ]
18:17 [Pub][ePrint]Cryptography from Compression Functions: The UCE Bridge to the ROM, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi[ expand ]
15:55 [Event][New]ICICS2014: The 16th International Conference on Information & Communications Security[ expand ]



2014-07-02
21:17 [Pub][ePrint]On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards, by Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili[ expand ]
21:17 [Pub][ePrint]On the Connection between Leakage Tolerance and Adaptive Security, by Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel[ expand ]
21:17 [Pub][ePrint]On the Classification of Finite Boolean Functions up to Fairness, by Nikolaos Makriyannis[ expand ]
21:17 [Pub][ePrint]Ideal Social Secret Sharing Using Birkhoff Interpolation Method, by Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian[ expand ]


2014-07-01
16:01 [Job][New]Post-Doc, Cryptolux, University of Luxembourg[ expand ]
06:17 [Pub][ePrint]RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data, by Noboru Kunihiro and Junya Honda[ expand ]


2014-06-30
18:17 [Pub][ePrint]Rmind: a tool for cryptographically secure statistical analysis, by Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk[ expand ]
18:17 [Pub][ePrint]Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions, by Johannes Blömer and Gennadij Liske[ expand ]
18:17 [Pub][ePrint]A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher, by Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay[ expand ]
18:17 [Pub][ePrint]Privacy preserving delegated word search in the cloud, by Kaoutar Elkhiyaoui and Melek Onen and Refik Molva[ expand ]
18:17 [Pub][ePrint]Reversing Stealthy Dopant-Level Circuits, by Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino[ expand ]
07:34 [Event][New]ICIEIS2014: International Conference on Informatics Engineering and Information science[ expand ]


2014-06-28
15:17 [Pub][ePrint]How to Generate and use Universal Parameters, by Dakshita Khurana and Amit Sahai and Brent Waters[ expand ]
10:10 [Event][New]ICISSP 2015: 1st International Conference on Information Systems Security and Privacy[ expand ]



2014-06-27
00:17 [Pub][ePrint]A Provable Security Analysis of Intel\'s Secure Key RNG, by Thomas Shrimpton and R. Seth Terashima[ expand ]
00:17 [Pub][ePrint]Efficient Hidden Vector Encryption with Constant-Size Ciphertext, by Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo[ expand ]
00:17 [Pub][ePrint]What\'s the Gist? Privacy-Preserving Aggregation of User Profiles, by Igor Bilogrevic \\and Julien Freudiger \\and Emiliano De Cristofaro \\and Ersin Uzun[ expand ]
00:17 [Pub][ePrint]Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob, by Markku-Juhani O. Saarinen[ expand ]


2014-06-26
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Improved Short Lattice Signatures in the Standard Model, by Léo Ducas and Daniele Micciancio[ expand ]
21:17 [Pub][ePrint]Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer, by Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş[ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Hardness of k-LWE and Applications in Traitor Tracing, by San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld[ expand ]
21:17 [Pub][ePrint]Arithmetic on Abelian and Kummer Varieties, by David Lubicz and Damien Robert[ expand ]


2014-06-25
21:12 [PhD][New]J. C. Migliore[ expand ]
21:12 [PhD][Update]Elisa Gorla: Lifting properties from the general hyperplane section of a projective scheme[ expand ]


2014-06-23
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Bootstrappable Identity-Based Fully Homomorphic Encryption, by Michael Clear and Ciar\\\'{a}n McGoldrick[ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge, by Dan Ding and Guizhen Zhu and Xiaoyun Wang[ expand ]
15:17 [Pub][ePrint]Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson[ expand ]
15:17 [Pub][ePrint]GGHLite: More Efficient Multilinear Maps from Ideal Lattices, by Adeline Langlois and Damien Stehle and Ron Steinfeld[ expand ]
15:17 [Pub][ePrint]Binary Elligator Squared, by Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Universally Composable Non-Interactive Key Exchange, by Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz[ expand ]
09:26 [Job][New]Software Security Engineer, CloudFlare Inc.[ expand ]



2014-06-21
18:26 [PhD][New]San Ling[ expand ]
18:26 [PhD][Update]Lei Wei: Analysis of Iterated Block Ciphers[ expand ]
18:26 [PhD][New]Elisa Gorla[ expand ]
18:25 [PhD][New][ expand ]
18:25 [PhD][New][ expand ]
18:17 [Pub][ePrint]Towards a Unified Theory of Cryptographic Agents, by Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran[ expand ]
18:17 [Pub][ePrint]Even more practical secure logging: Tree-based Seekable Sequential Key Generators, by Giorgia Azzurra Marson and Bertram Poettering[ expand ]
18:17 [Pub][ePrint]Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks, by Benny Applebaum and Eyal Widder[ expand ]
18:17 [Pub][ePrint]Relaxed Two-to-one Recoding Schemes, by Omkant Pandey and Kim Ramchen and Brent Waters[ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint]Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key, by Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich[ expand ]
18:17 [Pub][ePrint][ expand ]
18:17 [Pub][ePrint][ expand ]
06:17 [Pub][ePrint]Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability, by Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin[ expand ]
06:17 [Pub][ePrint]PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption, by Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au[ expand ]
06:17 [Pub][ePrint]Homomorphic Signatures with Efficient Verification for Polynomial Functions, by Dario Catalano, Dario Fiore, and Bogdan Warinschi[ expand ]
06:17 [Pub][ePrint]Privacy-Preserving Auditing for Attribute-Based Credentials, by Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial[ expand ]


2014-06-19
20:11 [Job][New]PhD / MSc. Scholarships , University of New Brunswick, Canada, North America[ expand ]
20:09 [Job][New]
Post-Doc positions, Ecole Normale Supérieure, Lyon, France
Laboratoire de l’Informatique du Parallélisme
[ expand ]
20:08 [Job][New]Post-Doc positions, Ecole Normale Supérieure, Lyon, France
Laboratoire de l’Informatique du Parallélisme
[ expand ]
20:08 [Job][New]Postdoctoral fellow, University of New Brunswick, Canada, North America[ expand ]
20:07 [Job][New]Applied Cryptographer, ID Quantique SA, Geneva, Swiss, Europe[ expand ]


2014-06-17
19:27 [Job][New]Research Assistant (PhD student), University of Paderborn[ expand ]
19:26 [Job][New]Ph.D. student, IMDEA Software Institute, Madrid[ expand ]
19:25 [Event][New]ECC'14: 18th Workshop On Elliptic Curve Cryptography[ expand ]
18:17 [Pub][ePrint]Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens, by Daniel Demmler and Thomas Schneider and Michael Zohner[ expand ]
15:17 [Pub][ePrint]On a new properties of number sequences ,a randomness test and a new RC4\'s key scheduling algorithm., by Samir Bouftass and Abdelhak Azhari[ expand ]
15:17 [Pub][ePrint]Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula, by Jie Chen and Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]Providing Root of Trust for ARM TrustZone using SRAM PUFs, by Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng[ expand ]
15:17 [Pub][ePrint](Leveled) Fully Homomorphic Signatures from Lattices, by Sergey Gorbunov and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps, by Constantin Catalin Dragan and Ferucio Laurentiu Tiplea[ expand ]
15:17 [Pub][ePrint]Provably secure and efficient certificateless signature in the standard model, by Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang[ expand ]


2014-06-15
12:17 [Pub][ePrint]FleXOR: Flexible garbling for XOR gates that beats free-XOR, by Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek[ expand ]
12:17 [Pub][ePrint]Template Attacks on Different Devices, by Omar Choudary and Markus G. Kuhn[ expand ]
12:17 [Pub][ePrint]Automated Analysis of Cryptographic Assumptions in Generic Group Models, by Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt[ expand ]
12:17 [Pub][ePrint]Transcript Secure Signatures Based on Modular Lattices, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte[ expand ]
12:17 [Pub][ePrint]Verified Implementations for Secure and Verifiable Computation, by José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pie[ expand ]
12:17 [Pub][ePrint]Single-shot security for one-time memories in the isolated qubits model, by Yi-Kai Liu[ expand ]
06:17 [Pub][ePrint]Early Propagation and Imbalanced Routing, How to Diminish in FPGAs, by Amir Moradi and Vincent Immler[ expand ]
06:17 [Pub][ePrint]Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version, by Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın[ expand ]
06:17 [Pub][ePrint]Proof of Activity: Extending Bitcoin\'s Proof of Work via Proof of Stake, by Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld[ expand ]
06:17 [Pub][ePrint]Leveled Fully Homomorphic Signatures from Standard Lattices, by Daniel Wichs[ expand ]



2014-06-14
15:17 [Pub][ePrint]Optimized Implementation of General Secret Sharing Scheme , by Lein Harn and Ching-Fang Hsu*[ expand ]
06:17 [Pub][ePrint]Related Key Secure PKE from Hash Proof Systems, by Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei[ expand ]
06:17 [Pub][ePrint]Improved Differential Attacks on Reduced SIMON Versions, by Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao[ expand ]
06:17 [Pub][ePrint]Faster Private Set Intersection based on OT Extension, by Benny Pinkas and Thomas Schneider and Michael Zohner[ expand ]


2014-06-13
18:17 [Pub][ePrint]4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes, by Valerie Nachef and Jacques Patarin and Emmanuel Volte[ expand ]
15:17 [Pub][ePrint]Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations, by Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp[ expand ]
12:59 [News]Calls for IACR Cryptology School Proposals[ expand ]
12:17 [Pub][ePrint]RPKI vs ROVER: Comparing the Risks of BGP Security Solutions, by Aanchal Malhotra and Sharon Goldberg[ expand ]
12:08 [Event][New]ICMC 2015: The second International Conference on Mathematics and Computing[ expand ]
06:17 [Pub][ePrint]Minimizing the Two-Round Even-Mansour Cipher, by Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger[ expand ]
06:17 [Pub][ePrint]Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix, by Xing Hu and Chunming Tang[ expand ]
06:17 [Pub][ePrint]Improved Generic Attacks Against Hash-based MACs and HAIFA, by Itai Dinur and Gaëtan Leurent[ expand ]


2014-06-12
06:17 [Pub][ePrint]Synthesis of Fault Attacks on Cryptographic Implementations, by Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz[ expand ]
06:17 [Pub][ePrint]Wait a minute! A fast, Cross-VM attack on AES, by Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar[ expand ]
06:17 [Pub][ePrint]Just a Little Bit More, by Joop van de Pol and Nigel P. Smart and Yuval Yarom[ expand ]
06:17 [Pub][ePrint]Double Level Montgomery Cox-Rower Architecture, New Bounds, by Jean-Claude Bajard and Nabil Merkiche[ expand ]
06:17 [Pub][ePrint]Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions, by Chunming Tang, Yuenai Chen[ expand ]
06:17 [Pub][ePrint]Security of Symmetric Encryption against Mass Surveillance, by Mihir Bellare and Kenneth Paterson and Phillip Rogaway[ expand ]
06:17 [Pub][ePrint]Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, by Jingguo Bi and Jean-S\\\'ebastien Coron and Jean-Charles Faug\\`ere and Phong Q. Nguyen and Gu\\\'ena\\\"[ expand ]
03:17 [Pub][ePrint]A Statistical Model for Higher Order DPA on Masked Devices, by A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo[ expand ]
03:17 [Pub][ePrint]Composable Authentication with Global PKI, by Ran Canetti and Daniel Shahaf and Margarita Vald[ expand ]
03:17 [Pub][ePrint]RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification, by Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas [ expand ]
03:17 [Pub][ePrint]Revisiting the Gentry-Szydlo Algorithm, by H. W. Lenstra and A. Silverberg[ expand ]


2014-06-11
21:17 [Pub][ePrint]Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment, by Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven[ expand ]
13:06 [Job][New]Post-Doctoral Researcher (junior or senior, depending on record), Universitat Rovira i Virgili, Tarragona, Catalonia, Spain[ expand ]
08:13 [Event][New]CrossFyre: 4th Workshop on Crypto, Robustness, and Secure Schemes for Females[ expand ]



2014-06-10
21:17 [Pub][ePrint]Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More, by Nuttapong Attrapadung[ expand ]
17:49 [Job][Update]Faculty , Istanbul Technical University, Istanbul, Turkey[ expand ]
17:49 [Job][New]PhD studentship in Hardware Security, University of Cambridge, England, UK, European Union[ expand ]
17:33 [Event][New]DIAC 2014: Directions in Authenticated Ciphers[ expand ]
17:18 [Event][New]PKC 2015: 18th Int'l Conference on Practice and Theory in Public-Key Cryptography[ expand ]


2014-06-09
17:41 [Job][New]Research Scientist, Temasek Laboratories, National University of Singapore, Singapore[ expand ]
17:41 [Job][New]PhD studentship , University of Birmingham, UK[ expand ]
17:41 [Job][New]Faculty , Istanbul Technical University, Istanbul, Turkey[ expand ]
17:40 [Event][New]ISCTURKEY 2014: International Conference on Information Security and Cryptology[ expand ]
17:39 [Event][New]WPES 2014: Workshop on Privacy in the Electronic Society[ expand ]


2014-06-06
15:17 [Pub][ePrint]Fast point multiplication algorithms for binary elliptic curves with and without precomputation, by Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez[ expand ]
15:17 [Pub][ePrint]Efficient Authentication and Pseudorandomness from Weaker (Ring-)LPN Assumptions, by Ivan Damg{\\aa}rd and Sunoo Park and Sarah Zakarias[ expand ]
15:17 [Pub][ePrint]Note of Multidimensional MITM Attack on 25-Round TWINE-128, by Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen[ expand ]
15:17 [Pub][ePrint]Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants, by Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang[ expand ]
06:17 [Pub][ePrint]The Hash Function \"Fugue\", by Shai Halevi and William E. Hall and Charanjit S. Jutla[ expand ]
06:17 [Pub][ePrint]System-level non-interference for constant-time cryptography, by Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie[ expand ]
06:17 [Pub][ePrint]FNR : Arbitrary length small domain block cipher proposal, by Sashank Dara, Scott Fluhrer[ expand ]


2014-06-05
21:17 [Pub][ePrint]Bounded Fully Homomorphic Signature Schemes, by Xiang Xie and Rui Xue[ expand ]
21:17 [Pub][ePrint]FFS Factory: Adapting Coppersmith\'s \"Factorization Factory\" to the Function Field Sieve, by J\\\'er\\\'emie Detrey[ expand ]
21:17 [Pub][ePrint]A Simple Recursive Tree Oblivious RAM, by Benny Pinkas and Tzachy Reinman[ expand ]
21:17 [Pub][ePrint]Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions, by Inna Polak, Adi Shamir[ expand ]
21:17 [Pub][ePrint]Adaptive Security of Constrained PRFs, by Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao[ expand ]
21:17 [Pub][ePrint]Virtual Proofs of Reality, by Ulrich Rührmair[ expand ]



2014-06-04
15:17 [Pub][ePrint]A Security Proof of KCDSA using an extended Random Oracle Model, by Vikram Singh[ expand ]
15:17 [Pub][ePrint]On the Cost of Lazy Engineering for Masked Software Implementations, by Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves De[ expand ]
15:17 [Pub][ePrint]Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices), by Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar[ expand ]
15:17 [Pub][ePrint]Soft Analytical Side-Channel Attacks, by Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]Moments-Correlating DPA, by Amir Moradi and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]Bootstrapping BGV Ciphertexts With A Wider Choice of p and q., by Emmanuela Orsini and Joop van de Pol and Nigel P. Smart[ expand ]
05:36 [Pub]New Reviews[ expand ]


2014-06-02
17:33 [Event][New]ICISC 2014: The Annual International Conference on Information Security and Cryptology[ expand ]
14:08 [Job][New]Research Associate (Post-Doc), University College London, the Greater Britain, Europe[ expand ]
09:17 [Pub][ePrint]Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy, by Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin[ expand ]
09:17 [Pub][ePrint]New Generic Attacks Against Hash-based MACs, by Gaëtan Leurent and Thomas Peyrin and Lei Wang[ expand ]
09:17 [Pub][ePrint]Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input, by Christina Brzuska and Arno Mittelbach[ expand ]
09:17 [Pub][ePrint]Large-Scale Secure Computation, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]
09:17 [Pub][ePrint]Generic Universal Forgery Attack on Iterative Hash-based MACs, by Thomas Peyrin and Lei Wang[ expand ]
09:17 [Pub][ePrint]On the Existence of Extractable One-Way Functions, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
09:17 [Pub][ePrint]Software implementation of an Attribute-Based Encryption scheme, by Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodr[ expand ]
09:17 [Pub][ePrint]Composable Oblivious Extended Permutations, by Peeter Laud and Jan Willemson[ expand ]
09:17 [Pub][ePrint]An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme, by Dustin Moody and Ray Perlner and Daniel Smith-Tone[ expand ]
09:17 [Pub][ePrint]Differential Properties of the HFE Cryptosystem, by Taylor Daniels and Daniel Smith-Tone[ expand ]
06:17 [Forum][2014 Reports] 2014/377 by Orr[ expand ]


2014-05-30
15:17 [Pub][ePrint]Cofactorization on Graphics Processing Units, by Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, and Arjen K. Lenstra[ expand ]
15:17 [Pub][ePrint]Almost Optimal Short Adaptive Non-Interactive Zero Knowledge, by Helger Lipmaa[ expand ]
15:17 [Pub][ePrint]Lightweight and Privacy-Preserving Delegatable Proofs of Storage, by Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]Relational Hash, by Avradip Mandal and Arnab Roy[ expand ]
15:17 [Pub][ePrint](Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions, by Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng[ expand ]
15:17 [Pub][ePrint]The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions, by Yu Yu and Dawu Gu and Xiangxue Li[ expand ]
15:17 [Pub][ePrint]MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud, by Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen[ expand ]
15:17 [Pub][ePrint]Black-Box Non-Black-Box Zero Knowledge, by Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti[ expand ]
15:17 [Pub][ePrint]Accelerating NTRU based Homomorphic Encryption using GPUs, by Wei Dai and Yark{\\i}n Dor\\\"{o}z and Berk Sunar[ expand ]
15:17 [Pub][ePrint]Finding collisions for MD4 hash algorithm using hybrid algorithm, by Marko Carić[ expand ]
15:17 [Pub][ePrint]New candidates for multivariate trapdoor functions, by Jaiberth Porras, John B. Baena, Jintai Ding[ expand ]
15:17 [Pub][ePrint]Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers, by Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede[ expand ]
15:17 [Pub][ePrint]Jacobian Coordinates on Genus 2 Curves, by Huseyin Hisil and Craig Costello[ expand ]
06:23 [Job][New]Lecturer/Senior Lecturer in Cyber Security
(equiv. to Assistant/Associate Professor), Surrey Centre for Cyber Security, Department of Computing, University of Surrey, Guildford, UK
[ expand ]


2014-05-28
18:17 [Pub][ePrint]Yao\'s millionaires\' problem and decoy-based public key encryption by classical physics, by Dima Grigoriev and Vladimir Shpilrain[ expand ]
18:17 [Pub][ePrint]Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System, by Younsung Choi, Dongho Won[ expand ]
18:17 [Pub][ePrint]Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation, by Felix Günther and Mark Manulis and Andreas Peter[ expand ]
18:17 [Pub][ePrint]Using Indistinguishability Obfuscation via UCEs, by Christina Brzuska and Arno Mittelbach[ expand ]
18:17 [Pub][ePrint]Efficient Adaptively Secure IBBE from Standard Assumptions, by Somindu C. Ramanna and Palash Sarkar[ expand ]
18:17 [Pub][ePrint]Hyper-and-elliptic-curve cryptography, by Daniel J. Bernstein and Tanja Lange[ expand ]
18:17 [Pub][ePrint]Attacks on Lin\'s Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps, by SK Hafizul Islam[ expand ]
18:17 [Pub][ePrint]Logic Synthesis based Public Key Scheme, by Boaz Shahar[ expand ]
18:17 [Pub][ePrint]How Secure is Deterministic Encryption?, by Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi[ expand ]
18:17 [Pub][ePrint]Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version), by Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li[ expand ]



2014-05-27
12:17 [Pub][ePrint]Optimal Contracts for Outsourced Computation, by Viet Pham and MHR. Khouzani and Carlos Cid[ expand ]
12:17 [Pub][ePrint]Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes, by Philipp Jovanovic and Atul Luykx and Bart Mennink[ expand ]
12:17 [Pub][ePrint]Fully secure constrained pseudorandom functions using random oracles, by Dennis Hofheinz[ expand ]
12:17 [Pub][ePrint]On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography, by Christophe Doche[ expand ]
12:17 [Pub][ePrint]Compact VSS and Efficient Homomorphic UC Commitments, by Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen[ expand ]
12:17 [Pub][ePrint]On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness, by Michèle Feltz and Cas Cremers[ expand ]
12:17 [Pub][ePrint]Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster, by Erich Wenger and Paul Wolfger[ expand ]
12:17 [Pub][ePrint]Redefining the Transparency Order, by Kaushik Chakraborty and Subhamoy Maitra and Sumanta Sarkar and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay[ expand ]
12:17 [Pub][ePrint]Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System, by Younsung Choi and Dongho Won[ expand ]
12:17 [Pub][ePrint]Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer, by Luke Mather and Elisabeth Oswald and Carolyn Whitnall[ expand ]
11:42 [News]Fellows 2014[ expand ]
06:59 [Event][New]CryptoBG*2014: CryptoBG*2014: Cryptology and Cyber Resilience[ expand ]
06:59 [Event][New]UbiCrypt Summer School crypt@b-it 2014[ expand ]


2014-05-25
12:17 [Pub][ePrint]Deleting Secret Data with Public Verifiability, by Feng Hao and Dylan Clarke and Avelino Francisco Zorzo[ expand ]
12:17 [Pub][ePrint]Forging Attacks on two Authenticated Encryptions COBRA and POET, by Mridul Nandi[ expand ]
12:17 [Pub][ePrint]Nothing is for Free: Security in Searching Shared & Encrypted Data, by Qiang Tang[ expand ]
12:17 [Pub][ePrint]New Results in the Linear Cryptanalysis of DES, by Igor Semaev[ expand ]


2014-05-24
18:33 [Job][New]Post-Doc, Cryptology Group, CWI, Amsterdam, The Netherlands[ expand ]


2014-05-23
13:11 [Job][New][ expand ]
09:17 [Pub][ePrint]McEliece in the world of Escher, by Danilo Gligoroski and Simona Samardjiska and H{\\aa}kon Jacobsen and Sergey Bezzateev[ expand ]
09:17 [Pub][ePrint]Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations, by Eduardo Ruiz Duarte and Octavio P\\\'{a}ez Osuna[ expand ]
09:17 [Pub][ePrint]A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, by Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won[ expand ]



2014-05-22
16:40 [PhD][Update]Nizamuddin: On the Design of signcryption Schemes[ expand ]
16:40 [PhD][Update]Mehmet Sabir Kiraz: Secure and Fair Two-Party Computation[ expand ]
16:39 [PhD][New]Zubair Naqvi: Security using Cryptographic Systems in Banks[ expand ]
16:39 [PhD][New]George Summers: Cryptographic Systems[ expand ]
16:38 [PhD][New][ expand ]
16:37 [PhD][New]Josep Balasch: Implementation Aspects of Security and Privacy in Embedded Design[ expand ]
09:17 [Pub][ePrint]Making and Breaking Leakage Simulators, by Jake Longo Galea and Daniel Martin and Elisabeth Oswald and Daniel Page and Martijn Stam[ expand ]
09:17 [Pub][ePrint]Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits, by Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod[ expand ]
09:17 [Pub][ePrint]Graph-theoretic design and analysis of key predistribution schemes, by Michelle Kendall and Keith M. Martin[ expand ]
09:17 [Pub][ePrint]Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes, by Ray Perlner[ expand ]
09:17 [Pub][ePrint]Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups, by Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich[ expand ]


2014-05-21
10:16 [Job][New]Lecturer (Assistant/Associate Professor equivalent), University of Bristol, United Kingdom of Greater Britan and Norther Ireland, EU[ expand ]


2014-05-20
09:17 [Pub][ePrint]Multi-Vendor PayWord with Payment Approval, by Andrea Huszti[ expand ]
09:17 [Pub][ePrint]Secret and Verifiable Delegated Voting for Wide Representation, by Yefim Leifman[ expand ]


2014-05-19
18:17 [Pub][ePrint]Zerocash: Decentralized Anonymous Payments from Bitcoin, by Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza[ expand ]
18:17 [Pub][ePrint]A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards, by Helger Lipmaa[ expand ]
18:17 [Pub][ePrint]One-Way Functions and (Im)perfect Obfuscation, by Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev[ expand ]
18:17 [Pub][ePrint]Time-Memory Trade-offs for Index Calculus in Genus 3, by Kim Laine and Kristin Lauter[ expand ]
18:17 [Pub][ePrint]Private Database Access With HE-over-ORAM Architecture, by Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova[ expand ]
18:17 [Pub][ePrint]Toward Robust Hidden Volumes using Write-Only Oblivious RAM, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu[ expand ]
18:17 [Pub][ePrint]New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications, by Yao Lu and Rui Zhang and Dongdai Lin[ expand ]
18:17 [Pub][ePrint]Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis, by Zoya Dyka, Thomas Basmer, Christian Wittke and Peter [ expand ]
18:17 [Pub][ePrint]Distributed Smooth Projective Hashing and its Application to Two-Server PAKE, by Franziskus Kiefer and Mark Manulis[ expand ]
14:43 [Job][New]Ph.D. / M.Sc. Scholarships and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, Istanbul, Turkey[ expand ]
08:00 [Job][New]Professor in Cryptography (W1 - non-tenured), Ruhr-Universität Bochum, Germany[ expand ]



2014-05-15
09:17 [Pub][ePrint]Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, by Ralf Kuesters and Tomasz Truderung and Andreas Vogt[ expand ]
09:17 [Pub][ePrint]A Strong and Efficient Certificateless Digital Signature Scheme, by Mohammed Alfateh Hassouna and Mohsin Hashim[ expand ]
09:17 [Pub][ePrint]Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds, by Yi Deng[ expand ]
09:17 [Pub][ePrint]A Tamper and Leakage Resilient Random Access Machine, by Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Related Randomness Attacks for Public Key Encryption, by Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn[ expand ]
09:17 [Pub][ePrint]Private Predictive Analysis on Encrypted Medical Data, by Joppe W. Bos and Kristin Lauter and Michael Naehrig[ expand ]
09:17 [Pub][ePrint]Shadow Numbers Public Key Encryption, by John Almeida[ expand ]
09:17 [Pub][ePrint]LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions, by Rachid El Bansarkhani and Johannes Buchmann[ expand ]
00:19 [News]Mass Surveillance and the Subversion of Cryptography[ expand ]


2014-05-13
09:17 [Pub][ePrint]An optimal representation for the trace zero subgroup, by Elisa Gorla and Maike Massierer[ expand ]
09:17 [Pub][ePrint]Using More Points in One Clock Cycle to Achieve Better Performance of Template Attacks, by Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng[ expand ]
09:17 [Pub][ePrint]Machine Learning Classification over Encrypted Data, by Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser[ expand ]
09:17 [Pub][ePrint]Build a Compact Cryptocurrency System Purely Based on PoS, by qianxiaochao[ expand ]
09:17 [Pub][ePrint]Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal, by Berry Schoenmakers[ expand ]
09:17 [Pub][ePrint]Affine-evasive Sets Modulo a Prime, by Divesh Aggarwal[ expand ]
09:17 [Pub][ePrint]An Optimal Strong Password Authentication Protocol with USB Sticks, by Vikram D[ expand ]


2014-05-12
06:17 [Pub][ePrint]FeW: A Lightweight Block Cipher, by Manoj Kumar and Saibal K Pal and Anupama Panigrahi[ expand ]


2014-05-10
09:17 [Pub][ePrint]A practical forgery and state recovery attack on the authenticated cipher PANDA-s, by Xiutao FENG, Fan ZHANG and Hui WANG[ expand ]
09:17 [Pub][ePrint]From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes, by Sandro Coretti and Ueli Maurer Björn Tackmann and Daniele Venturi}[ expand ]



2014-05-08
09:17 [Pub][ePrint]Some Remarks on Honeyword Based Password-Cracking Detection, by Imran Erguler[ expand ]


2014-05-07
18:21 [News]Volunteers wanted for IACR online services[ expand ]
09:17 [Pub][ePrint]Coding Theoretic Construction of Quantum Ramp Secret Sharing, by Ryutaroh Matsumoto[ expand ]


2014-05-06
12:17 [Pub][ePrint]Efficient Quantum-Immune Keyless Signatures with Identity, by Ahto Buldas and Risto Laanoja and Ahto Truu[ expand ]
12:17 [Pub][ePrint]Improved Differential Cryptanalysis of Round-Reduced Speck, by Itai Dinur[ expand ]
12:17 [Pub][ePrint]Preimage attacks on Reduced-round Stribog, by Riham AlTawy and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Index calculus in the trace zero variety, by Elisa Gorla and Maike Massierer[ expand ]
12:17 [Pub][ePrint]Analysis of NORX, by Philipp Jovanovic and Samuel Neves and Jean-Philippe Aumasson[ expand ]
12:17 [Pub][ePrint]Explicit Non-Malleable Codes Resistant to Permutations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran[ expand ]
06:40 [Event][New]EC'15: Eurocrypt 2015[ expand ]
05:00 [Job][New]Ph. D student, CEA SAS (Secure Architectures & Systems) Lab, France[ expand ]


2014-05-05
12:17 [Pub][ePrint]Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R, by Bartosz Zoltak[ expand ]



2014-05-04
18:17 [Pub][ePrint]Statistical weaknesses in 20 RC-4 like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R, by Bartosz Zoltak[ expand ]
18:17 [Pub][ePrint]Improved Leakage Model Based on Genetic Algorithm, by Zhenbin Zhang and Liji Wu[ expand ]


2014-05-02
18:17 [Pub][ePrint]On the Complexity of Finding Low-Level Solutions, by Bjoern Grohmann[ expand ]


2014-05-01
18:17 [Pub][ePrint]Structure-Preserving Signatures from Type II Pairings, by Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi[ expand ]
03:17 [Pub][ePrint]Exponent-inversion Signatures and IBE under Static Assumptions, by Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu[ expand ]
03:17 [Pub][ePrint]Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited, by Yu Chen and Qiong Huang and Zongyang Zhang[ expand ]
00:17 [Pub][ePrint]Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption, by Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters[ expand ]


2014-04-30
21:17 [Pub][ePrint]The Locality of Searchable Symmetric Encryption, by David Cash and Stefano Tessaro[ expand ]
21:17 [Pub][ePrint]Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks, by Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni[ expand ]
21:17 [Pub][ePrint]Publicly Evaluable Pseudorandom Functions and Their Applications, by Yu Chen and Zongyang Zhang[ expand ]
21:17 [Pub][ePrint]Collision Attack on 5 Rounds of Grøstl, by Florian Mendel and Vincent Rijmen and Martin Schläffer[ expand ]
21:17 [Pub][ePrint]Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead, by Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida[ expand ]
21:17 [Pub][ePrint]On the security of Xu et al.\'s authentication and key agreement scheme for telecare medicine information systems, by SK Hafizul Islam[ expand ]
21:17 [Pub][ePrint]Branching Heuristics in Differential Collision Search with Applications to SHA-512, by Maria Eichlseder and Florian Mendel and Martin Schläffer[ expand ]
15:17 [Pub][ePrint]How to Avoid Obfuscation Using Witness PRFs, by Mark Zhandry[ expand ]
15:17 [Pub][ePrint]On the Powers of 2, by Robert Granger and Thorsten Kleinjung and Jens Zumbr\\\"agel[ expand ]
15:17 [Pub][ePrint]Optimality of Non-Adaptive Strategies: The Case of Parallel Games, by Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann[ expand ]
12:17 [Pub][ePrint]Torsion Limits and Riemann-Roch Systems for Function Fields and Applications, by Ignacio Cascudo and Ronald Cramer and Chaoping Xing[ expand ]
12:17 [Pub][ePrint]Pipelineable On-Line Encryption, by Farzaneh Abed and Scott Fluhrer and John Foley and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel[ expand ]
12:17 [Pub][ePrint]Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding, by Andris Ambainis and Ansis Rosmanis and Dominique Unruh[ expand ]
06:17 [Pub][ePrint]ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation, by Nir Bitansky and Omer Paneth[ expand ]
06:17 [Pub][ePrint]The M3lcrypt Password Based Key Derivation Function, by Isaiah Makwakwa[ expand ]
06:17 [Pub][ePrint]An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol, by Xi-Jun Lin and Lin Sun[ expand ]



2014-04-29
21:17 [Pub][ePrint]Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256, by Leibo Li and Keting Jia[ expand ]
21:17 [Pub][ePrint]Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗, by Antonio Sanso[ expand ]
11:39 [Event][New][ expand ]


2014-04-28
07:54 [PhD][Update]Nicolas Moro: Security of assembly programs against attacks on embedded processors[ expand ]


2014-04-27
00:17 [Pub][ePrint]Optimal Resilience Broadcast against Locally Bounded and General Adversaries, by Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas[ expand ]
00:17 [Pub][ePrint]An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation, by Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft[ expand ]
00:17 [Pub][ePrint]Resilient Aggregation in Simple Linear Sensor Networks, by Kevin J. Henry and Douglas R. Stinson[ expand ]
00:17 [Pub][ePrint][ expand ]
00:17 [Pub][ePrint]Weaknesses of Password Authentication Scheme Based on Geometric Hashing, by Martin Stanek[ expand ]


2014-04-25
13:40 [Event][New]ASK 2014: The Fourth Asian Workshop on Symmetric Key Cryptography[ expand ]
00:17 [Pub][ePrint]Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions, by Essam Ghadafi[ expand ]
00:17 [Pub][ePrint]Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials, by David Derler and Christian Hanser and Daniel Slamanig[ expand ]
00:17 [Pub][ePrint]Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way, by Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam[ expand ]
00:17 [Pub][ePrint]Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions, by Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie[ expand ]
00:17 [Pub][ePrint]On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation, by Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen[ expand ]
00:17 [Pub][ePrint]WCFB: a tweakable wide block cipher, by Andrey Jivsov[ expand ]
00:17 [Pub][ePrint]MSEA: Modified Symmetric Encryption Algorithm, by Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh[ expand ]
00:17 [Pub][ePrint]Improved Impossible Differential Attacks against Round-Reduced LBlock, by Christina Boura and Marine Minier and Mar\\\'ia Naya-Plasencia and Valentin Suder[ expand ]



2014-04-24
09:09 [Event][New]STM 2014: 10th International Workshop on Security and Trust Management[ expand ]


2014-04-23
09:10 [Event][New]SSP: IEEE Symposium on Security and Privacy[ expand ]
09:09 [Event][New]AsiaJCIS 2014: 9th Asia Joint Conference on Information Security (AsiaJCIS 2014) 9th Asia[ expand ]
09:09 [Job][New]Full-Time PhD Position in Privacy-Preserving Data Mining, University of Twente, the Netherlands[ expand ]
09:08 [Job][New]Post-doctoral research fellow, Queensland University of Technology, Brisbane, Australia[ expand ]
09:08 [Job][New]Cryptographer, USMobile, Inc., North America[ expand ]


2014-04-22
00:17 [Pub][ePrint]New Treatment of the BSW Sampling and Its Applications to Stream Ciphers, by Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi[ expand ]
00:17 [Pub][ePrint]Design of identity-based digital signature schemes using extended chaotic maps, by SK Hafizul Islam[ expand ]
00:17 [Pub][ePrint]Identity-based encryption and digital signature schemes using extended chaotic maps, by SK Hafizul Islam[ expand ]
00:17 [Pub][ePrint]Weak instances of composite order protocols, by Sorina Ionica and Malika Izabachène[ expand ]
00:17 [Pub][ePrint]Witness Encryption from Instance Independent Assumptions, by Craig Gentry and Allison Bishop Lewko and Brent Waters[ expand ]
00:17 [Pub][ePrint]Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm, by Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su[ expand ]


2014-04-21
21:17 [Pub][ePrint]STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation, by Markku-Juhani O. Saarinen[ expand ]
21:17 [Pub][ePrint]Faster Maliciously Secure Two-Party Computation Using the GPU, by Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen[ expand ]
21:17 [Pub][ePrint]Chosen Ciphertext Security via Point Obfuscation, by Takahiro Matsuda and Goichiro Hanaoka[ expand ]
21:17 [Pub][ePrint]A low complexity bit-parallel Montgomery multiplier based on squaring for trinomials , by Yin Li and Yiyang Chen[ expand ]
21:17 [Pub][ePrint]Differential Fault Analysis on SIMON and SPECK ciphers, by Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay[ expand ]



2014-04-20
18:17 [Pub][ePrint]ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption, by Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Sre[ expand ]
18:17 [Pub][ePrint]Dual System Groups and its Applications --- Compact HIBE and More, by Jie Chen and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Continuous After-the-fact Leakage-Resilient Key Exchange (full version), by Janaka Alawatugoda and Colin Boyd and Douglas Stebila[ expand ]
18:17 [Pub][ePrint]A Generic Scan Attack on Hardware based eStream Winners, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Differential Fault Analysis of MICKEY Family of Stream Ciphers, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Fault Analysis of Grain Family of Stream Ciphers, by Sandip Karmakar and Dipanwita Roy Chowdhury[ expand ]
18:17 [Pub][ePrint]Locally Decodable Codes for edit distance, by Rafail Ostrovsky and Anat Paskin-Cherniavsky[ expand ]
18:17 [Pub][ePrint]Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function, by Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
18:17 [Pub][ePrint]A realtime key recovery attack on the authenticated cipher FASER128, by Xiutao FENG and Fan ZHANG[ expand ]
18:17 [Pub][ePrint]Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem, by Bruce Kallick[ expand ]
18:17 [Pub][ePrint]Private and Dynamic Time-Series Data Aggregation with Trust Relaxation, by Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva[ expand ]
18:17 [Pub][ePrint]Certification and Efficient Proofs of Committed Topology Graphs, by Thomas Gross[ expand ]
18:17 [Pub][ePrint]Enhanced Lattice-Based Signatures on Reconfigurable Hardware, by Thomas P\\\"oppelmann and L{\\\'e}o Ducas and Tim G\\\"uneysu[ expand ]
18:17 [Pub][ePrint]Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems, by Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng[ expand ]
18:17 [Pub][ePrint]Making RSA-PSS Provably Secure Against Non-Random Faults, by Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
18:17 [Pub][ePrint]Forgery on Stateless CMCC, by Guy Barwell[ expand ]
18:17 [Pub][ePrint]Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme, by Boaz Tsaban and Noam Lifshitz[ expand ]
18:17 [Pub][ePrint]Linear Extension Cube Attack on Stream Ciphers, by Liren Ding, Yongjuan Wang, Zhufeng Li[ expand ]
15:17 [Pub][ePrint]Fine grain Cross-VM Attacks on Xen and VMware are possible!, by Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar[ expand ]
15:17 [Pub][ePrint]Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange, by Ivan Pryvalov and Aniket Kate[ expand ]
03:07 [Event][New]ISC '14: Information Security Conference[ expand ]


2014-04-18
09:17 [Pub][ePrint]Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme, by Kwangsu Lee and Dong Hoon Lee[ expand ]
09:17 [Pub][ePrint]A practical state recovery attack on the stream cipher Sablier v1, by Xiutao FENG and Fan ZHANG[ expand ]
06:17 [Pub][ePrint]bitcoin.BitMint: Reconciling Bitcoin with Central Banks, by Gideon Samid[ expand ]
06:17 [Pub][ePrint]Key Derivation From Noisy Sources With More Errors Than Entropy, by Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin[ expand ]
06:17 [Pub][ePrint]Zero-Knowledge Password Policy Checks and Verifier-Based PAKE, by Franziskus Kiefer and Mark Manulis[ expand ]
06:17 [Pub][ePrint]A New Way to Prevent UKS Attacks Using Trusted Computing, by Qianying Zhang and Shijun Zhao and Dengguo Feng[ expand ]


2014-04-17
05:24 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]


2014-04-15
09:17 [Pub][ePrint]Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries, by Martin Pettai and Peeter Laud[ expand ]
09:17 [Pub][ePrint]Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5, by Florian Legendre and Gilles Dequen and Michaël Krajecki[ expand ]



2014-04-14
12:01 [Conf]Proceedings PKC 2014 online[ expand ]
11:07 [Event][New]SCN 2014: 9th Conference on Security and Cryptography for Networks[ expand ]
11:06 [Event][New]Indocrypt: 15th International Conference on Cryptology, Indocrypt[ expand ]
06:19 [Job][New]PhD Student, PhD positions at CTIC, Aarhus University, Denmark, Northern Europe[ expand ]
06:19 [Job][New]Ph.D. Scholarship in Computer Science (3 years full time), University of Wollongong, Australia[ expand ]


2014-04-11
21:17 [Pub][ePrint]High Parallel Complexity Graphs and Memory-Hard Functions, by Joel Alwen and Vladimir Serbinenko[ expand ]
21:17 [Pub][ePrint]SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs, by Aydin Aysu and Ege Gulcan and Patrick Schaumont[ expand ]


2014-04-08
14:46 [Job][New]PhD scholarship, University of Auckland, New Zealand[ expand ]


2014-04-07
15:05 [Event][New]M2MSec'14: First International Workshop on Security and Privacy in M2M Communications[ expand ]
10:55 [Job][New]Researcher in Boolean Functions, Reliable Communication Group, Department of Informatics, University of Bergen, Norway[ expand ]



2014-04-05
18:17 [Pub][ePrint]Linear Sequential Circuit Approximation of Acterbahn Stream Cipher, by Shazia Afreen[ expand ]


2014-04-03
15:32 [Job][New]Doctoral Student, Technische Universität Darmstadt, Germany[ expand ]


2014-04-02
17:11 [Event][New]LightSEC 2014: Third International Workshop on Lightweight Cryptography[ expand ]
17:10 [Event][New]Workshop on Security and Privacy for Smart Connected Devices 2014[ expand ]


2014-04-01
09:17 [Pub][ePrint]Efficient Fuzzy Search on Encrypted Data, by Alexandra Boldyreva and Nathan Chenette[ expand ]
09:17 [Pub][ePrint]Enhancing Oblivious RAM Performance Using Dynamic Prefetching, by Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas[ expand ]
09:17 [Pub][ePrint]Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, by Yark{\\i}n Dor\\\"{o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar[ expand ]
09:17 [Pub][ePrint]Bandwidth Efficient PIR from NTRU, by Yark{\\i}n Dor\\\"{o}z, Berk Sunar and Ghaith Hammouri[ expand ]
09:17 [Pub][ePrint]Self-Updatable Encryption with Short Public Parameters and Its Extensions, by Kwangsu Lee[ expand ]
09:17 [Pub][ePrint]Isogeny graphs with maximal real multiplication, by Sorina Ionica and Emmanuel Thomé[ expand ]
09:17 [Pub][ePrint]Investigating the Feasibility of LEAP+ in ZigBee Specification, by Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi[ expand ]
07:03 [Event][New]QCRYPT: 4th International Conference on Quantum Cryptography[ expand ]
07:03 [Event][New]Workshop on Cybersecurity in a Post-Quantum World[ expand ]



2014-03-30
00:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]


2014-03-29
21:17 [Pub][ePrint]Improved Analysis of Zorro-Like Ciphers, by Achiya Bar-Or and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Mar\\\'{\\i}a Naya-Plasencia and Boaz Tsaban[ expand ]
21:17 [Pub][ePrint]CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks, by Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi[ expand ]
15:17 [Pub][ePrint]Weak-Key Analysis of POET, by Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser[ expand ]
00:17 [Pub][ePrint]Adaptively Secure Functional Encryption for Finitite Languages from DLIN Assumption, by Tapas Pandit and Rana Barua[ expand ]


2014-03-28
09:17 [Pub][ePrint]Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices, by Henry Carter and Charles Lever and Patrick Traynor[ expand ]
09:17 [Pub][ePrint]Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64, by Léo Perrin and Dmitry Khovratovich[ expand ]
05:52 [Job][New]Summer Intern – Master\\\'s / Ph.D. student in Computer Science, Computer Engineering, or Applied Math, IBM Research – Almaden, 650 Harry Road, San Jose, CA 95120-6099, USA[ expand ]


2014-03-27
15:17 [Pub][ePrint]Optimizing Obfuscation: Avoiding Barrington\'s Theorem, by Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations, by Toomas Krips and Jan Willemson[ expand ]
15:17 [Pub][ePrint]Total Break of Zorro using Linear and Differential Attacks, by Shahram Rasoolzadeh and Zahra Ahmadian and Mahmood Salmasizadeh and Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]Dynamic Searchable Encryption via Blind Storage, by Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter[ expand ]



2014-03-26
18:08 [Event][New]SECRYPT 2014: 11th International Conference on Security and Cryptography[ expand ]
18:08 [Job][New]Research Scientist, RSA Laboratories, Cambridge, MA, USA[ expand ]
18:07 [Job][New]Internship, Security in Telecommunications, TU Berlin, Germany[ expand ]


2014-03-24
18:17 [Pub][ePrint]A Practical Universal Forgery Attack against PAES-8, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]A Forgery Attack against PANDA-s, by Yu Sasaki and Lei Wang[ expand ]
18:17 [Pub][ePrint]Implementation and improvement of the Partial Sum Attack on 6-round AES, by Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala[ expand ]
18:17 [Pub][ePrint]Attack On the Markov Problem, by James L. Adams[ expand ]
18:17 [Pub][ePrint]Squaring Algorithms with Delayed Carry Method and Efficient Parallelization, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]
18:17 [Pub][ePrint]Secret-Sharing for NP from Indistinguishability Obfuscation, by Ilan Komargodski and Moni Naor and Eylon Yogev[ expand ]
18:17 [Pub][ePrint]Remarks on the Pocklington and Padr\\\'o-S\\\'aez Cube Root Algorithm in $\\mathbb F_q$, by Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon[ expand ]
18:13 [Job][New]Doctoral Students (and Post-Doc), Technische Universität Darmstadt, Germany[ expand ]
17:17 [Event][New]RFIDsec'14 Asia: 2014 Workshop on RFID Security[ expand ]
17:15 [Job][New]Post-Doc, University of Versailles-St-Quentin-en-Yvelines, France[ expand ]


2014-03-22
21:17 [Pub][ePrint]Some Randomness Experiments on TRIVIUM, by Subhabrata Samajder and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Algebraic Cryptanalysis of Wild McEliece Incognito, by Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich[ expand ]
21:17 [Pub][ePrint]A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation, by Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung[ expand ]
21:17 [Pub][ePrint]Offline Dictionary Attack on Password Authentication Schemes using Smart Cards, by Ding Wang and Ping Wang[ expand ]


2014-03-21
21:18 [Job][New]Professor in Cryptography (tenured) , Graz University of Technology, Austria, Europe [ expand ]
21:17 [Job][New]Tenure-Track Staff Member, CWI Amsterdam, NL, Europe[ expand ]
09:17 [Pub][ePrint]Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption, by Katsuyuki Takashima[ expand ]



2014-03-20
21:37 [Event][New]FDTC'14: Workshop on Fault Diagnosis and Tolerance in Cryptography 2014[ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness, by Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas[ expand ]
15:17 [Pub][ePrint]ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]


2014-03-19
22:31 [Event][New][ expand ]
22:30 [Event][New]Crypto: Crypto 2016 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2017 (tentative)[ expand ]
22:30 [Event][New]Crypto: Crypto 2018 (tentative)[ expand ]
20:50 [PhD][Update]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
20:28 [Event][New][ expand ]


2014-03-18
15:17 [Pub][ePrint][ expand ]
09:04 [PhD][New]Diego F. Aranha: Efficient software implementation of elliptic curves and bilinear pairings[ expand ]
09:03 [PhD][New][ expand ]
09:02 [PhD][New][ expand ]
08:50 [Event][New]SPACE 2014: 4th International Conference on Security, Privacy, and Applied Cryptography[ expand ]
00:17 [Pub][ePrint]Verifiable Computation over Encrypted Data in the Presence of Verification Queries, by Rosario Gennaro and Valerio Pastro[ expand ]
00:17 [Pub][ePrint]From Input Private to Universally Composable Secure Multiparty Computation Primitives, by Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen[ expand ]
00:17 [Pub][ePrint][ expand ]
00:17 [Pub][ePrint][ expand ]


2014-03-17
22:32 [Job][New]Post-Doc, LIASD, University Paris 8, France[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2018[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2017[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2016[ expand ]
15:15 [Event][New]Crypto: tentative: Crypto 2015[ expand ]
09:17 [Pub][ePrint]Fast GPGPU-Based Elliptic Curve Scalar Multiplication, by Eric M. Mahé and Jean-Marie Chauvet[ expand ]



2014-03-16
21:02 [News]Scott Vanstone (1947-2014)[ expand ]


2014-03-15
20:30 [Event][New]CARDIS 2014: 13th Smart Card Research and Advanced Application Conference[ expand ]
20:19 [News]President's letter[ expand ]


2014-03-14
15:17 [Pub][ePrint]Breaking POET Authentication with a Single Query, by Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei[ expand ]
15:17 [Pub][ePrint]Crypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili[ expand ]


2014-03-13
21:17 [Pub][ePrint]Low Overhead Broadcast Encryption from Multilinear Maps, by Dan Boneh and Brent Waters and Mark Zhandry[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols, by Sai Raghu Talluri and Swapnoneel Roy[ expand ]
18:14 [Event][New]ESORICS 2014: 19th European Symposium on Research in Computer Security[ expand ]
15:17 [Pub][ePrint]JHAE: An Authenticated Encryption Mode Based on JH, by Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri[ expand ]
10:43 [Job][New]Ph.D. students, TELECOM-ParisTech[ expand ]
10:33 [Event][New]BalkanCryptSec: International Conference on Cryptography and Information Security[ expand ]



2014-03-12
21:17 [Pub][ePrint]Two-sources Randomness Extractors for Elliptic Curves, by Abdoul Aziz Ciss[ expand ]
21:17 [Pub][ePrint]Side-Channel Analysis on Blinded Regular Scalar Multiplications, by Benoit Feix and Mylène Roussellet and Alexandre Venelli[ expand ]
21:17 [Pub][ePrint]The Temperature Side Channel and Heating Fault Attacks, by Michael Hutter and Jörn-Marc Schmidt[ expand ]
21:17 [Pub][ePrint]Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment, by Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal[ expand ]
21:17 [Pub][ePrint]A Second Look at Fischlin\'s Transformation, by Özgür Dagdelen and Daniele Venturi[ expand ]


2014-03-11
15:17 [Pub][ePrint]FFT-Based Key Recovery for the Integral Attack, by Yosuke Todo[ expand ]


2014-03-10
15:17 [Pub][ePrint]AES-Based Authenticated Encryption Modes in Parallel High-Performance Software, by Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser[ expand ]
07:04 [Job][New]Ph.D. student in Quantum Cryptography, University of and CWI Amsterdam, the Netherlands, Europe[ expand ]


2014-03-09
21:17 [Pub][ePrint]Oblivious Data Structures, by Xiao Wang and Kartik Nayak and Chang Liu and Elaine Shi and Emil Stefanov and Yan Huang[ expand ]
21:17 [Pub][ePrint]SETUP in Secret Sharing Schemes, by Ruxandra F. Olimid[ expand ]
21:17 [Pub][ePrint]Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs, by Tetsu Iwata and Lei Wang[ expand ]
21:17 [Pub][ePrint]Proving the TLS Handshake Secure (as it is), by Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin[ expand ]



2014-03-07
12:42 [Event][New]ProvSec 2014: The Eighth International Conference on Provable Security[ expand ]
12:42 [Event][New]ARES 2014: The Ninth International Conference on Availability, Reliability and Securi[ expand ]
10:17 [Pub][ePrint]A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro[ expand ]
10:17 [Pub][ePrint]Improving throughput of RC4 algorithm using multithreading techniques in multicore processors, by T.D.B Weerasinghe[ expand ]


2014-03-06
22:17 [Pub][ePrint]Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs, by Maura B. Paterson and Douglas R. Stinson[ expand ]
22:17 [Pub][ePrint]Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data, by Qingji Zheng and Shouhuai Xu[ expand ]
22:17 [Pub][ePrint]Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES, by Valentina Banciu and Elisabeth Oswald[ expand ]


2014-03-05
16:17 [Pub][ePrint]One-Round Witness Indistinguishability from Indistinguishability Obfuscation, by Qihua Niu, Hongda Li, Bei Liang, Fei Tang[ expand ]
16:17 [Pub][ePrint]Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms, by T.D.B Weerasinghe[ expand ]
16:17 [Pub][ePrint]Analysis of a Modified RC4 Algorithm, by T.D.B Weerasinghe[ expand ]
16:05 [Job][New]Security Systems Programmer Associate, University of Michigan Transportation Research Institute (UMTRI), USA, North-West[ expand ]
15:36 [Event][New]CSS 2014: 3rd Conference on Cryptography and Security Systems 2014[ expand ]
15:20 [Job][New]Security Systems Programmer Lead, University of Michigan Transportation Research Institute (UMTRI), USA, North-West[ expand ]
09:00 [Job][Update]PhD Positions in Applied Cryptology, Worcester Polytechnic Institue, MA, USA[ expand ]
05:47 [Job][New]Lecturer, Computer Engineering and Systems, University of Washington, Tacoma Washington USA[ expand ]


2014-03-04
22:17 [Pub][ePrint]Continuous Non-malleable Codes, by Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi[ expand ]
22:17 [Pub][ePrint]Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?, by Jeroen Delvaux and Dawu Gu and Dries Schellekens and Ingrid Verbauwhede[ expand ]
22:17 [Pub][ePrint]An Effective RC4 Stream Cipher, by T.D.B Weerasinghe[ expand ]
10:17 [Pub][ePrint]Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256, by Shay Gueron[ expand ]
10:17 [Pub][ePrint]Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms , by Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman[ expand ]
09:19 [Event][New]Asiacrypt 2014[ expand ]
09:18 [Event][New]Asiacrypt 2014: The 20th Annual Conference on the Theory and Application of Cryptography[ expand ]
01:17 [Pub][ePrint]Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond, by Scott Coull and Kevin Dyer[ expand ]
01:17 [Pub][ePrint]How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs, by Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs[ expand ]
01:17 [Pub][ePrint]Tuple decoders for traitor tracing schemes, by Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven[ expand ]
01:17 [Pub][ePrint]A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT, by Kirti Chawla and Om Pal Yadav[ expand ]
01:17 [Pub][ePrint]Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters, by Yuriy Tarannikov[ expand ]
01:17 [Pub][ePrint]Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices, by Arnaud Dambra and Philippe Gaborit and Myl\\`ene Roussellet and Julien Schrek and Nicolas Tafforeau[ expand ]
01:17 [Pub][ePrint]TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES, by Hu Xiong[ expand ]
01:17 [Pub][ePrint]``Ooh Aah... Just a Little Bit\'\' : A small amount of side channel can go a long way, by Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom[ expand ]
01:17 [Pub][ePrint]TRUESET: Nearly Practical Verifiable Set Computations, by Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikolaos Triandopoulos[ expand ]



2014-03-03
13:17 [Pub][ePrint]Weak-Key Leakage Resilient Cryptography, by Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan[ expand ]
13:17 [Pub][ePrint]Point compression for the trace zero subgroup over a small degree extension field, by Elisa Gorla and Maike Massierer[ expand ]
08:28 [Job][New]Full Time Lecturer, University of Washington, Tacoma Washington USA[ expand ]
08:27 [Job][New]Cloud Security R&D Engineers, Applied Science and Technology Research Institute (ASTRI), Hong Kong[ expand ]


2014-03-01
19:17 [Pub][ePrint]CLOC: Authenticated Encryption for Short Input, by Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka[ expand ]
19:17 [Pub][ePrint]Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate $[ expand ]
16:17 [Pub][ePrint]Honey Encryption: Security Beyond the Brute-Force Bound, by Ari Juels and Thomas Ristenpart[ expand ]
16:17 [Pub][ePrint]Non-Interactive Cryptography in the RAM Model of Computation, by Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
16:17 [Pub][ePrint]Verifiable Oblivious Storage, by Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam[ expand ]
16:17 [Pub][ePrint]A Statistics-based Fundamental Model for Side-channel Attack Analysis, by Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang[ expand ]
16:17 [Pub][ePrint]Security Analysis of Key-Alternating Feistel Ciphers, by Rodolphe Lampe and Yannick Seurin[ expand ]


2014-02-28
01:17 [Pub][ePrint]On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications, by Nikolaos Karapanos and Srdjan Capkun[ expand ]


2014-02-27
22:17 [Pub][ePrint]The Multiple Number Field Sieve for Medium and High Characteristic Finite Fields, by Razvan Barbulescu and Cécile Pierrot[ expand ]
22:17 [Pub][ePrint]Millions of Millionaires: Multiparty Computation in Large Networks, by Mahdi Zamani and Mahnush Movahedi and Jared Saia[ expand ]
22:17 [Pub][ePrint]Outsourcing Private RAM Computation, by Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs[ expand ]
04:17 [Pub][ePrint]Untappable communication channels over optical fibers from quantum-optical noise, by Geraldo A. Barbosa and Jeroen van de Graaf[ expand ]
04:17 [Pub][ePrint]Calculating Cryptographic Degree of an S-Box, by Prasanna Raghaw Mishra[ expand ]
04:17 [Pub][ePrint]How to Securely Release Unverified Plaintext in Authenticated Encryption, by Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda[ expand ]
04:17 [Pub][ePrint]Statistical Concurrent Non-Malleable Zero Knowledge, by Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti[ expand ]
04:17 [Pub][ePrint]FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm , by Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez[ expand ]
04:17 [Pub][ePrint]Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps, by Hao Wang[ expand ]
04:17 [Pub][ePrint]Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack, by Yuval Yarom and Naomi Benger[ expand ]



2014-02-25
16:17 [Pub][ePrint]On the Phase Space of Block-Hiding Strategies, by Assaf Shomer[ expand ]


2014-02-24
04:17 [Pub][ePrint]Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction, by Jae Hong Seo[ expand ]
04:17 [Pub][ePrint]Efficient, Oblivious Data Structures for MPC, by Marcel Keller and Peter Scholl[ expand ]
04:17 [Pub][ePrint]Isolated Execution on Many-core Architectures, by Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun[ expand ]
04:17 [Pub][ePrint]Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment, by Ding Wang, Ping Wang, and Debiao He[ expand ]
04:17 [Pub][ePrint]Kummer strikes back: new DH speed records, by Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe[ expand ]
04:17 [Pub][ePrint]Efficient Secure and Verifiable Outsourcing of Matrix Multiplications, by Yihua Zhang and Marina Blanton[ expand ]
04:17 [Pub][ePrint]Efficient Revocable Identity-Based Encryption via Subset Difference Methods, by Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park[ expand ]
04:17 [Pub][ePrint]Modelling After-the-fact Leakage for Key Exchange, by Janaka Alawatugoda and Douglas Stebila and Colin Boyd[ expand ]
04:17 [Pub][ePrint]Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis, by Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig[ expand ]
04:17 [Pub][ePrint]How to Use Bitcoin to Design Fair Protocols, by Iddo Bentov and Ranjit Kumaresan[ expand ]
04:17 [Pub][ePrint]Efficient Three-Party Computation from Cut-and-Choose, by Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas[ expand ]
04:17 [Pub][ePrint]Algebraic Properties of Modular Addition Modulo a Power of Two, by S. M. Dehnavi and Alireza Rahimipour[ expand ]
04:17 [Pub][ePrint]Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited, by Hui Cui, Yi Mu, Man Ho Au[ expand ]
04:17 [Pub][ePrint]Removing Erasures with Explainable Hash Proof Systems, by Michel Abdalla and Fabrice Benhamouda and David Pointcheval[ expand ]
04:17 [Pub][ePrint]Optimal Non-Perfect Uniform Secret Sharing Schemes, by Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró[ expand ]
04:17 [Pub][ePrint]FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
04:17 [Pub][ePrint]New Way to Construct Cryptographic Hash Function, by WANGYong[ expand ]
04:17 [Pub][ePrint]Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation, by Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi[ expand ]
01:17 [Pub][ePrint]Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version), by Weijin Wang, Yu Qin, Dengguo Feng[ expand ]


2014-02-21
19:17 [Pub][ePrint]Breaking `128-bit Secure\' Supersingular Binary Curves (or how to solve discrete logarithms in $\\F_{2^{4 \\cdot 1223}}$ and $\\F_{2^{12 \\cdot 367}}$), by Robert Granger and Thorsten Kleinjung and Je[ expand ]


2014-02-19
12:30 [Job][New]cryptologic product development team members and leads, TECHNA, Kolkata India[ expand ]
12:27 [Event][New]ACM TECS: ACM TECS: Embedded Platforms for Cryptography in the Coming Decade[ expand ]



2014-02-18
15:48 [Job][New]Lecturer/Associate Professor/Researcher in Cryptology and Security, Hangzhou Normal University, China, Pacific Area[ expand ]


2014-02-17
06:27 [Event][New]NSS 2014: The 8th International Conference on Network and System Security[ expand ]


2014-02-16
22:17 [Pub][ePrint]Quantum position verification in the random oracle model, by Dominique Unruh[ expand ]
16:17 [Pub][ePrint]Optimal Algebraic Manipulation Detection Codes, by Ronald Cramer and Carles Padr{\\\'o} and Chaoping Xing[ expand ]
16:17 [Pub][ePrint]Comments on a novel user authentication and key agreement scheme, by Jia-Lun Tsai[ expand ]
16:17 [Pub][ePrint]Prover Anonymous and Deniable Distance-Bounding Authentication, by Sebastien Gambs and Cristina Onete and Jean-Marc Robert[ expand ]
16:17 [Pub][ePrint]Secure Compression: Theory \\& Practice, by James Kelley and Roberto Tamassia[ expand ]
16:17 [Pub][ePrint]Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, by Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich[ expand ]
16:17 [Pub][ePrint]A Note on the CLRW2 Tweakable Block Cipher Construction, by Gordon Procter[ expand ]
16:17 [Pub][ePrint]Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box, by Sourav Das[ expand ]
16:17 [Pub][ePrint]An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems, by Bjoern Grohmann[ expand ]


2014-02-15
22:17 [Pub][ePrint]Diffusion Programmable Device : The device to prevent reverse engineering, by Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino[ expand ]
22:17 [Pub][ePrint]MJH: A Faster Alternative to MDC-2, by Jooyoung Lee and Martijn Stam[ expand ]
22:17 [Pub][ePrint]Key-Indistinguishable Message Authentication Codes, by Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov[ expand ]
20:12 [Job][New]PhD Position in Lattice-Based Cryptography, Technische Universität Darmstadt, Germany, Middle-Europe[ expand ]



2014-02-14
19:17 [Pub][ePrint]Algorithms in HElib, by Shai Halevi and Victor Shoup[ expand ]
19:17 [Pub][ePrint]Reducing the Overhead of Cloud MPC, by Ashish Choudhury and Arpita Patra and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Space-efficient, byte-wise incremental and perfectly private encryption schemes, by Kévin Atighehchi[ expand ]
19:17 [Pub][ePrint]SHipher: Families of Block Ciphers based on SubSet-Sum Problem, by Xiali Hei and Binheng Song[ expand ]
19:17 [Pub][ePrint]Actively Secure Private Function Evaluation, by Payman Mohassel and Saeed Sadeghian and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Dishonest Majority Multi-Party Computation for Binary Circuits, by Enrique Larraia and Emmanuela Orsini and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]Improved Slender-set Linear Cryptanalysis, by Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi[ expand ]
16:17 [Pub][ePrint]Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources, by Christina Brzuska and Pooya Farshim and Arno Mittelbach[ expand ]
16:17 [Pub][ePrint][ expand ]
16:17 [Pub][ePrint]A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups, by Koji Nuida[ expand ]
16:17 [Pub][ePrint]Tight security bounds for multiple encryption, by Yuanxi Dai, John Steinberger[ expand ]
16:17 [Pub][ePrint]Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures, by Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi[ expand ]
06:38 [PhD][New]Nizamuddin: On the Design of signcryption Schemes[ expand ]


2014-02-13
05:56 [Job][New][ expand ]


2014-02-11
09:02 [Job][Update]1 PhD student in Information Security, Chalmers University of Technology, Gothenburg, Sweden[ expand ]


2014-02-10
16:17 [Pub][ePrint]Faster Bootstrapping with Polynomial Error, by Jacob Alperin-Sheriff and Chris Peikert[ expand ]
16:17 [Pub][ePrint]The Related-Key Analysis of Feistel Constructions, by Manuel Barbosa and Pooya Farshim[ expand ]
16:17 [Pub][ePrint]A new class of system oriented PKC, K(I)SOPKC., by Masao KASAHARA[ expand ]
16:17 [Pub][ePrint]On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad[ expand ]
16:17 [Pub][ePrint]Cryptanalysis of KLEIN (Full version), by Virginie Lallemand and María Naya-Plasencia[ expand ]
16:17 [Pub][ePrint]Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version), by Anne Canteaut and Thomas Fuhr and Henri Gilbert and Maria Naya-Plasencia and Jean-René Reinhard[ expand ]
16:17 [Pub][ePrint]A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing, by Himanshu Tyagi and Shun Watanabe[ expand ]



2014-02-07
16:17 [Pub][ePrint]AnoA: A Framework For Analyzing Anonymous Communication Protocols, by Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi[ expand ]
16:17 [Pub][ePrint]Randomized and Efficient Authentication in Mobile Environments, by Wei Jiang, Dan Lin, Feng Li, Elisa Bertino[ expand ]
16:17 [Pub][ePrint]Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer, by Aleksandra Mileva[ expand ]
16:17 [Pub][ePrint]RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms, by Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede[ expand ]
05:59 [Event][New]NSPW'14: 2014 New Security Paradigms Workshop[ expand ]


2014-02-06
15:45 [Event][New]MPC14: Workshop on Theory and Practice of Secure Multiparty Computation[ expand ]
15:41 [Event][New]ECTCM 2014: Second International Workshop on Emerging Cyberthreats and Countermeasures[ expand ]


2014-02-05
16:17 [Pub][ePrint]Garbled RAM Revisited, Part II, by Steve Lu and Rafail Ostrovsky[ expand ]
16:17 [Pub][ePrint]Garbled RAM Revisited, Part I, by Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs[ expand ]
16:17 [Pub][ePrint]Efficient Round Optimal Blind Signatures, by Sanjam Garg and Divya Gupta[ expand ]
16:17 [Pub][ePrint]A Full Characterization of Completeness for Two-party Randomized Function Evaluation, by Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai[ expand ]
05:44 [Job][New]Security Engineer, CloudFlare Inc. (San Francisco, USA and London, UK)[ expand ]


2014-02-04
19:17 [Pub][ePrint]Unifying Leakage Models: from Probing Attacks to Noisy Leakage, by Alexandre Duc and Stefan Dziembowski and Sebastian Faust[ expand ]
19:17 [Pub][ePrint]Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers, by Ahmad Boorghany and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Mixcoin: Anonymity for Bitcoin with accountable mixes, by Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten[ expand ]
19:17 [Pub][ePrint]Certified Bitcoins, by Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros[ expand ]
19:17 [Pub][ePrint]Publicly Auditable Secure Multi-Party Computation, by Carsten Baum and Claudio Orlandi and Ivan Damgård[ expand ]
19:17 [Pub][ePrint]New and Improved Key-Homomorphic Pseudorandom Functions, by Abhishek Banerjee and Chris Peikert[ expand ]
19:17 [Pub][ePrint]Anonymous Authentication with Shared Secrets, by Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov[ expand ]
19:17 [Pub][ePrint]Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM, by Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann[ expand ]
16:17 [Pub][ePrint]Implementing Pairing-Based Cryptosystems in USB Tokens, by Zhaohui Cheng[ expand ]
16:17 [Pub][ePrint]Lattice Cryptography for the Internet, by Chris Peikert[ expand ]
16:17 [Pub][ePrint]One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks, by Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi[ expand ]
06:15 [Event][New]Post-quantum Cryptography Summer School[ expand ]



2014-02-03
21:56 [Job][New]PhD Positions in Applied Cryptology, Worcester Polytechnic Institue, MA, USA[ expand ]
12:54 [Event][New]SAC'2014: Selected Areas in Cryptography[ expand ]
08:49 [Event][New]CANS 2014: 13rd International Conference on Cryptology and Network Security[ expand ]


2014-01-31
13:17 [Pub][ePrint]Some security bounds for the DGHV scheme, by Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala[ expand ]


2014-01-30
13:17 [Pub][ePrint]Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents, by Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey[ expand ]
13:17 [Pub][ePrint]A Subexponential Construction of Graph Coloring for Multiparty Computation, by Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld[ expand ]


2014-01-29
16:17 [Pub][ePrint]Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case, by Palash Sarkar and Shashank Singh[ expand ]



2014-01-28
19:17 [Pub][ePrint]A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems, by Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan[ expand ]
19:17 [Pub][ePrint]Cryptanalysis on \"Secure untraceable off-line electronic cash system\", by Yalin Chen and Jue-Sam Chou*[ expand ]
19:17 [Pub][ePrint]A Comparison of the Homomorphic Encryption Schemes FV and YASHE, by Tancrède Lepoint and Michael Naehrig[ expand ]
19:17 [Pub][ePrint]Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts, by Stefano Tessaro and David A. Wilson[ expand ]
19:17 [Pub][ePrint]Verifiable Computation in Multiparty Protocols with Honest Majority, by Peeter Laud and Alisa Pankova[ expand ]
13:17 [Pub][ePrint]Cuckoo Cycle; a memory-hard proof-of-work system, by John Tromp[ expand ]
04:48 [PhD][New]Claude Carlet[ expand ]
04:47 [PhD][New]Abdelaziz Elaabid: Side channel attacks: advanced experimentations on template attacks[ expand ]
04:47 [PhD][Update][ expand ]


2014-01-27
14:48 [Job][New]Postdoc in Cryptology, Technical University of Denmark, DTU[ expand ]
14:44 [Job][New]Post-Doc in Applied Cryptography, University of Trier, Germany[ expand ]
10:17 [Pub][ePrint]Cryptanalysis of FIDES, by Itai Dinur and Jérémy Jean[ expand ]
01:17 [Pub][ePrint]Computing Discrete Logarithms in F_{3^{6*137}} using Magma , by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez[ expand ]


2014-01-26
22:17 [Pub][ePrint]Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, by Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang[ expand ]
22:17 [Pub][ePrint]Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics, by Younsung Choi[ expand ]
22:17 [Pub][ePrint]The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions, by Sugata Gangopadhyay and Pantelimon Stanica[ expand ]
22:17 [Pub][ePrint]Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, by Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert[ expand ]
14:59 [PhD][New]Constantin Catalin Dragan: Security of CRT-based Secret Sharing Schemes[ expand ]
14:59 [PhD][New]Ferucio Laurentiu Tiplea[ expand ]
14:58 [PhD][New]Ruxandra F. Olimid: Secret Sharing-based Group Key Establishment[ expand ]
14:58 [PhD][New]Adrian Atanasiu[ expand ]


2014-01-24
13:26 [Job][New]Postdoctoral and Internship Positions, MICROSOFT RESEARCH, Redmond, Washington USA[ expand ]
13:26 [Job][New][ expand ]
13:24 [Event][New]DBSec'14: 28th IFIP WG 11.3 Working Conf. on Data and Applications Security & Privacy[ expand ]



2014-01-22
19:17 [Pub][ePrint]DAA-related APIs in TPM2.0 Revisited, by Li Xi[ expand ]
16:17 [Pub][ePrint]An Equivalence-Preserving Transformation of Shift Registers, by Elena Dubrova[ expand ]


2014-01-21
16:17 [Pub][ePrint]Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication, by Daniel R. L. Brown[ expand ]
16:17 [Pub][ePrint]Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, by Neha tirthani and Ganesan[ expand ]
16:17 [Pub][ePrint]When a Boolean Function can be Expressed as the Sum of two Bent Functions, by Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li[ expand ]
09:48 [Event][New]CMS 2014: 15th Joint IFIP TC6 and TC11 Conf. on Communications and Multimedia Security[ expand ]


2014-01-20
10:17 [Pub][ePrint]Down the Rabbit Hole: Revisiting the Shrinking Method, by Vivien Dubois[ expand ]
10:17 [Pub][ePrint]Crypto-analyses on \"user efficient recoverable off-line e-cashs scheme with fast anonymity revoking\", by Yalin Chen1 and Jue-Sam Chou*2[ expand ]
10:17 [Pub][ePrint]Human Assisted Randomness Generation Using Video Games, by Mohsen Alimomeni and Reihaneh Safavi-Naini[ expand ]


2014-01-17
13:17 [Pub][ePrint]rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval, by Lichun Li and Michael Militzer and Anwitaman Datta[ expand ]
10:17 [Pub][ePrint]Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, by Mehdi Tibouchi[ expand ]
10:17 [Pub][ePrint]A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD, by Jintai Ding, Chengdong Tao[ expand ]



2014-01-15
22:17 [Pub][ePrint]Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography, by Boaz Tsaban[ expand ]
16:49 [Event][New][ expand ]
16:17 [Pub][ePrint]A Fast Modular Reduction Method, by Zhengjun Cao and Ruizhong Wei and Xiaodong Lin[ expand ]
07:05 [PhD][Update]Serge Vaudenay: The Security of Cryptographic Primitives[ expand ]
04:17 [Pub][ePrint]Homomorphic AES Evaluation using NTRU, by Yarkin Doroz and Yin Hu and Berk Sunar[ expand ]


2014-01-14
16:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf Küsters and Enrico Scapin and Tomasz Truderung and Jürgen Graf[ expand ]
13:17 [Pub][ePrint]Extending and Applying a Framework for the Cryptographic Verification of Java Programs., by Ralf K\\\"usters and Enrico Scapin and Tomasz Truderung and J\\\"urgen Graf[ expand ]
01:17 [Pub][ePrint][ expand ]


2014-01-13
22:17 [Pub][ePrint]A Secure Text Messaging Protocol, by Gary Belvin[ expand ]


2014-01-12
16:17 [Pub][ePrint]Authenticated Encryption with SPECK, by Chase Manny[ expand ]
16:17 [Pub][ePrint]Lattice-based Group Signature Scheme with Verifier-local Revocation, by Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang[ expand ]
16:17 [Pub][ePrint]Scale-Invariant Fully Homomorphic Encryption over the Integers, by Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results, by Yongge Wang[ expand ]
16:17 [Pub][ePrint]Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs, by Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.[ expand ]
16:17 [Pub][ePrint]General Impossibility of Group Homomorphic Encryption in the Quantum World, by Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter[ expand ]
16:17 [Pub][ePrint]Channel Equalization for Side Channel Attacks, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]



2014-01-10
17:28 [Event][New]DASec 2014: The First International Workshop on Big Data Analytics for Security[ expand ]
10:17 [Pub][ePrint]Twisting Edwards curves with isogenies, by Mike Hamburg[ expand ]
10:17 [Pub][ePrint]Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System, by Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger [ expand ]


2014-01-09
16:56 [Event][New]AsiaCCS-SCC: The Second International Workshop on Security in Cloud Computing[ expand ]
16:56 [Event][New]ASIAPKC 2014: 2nd ACM ASIA Public-Key Cryptography Workshop[ expand ]


2014-01-08
19:17 [Pub][ePrint]Side-Channel Leakage through Static Power -Should We Care about in Practice?-, by Amir Moradi[ expand ]
19:17 [Pub][ePrint][ expand ]
19:17 [Pub][ePrint]Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle, by Gengran Hu and Yanbin Pan and Feng Zhang[ expand ]
19:17 [Pub][ePrint]Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR, by Sourav Das[ expand ]
19:17 [Pub][ePrint]Online/Offline Attribute-Based Encryption, by Susan Hohenberger and Brent Waters[ expand ]
19:17 [Pub][ePrint](De-)Constructing TLS, by Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi[ expand ]
19:17 [Pub][ePrint]Lazy Modulus Switching for the BKW Algorithm on LWE, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]


2014-01-07
22:00 [PhD][Update]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
10:17 [Pub][ePrint]Completeness for Symmetric Two-Party Functionalities - Revisited, by Yehuda Lindell and Eran Omri and Hila Zarosim[ expand ]
10:17 [Pub][ePrint]Two-round password-only authenticated key exchange in the three-party setting, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
10:17 [Pub][ePrint]Triple and Quadruple Encryption: Bridging the Gaps, by Bart Mennink and Bart Preneel[ expand ]
10:17 [Pub][ePrint]Tight Security Bounds for Triple Encryption, by Jooyoung Lee[ expand ]
10:17 [Pub][ePrint]Linkable Message Tagging: Solving the key distribution problem of signature schemes, by Felix Günther and Bertram Poettering[ expand ]
10:17 [Pub][ePrint]A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs, by Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol[ expand ]
10:17 [Pub][ePrint][ expand ]
10:17 [Pub][ePrint]Construction of New Families of ‎MDS‎ Diffusion Layers, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]



2014-01-06
07:11 [PhD][New]Sebastian Pape: The Challenge of Authentication in Insecure Environments[ expand ]
07:11 [PhD][New][ expand ]


2014-01-05
15:50 [PhD][New]Emmanuelle Encrenaz[ expand ]
15:50 [PhD][New]Bruno Robisson[ expand ]
15:48 [PhD][New]Dong Hoon Lee[ expand ]
15:42 [PhD][New]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
15:34 [PhD][New]Amr Youssef[ expand ]
15:34 [PhD][New]Zachary Kissel: Verifiable Symmetric Searchable Encryption[ expand ]
15:34 [PhD][New]Jie Wang: Polynomial Time Creativity and its Applications (P-Creativity)[ expand ]
13:17 [Pub][ePrint]A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing, by Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh[ expand ]
13:17 [Pub][ePrint]Characterization of EME with Linear Mixing, by Mridul Nandi and Nilanjan Datta[ expand ]
13:17 [Pub][ePrint]A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis, by Annelie Heuser and Sylvain Guilley and Olivier Rioul[ expand ]
13:17 [Pub][ePrint]One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner., by Ethan Heilman[ expand ]
13:17 [Pub][ePrint]Efficient Non-Interactive Zero Knowledge Arguments for Set Operations, by Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang[ expand ]


2014-01-04
17:27 [PhD][Update]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]


2014-01-03
13:17 [Pub][ePrint]The analysis of the Keccak with the new method called parity, by Ghanei yakhdan.mostafa, Noruzi, zynolabedin[ expand ]
10:17 [Pub][ePrint]MaxMinMax problem and sparse equations over finite fields, by Igor Semaev[ expand ]



2014-01-02
10:17 [Pub][ePrint]$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials, by Xi Xiong and Haining Fan[ expand ]
10:17 [Pub][ePrint]Pseudorandom Generator Based on Hard Lattice Problem, by Kuan Cheng[ expand ]


2014-01-01
23:37 [Event][New]YACC 2014: Yet Another Conference on Cryptography[ expand ]
22:17 [Pub][ePrint]Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks, by Yalin Chen and Jue-Sam Chou[ expand ]
16:17 [Pub][ePrint]New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers, by Zhe Liu and Johann Gro{\\ss}sch{\\\"a}dl[ expand ]
16:17 [Pub][ePrint]Can Bitcoin Scale? Secure High-Rate Transaction Processing in The Bitcoin Network, by Yonatan Sompolinsky and Aviv Zohar[ expand ]
16:17 [Pub][ePrint]New Constructions of Revocable Identity-Based Encryption from Multilinear Maps, by Seunghwan Park and Kwangsu Lee and Dong Hoon Lee[ expand ]


2013-12-31
06:37 [Job][New]Computer Engineering, Ariel University, Israel, Mediterranean[ expand ]


2013-12-30
22:17 [Pub][ePrint]Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs, by Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng[ expand ]
22:17 [Pub][ePrint]MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature, by Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li[ expand ]
22:17 [Pub][ePrint]Succinct Non-Interactive Arguments for a von Neumann Architecture, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]



2013-12-29
22:17 [Pub][ePrint]Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE, by Michael Clear and Ciaran McGoldrick[ expand ]
22:17 [Pub][ePrint]Public-Key Encryption with Lazy Parties, by Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction, by Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]Poly-Many Hardcore Bits for Any One-Way Function, by Mihir Bellare and Stefano Tessaro[ expand ]
13:17 [Pub][ePrint]PRE^{+}: Dual of Proxy Re-encryption and Its Application, by Xu An Wang and Yunlong Ge and Xiaoyuan Yang[ expand ]
13:17 [Pub][ePrint]A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities, by Weiqiang Wen and Libin Wang[ expand ]
13:17 [Pub][ePrint]A new class of hyper-bent functions and Kloosterman sums, by Chunming Tang, Yanfeng Qi[ expand ]
13:17 [Pub][ePrint]How to Fake Auxiliary Input, by Dimitar Jetchev and Krzysztof Pietrzak[ expand ]
13:17 [Pub][ePrint]Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft), by Lear Bahack[ expand ]
13:17 [Pub][ePrint]LHash: A Lightweight Hash Function (Full Version), by Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong[ expand ]
13:17 [Pub][ePrint]Compact Hardware Implementation of Ring-LWE Cryptosystems, by Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede[ expand ]
13:17 [Pub][ePrint]SNR to Success Rate: Reaching the Limit of Non-Profiling DPA, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs, by Adam Smith and Ye Zhang[ expand ]
13:17 [Pub][ePrint]Formal Treatment of Distributed Trust in Electronic Voting, by Stephan Neumann and Melanie Volkamer[ expand ]
13:17 [Pub][ePrint]How to Delegate Computations: The Power of No-Signaling Proofs, by Yael Tauman Kalai and Ran Raz and Ron Rothblum[ expand ]
13:17 [Pub][ePrint]Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments, by Muhammad Rizwan Asghar[ expand ]
13:17 [Pub][ePrint]On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input , by Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
13:17 [Pub][ePrint]Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications, by Sherman S.M. Chow and Matthew Franklin and Haibin Zhang[ expand ]
13:17 [Pub][ePrint]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, by Daniel Genkin and Adi Shamir and Eran Tromer[ expand ]


2013-12-27
13:37 [Job][New]Research Fellow, University of Tartu, Estonia[ expand ]


2013-12-20
16:48 [Job][New]Fully funded Ph.D., Ecole normale supérieure (Paris Area, France)[ expand ]
16:17 [Pub][ePrint]Tightly-Secure Signatures From Lossy Identification Schemes, by Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]Weaknesses in a Recently Proposed RFID Authentication Protocol, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
16:17 [Pub][ePrint]Multiple-Use Transferable E-Cash , by Pratik Sarkar[ expand ]


2013-12-18
15:08 [Job][New]Post-Doc, EPFL, Switzerland[ expand ]
08:54 [Job][New]3 Phd Students in Trustworthy Hardware/Hardware Security, New York University Polytechnic School of Engineering, USA, North America[ expand ]



2013-12-17
19:17 [Pub][ePrint]Automatic Search for Differential Trails in ARX Ciphers (Extended Version), by Alex Biryukov and Vesselin Velichkov[ expand ]
16:17 [Pub][ePrint]Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256, by Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang[ expand ]
16:17 [Pub][ePrint]Power and Timing Side Channels for PUFs and their Efficient Exploitation, by Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson[ expand ]
16:17 [Pub][ePrint]Secure Floating-Point Arithmetic and Private Satellite Collision Analysis, by Liina Kamm and Jan Willemson[ expand ]
16:17 [Pub][ePrint]Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
16:17 [Pub][ePrint]Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols, by Xi-Jun Lin and Lin Sun[ expand ]
16:17 [Pub][ePrint]Ultralightweight cryptography for passive RFID system, by Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed[ expand ]
16:17 [Pub][ePrint]A new attack on RSA with a composed decryption exponent, by Abderrahmane Nitaj and Mohamed Ould Douh[ expand ]
16:17 [Pub][ePrint]How to Keep a Secret: Leakage Deterring Public-key Cryptography, by Aggelos Kiayias and Qiang Tang[ expand ]
16:17 [Pub][ePrint]A generic view on trace-and-revoke broadcast encryption schemes, by Dennis Hofheinz and Christoph Striecks[ expand ]
16:17 [Pub][ePrint]A Study of Goldbach\'s conjecture and Polignac\'s conjecture equivalence issues, by Jian Ye and Chenglian Liu[ expand ]
16:17 [Pub][ePrint]Detecting Hidden Leakages, by Amir Moradi and Sylvain Guilley and Annelie Heuser[ expand ]


2013-12-16
22:17 [Pub][ePrint]Trust Views for the Web PKI, by Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser[ expand ]
22:17 [Pub][ePrint](Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, by Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Z[ expand ]
22:17 [Pub][ePrint]Lattice Decoding Attacks on Binary LWE, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]An improved compression technique for signatures based on learning with errors, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]Fair Two-Party Computations via the BitCoin Deposits, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
22:17 [Pub][ePrint]Identity-Based Key-Encapsulation Mechanism from Multilinear Maps, by Hao Wang and Lei Wu Zhihua Zheng[ expand ]
19:17 [Pub][ePrint]A Modular Framework for Building Variable-Input Length Tweakable Ciphers, by Thomas Shrimpton and R. Seth Terashima[ expand ]
19:17 [Pub][ePrint]Keyless Signatures\' Infrastructure: How to Build Global Distributed Hash-Trees, by Ahto Buldas and Andres Kroonmaa and Risto Laanoja[ expand ]
19:17 [Pub][ePrint]Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions, by Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Practical Dynamic Searchable Encryption with Small Leakage, by Emil Stefanov and Charalampos Papamanthou and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Provable Security Proofs and their Interpretation in the Real World, by Vikram Singh[ expand ]
19:17 [Pub][ePrint]PROPERTY PRESERVING SYMMETRIC ENCRYPTION: REVISITED, by SANJIT CHATTERJEE AND M. PREM LAXMAN DAS[ expand ]
19:17 [Pub][ePrint]Is Bitcoin a Decentralized Currency?, by Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun[ expand ]
15:47 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Max Planck Institute for Software Systems, Saarbrücken, Germany[ expand ]
08:38 [Job][New]Ph.D student , Chalmers University of Technology, Sweden[ expand ]
08:07 [Event][New]IEEE Computer SI on Mobile App Sec: IEEE Computer SI on methodologies and solutions for mobile app. security[ expand ]


2013-12-11
13:17 [Pub][ePrint]Decentralized Traceable Attribute-Based Signatures, by Ali El Kaafarani and Essam Ghadafi and Dalia Khader[ expand ]
12:10 [Job][New]Research Assistent, Institute for Security in Information Technology, Technische Universitaet Muenchen; Munich (Germany)[ expand ]
05:43 [Job][New]Assistant Professor, Simon Fraser University, Burnaby, Canada, North America[ expand ]


2013-12-10
06:42 [Job][New]Post-Doctoral Position in Systems Security, Network Security, Cryptography or Tech Policy, Boston University, Boston, MA, USA[ expand ]



2013-12-09
17:51 [Event][New]IEEE IoT Journal, Special Issue on Security for IoT: the State of the Art[ expand ]
16:12 [Job][New]Digital Security Expert, Philips Research, Eindhoven, the Netherlands[ expand ]


2013-12-06
22:17 [Pub][ePrint]Lower Bounds in the Hardware Token Model, by Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen[ expand ]
22:17 [Pub][ePrint]Secure multi-party data analysis: end user validation and practical experiments, by Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt[ expand ]
22:17 [Pub][ePrint]EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen, by Alberto Peinado and Jorge Munilla and Amparo Fúster[ expand ]
22:17 [Pub][ePrint]Fair and Efficient Secure Multiparty Computation with Reputation Systems, by Gilad Asharov and Yehuda Lindell and Hila Zarosim[ expand ]
22:17 [Pub][ePrint]Another Look at XCB, by {Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar[ expand ]
22:17 [Pub][ePrint]Leakage Resilient Fully Homomorphic Encryption, by Alexandra Berkoff and Feng-Hao Liu[ expand ]
22:17 [Pub][ePrint]Errorless Smooth Projective Hash Function based on LWE, by Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan[ expand ]
22:17 [Pub][ePrint]On the Security of Recently Proposed RFID Protocols, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
22:17 [Pub][ePrint]Safe enclosures: towards cryptographic techniques for server protection, by Sergiu Bursuc and Julian P. Murphy[ expand ]
22:17 [Pub][ePrint]On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography, by Roberto De Prisco and Alfredo De Santis[ expand ]
22:17 [Pub][ePrint]Interactive Encryption, Message Authentication, and Anonymous Key Exchange, by Yevgeniy Dodis and Dario Fiore[ expand ]
22:17 [Pub][ePrint]Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes, by Shay Gueron and Vlad Krasnov[ expand ]
22:17 [Pub][ePrint]Iterated group products and leakage resilience against NC^1, by Eric Miles[ expand ]
22:17 [Pub][ePrint]RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases, by Lil Maria Rodriguez-Henriquez and Debrup Chakraborty[ expand ]
22:17 [Pub][ePrint]Multi-ciphersuite security and the SSH protocol, by Benjamin Dowling and Florian Giesen and Florian Kohlar and Jörg Schwenk and Douglas Stebila[ expand ]
22:17 [Pub][ePrint]A Note on Bilinear Groups of a Large Composite Order, by Zhengjun Cao and Lihua Liu[ expand ]
22:17 [Pub][ePrint]Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol, by Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto[ expand ]
22:17 [Pub][ePrint]Formal Analysis of CRT-RSA Vigilant\'s Countermeasure Against the BellCoRe Attack, by Pablo Rauzy and Sylvain Guilley[ expand ]
22:17 [Pub][ePrint]Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing, by Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk[ expand ]
22:17 [Pub][ePrint]Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness, by Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing[ expand ]
22:17 [Pub][ePrint]Distributed Key Generation for Secure Encrypted Deduplication, by Yitao Duan[ expand ]
16:19 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Center for IT-Security, Privacy and Accountability, Saarland University, Saarbrücken, Germany[ expand ]
09:52 [Job][New]Ph.D. Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg, Luxembourg[ expand ]


2013-12-04
15:40 [Job][New]Two Ph.D. Positions in Cryptography/IT Security, University of Luxembourg[ expand ]
08:57 [Event][New]IWSEC 2014: 9th International Workshop on Security[ expand ]
08:57 [Event][New]IEICE Trans. Fundamentals: Special Section on Cryptography and Information Secur[ expand ]


2013-12-03
12:41 [PhD][New]Nicolas Moro: Complex security strategies for secure embedded circuits[ expand ]
12:41 [PhD][New][ expand ]
11:22 [PhD][Update]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
11:19 [PhD][New]Aleksandar Kircanski: Cryptanalysis of Symmetric Cryptographic Primitives[ expand ]
07:17 [Pub][ePrint](Anonymous) Compact HIBE From Standard Assumptions, by Somindu C. Ramanna and Palash Sarkar[ expand ]
07:17 [Pub][ePrint]Proofs of Space: When Space is of the Essence, by Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi[ expand ]



2013-12-02
14:16 [Event][New]PETS'14: Privacy Enhancing Technologies Symposium[ expand ]
13:28 [Job][New]Research Associate (Post-Doc), University College London, United Kingdom[ expand ]


2013-12-01
19:17 [Pub][ePrint]Group Signature with relaxed-privacy and revocability for VANET, by Mohammad Saiful Islam Mamun and Atsuko Miyaji[ expand ]
19:17 [Pub][ePrint]Fully, (Almost) Tightly Secure IBE from Standard Assumptions, by Jie Chen and Hoeteck Wee[ expand ]
19:17 [Pub][ePrint]Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function, by Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications, by Dario Catalano and Antonio Marcedone and Orazio Puglisi[ expand ]
19:17 [Pub][ePrint]Algebraic Properties of the Cube Attack, by Frank-M. Quedenfeld and Christopher Wolf[ expand ]
19:17 [Pub][ePrint]New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography, by Gilles Macario-Rat and Jérôme Plût and Henri Gilbert[ expand ]
19:17 [Pub][ePrint]A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System, by Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu[ expand ]
19:17 [Pub][ePrint]Tamper Resilient Circuits: The Adversary at the Gates, by Aggelos Kiayias and Yiannis Tselekounis[ expand ]
19:17 [Pub][ePrint]Proofs of Space, by Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak[ expand ]
19:17 [Pub][ePrint]Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications, by Xi-Jun Lin and Lin Sun[ expand ]
19:17 [Pub][ePrint]Behind the Scene of Side Channel Attacks, by Victor Lomn\\\'{e}, Emmanuel Prouff, and Thomas Roche[ expand ]


2013-11-30
07:17 [Pub][ePrint]A fast integer-based batch full-homomorphic encryption scheme over finite field, by Long Zhang and Qiuling Yue[ expand ]
07:17 [Pub][ePrint]Improved Authenticity Bound of EAX, and Refinements, by Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata[ expand ]
07:17 [Pub][ePrint]APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography, by Elena Andreeva and Beg\\\"ul Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Parallelizable and Authenticated Online Ciphers, by Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Proofs of Data Possession and Retrievability Based on MRD Codes, by Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu[ expand ]
07:17 [Pub][ePrint]Improvement of Lin-Tzeng Solution to Yao\'s Millionaires Problem and Its Cheating Advantage Analysis, by Zhengjun Cao and Lihua Liu[ expand ]
07:17 [Pub][ePrint]Wide-weak Privacy Preserving RFID Mutual Authentication Protocol, by Raghuvir Songhela and Manik Lal Das[ expand ]
07:17 [Pub][ePrint]Tree Based Symmetric Key Broadcast Encryption, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
04:17 [Pub][ePrint]Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model, by Fei Tang, Hongda Li, Qihua Niu, and Bei Liang[ expand ]
04:17 [Pub][ePrint]Secure Multiparty Computations on BitCoin, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
04:17 [Pub][ePrint]ECC-Based Non-Interactive Deniable Authentication with Designated Verifier, by Yalin Chen and Jue-Sam Chou2[ expand ]


2013-11-28
13:44 [Event][New]CTCrypt 2014: 3rd Workshop on Current Trends in Cryptology[ expand ]



2013-11-26
10:25 [Event][New]CSF'14: 27th IEEE Computer Security Foundations Symposium[ expand ]
10:24 [Job][New]Maitre Assistant(e) - Senior Assistant (postdoc), University of Neuchatel, Switzerland[ expand ]
10:23 [Job][New]Post-Doc, Royal Holloway, University of London, UK[ expand ]
08:03 [News]IACR Ethics Committee[ expand ]
07:58 [Event][New]SCN 2014: Ninth Conference on Security and Cryptography for Networks[ expand ]


2013-11-25
22:17 [Pub][ePrint]How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?, by Dorit Ron and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Obfuscation from Semantically-Secure Multi-linear Encodings, by Rafael Pass and Sidharth Telang and Karn Seth[ expand ]
22:17 [Pub][ePrint]A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester, by Nasser Ramazani Darmian[ expand ]
22:17 [Pub][ePrint]Distributed Group Authentication for RFID Supply Management, by Mike Burmester and Jorge Munilla[ expand ]
22:17 [Pub][ePrint]Multi-Stage Fault Attacks on Block Ciphers, by Philipp Jovanovic and Martin Kreuzer and Ilia Polian[ expand ]
22:17 [Pub][ePrint]Construction of Multiplicative Monotone Span Program, by Yuenai Chen and Chunming Tang[ expand ]
22:17 [Pub][ePrint]Location Leakage in Distance Bounding: Why Location Privacy does not Work, by Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay[ expand ]
22:17 [Pub][ePrint]Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro, by Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu[ expand ]
22:17 [Pub][ePrint]Multi-Input Functional Encryption, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\\phi$ Functions, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor, by Wuqiang Shen and Shaohua Tang[ expand ]
22:17 [Pub][ePrint]Efficient Template Attacks, by Omar Choudary and Markus G. Kuhn[ expand ]
22:17 [Pub][ePrint]Broadcast Amplification, by Martin Hirt and Ueli Maurer and Pavel Raykov[ expand ]
22:17 [Pub][ePrint]VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4, by Bartosz Zoltak[ expand ]
22:17 [Pub][ePrint]Misuse Resistant Parallel Authenticated Encryptions, by Mridul Nandi and Nilanjan Datta[ expand ]
19:17 [Pub][ePrint]RankSign : an efficient signature algorithm based on the rank metric, by P. Gaborit and O. Ruatta and J. Schrek and G. Zémor[ expand ]
05:40 [Event][New]Cryptology2014: 4th International Cryptology and Information Security Conference 2014[ expand ]


2013-11-21
22:17 [Pub][ePrint]Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited, by Kaoru Kurosawa and Le Trieu Phong[ expand ]
22:17 [Pub][ePrint]Dynamic Countermeasure Against the Zero Power Analysis, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
19:17 [Pub][ePrint]Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting, by Yutaka Kawai and Katsuyuki Takashima[ expand ]
19:17 [Pub][ePrint]Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency, by Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung[ expand ]
19:17 [Pub][ePrint]Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince, by Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati[ expand ]
19:17 [Pub][ePrint]On cross joining de Bruijn sequences, by Johannes Mykkeltveit and Janusz Szmidt[ expand ]
19:17 [Pub][ePrint]Vectorization of ChaCha Stream Cipher, by Martin Goll and Shay Gueron[ expand ]
08:41 [News]Deadline for Nominations of IACR Fellows[ expand ]


2013-11-20
19:17 [Forum][IACR Publication Reform] An early/mid career perspective by brentwaters[ expand ]



2013-11-18
10:57 [Election]IACR 2013 Election Results[ expand ]
10:09 [Event][New]WISTP 2014: 8th Workshop in Information Security Theory and Practice[ expand ]


2013-11-17
04:17 [Pub][ePrint]A Meet-in-the-middle Attack on Round-Reduced mCrypton, by Yonglin Hao, Dongxia Bai[ expand ]
04:17 [Pub][ePrint]Improving security and efficiency for multi-authority access control system in cloud storage, by Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong[ expand ]
04:17 [Pub][ePrint]Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP, by Omkant Pandey and Manoj Prabhakaran and Amit Sahai[ expand ]
04:17 [Pub][ePrint]Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures, by Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele [ expand ]
04:17 [Pub][ePrint]On the Power of Rewinding Simulators in Functional Encryption, by Angelo De Caro and Vincenzo Iovino[ expand ]
04:17 [Pub][ePrint]Using Hamiltonian Totems as Passwords, by Herv\\\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache[ expand ]
04:17 [Pub][ePrint]Fully Deniable Mutual Authentication Protocol Based on RSA Signature, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Efficient CCA-secure Threshold Public-Key Encryption Scheme, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Plaintext Recovery Attacks Against WPA/TKIP, by Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt[ expand ]
04:17 [Pub][ePrint]Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks, by Jayaprakash Kar[ expand ]
04:17 [Pub][ePrint]Asymptotically Efficient Lattice-Based Digital Signatures, by Vadim Lyubashevsky and Daniele Miccicancio[ expand ]
04:17 [Pub][ePrint]Asynchronous MPC with t< n/2 Using Non-equivocation, by Michael Backes, Fabian Bendun, Ashish Choudhury and Aniket Kate[ expand ]
04:17 [Pub][ePrint]Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results, by Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumar[ expand ]
04:17 [Pub][ePrint]Privacy Preserving Unique Statistics in a Smart Grid, by Iraklis Leontiadis, Melek Önen, Refik Molva[ expand ]
04:17 [Pub][ePrint]Dipl.-Math., by Jürgen Müller[ expand ]
04:17 [Pub][ePrint]Fast Software Implementation of Binary Elliptic Curve Cryptography, by Manuel Bluhm and Shay Gueron[ expand ]
04:17 [Pub][ePrint]A Revocable Online-Offline Certificateless Signature Scheme without Pairing, by Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek [ expand ]
04:17 [Pub][ePrint]Practical Signatures from the Partial Fourier Recovery Problem, by Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte[ expand ]
01:17 [Pub][ePrint]An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II), by Gérald Gavin[ expand ]
01:17 [Pub][ePrint]NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS, by Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi[ expand ]


2013-11-15
10:45 [Event][New]CloudCom 2013: IEEE CloudCom 2013 (5th IEEE International Conference on Cloud Computing)[ expand ]


2013-11-14
19:17 [Pub][ePrint]On the Resilience and Uniqueness of CPA for Secure Broadcast, by Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
12:18 [Job][New]Tenure-track Assistant/Associate Professor, University of Connecticut, USA[ expand ]
07:17 [Pub][ePrint]Elliptic Curve Cryptography in Practice, by Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow[ expand ]
07:17 [Pub][ePrint]A Key Compromise Impersonation attack against Wang\'s Provably Secure Identity-based Key Agreement Protocol, by Maurizio Adriano Strangio[ expand ]
07:17 [Pub][ePrint]SSS-V2: Secure Similarity Search, by Hyun-A Park[ expand ]
07:17 [Pub][ePrint]Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez[ expand ]
07:17 [Pub][ePrint]TRS-80 With A Keccak Sponge Cake, by Jean-Marie Chauvet[ expand ]
07:17 [Pub][ePrint]Masking Tables---An Underestimated Security Risk, by Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald[ expand ]



2013-11-13
07:17 [Pub][ePrint]Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited, by Yongqiang Li and Mingsheng Wang and Yuyin Yu[ expand ]
07:17 [Pub][ePrint]Stamp \\& Extend -- Instant but Undeniable Timestamping based on Lazy Trees, by {\\L}ukasz Krzywiecki and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
07:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities, by Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai[ expand ]
07:17 [Pub][ePrint]Modified Alternating Step Generators, by Robert Wicik and Tomasz Rachwalik[ expand ]
07:17 [Pub][ePrint]Multi-Input Functional Encryption, by Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai[ expand ]


2013-11-11
13:47 [Event][New]LATINCRYPT 2014: Third International Conference on Cryptology and Information Security[ expand ]


2013-11-08
08:54 [Event][New]IWSEC 2013: The 8th International Workshop on Security (Poster Session)[ expand ]
08:50 [Job][New]Security Engineer, CloudFlare Inc., San Francisco, CA, USA, the Northern Hemisphere[ expand ]
08:48 [Job][New]Ph.D. Scholarships, University of Salerno, Italy[ expand ]


2013-11-07
07:17 [Pub][ePrint]Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack, by Chihong Joo and Aaram Yun[ expand ]
07:17 [Pub][ePrint]Mobile Transaction over NFC and GSM, by Muhammad Qasim Saeed and Pardis Pourghomi[ expand ]
07:17 [Pub][ePrint]Verifiable Set Operations over Outsourced Databases, by Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos[ expand ]
07:17 [Pub][ePrint]Amplifying Privacy in Privacy Amplification, by Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin[ expand ]
07:17 [Pub][ePrint]The Realm of the Pairings, by Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini[ expand ]
07:17 [Pub][ePrint]Deep Attacks of a Certificateless Signature Scheme, by Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li[ expand ]



2013-11-06
18:12 [Job][New]PhD studentships, Royal Holloway, University of London, UK[ expand ]
14:47 [Job][New]PhD student, SnT, University of Luxembourg, Luxembourg[ expand ]


2013-11-05
07:43 [Job][New]Professor (Open Rank), Worcester Polytechnic Institute, MA, USA, below Canada[ expand ]


2013-11-04
13:39 [Event][New]Joint MPIM and B-IT workshop on Number Theory and Cryptography[ expand ]
13:00 [Event][New]ASIACCS 2014: 9th ACM Symposium on Information, Computer and Communications Security[ expand ]
13:00 [Event][New]RFIDSec'14: The 10th Workshop on RFID Security[ expand ]
04:17 [Pub][ePrint]Outsourced Symmetric Private Information Retrieval, by Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]


2013-11-03
22:17 [Pub][ePrint]Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited, by Sandro Coretti and Ueli Maurer and Björn Tackmann[ expand ]
22:17 [Pub][ePrint]NTRU-KE: A Lattice-based Public Key Exchange Protocol, by Xinyu Lei and Xiaofeng Liao[ expand ]
22:17 [Pub][ePrint]NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
22:17 [Pub][ePrint]A Secure Obfuscator for Encrypted Blind Signature Functionality, by Xiao Feng and Zheng Yuan[ expand ]
19:17 [Pub][ePrint]Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir[ expand ]
19:17 [Pub][ePrint]Method to secure data in the cloud while preserving summary statistics, by Sanchita Barman, Bimal Roy[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Zorro, by Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang[ expand ]
19:17 [Pub][ePrint]PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage, by Daisuke Moriyama and Shin\'ichiro Matsuo and Moti Yung[ expand ]
19:17 [Pub][ePrint]Ambiguous One-Move Nominative Signature Without Random Oracles, by Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang[ expand ]
19:17 [Pub][ePrint]An Approach to Reduce Storage for Homomorphic Computations, by Jung Hee Cheon and Jinsu Kim[ expand ]
19:17 [Pub][ePrint]Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \\& Concurrent Quantum Attacks, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Key Derivation Without Entropy Waste, by Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]A reduction of semigroup DLP to classic DLP, by Matan Banin and Boaz Tsaban[ expand ]
19:17 [Pub][ePrint]How to Certify the Leakage of a Chip?, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon[ expand ]
19:17 [Pub][ePrint]Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation, by Clemens Heuberger and Michela Mazzoli[ expand ]
19:17 [Pub][ePrint]Adaptive Witness Encryption and Asymmetric Password-based Cryptography, by Mihir Bellare and Viet Tung Hoang[ expand ]
19:17 [Pub][ePrint]Limits of Extractability Assumptions with Distributional Auxiliary Input, by Elette Boyle and Rafael Pass[ expand ]



2013-10-30
09:30 [Job][New]CEO / General Manager, ESCRYPT Inc., Ann Arbor, USA, North America[ expand ]


2013-10-28
21:17 [Pub][ePrint]Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits, by Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Higher Order Masking of Look-up Tables, by Jean-Sebastien Coron[ expand ]
21:17 [Pub][ePrint]Bootstrapping Obfuscators via Fast Pseudorandom Functions, by Benny Applebaum[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks, by Xi-Jun Lin and Lin Sun[ expand ]
21:17 [Pub][ePrint]A More Efficient AES Threshold Implementation, by Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
21:17 [Pub][ePrint]Examination of a New Defense Mechanism: Honeywords, by Ziya Genc, Süleyman Kardas, and Mehmet Sabir Kiraz[ expand ]
21:17 [Pub][ePrint]AEGIS: A Fast Authenticated Encryption Algorithm, by Hongjun Wu and Bart Preneel[ expand ]
21:17 [Pub][ePrint]Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data, by Lichun Li and Anwitaman Datta[ expand ]
21:17 [Pub][ePrint]Secure Key Exchange and Sessions Without Credentials, by Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis[ expand ]
21:17 [Pub][ePrint]Faster Compact Diffie-Hellman: Endomorphisms on the x-line, by Craig Costello and Huseyin Hisil and Benjamin Smith[ expand ]
21:17 [Pub][ePrint]Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]


2013-10-24
18:17 [Pub][ePrint]Obfuscation ==> (IND-CPA Security =/=> Circular Security), by Antonio Marcedone and Claudio Orlandi[ expand ]
18:17 [Pub][ePrint]Differing-Inputs Obfuscation and Applications, by Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Unbalancing Pairing-Based Key Exchange Protocols, by Michael Scott[ expand ]
18:17 [Pub][ePrint]How to Compress (Reusable) Garbled Circuits, by Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy[ expand ]
18:17 [Pub][ePrint]New abstractions in applied pi-calculus and automated verification of protected executions, by Shiwei Xu and Sergiu Bursuc and Julian P. Murphy[ expand ]
18:17 [Pub][ePrint]Solving shortest and closest vector problems: The decomposition approach, by Anja Becker, Nicolas Gama and Antoine Joux[ expand ]
18:17 [Pub][ePrint]Fully Bideniable Public-Key Encryption, by Marcel Sebek[ expand ]
12:17 [Pub][ePrint]Separations in Circular Security for Arbitrary Length Key Cycles, by Venkata Koppula and Kim Ramchen and Brent Waters[ expand ]
12:17 [Pub][ePrint]Secret Key Cryptosystem based on Non-Systematic Polar Codes, by Reza Hooshmand[ expand ]
12:17 [Pub][ePrint]Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks, by Damien Vergnaud and David Xiao[ expand ]
12:17 [Pub][ePrint]A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme, by Dana Dachman-Soled[ expand ]
12:17 [Pub][ePrint]Formal verification of a software countermeasure against instruction skip attacks, by Karine Heydemann and Nicolas Moro and Emmanuelle Encrenaz and Bruno Robisson[ expand ]
12:17 [Pub][ePrint]Universally composable privacy preserving finite automata execution with low online and offline complexity, by Peeter Laud and Jan Willemson[ expand ]
12:17 [Pub][ePrint]Bounded Tamper Resilience: How to go beyond the Algebraic Barrier, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others, by Siwei Sun, Lei Hu, Peng Wang[ expand ]
09:17 [Pub][ePrint]A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher, by Tomer Ashur and Orr Dunkelman[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, by Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Traps to the BGJT-Algorithm for Discrete Logarithms, by Qi Cheng and Daqing Wan and Jincheng Zhuang[ expand ]
09:17 [Pub][ePrint]Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, by Benjamin Smith[ expand ]
09:17 [Pub][ePrint]Robust Pseudorandom Generators, by Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman[ expand ]
09:17 [Pub][ePrint]Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces, by Charanjit Jutla and Arnab Roy[ expand ]
09:17 [Pub][ePrint]Attribute-Based Encryption for Arithmetic Circuits, by Dan Boneh and Valeria Nikolaenko and Gil Segev[ expand ]
09:17 [Pub][ePrint]Obfuscation for Evasive Functions, by Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
09:17 [Pub][ePrint]A TPM Diffie-Hellman Oracle, by Tolga Acar and Lan Nguyen and Greg Zaverucha[ expand ]
09:17 [Pub][ePrint]An Offline Dictionary Attack against a Three-Party Key Exchange Protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
09:17 [Pub][ePrint]A Note on the Impossibility of Obfuscation with Auxiliary Input, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
09:17 [Pub][ePrint]TUC: Time-sensitive and Modular Analysis of Anonymous Communication, by Michael Backes and Praveen Manoharan and Esfandiar Mohammadi[ expand ]
09:17 [Pub][ePrint]Linear Cryptanalysis of Round Reduced Variants of SIMON, by Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya[ expand ]
09:17 [Pub][ePrint]Fine-Tuning Groth-Sahai Proofs, by Alex Escala and Jens Groth[ expand ]
09:17 [Pub][ePrint]Anonymous aggregation for lightweight multiparty computations, by Constantinos Patsakis[ expand ]
09:17 [Pub][ePrint]Discrete Logarithms and Mordell-Weil Groups , by Mohammad Sadek[ expand ]
04:41 [Event][New]PUFFIN: Physically Unclonable Functions Workshop[ expand ]
04:34 [Job][New]Security Consultant, ESCRYPT Inc., Ann Arbor[ expand ]
04:33 [Job][New]Lecturer, University College London, UK, EU[ expand ]


2013-10-22
09:36 [Event][New]Summer school on Design and security of crypto algorithms and devices[ expand ]
06:42 [Job][New]two Ph.D. positions, Worcester Polytechnic Institute[ expand ]
06:42 [Job][New]Ph.D. Research Training Group, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]



2013-10-21
06:49 [Job][New]Two faculty Positions in Computer Engineering, New York University Polytechnic School of Engineering, USA, North America[ expand ]
06:49 [Job][New]Junior Researcher, Senior Researcher, Charles University, Prague, Czech Republic[ expand ]
06:48 [Job][New]Assistant Professor, Charles University, Prague, Czech Republic[ expand ]


2013-10-18
05:18 [Job][New]Postdoc Fellowship (1 year), Norwegian University of Science and Technology (NTNU)[ expand ]


2013-10-15
09:17 [Pub][ePrint]A provable secure anonymous proxy signature scheme without random oracles, by Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh[ expand ]
09:17 [Pub][ePrint]Parallel authenticated encryption with the duplex construction, by Pawel Morawiecki and Josef Pieprzyk[ expand ]
09:17 [Pub][ePrint]New Trapdoor Projection Maps for Composite-Order Bilinear Groups, by Sarah Meiklejohn and Hovav Shacham[ expand ]
09:17 [Pub][ePrint]Bias-based modeling and entropy analysis of PUFs, by Robbert van den Berg and Boris Skoric and Vincent van der Leest[ expand ]
09:17 [Pub][ePrint]Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version), by Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel[ expand ]
09:17 [Pub][ePrint]Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter, by Baodong Qin and Shengli Liu[ expand ]
09:17 [Pub][ePrint]RKA-KDM secure encryption from public-key encryption, by Florian Böhl and Gareth T. Davies and Dennis Hofheinz[ expand ]
09:17 [Pub][ePrint]Efficient Modular Arithmetic for SIMD Devices, by Wilke Trei[ expand ]
09:17 [Pub][ePrint]A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound, by Sanjit Chatterjee and Chethan Kamath[ expand ]
09:17 [Pub][ePrint]On Extractability Obfuscation, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]
09:17 [Pub][ePrint]Security Analysis of Password-Authenticated Key Retrieval, by SeongHan Shin and Kazukuni Kobara[ expand ]
09:17 [Pub][ePrint]Integral Distinguishers for Reduced-round Stribog, by Riham AlTawy and Amr M. Youssef[ expand ]
04:47 [Event][New]SEC 2014: 29th IFIP TC11 SEC 2014 Int Conf ICT Systems Security & Privacy Protection[ expand ]
04:46 [Event][New]CHES 2014: Cryptographic Hardware and Embedded Systems[ expand ]


2013-10-14
16:30 [Job][New]Two PhD Positions, University of Bristol[ expand ]



2013-10-11
13:03 [Job][New]Two Post-Docs, Nanyang Technological University, Singapore[ expand ]


2013-10-10
18:17 [Pub][ePrint]A note on high-security general-purpose elliptic curves, by Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira[ expand ]
18:17 [Pub][ePrint]Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles, by Johannes Blömer and Gennadij Liske[ expand ]
15:17 [Pub][ePrint]FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession, by Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin K\\\"up\\c{c}\\\"u and \\\"Oznur \\\"Ozkasap[ expand ]
15:17 [Pub][ePrint]Elliptic and Hyperelliptic Curves: a Practical Security Analysis, by Joppe W. Bos and Craig Costello and Andrea Miele[ expand ]
15:17 [Pub][ePrint]There is no Indistinguishability Obfuscation in Pessiland, by Tal Moran and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation, by Dan Boneh and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Communication-Efficient MPC for General Adversary Structures, by Joshua Lampkins and Rafail Ostrovsky[ expand ]


2013-10-08
22:35 [Job][New]PhD Scholarship, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]


2013-10-07
14:17 [Job][New]Tenured, Tenure-track Faculty positions, Sejong University, Seoul, Korea[ expand ]
14:16 [Job][New]Researcher (postdoc) in Cryptography (or Quantum Crypto), Institute of Computer Science, University of Tartu, Estonia, EU[ expand ]



2013-10-06
21:24 [Event][New]CECC14: Central European Conference on Cryptology[ expand ]


2013-10-05
15:17 [Pub][ePrint]Differentially 4-Uniform Bijections by Permuting the Inverse Function, by Deng Tang and Claude Carlet and Xiaohu Tang[ expand ]
15:17 [Pub][ePrint]DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption, by Somindu C. Ramanna[ expand ]
15:17 [Pub][ePrint]Detection of Algebraic Manipulation in the Presence of Leakage, by Hadi Ahmadi and Reihaneh Safavi-Naini[ expand ]
15:17 [Pub][ePrint]SCARE of Secret Ciphers with SPN Structures, by Matthieu Rivain and Thomas Roche[ expand ]
15:17 [Pub][ePrint]Universal security; from bits and mips to pools, lakes -- and beyond, by Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé[ expand ]
15:17 [Pub][ePrint]Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
15:17 [Pub][ePrint]Four Measures of Nonlinearity, by Joan Boyar and Magnus Find and Rene Peralta[ expand ]


2013-10-04
23:47 [Event][New]WiSec'14: The 7th ACM Conference on Security and Privacy[ expand ]
06:34 [Event][New]COSADE'14: Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
06:25 [Job][New]Two Postdoc Positions, Technical University of Denmark, DTU[ expand ]
06:25 [Job][New]Lecturer in Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]


2013-10-01
21:17 [Pub][ePrint]Combined Modeling and Side Channel Attacks on Strong PUFs, by Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar[ expand ]
21:17 [Pub][ePrint]Protecting Obfuscation Against Algebraic Attacks, by Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
15:05 [Election]IACR Election & Referendum - Please Vote[ expand ]



2013-09-30
18:17 [Pub][ePrint]Estimating Key Sizes For High Dimensional Lattice Based Systems, by Joop van de Pol and Nigel P. Smart[ expand ]
18:17 [Pub][ePrint]Secure Key Management in the Cloud, by Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter[ expand ]
18:17 [Pub][ePrint]Parallelizable Authenticated Encryption from Functions, by Kazuhiko Minematsu[ expand ]
18:17 [Pub][ePrint]Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud, by Jiawei Yuan and Shucheng Yu[ expand ]
18:17 [Pub][ePrint]Improved Linear Attacks on the Chinese Block Cipher Standard, by Mingjie Liu and Jiazhe Chen[ expand ]


2013-09-29
18:17 [Pub][ePrint]Securing the Data in Big Data Security Analytics, by Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos[ expand ]


2013-09-28
18:17 [Pub][ePrint]New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption, by Xiaolin Cao and Ciara Moore[ expand ]
18:17 [Pub][ePrint]Off-Path Hacking: The Illusion of Challenge-Response Authentication, by Yossi Gilad and Amir Herzberg and Haya Shulman[ expand ]
18:17 [Pub][ePrint]Decentralized Anonymous Credentials, by Christina Garman and Matthew Green and Ian Miers[ expand ]


2013-09-27
15:17 [Pub][ePrint]Multi-LHL protocol, by Marika Mitrengová[ expand ]
15:17 [Pub][ePrint]Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications, by Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi[ expand ]
15:17 [Pub][ePrint]Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
15:17 [Pub][ePrint]Security Amplification against Meet-in-the-Middle Attacks Using Whitening, by Pierre-Alain Fouque and Pierre Karpman[ expand ]
15:17 [Pub][ePrint]Some results concerning global avalanche characteristics of two $q$-ary functions, by Brajesh Kumar Singh[ expand ]



2013-09-26
03:17 [Pub][ePrint]Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction, by Xiaolin Cao, Ciara Moore, Maire O\'Neill, Elizabeth O\'Sullivan and Neil Hanle[ expand ]
03:17 [Pub][ePrint]Privacy and Verifiability in Voting Systems: Methods, Developments and Trends, by Hugo Jonker and Sjouke Mauw and Jun Pang[ expand ]
03:17 [Pub][ePrint]Is extracting data the same as possessing data?, by Douglas R. Stinson and Jalaj Upadhyay[ expand ]


2013-09-24
06:33 [Job][New]Cryptographic Researcher, Security Innovation, Wilmington, MA, USA[ expand ]
06:33 [Job][New]Associate Professor, School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia[ expand ]
06:17 [Pub][ePrint]Recomputing with Permuted Operands: A Concurrent Error Detection Approach, by Xiaofei Guo and Ramesh Karri[ expand ]


2013-09-23
07:41 [Event][New]ACNS'14: 12th International Conference on Applied Cryptography and Network Security[ expand ]
06:17 [Pub][ePrint]Sub-linear Blind Ring Signatures without Random Oracles, by Essam Ghadafi[ expand ]
06:17 [Pub][ePrint]Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful, by Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki[ expand ]
06:17 [Pub][ePrint]Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]Ultra Low-Power implementation of ECC on the ARM Cortex-M0+, by Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]How to Further Increase Leakage Exploitation Rate in Profiled Side-Channel Attacks?, by Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng[ expand ]
06:17 [Pub][ePrint]Cryptanalysis of Full RIPEMD-128, by Franck Landelle and Thomas Peyrin[ expand ]
06:17 [Pub][ePrint]Revocable quantum timed-release encryption, by Dominique Unruh[ expand ]
06:17 [Pub][ePrint]Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC., by Masao KAS[ expand ]
06:17 [Pub][ePrint]Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos, by Jörg Schwenk[ expand ]
03:17 [Pub][ePrint]Invariance-Based Concurrent Error Detection for Advanced Encryption Standard, by Xiaofei Guo and Ramesh Karri[ expand ]


2013-09-22
14:26 [Job][New]Assistant Professor (Lecturer, Senior Lecturer), Ariel University, Israel[ expand ]



2013-09-19
15:17 [Pub][ePrint]Two-round secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova[ expand ]
15:17 [Pub][ePrint]Improved Cryptanalysis of Reduced RIPEMD-160, by Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Factoring RSA keys from certified smart cards: Coppersmith in the wild, by Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Som[ expand ]
15:17 [Pub][ePrint]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version, by Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and Da[ expand ]
15:17 [Pub][ePrint]Efficient Pairings Computation on Jacobi Quartic Elliptic Curves, by Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa[ expand ]
15:17 [Pub][ePrint]On the Efficacy of Solving LWE by Reduction to Unique-SVP, by Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert[ expand ]


2013-09-18
22:03 [Job][New]Tenure-track Assistant Professors , Florida State University, Tallahassee, Florida, Southern USA[ expand ]
13:32 [Job][New]Ph.D./Post-Docs, University of Haifa, Israel[ expand ]
13:32 [Job][New]MSc Student, University of Warsaw, Poland, European Union[ expand ]
13:32 [Job][New]PhD Student, University of Warsaw, Poland, European Union[ expand ]
13:31 [Job][New]Post-Doc, University of Warsaw, Poland, European Union[ expand ]
13:30 [Event][New]ACISP 2014: 19th Australasian Conference on Information Security and Privacy[ expand ]


2013-09-15
00:17 [Pub][ePrint]Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study, by Michael Shantz and Edlyn Teske[ expand ]
00:17 [Pub][ePrint]Enhanced certificate transparency (how Johnny could encrypt), by Mark D. Ryan[ expand ]
00:17 [Pub][ePrint]A Local-Global Approach to Solving Ideal Lattice Problems, by Yuan Tian and Rongxin Sun and Xueyong Zhu[ expand ]
00:17 [Pub][ePrint]One-Sided Adaptively Secure Two-Party Computation, by Carmit Hazay and Arpita Patra[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of the Toorani-Falahati Hill Ciphers, by Liam Keliher and Anthony Z. Delaney[ expand ]
00:17 [Pub][ePrint]Analysis of the Rainbow Tradeoff Algorithm Used in Practice, by Jung Woo Kim and Jin Hong and Kunsoo Park[ expand ]
00:17 [Pub][ePrint]EyeDecrypt -- Private Interactions in Plain Sight, by Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis[ expand ]
00:17 [Pub][ePrint]Smashing MASH-1, by Vladimir Antipkin[ expand ]


2013-09-14
13:27 [Event][New]DigitalSec: The International Conference on Digital Security and Forensics[ expand ]
09:17 [Pub][ePrint]SPHF-Friendly Non-Interactive Commitments, by Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval[ expand ]
03:17 [Pub][ePrint]ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments, by Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo[ expand ]
03:17 [Pub][ePrint]Generic related-key and induced chosen IV attacks using the method of key differentiation, by Enes Pasalic and Yongzhuang Wei[ expand ]
03:17 [Pub][ePrint]On Algebraic Immunity of $\\Tr(x^{-1})$ over $\\mathbb{F}_{2^n}, by Xiutao Feng[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of GOST R Hash Function, by Zongyue Wang, Hongbo Yu, Xiaoyun Wang[ expand ]
03:17 [Pub][ePrint]polynomial selection for the number field sieve in geometric view, by Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang[ expand ]
03:17 [Pub][ePrint]The Special Number Field Sieve in $\\F _{p^{n}}$, Application to Pairing-Friendly Constructions, by Antoine Joux and Cécile Pierrot[ expand ]
03:17 [Pub][ePrint]PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones, by Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma[ expand ]
03:17 [Pub][ePrint]Random Projections, Graph Sparsification, and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]On Measurable Side-Channel Leaks inside ASIC Design Primitives, by Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino[ expand ]
00:17 [Pub][ePrint]A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent, by Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov[ expand ]
00:17 [Pub][ePrint]Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique, by Luís T. A. N. Brandão[ expand ]
00:17 [Pub][ePrint]Extended Criterion for Absence of Fixed Points, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
00:17 [Pub][ePrint]Equivalence between MAC and PRF for Blockcipher based Constructions, by Nilanjan Datta and Mridul Nandi[ expand ]



2013-09-12
12:24 [Job][New]PhD scholarship, TU Berlin and DLR and HRS ST, Germany, Europe[ expand ]
09:33 [Job][New]Professors (all ranks), Nazarbayev University, Kazakhstan[ expand ]
09:27 [Event][New]IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet The rapid[ expand ]


2013-09-11
09:41 [Job][New]Assistant/Associate Professor, Texas Tech University, the Big State, USA[ expand ]


2013-09-10
10:26 [PhD][New]C. Eric (Carl) Bach[ expand ]
10:25 [PhD][New][ expand ]


2013-09-09
03:17 [Pub][ePrint]Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher, by Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay[ expand ]
03:17 [Pub][ePrint]Efficient General-Adversary Multi-Party Computation, by Martin Hirt and Daniel Tschudi[ expand ]
03:17 [Pub][ePrint]New Efficient Identity-Based Encryption From Factorization, by Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao[ expand ]
03:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of the Speck Family of Block Ciphers, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
03:17 [Pub][ePrint][ expand ]
03:17 [Pub][ePrint]Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]



2013-09-08
02:34 [Event][New]Africacrypt 2014[ expand ]
02:31 [Job][Update]Lead Digital Currency Crypto Contractor, Currency Instruments, Illinois (USA)[ expand ]


2013-09-06
17:47 [Job][New]Lead Digital Currency Crypto Engineer, Currency Instruments, Illinois (USA)[ expand ]


2013-09-05
21:17 [Pub][ePrint]Non-Malleable Coding Against Bit-wise and Split-State Tampering, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Capacity of Non-Malleable Codes, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, by Zvika Brakerski and Guy N. Rothblum[ expand ]
21:17 [Pub][ePrint]Self-pairings on supersingular elliptic curves with embedding degree $three$, by Binglong Chen and Chang-An~Zhao[ expand ]
06:04 [Job][Update]Ph.D. student, DemTech/IT University of Copenhagen, Denmark[ expand ]
06:04 [Job][New]PhD position on Privacy Engineering, University of Ulm, Institute of Distributed Systems, Germany[ expand ]
06:04 [Job][New]Ph.D. student, DemTech/IT University of Copenhagen[ expand ]


2013-09-04
15:17 [Pub][ePrint]Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis, by Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
15:17 [Pub][ePrint]Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time, by Ben Morris and Phillip Rogaway[ expand ]
15:17 [Pub][ePrint]A Constructive Approach to Functional Encryption, by Christian Matt and Ueli Maurer[ expand ]
15:17 [Pub][ePrint]Practical approaches to varying network size in combinatorial key predistribution schemes, by Kevin Henry and Maura B. Paterson and Douglas R. Stinson[ expand ]
15:17 [Pub][ePrint]Black-Box Obfuscation for d-CNFs, by Zvika Brakerski and Guy N. Rothblum[ expand ]
15:17 [Pub][ePrint]Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
15:17 [Pub][ePrint]Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design, by Ueli Maurer and Björn Tackmann and Sandro Coretti[ expand ]
15:17 [Pub][ePrint]Formally Proved Security of Assembly Code Against Leakage, by Pablo Rauzy and Sylvain Guilley and Zakaria Najm[ expand ]
15:17 [Pub][ePrint]Multi-Valued Byzantine Broadcast: the $t < n$ Case, by Martin Hirt and Pavel Raykov[ expand ]
15:17 [Pub][ePrint]More Efficient Oblivious Transfer and Extensions for Faster Secure Computation, by Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner[ expand ]
15:17 [Pub][ePrint]Puzzle Encryption Algorithm, by Gregory Alvarez and Charles Berenguer[ expand ]
15:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao, Xiaolei, Licheng Wang and Jun Shao[ expand ]
15:17 [Pub][ePrint]Equations System coming from Weil descent and subexponential attack for algebraic curve , by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Decomposition formula of the Jacobian group of plane curve, by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks, by Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang[ expand ]
15:17 [Pub][ePrint]TRS-80 with a grain of salt, by Jean-Marie Chauvet[ expand ]
13:32 [Event][New]Crypto 2014[ expand ]



2013-09-03
20:48 [Job][New]Junior Professorship in Mobile Security, Ruhr-Universität Bochum, Germany[ expand ]
06:30 [Event][New]CS2-2014: First Workshop on Cryptography and Security in Computing Syste[ expand ]


2013-08-30
21:47 [Job][New]UTRCI Research Scientist, Cyber-physical Systems Security , United Technologies Research Centre, Cork - Ireland[ expand ]
21:46 [Job][New]Ph.D.student, Hochschule Furtwangen University, Germany, EEA[ expand ]
21:43 [Event][New]SHA3: The 2014 SHA3 Workshop[ expand ]
15:17 [Pub][ePrint]Private Over-threshold Aggregation Protocols over Distributed Databases, by Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim[ expand ]
15:17 [Pub][ePrint]Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes, by Christian Hanser and Daniel Slamanig[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the SIMON Family of Block Ciphers, by Hoda A. Alkhzaimi and Martin M. Lauridsen[ expand ]
15:17 [Pub][ePrint]Searching for Nonlinear Feedback Shift Registers with Parallel Computing, by Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt[ expand ]
15:17 [Pub][ePrint]Lattice-Based FHE as Secure as PKE, by Zvika Brakerski and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]On the security of a password-only authenticated three-party key exchange protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
12:17 [Pub][ePrint]Rebound attacks on Stribog, by Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Practical Issues with TLS Client Certificate Authentication, by Arnis Parsovs[ expand ]
12:17 [Pub][ePrint]Inter-FSP Funds Transfer Protocol, by Amir Herzberg and Shay Nachmani[ expand ]
12:17 [Pub][ePrint]A Three-Level Sieve Algorithm for the Shortest Vector Problem, by Feng Zhang and Yanbin Pan and Gengran Hu[ expand ]
12:17 [Pub][ePrint]Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms, by Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede[ expand ]
12:17 [Pub][ePrint]Efficient Unobservable Anonymous Reporting against Strong Adversaries, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]Gossip Latin Square and The Meet-All Gossipers Problem, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves, by Takakazu Satoh[ expand ]
12:17 [Pub][ePrint]On the Limits of Provable Anonymity, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]The Parallel-Cut Meet-In-The-Middle Attack, by Ivica Nikolic, Lei Wang and Shuang Wu[ expand ]
09:17 [Pub][ePrint]How to Withstand Mobile Virus Attacks, Revisited, by Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky[ expand ]
09:17 [Pub][ePrint]Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption, by Somindu C. Ramanna and Palash Sarkar[ expand ]
09:17 [Pub][ePrint]The Spammed Code Offset Method, by Boris Skoric and Niels de Vreede[ expand ]
09:17 [Pub][ePrint]Differential Cryptanalysis of Reduced-Round Simon, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Catena: A Memory-Consuming Password Scrambler, by Christian Forler and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Threshold Secret Image Sharing, by Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren[ expand ]
09:17 [Pub][ePrint]White-Box Security Notions for Symmetric Encryption Schemes, by Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain[ expand ]
09:17 [Pub][ePrint]The Resistance of PRESENT-80 Against Related-Key Differential Attacks, by Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Multiple Limited-Birthday Distinguishers and Applications, by Jérémy Jean and María Naya-Plasencia and Thomas Peyrin[ expand ]


2013-08-26
14:13 [Event][New]Practical Cryptography: Algorithms and Implementations using C++[ expand ]
14:12 [Event][New]Practical Cryptography: Algorithms & Implementations using C++[ expand ]
11:01 [Event][New]CfP: Special Issue Crypto: Discrete Structures / Side Channels[ expand ]
07:09 [Event][New]IJISS: International Journal of Information Security Science[ expand ]


2013-08-25
22:42 [Service]Volunteer wanted to edit video[ expand ]



2013-08-24
08:59 [Event][New]CARDIS 2013: Twelfth Smart Card Research and Advanced Application Conference[ expand ]


2013-08-23
17:15 [Election]Nominations are Now Open[ expand ]


2013-08-22
14:05 [PhD][New]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
14:02 [PhD][Update]Marina Samokhina: The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
08:51 [Event][New]ANTS XI: Algorithmic Number Theory Symposium XI[ expand ]
03:17 [Pub][ePrint]Locally Updatable and Locally Decodable Codes, by Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky[ expand ]


2013-08-21
03:17 [Pub][ePrint]Montgomery Multiplication Using Vector Instructions, by Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]Universal Leaky Random Oracle Model, by Guangjun Fan and Yongbin Zhou and Dengguo Feng[ expand ]
03:17 [Pub][ePrint]Improvement of One Adaptive Oblivious Transfer Scheme , by Zhengjun Cao and Lihua Liu[ expand ]
03:17 [Pub][ePrint]MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials, by Melissa Chase and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol, by Changyu Dong and Liqun Chen and Zikai Wen[ expand ]
03:17 [Pub][ePrint]Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited, by Jia Xu and Jianying Zhou[ expand ]
03:17 [Pub][ePrint]Enforcing Language Semantics Using Proof-Carrying Data, by Stephen Chong and Eran Tromer and Jeffrey A. Vaughan[ expand ]



2013-08-20
15:40 [Service]Free Access to IACR Publications at Springer[ expand ]
15:31 [News]Clarification on the new IACR publication and copyright policy[ expand ]
15:03 [Event][New]CT-RSA '14: Cryptographers' Track at the RSA Conference[ expand ]
15:00 [Job][Update]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]


2013-08-19
08:59 [Job][New]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]
08:59 [Job][New]PhD students, Queensland University of Technology, Brisbane, Australia[ expand ]
08:59 [Job][Update]Post-Doc, University of Athens, Greece[ expand ]


2013-08-17
21:17 [Pub][ePrint]Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences , by Jingguo Bi and Phong Q. Nguyen[ expand ]
21:17 [Pub][ePrint]Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT, by Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers, by Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick W[ expand ]
21:17 [Pub][ePrint]Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation, by Susan Hohenberger and Amit Sahai and Brent Waters[ expand ]
21:17 [Pub][ePrint]Multi-Key Searchable Encryption, by Raluca Ada Popa and Nickolai Zeldovich[ expand ]
21:17 [Pub][ePrint]SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge, by Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza[ expand ]
21:17 [Pub][ePrint]A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Improvement of One Anonymous Identity-Based Encryption, by Zhengjun Cao and Lihua Liu[ expand ]
21:17 [Pub][ePrint]A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves, by Reza Azarderakhsh and Koray Karabina[ expand ]
21:17 [Pub][ePrint]On secret sharing with nonlinear product reconstruction, by Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing[ expand ]


2013-08-15
09:17 [Pub][ePrint]Proving TLS-attack related open biases of RC4, by Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]Type-Based Analysis of Protected Storage in the TPM (full version), by Jianxiong Shao and Dengguo Feng and Yu Qin}[ expand ]
09:17 [Pub][ePrint]Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups, by Ran Canetti and Vinod Vaikuntanathan[ expand ]
09:17 [Pub][ePrint]Limits on the Power of Cryptographic Cheap Talk, by Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen[ expand ]
09:17 [Pub][ePrint]Non-Malleable Codes from Two-Source Extractors, by Stefan Dziembowski and Tomasz Kazana and Maciej Obremski[ expand ]
09:17 [Pub][ePrint]Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme, by Zhengjun Cao and Hanyue Cao[ expand ]
09:17 [Pub][ePrint]Rational Protocol Design: Cryptography Against Incentive-driven Adversaries, by Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas[ expand ]
09:17 [Pub][ePrint]Revocable IBE Systems with Almost Constant-size Key Update, by Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Differential Fault Attack against Grain family with very few faults and minimal assumptions, by Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]A new class of semi-bent quadratic Boolean functions, by Chunming Tang and Yanfeng Qi[ expand ]
09:17 [Pub][ePrint]Cryptographically Enforced RBAC, by Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Improved OT Extension for Transferring Short Secrets, by Vladimir Kolesnikov and Ranjit Kumaresan[ expand ]
09:17 [Pub][ePrint]For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes, by Masoumeh Safkhani, Nasour Bagheri[ expand ]
09:17 [Pub][ePrint]An Efficient Scheme for Centralized Group Key Management in Collaborative Environments, by Constantinos Patsakis and Agusti Solanas[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency, by Kwangsu Lee and Dong Hoon Lee[ expand ]



2013-08-14
15:17 [Pub][ePrint]A New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and Indranil Sengupta[ expand ]
15:17 [Pub][ePrint]Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification, by Jiawei Yuan and Shucheng Yu[ expand ]
15:17 [Pub][ePrint]A Variant of Coppersmith\'s Algorithm with Improved Complexity and Efficient Exhaustive Search, by Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun[ expand ]
15:17 [Pub][ePrint]Bounds in Shallows and in Miseries, by Céline Blondeau and Andrey Bogdanov and Gregor Leander[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012, by Yosuke Todo and Keita Xagawa[ expand ]
15:17 [Pub][ePrint]Efficient Multiparty Protocols via Log-Depth Threshold Formulae, by Gil Cohen, Ivan Bjerre Damg{\\aa}rd, Yuval Ishai, Jonas K\\\"{o}lker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum[ expand ]
15:17 [Pub][ePrint]Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks, by B. Skoric[ expand ]
15:17 [Pub][ePrint]Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach, by Stefan G. Weber[ expand ]
15:17 [Pub][ePrint]Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing, by Renaud Dubois and Margaux Dugardin and Aurore Guillevic[ expand ]
15:17 [Pub][ePrint]Distinguishing WPA, by Sourav Sen Gupta and Subhamoy Maitra and Willi Meier[ expand ]
15:17 [Pub][ePrint]Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition, by Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao[ expand ]
15:17 [Pub][ePrint]Handling Authentication and Detection Probability in Multi-tag RFID Environment, by Subhasish Dhal and Indranil Sengupta[ expand ]


2013-08-12
11:28 [Event][New]SSPA2013: Smart Sensor Protocols and Algorithms 2013[ expand ]


2013-08-10
18:27 [Event][New]Congress on privacy and surveillance[ expand ]


2013-08-09
20:42 [Event][New]ISC 2013: Sixteenth Information Security Conference[ expand ]
06:58 [Event][New]Inscrypt'13: 9th China International Conference on Information Security and Cryptology[ expand ]



2013-08-08
21:17 [Forum][IACR Publication Reform] Response to the invitation for comments by eoswald[ expand ]


2013-08-06
11:10 [Event][New]TCC: Theory of Cryptography Conference[ expand ]


2013-08-05
18:07 [News]Revisiting the IACR Publication Strategy: An Invitation for Comments[ expand ]
15:17 [Forum][IACR Publication Reform] Re: IACR publication reform - background material by nigel[ expand ]


2013-08-04
19:50 [Job][New]Senior / Scientists, A*STAR, Data Storage Institute, Singapore[ expand ]



2013-08-03
10:40 [Job][New]Computing Security Department Chair, Rochester Institute of Technology, Rochester, NY, USA[ expand ]
06:17 [Pub][ePrint]A note on verifying the APN property, by Pascale Charpin and Gohar M. Kyureghyan[ expand ]
06:17 [Pub][ePrint]Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications, by Zhengjun Cao[ expand ]
06:17 [Pub][ePrint]The Norwegian Internet Voting Protocol, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Partially blind password-based signatures using elliptic curves, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Obfuscating Conjunctions, by Zvika Brakerski and Guy N. Rothblum[ expand ]
06:17 [Pub][ePrint]Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]


2013-08-02
15:17 [Pub][ePrint]Verifiable Delegation of Computation on Outsourced Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
15:17 [Pub][ePrint]How To Construct Extractable One-Way Functions Against Uniform Adversaries, by Nir Bitansky and Ran Canetti and Omer Paneth[ expand ]
15:17 [Pub][ePrint]Analysis of BLAKE2, by Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Efficient computation of addition-subtraction chains using generalized continued Fractions, by Amadou Tall and Ali Yassin Sanghare[ expand ]
08:05 [Job][New]Post-Doc, Telecom ParisTech, Communication and Electrical Engineering Department, Sophia-Antipolis, France[ expand ]
06:17 [Pub][ePrint]Practical & Provably Secure Distance-Bounding, by Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay[ expand ]
06:17 [Pub][ePrint]Towards A Practical JCJ / Civitas Implementation, by Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig[ expand ]
06:17 [Pub][ePrint]Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel, by Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref[ expand ]
06:17 [Pub][ePrint]Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data, by Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese[ expand ]


2013-08-01
09:17 [Pub][ePrint]HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware, by Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu[ expand ]


2013-07-29
06:17 [Pub][ePrint]Solving Terminal Revocation in EAC by Augmenting Terminal Authentication, by Rafik Chaabouni[ expand ]
06:17 [Pub][ePrint]Reset Indifferentiability and its Consequences, by Paul Baecher and Christina Brzuska and Arno MIttelbach[ expand ]



2013-07-27
17:40 [Job][New]Post-Doc Positions, University of Bristol[ expand ]
17:39 [Job][New]Post-doc, LIX, École polytechnique, France[ expand ]