International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 [ 62 ] 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118
2014-01-12
16:17 [Pub][ePrint]Channel Equalization for Side Channel Attacks, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]


2014-01-10
17:28 [Event][New]DASec 2014: The First International Workshop on Big Data Analytics for Security[ expand ]
10:17 [Pub][ePrint]Twisting Edwards curves with isogenies, by Mike Hamburg[ expand ]
10:17 [Pub][ePrint]Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System, by Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger [ expand ]


2014-01-09
16:56 [Event][New]AsiaCCS-SCC: The Second International Workshop on Security in Cloud Computing[ expand ]
16:56 [Event][New]ASIAPKC 2014: 2nd ACM ASIA Public-Key Cryptography Workshop[ expand ]


2014-01-08
19:17 [Pub][ePrint]Side-Channel Leakage through Static Power -Should We Care about in Practice?-, by Amir Moradi[ expand ]
19:17 [Pub][ePrint][ expand ]
19:17 [Pub][ePrint]Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle, by Gengran Hu and Yanbin Pan and Feng Zhang[ expand ]
19:17 [Pub][ePrint]Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR, by Sourav Das[ expand ]
19:17 [Pub][ePrint]Online/Offline Attribute-Based Encryption, by Susan Hohenberger and Brent Waters[ expand ]
19:17 [Pub][ePrint](De-)Constructing TLS, by Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi[ expand ]
19:17 [Pub][ePrint]Lazy Modulus Switching for the BKW Algorithm on LWE, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]


2014-01-07
22:00 [PhD][Update]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
10:17 [Pub][ePrint]Completeness for Symmetric Two-Party Functionalities - Revisited, by Yehuda Lindell and Eran Omri and Hila Zarosim[ expand ]
10:17 [Pub][ePrint]Two-round password-only authenticated key exchange in the three-party setting, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
10:17 [Pub][ePrint]Triple and Quadruple Encryption: Bridging the Gaps, by Bart Mennink and Bart Preneel[ expand ]
10:17 [Pub][ePrint]Tight Security Bounds for Triple Encryption, by Jooyoung Lee[ expand ]
10:17 [Pub][ePrint]Linkable Message Tagging: Solving the key distribution problem of signature schemes, by Felix Günther and Bertram Poettering[ expand ]
10:17 [Pub][ePrint]A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs, by Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol[ expand ]
10:17 [Pub][ePrint][ expand ]
10:17 [Pub][ePrint]Construction of New Families of ‎MDS‎ Diffusion Layers, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha[ expand ]



2014-01-06
07:11 [PhD][New]Sebastian Pape: The Challenge of Authentication in Insecure Environments[ expand ]
07:11 [PhD][New][ expand ]


2014-01-05
15:50 [PhD][New]Emmanuelle Encrenaz[ expand ]
15:50 [PhD][New]Bruno Robisson[ expand ]
15:48 [PhD][New]Dong Hoon Lee[ expand ]
15:42 [PhD][New]Kwangsu Lee: Efficient Hidden Vector Encryptions and Its Applications[ expand ]
15:34 [PhD][New]Amr Youssef[ expand ]
15:34 [PhD][New]Zachary Kissel: Verifiable Symmetric Searchable Encryption[ expand ]
15:34 [PhD][New]Jie Wang: Polynomial Time Creativity and its Applications (P-Creativity)[ expand ]
13:17 [Pub][ePrint]A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing, by Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh[ expand ]
13:17 [Pub][ePrint]Characterization of EME with Linear Mixing, by Mridul Nandi and Nilanjan Datta[ expand ]
13:17 [Pub][ePrint]A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis, by Annelie Heuser and Sylvain Guilley and Olivier Rioul[ expand ]
13:17 [Pub][ePrint]One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner., by Ethan Heilman[ expand ]
13:17 [Pub][ePrint]Efficient Non-Interactive Zero Knowledge Arguments for Set Operations, by Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang[ expand ]


2014-01-04
17:27 [PhD][Update]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]


2014-01-03
13:17 [Pub][ePrint]The analysis of the Keccak with the new method called parity, by Ghanei yakhdan.mostafa, Noruzi, zynolabedin[ expand ]
10:17 [Pub][ePrint]MaxMinMax problem and sparse equations over finite fields, by Igor Semaev[ expand ]



2014-01-02
10:17 [Pub][ePrint]$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials, by Xi Xiong and Haining Fan[ expand ]
10:17 [Pub][ePrint]Pseudorandom Generator Based on Hard Lattice Problem, by Kuan Cheng[ expand ]


2014-01-01
23:37 [Event][New]YACC 2014: Yet Another Conference on Cryptography[ expand ]
22:17 [Pub][ePrint]Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks, by Yalin Chen and Jue-Sam Chou[ expand ]
16:17 [Pub][ePrint]New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers, by Zhe Liu and Johann Gro{\\ss}sch{\\\"a}dl[ expand ]
16:17 [Pub][ePrint]Can Bitcoin Scale? Secure High-Rate Transaction Processing in The Bitcoin Network, by Yonatan Sompolinsky and Aviv Zohar[ expand ]
16:17 [Pub][ePrint]New Constructions of Revocable Identity-Based Encryption from Multilinear Maps, by Seunghwan Park and Kwangsu Lee and Dong Hoon Lee[ expand ]


2013-12-31
06:37 [Job][New]Computer Engineering, Ariel University, Israel, Mediterranean[ expand ]


2013-12-30
22:17 [Pub][ePrint]Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs, by Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng[ expand ]
22:17 [Pub][ePrint]MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature, by Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li[ expand ]
22:17 [Pub][ePrint]Succinct Non-Interactive Arguments for a von Neumann Architecture, by Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza[ expand ]



2013-12-29
22:17 [Pub][ePrint]Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE, by Michael Clear and Ciaran McGoldrick[ expand ]
22:17 [Pub][ePrint]Public-Key Encryption with Lazy Parties, by Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction, by Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga[ expand ]
13:17 [Pub][ePrint]Poly-Many Hardcore Bits for Any One-Way Function, by Mihir Bellare and Stefano Tessaro[ expand ]
13:17 [Pub][ePrint]PRE^{+}: Dual of Proxy Re-encryption and Its Application, by Xu An Wang and Yunlong Ge and Xiaoyuan Yang[ expand ]
13:17 [Pub][ePrint]A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities, by Weiqiang Wen and Libin Wang[ expand ]
13:17 [Pub][ePrint]A new class of hyper-bent functions and Kloosterman sums, by Chunming Tang, Yanfeng Qi[ expand ]
13:17 [Pub][ePrint]How to Fake Auxiliary Input, by Dimitar Jetchev and Krzysztof Pietrzak[ expand ]
13:17 [Pub][ePrint]Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft), by Lear Bahack[ expand ]
13:17 [Pub][ePrint]LHash: A Lightweight Hash Function (Full Version), by Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong[ expand ]
13:17 [Pub][ePrint]Compact Hardware Implementation of Ring-LWE Cryptosystems, by Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede[ expand ]
13:17 [Pub][ePrint]SNR to Success Rate: Reaching the Limit of Non-Profiling DPA, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
13:17 [Pub][ePrint]Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs, by Adam Smith and Ye Zhang[ expand ]
13:17 [Pub][ePrint]Formal Treatment of Distributed Trust in Electronic Voting, by Stephan Neumann and Melanie Volkamer[ expand ]
13:17 [Pub][ePrint]How to Delegate Computations: The Power of No-Signaling Proofs, by Yael Tauman Kalai and Ran Raz and Ron Rothblum[ expand ]
13:17 [Pub][ePrint]Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments, by Muhammad Rizwan Asghar[ expand ]
13:17 [Pub][ePrint]On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input , by Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, by Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix[ expand ]
13:17 [Pub][ePrint]Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications, by Sherman S.M. Chow and Matthew Franklin and Haibin Zhang[ expand ]
13:17 [Pub][ePrint]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, by Daniel Genkin and Adi Shamir and Eran Tromer[ expand ]


2013-12-27
13:37 [Job][New]Research Fellow, University of Tartu, Estonia[ expand ]


2013-12-20
16:48 [Job][New]Fully funded Ph.D., Ecole normale supérieure (Paris Area, France)[ expand ]
16:17 [Pub][ePrint]Tightly-Secure Signatures From Lossy Identification Schemes, by Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi[ expand ]
16:17 [Pub][ePrint]Weaknesses in a Recently Proposed RFID Authentication Protocol, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
16:17 [Pub][ePrint]Multiple-Use Transferable E-Cash , by Pratik Sarkar[ expand ]


2013-12-18
15:08 [Job][New]Post-Doc, EPFL, Switzerland[ expand ]
08:54 [Job][New]3 Phd Students in Trustworthy Hardware/Hardware Security, New York University Polytechnic School of Engineering, USA, North America[ expand ]



2013-12-17
19:17 [Pub][ePrint]Automatic Search for Differential Trails in ARX Ciphers (Extended Version), by Alex Biryukov and Vesselin Velichkov[ expand ]
16:17 [Pub][ePrint]Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256, by Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang[ expand ]
16:17 [Pub][ePrint]Power and Timing Side Channels for PUFs and their Efficient Exploitation, by Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson[ expand ]
16:17 [Pub][ePrint]Secure Floating-Point Arithmetic and Private Satellite Collision Analysis, by Liina Kamm and Jan Willemson[ expand ]
16:17 [Pub][ePrint]Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model, by Suvadeep Hajra and Debdeep Mukhopadhyay[ expand ]
16:17 [Pub][ePrint]Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols, by Xi-Jun Lin and Lin Sun[ expand ]
16:17 [Pub][ePrint]Ultralightweight cryptography for passive RFID system, by Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed[ expand ]
16:17 [Pub][ePrint]A new attack on RSA with a composed decryption exponent, by Abderrahmane Nitaj and Mohamed Ould Douh[ expand ]
16:17 [Pub][ePrint]How to Keep a Secret: Leakage Deterring Public-key Cryptography, by Aggelos Kiayias and Qiang Tang[ expand ]
16:17 [Pub][ePrint]A generic view on trace-and-revoke broadcast encryption schemes, by Dennis Hofheinz and Christoph Striecks[ expand ]
16:17 [Pub][ePrint]A Study of Goldbach\'s conjecture and Polignac\'s conjecture equivalence issues, by Jian Ye and Chenglian Liu[ expand ]
16:17 [Pub][ePrint]Detecting Hidden Leakages, by Amir Moradi and Sylvain Guilley and Annelie Heuser[ expand ]


2013-12-16
22:17 [Pub][ePrint]Trust Views for the Web PKI, by Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser[ expand ]
22:17 [Pub][ePrint](Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, by Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Z[ expand ]
22:17 [Pub][ePrint]Lattice Decoding Attacks on Binary LWE, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]An improved compression technique for signatures based on learning with errors, by Shi Bai and Steven D. Galbraith[ expand ]
22:17 [Pub][ePrint]Fair Two-Party Computations via the BitCoin Deposits, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
22:17 [Pub][ePrint]Identity-Based Key-Encapsulation Mechanism from Multilinear Maps, by Hao Wang and Lei Wu Zhihua Zheng[ expand ]
19:17 [Pub][ePrint]A Modular Framework for Building Variable-Input Length Tweakable Ciphers, by Thomas Shrimpton and R. Seth Terashima[ expand ]
19:17 [Pub][ePrint]Keyless Signatures\' Infrastructure: How to Build Global Distributed Hash-Trees, by Ahto Buldas and Andres Kroonmaa and Risto Laanoja[ expand ]
19:17 [Pub][ePrint]Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions, by Fabrice Benhamouda and David Pointcheval[ expand ]
19:17 [Pub][ePrint]Practical Dynamic Searchable Encryption with Small Leakage, by Emil Stefanov and Charalampos Papamanthou and Elaine Shi[ expand ]
19:17 [Pub][ePrint]Provable Security Proofs and their Interpretation in the Real World, by Vikram Singh[ expand ]
19:17 [Pub][ePrint]PROPERTY PRESERVING SYMMETRIC ENCRYPTION: REVISITED, by SANJIT CHATTERJEE AND M. PREM LAXMAN DAS[ expand ]
19:17 [Pub][ePrint]Is Bitcoin a Decentralized Currency?, by Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun[ expand ]
15:47 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Max Planck Institute for Software Systems, Saarbrücken, Germany[ expand ]
08:38 [Job][New]Ph.D student , Chalmers University of Technology, Sweden[ expand ]
08:07 [Event][New]IEEE Computer SI on Mobile App Sec: IEEE Computer SI on methodologies and solutions for mobile app. security[ expand ]


2013-12-11
13:17 [Pub][ePrint]Decentralized Traceable Attribute-Based Signatures, by Ali El Kaafarani and Essam Ghadafi and Dalia Khader[ expand ]
12:10 [Job][New]Research Assistent, Institute for Security in Information Technology, Technische Universitaet Muenchen; Munich (Germany)[ expand ]
05:43 [Job][New]Assistant Professor, Simon Fraser University, Burnaby, Canada, North America[ expand ]


2013-12-10
06:42 [Job][New]Post-Doctoral Position in Systems Security, Network Security, Cryptography or Tech Policy, Boston University, Boston, MA, USA[ expand ]



2013-12-09
17:51 [Event][New]IEEE IoT Journal, Special Issue on Security for IoT: the State of the Art[ expand ]
16:12 [Job][New]Digital Security Expert, Philips Research, Eindhoven, the Netherlands[ expand ]


2013-12-06
22:17 [Pub][ePrint]Lower Bounds in the Hardware Token Model, by Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen[ expand ]
22:17 [Pub][ePrint]Secure multi-party data analysis: end user validation and practical experiments, by Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt[ expand ]
22:17 [Pub][ePrint]EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen, by Alberto Peinado and Jorge Munilla and Amparo Fúster[ expand ]
22:17 [Pub][ePrint]Fair and Efficient Secure Multiparty Computation with Reputation Systems, by Gilad Asharov and Yehuda Lindell and Hila Zarosim[ expand ]
22:17 [Pub][ePrint]Another Look at XCB, by {Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar[ expand ]
22:17 [Pub][ePrint]Leakage Resilient Fully Homomorphic Encryption, by Alexandra Berkoff and Feng-Hao Liu[ expand ]
22:17 [Pub][ePrint]Errorless Smooth Projective Hash Function based on LWE, by Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan[ expand ]
22:17 [Pub][ePrint]On the Security of Recently Proposed RFID Protocols, by Mete Akg\\\"{u}n, M. Ufuk \\c{C}a\\v{g}layan[ expand ]
22:17 [Pub][ePrint]Safe enclosures: towards cryptographic techniques for server protection, by Sergiu Bursuc and Julian P. Murphy[ expand ]
22:17 [Pub][ePrint]On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography, by Roberto De Prisco and Alfredo De Santis[ expand ]
22:17 [Pub][ePrint]Interactive Encryption, Message Authentication, and Anonymous Key Exchange, by Yevgeniy Dodis and Dario Fiore[ expand ]
22:17 [Pub][ePrint]Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes, by Shay Gueron and Vlad Krasnov[ expand ]
22:17 [Pub][ePrint]Iterated group products and leakage resilience against NC^1, by Eric Miles[ expand ]
22:17 [Pub][ePrint]RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases, by Lil Maria Rodriguez-Henriquez and Debrup Chakraborty[ expand ]
22:17 [Pub][ePrint]Multi-ciphersuite security and the SSH protocol, by Benjamin Dowling and Florian Giesen and Florian Kohlar and Jörg Schwenk and Douglas Stebila[ expand ]
22:17 [Pub][ePrint]A Note on Bilinear Groups of a Large Composite Order, by Zhengjun Cao and Lihua Liu[ expand ]
22:17 [Pub][ePrint]Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol, by Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto[ expand ]
22:17 [Pub][ePrint]Formal Analysis of CRT-RSA Vigilant\'s Countermeasure Against the BellCoRe Attack, by Pablo Rauzy and Sylvain Guilley[ expand ]
22:17 [Pub][ePrint]Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing, by Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk[ expand ]
22:17 [Pub][ePrint]Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness, by Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing[ expand ]
22:17 [Pub][ePrint]Distributed Key Generation for Secure Encrypted Deduplication, by Yitao Duan[ expand ]
16:19 [Job][New]Postdoc Positions in IT-Security, Privacy, and Cryptography, Center for IT-Security, Privacy and Accountability, Saarland University, Saarbrücken, Germany[ expand ]
09:52 [Job][New]Ph.D. Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg, Luxembourg[ expand ]


2013-12-04
15:40 [Job][New]Two Ph.D. Positions in Cryptography/IT Security, University of Luxembourg[ expand ]
08:57 [Event][New]IWSEC 2014: 9th International Workshop on Security[ expand ]
08:57 [Event][New]IEICE Trans. Fundamentals: Special Section on Cryptography and Information Secur[ expand ]


2013-12-03
12:41 [PhD][New]Nicolas Moro: Complex security strategies for secure embedded circuits[ expand ]
12:41 [PhD][New][ expand ]
11:22 [PhD][Update]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
11:19 [PhD][New]Aleksandar Kircanski: Cryptanalysis of Symmetric Cryptographic Primitives[ expand ]
07:17 [Pub][ePrint](Anonymous) Compact HIBE From Standard Assumptions, by Somindu C. Ramanna and Palash Sarkar[ expand ]
07:17 [Pub][ePrint]Proofs of Space: When Space is of the Essence, by Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi[ expand ]



2013-12-02
14:16 [Event][New]PETS'14: Privacy Enhancing Technologies Symposium[ expand ]
13:28 [Job][New]Research Associate (Post-Doc), University College London, United Kingdom[ expand ]


2013-12-01
19:17 [Pub][ePrint]Group Signature with relaxed-privacy and revocability for VANET, by Mohammad Saiful Islam Mamun and Atsuko Miyaji[ expand ]
19:17 [Pub][ePrint]Fully, (Almost) Tightly Secure IBE from Standard Assumptions, by Jie Chen and Hoeteck Wee[ expand ]
19:17 [Pub][ePrint]Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function, by Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng[ expand ]
19:17 [Pub][ePrint]Linearly Homomorphic Structure Preserving Signatures: New Methodologies and Applications, by Dario Catalano and Antonio Marcedone and Orazio Puglisi[ expand ]
19:17 [Pub][ePrint]Algebraic Properties of the Cube Attack, by Frank-M. Quedenfeld and Christopher Wolf[ expand ]
19:17 [Pub][ePrint]New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography, by Gilles Macario-Rat and Jérôme Plût and Henri Gilbert[ expand ]
19:17 [Pub][ePrint]A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System, by Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu[ expand ]
19:17 [Pub][ePrint]Tamper Resilient Circuits: The Adversary at the Gates, by Aggelos Kiayias and Yiannis Tselekounis[ expand ]
19:17 [Pub][ePrint]Proofs of Space, by Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak[ expand ]
19:17 [Pub][ePrint]Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications, by Xi-Jun Lin and Lin Sun[ expand ]
19:17 [Pub][ePrint]Behind the Scene of Side Channel Attacks, by Victor Lomn\\\'{e}, Emmanuel Prouff, and Thomas Roche[ expand ]


2013-11-30
07:17 [Pub][ePrint]A fast integer-based batch full-homomorphic encryption scheme over finite field, by Long Zhang and Qiuling Yue[ expand ]
07:17 [Pub][ePrint]Improved Authenticity Bound of EAX, and Refinements, by Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata[ expand ]
07:17 [Pub][ePrint]APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography, by Elena Andreeva and Beg\\\"ul Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Parallelizable and Authenticated Online Ciphers, by Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda[ expand ]
07:17 [Pub][ePrint]Proofs of Data Possession and Retrievability Based on MRD Codes, by Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu[ expand ]
07:17 [Pub][ePrint]Improvement of Lin-Tzeng Solution to Yao\'s Millionaires Problem and Its Cheating Advantage Analysis, by Zhengjun Cao and Lihua Liu[ expand ]
07:17 [Pub][ePrint]Wide-weak Privacy Preserving RFID Mutual Authentication Protocol, by Raghuvir Songhela and Manik Lal Das[ expand ]
07:17 [Pub][ePrint]Tree Based Symmetric Key Broadcast Encryption, by Sanjay Bhattacherjee and Palash Sarkar[ expand ]
04:17 [Pub][ePrint]Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model, by Fei Tang, Hongda Li, Qihua Niu, and Bei Liang[ expand ]
04:17 [Pub][ePrint]Secure Multiparty Computations on BitCoin, by Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek[ expand ]
04:17 [Pub][ePrint]ECC-Based Non-Interactive Deniable Authentication with Designated Verifier, by Yalin Chen and Jue-Sam Chou2[ expand ]


2013-11-28
13:44 [Event][New]CTCrypt 2014: 3rd Workshop on Current Trends in Cryptology[ expand ]



2013-11-26
10:25 [Event][New]CSF'14: 27th IEEE Computer Security Foundations Symposium[ expand ]
10:24 [Job][New]Maitre Assistant(e) - Senior Assistant (postdoc), University of Neuchatel, Switzerland[ expand ]
10:23 [Job][New]Post-Doc, Royal Holloway, University of London, UK[ expand ]
08:03 [News]IACR Ethics Committee[ expand ]
07:58 [Event][New]SCN 2014: Ninth Conference on Security and Cryptography for Networks[ expand ]


2013-11-25
22:17 [Pub][ePrint]How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?, by Dorit Ron and Adi Shamir[ expand ]
22:17 [Pub][ePrint]Obfuscation from Semantically-Secure Multi-linear Encodings, by Rafael Pass and Sidharth Telang and Karn Seth[ expand ]
22:17 [Pub][ePrint]A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester, by Nasser Ramazani Darmian[ expand ]
22:17 [Pub][ePrint]Distributed Group Authentication for RFID Supply Management, by Mike Burmester and Jorge Munilla[ expand ]
22:17 [Pub][ePrint]Multi-Stage Fault Attacks on Block Ciphers, by Philipp Jovanovic and Martin Kreuzer and Ilia Polian[ expand ]
22:17 [Pub][ePrint]Construction of Multiplicative Monotone Span Program, by Yuenai Chen and Chunming Tang[ expand ]
22:17 [Pub][ePrint]Location Leakage in Distance Bounding: Why Location Privacy does not Work, by Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay[ expand ]
22:17 [Pub][ePrint]Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro, by Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu[ expand ]
22:17 [Pub][ePrint]Multi-Input Functional Encryption, by S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\\phi$ Functions, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation, by Markku-Juhani O. Saarinen[ expand ]
22:17 [Pub][ePrint]TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor, by Wuqiang Shen and Shaohua Tang[ expand ]
22:17 [Pub][ePrint]Efficient Template Attacks, by Omar Choudary and Markus G. Kuhn[ expand ]
22:17 [Pub][ePrint]Broadcast Amplification, by Martin Hirt and Ueli Maurer and Pavel Raykov[ expand ]
22:17 [Pub][ePrint]VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4, by Bartosz Zoltak[ expand ]
22:17 [Pub][ePrint]Misuse Resistant Parallel Authenticated Encryptions, by Mridul Nandi and Nilanjan Datta[ expand ]
19:17 [Pub][ePrint]RankSign : an efficient signature algorithm based on the rank metric, by P. Gaborit and O. Ruatta and J. Schrek and G. Zémor[ expand ]
05:40 [Event][New]Cryptology2014: 4th International Cryptology and Information Security Conference 2014[ expand ]


2013-11-21
22:17 [Pub][ePrint]Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited, by Kaoru Kurosawa and Le Trieu Phong[ expand ]
22:17 [Pub][ePrint]Dynamic Countermeasure Against the Zero Power Analysis, by Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache[ expand ]
19:17 [Pub][ePrint]Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting, by Yutaka Kawai and Katsuyuki Takashima[ expand ]
19:17 [Pub][ePrint]Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency, by Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung[ expand ]
19:17 [Pub][ePrint]Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince, by Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati[ expand ]
19:17 [Pub][ePrint]On cross joining de Bruijn sequences, by Johannes Mykkeltveit and Janusz Szmidt[ expand ]
19:17 [Pub][ePrint]Vectorization of ChaCha Stream Cipher, by Martin Goll and Shay Gueron[ expand ]
08:41 [News]Deadline for Nominations of IACR Fellows[ expand ]


2013-11-20
19:17 [Forum][IACR Publication Reform] An early/mid career perspective by brentwaters[ expand ]



2013-11-18
10:57 [Election]IACR 2013 Election Results[ expand ]
10:09 [Event][New]WISTP 2014: 8th Workshop in Information Security Theory and Practice[ expand ]


2013-11-17
04:17 [Pub][ePrint]A Meet-in-the-middle Attack on Round-Reduced mCrypton, by Yonglin Hao, Dongxia Bai[ expand ]
04:17 [Pub][ePrint]Improving security and efficiency for multi-authority access control system in cloud storage, by Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong[ expand ]
04:17 [Pub][ePrint]Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP, by Omkant Pandey and Manoj Prabhakaran and Amit Sahai[ expand ]
04:17 [Pub][ePrint]Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures, by Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele [ expand ]
04:17 [Pub][ePrint]On the Power of Rewinding Simulators in Functional Encryption, by Angelo De Caro and Vincenzo Iovino[ expand ]
04:17 [Pub][ePrint]Using Hamiltonian Totems as Passwords, by Herv\\\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache[ expand ]
04:17 [Pub][ePrint]Fully Deniable Mutual Authentication Protocol Based on RSA Signature, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Efficient CCA-secure Threshold Public-Key Encryption Scheme, by Xi-Jun Lin and Lin Sun[ expand ]
04:17 [Pub][ePrint]Plaintext Recovery Attacks Against WPA/TKIP, by Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt[ expand ]
04:17 [Pub][ePrint]Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks, by Jayaprakash Kar[ expand ]
04:17 [Pub][ePrint]Asymptotically Efficient Lattice-Based Digital Signatures, by Vadim Lyubashevsky and Daniele Miccicancio[ expand ]
04:17 [Pub][ePrint]Asynchronous MPC with t< n/2 Using Non-equivocation, by Michael Backes, Fabian Bendun, Ashish Choudhury and Aniket Kate[ expand ]
04:17 [Pub][ePrint]Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results, by Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumar[ expand ]
04:17 [Pub][ePrint]Privacy Preserving Unique Statistics in a Smart Grid, by Iraklis Leontiadis, Melek Önen, Refik Molva[ expand ]
04:17 [Pub][ePrint]Dipl.-Math., by Jürgen Müller[ expand ]
04:17 [Pub][ePrint]Fast Software Implementation of Binary Elliptic Curve Cryptography, by Manuel Bluhm and Shay Gueron[ expand ]
04:17 [Pub][ePrint]A Revocable Online-Offline Certificateless Signature Scheme without Pairing, by Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek [ expand ]
04:17 [Pub][ePrint]Practical Signatures from the Partial Fourier Recovery Problem, by Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte[ expand ]
01:17 [Pub][ePrint]An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II), by Gérald Gavin[ expand ]
01:17 [Pub][ePrint]NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS, by Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi[ expand ]


2013-11-15
10:45 [Event][New]CloudCom 2013: IEEE CloudCom 2013 (5th IEEE International Conference on Cloud Computing)[ expand ]


2013-11-14
19:17 [Pub][ePrint]On the Resilience and Uniqueness of CPA for Secure Broadcast, by Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas[ expand ]
12:18 [Job][New]Tenure-track Assistant/Associate Professor, University of Connecticut, USA[ expand ]
07:17 [Pub][ePrint]Elliptic Curve Cryptography in Practice, by Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow[ expand ]
07:17 [Pub][ePrint]A Key Compromise Impersonation attack against Wang\'s Provably Secure Identity-based Key Agreement Protocol, by Maurizio Adriano Strangio[ expand ]
07:17 [Pub][ePrint]SSS-V2: Secure Similarity Search, by Hyun-A Park[ expand ]
07:17 [Pub][ePrint]Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez[ expand ]
07:17 [Pub][ePrint]TRS-80 With A Keccak Sponge Cake, by Jean-Marie Chauvet[ expand ]
07:17 [Pub][ePrint]Masking Tables---An Underestimated Security Risk, by Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald[ expand ]



2013-11-13
07:17 [Pub][ePrint]Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited, by Yongqiang Li and Mingsheng Wang and Yuyin Yu[ expand ]
07:17 [Pub][ePrint]Stamp \\& Extend -- Instant but Undeniable Timestamping based on Lazy Trees, by {\\L}ukasz Krzywiecki and Przemys{\\l}aw Kubiak and Miros{\\l}aw Kuty{\\l}owski[ expand ]
07:17 [Pub][ePrint]Functional Encryption for Randomized Functionalities, by Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai[ expand ]
07:17 [Pub][ePrint]Modified Alternating Step Generators, by Robert Wicik and Tomasz Rachwalik[ expand ]
07:17 [Pub][ePrint]Multi-Input Functional Encryption, by Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai[ expand ]


2013-11-11
13:47 [Event][New]LATINCRYPT 2014: Third International Conference on Cryptology and Information Security[ expand ]


2013-11-08
08:54 [Event][New]IWSEC 2013: The 8th International Workshop on Security (Poster Session)[ expand ]
08:50 [Job][New]Security Engineer, CloudFlare Inc., San Francisco, CA, USA, the Northern Hemisphere[ expand ]
08:48 [Job][New]Ph.D. Scholarships, University of Salerno, Italy[ expand ]


2013-11-07
07:17 [Pub][ePrint]Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack, by Chihong Joo and Aaram Yun[ expand ]
07:17 [Pub][ePrint]Mobile Transaction over NFC and GSM, by Muhammad Qasim Saeed and Pardis Pourghomi[ expand ]
07:17 [Pub][ePrint]Verifiable Set Operations over Outsourced Databases, by Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos[ expand ]
07:17 [Pub][ePrint]Amplifying Privacy in Privacy Amplification, by Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin[ expand ]
07:17 [Pub][ePrint]The Realm of the Pairings, by Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini[ expand ]
07:17 [Pub][ePrint]Deep Attacks of a Certificateless Signature Scheme, by Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li[ expand ]



2013-11-06
18:12 [Job][New]PhD studentships, Royal Holloway, University of London, UK[ expand ]
14:47 [Job][New]PhD student, SnT, University of Luxembourg, Luxembourg[ expand ]


2013-11-05
07:43 [Job][New]Professor (Open Rank), Worcester Polytechnic Institute, MA, USA, below Canada[ expand ]


2013-11-04
13:39 [Event][New]Joint MPIM and B-IT workshop on Number Theory and Cryptography[ expand ]
13:00 [Event][New]ASIACCS 2014: 9th ACM Symposium on Information, Computer and Communications Security[ expand ]
13:00 [Event][New]RFIDSec'14: The 10th Workshop on RFID Security[ expand ]
04:17 [Pub][ePrint]Outsourced Symmetric Private Information Retrieval, by Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]


2013-11-03
22:17 [Pub][ePrint]Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited, by Sandro Coretti and Ueli Maurer and Björn Tackmann[ expand ]
22:17 [Pub][ePrint]NTRU-KE: A Lattice-based Public Key Exchange Protocol, by Xinyu Lei and Xiaofeng Liao[ expand ]
22:17 [Pub][ePrint]NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm[ expand ]
22:17 [Pub][ePrint]A Secure Obfuscator for Encrypted Blind Signature Functionality, by Xiao Feng and Zheng Yuan[ expand ]
19:17 [Pub][ePrint]Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir[ expand ]
19:17 [Pub][ePrint]Method to secure data in the cloud while preserving summary statistics, by Sanchita Barman, Bimal Roy[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Zorro, by Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang[ expand ]
19:17 [Pub][ePrint]PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage, by Daisuke Moriyama and Shin\'ichiro Matsuo and Moti Yung[ expand ]
19:17 [Pub][ePrint]Ambiguous One-Move Nominative Signature Without Random Oracles, by Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang[ expand ]
19:17 [Pub][ePrint]An Approach to Reduce Storage for Homomorphic Computations, by Jung Hee Cheon and Jinsu Kim[ expand ]
19:17 [Pub][ePrint]Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \\& Concurrent Quantum Attacks, by Mohammad Sadeq Dousti and Rasool Jalili[ expand ]
19:17 [Pub][ePrint]Key Derivation Without Entropy Waste, by Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]A reduction of semigroup DLP to classic DLP, by Matan Banin and Boaz Tsaban[ expand ]
19:17 [Pub][ePrint]How to Certify the Leakage of a Chip?, by François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon[ expand ]
19:17 [Pub][ePrint]Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation, by Clemens Heuberger and Michela Mazzoli[ expand ]
19:17 [Pub][ePrint]Adaptive Witness Encryption and Asymmetric Password-based Cryptography, by Mihir Bellare and Viet Tung Hoang[ expand ]
19:17 [Pub][ePrint]Limits of Extractability Assumptions with Distributional Auxiliary Input, by Elette Boyle and Rafael Pass[ expand ]



2013-10-30
09:30 [Job][New]CEO / General Manager, ESCRYPT Inc., Ann Arbor, USA, North America[ expand ]


2013-10-28
21:17 [Pub][ePrint]Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits, by Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
21:17 [Pub][ePrint]Higher Order Masking of Look-up Tables, by Jean-Sebastien Coron[ expand ]
21:17 [Pub][ePrint]Bootstrapping Obfuscators via Fast Pseudorandom Functions, by Benny Applebaum[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks, by Xi-Jun Lin and Lin Sun[ expand ]
21:17 [Pub][ePrint]A More Efficient AES Threshold Implementation, by Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen[ expand ]
21:17 [Pub][ePrint]Examination of a New Defense Mechanism: Honeywords, by Ziya Genc, Süleyman Kardas, and Mehmet Sabir Kiraz[ expand ]
21:17 [Pub][ePrint]AEGIS: A Fast Authenticated Encryption Algorithm, by Hongjun Wu and Bart Preneel[ expand ]
21:17 [Pub][ePrint]Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data, by Lichun Li and Anwitaman Datta[ expand ]
21:17 [Pub][ePrint]Secure Key Exchange and Sessions Without Credentials, by Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis[ expand ]
21:17 [Pub][ePrint]Faster Compact Diffie-Hellman: Endomorphisms on the x-line, by Craig Costello and Huseyin Hisil and Benjamin Smith[ expand ]
21:17 [Pub][ePrint]Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]


2013-10-24
18:17 [Pub][ePrint]Obfuscation ==> (IND-CPA Security =/=> Circular Security), by Antonio Marcedone and Claudio Orlandi[ expand ]
18:17 [Pub][ePrint]Differing-Inputs Obfuscation and Applications, by Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Unbalancing Pairing-Based Key Exchange Protocols, by Michael Scott[ expand ]
18:17 [Pub][ePrint]How to Compress (Reusable) Garbled Circuits, by Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy[ expand ]
18:17 [Pub][ePrint]New abstractions in applied pi-calculus and automated verification of protected executions, by Shiwei Xu and Sergiu Bursuc and Julian P. Murphy[ expand ]
18:17 [Pub][ePrint]Solving shortest and closest vector problems: The decomposition approach, by Anja Becker, Nicolas Gama and Antoine Joux[ expand ]
18:17 [Pub][ePrint]Fully Bideniable Public-Key Encryption, by Marcel Sebek[ expand ]
12:17 [Pub][ePrint]Separations in Circular Security for Arbitrary Length Key Cycles, by Venkata Koppula and Kim Ramchen and Brent Waters[ expand ]
12:17 [Pub][ePrint]Secret Key Cryptosystem based on Non-Systematic Polar Codes, by Reza Hooshmand[ expand ]
12:17 [Pub][ePrint]Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks, by Damien Vergnaud and David Xiao[ expand ]
12:17 [Pub][ePrint]A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme, by Dana Dachman-Soled[ expand ]
12:17 [Pub][ePrint]Formal verification of a software countermeasure against instruction skip attacks, by Karine Heydemann and Nicolas Moro and Emmanuelle Encrenaz and Bruno Robisson[ expand ]
12:17 [Pub][ePrint]Universally composable privacy preserving finite automata execution with low online and offline complexity, by Peeter Laud and Jan Willemson[ expand ]
12:17 [Pub][ePrint]Bounded Tamper Resilience: How to go beyond the Algebraic Barrier, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
09:17 [Pub][ePrint]Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others, by Siwei Sun, Lei Hu, Peng Wang[ expand ]
09:17 [Pub][ePrint]A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher, by Tomer Ashur and Orr Dunkelman[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, by Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Traps to the BGJT-Algorithm for Discrete Logarithms, by Qi Cheng and Daqing Wan and Jincheng Zhuang[ expand ]
09:17 [Pub][ePrint]Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, by Benjamin Smith[ expand ]
09:17 [Pub][ePrint]Robust Pseudorandom Generators, by Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman[ expand ]
09:17 [Pub][ePrint]Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces, by Charanjit Jutla and Arnab Roy[ expand ]
09:17 [Pub][ePrint]Attribute-Based Encryption for Arithmetic Circuits, by Dan Boneh and Valeria Nikolaenko and Gil Segev[ expand ]
09:17 [Pub][ePrint]Obfuscation for Evasive Functions, by Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
09:17 [Pub][ePrint]A TPM Diffie-Hellman Oracle, by Tolga Acar and Lan Nguyen and Greg Zaverucha[ expand ]
09:17 [Pub][ePrint]An Offline Dictionary Attack against a Three-Party Key Exchange Protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
09:17 [Pub][ePrint]A Note on the Impossibility of Obfuscation with Auxiliary Input, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
09:17 [Pub][ePrint]TUC: Time-sensitive and Modular Analysis of Anonymous Communication, by Michael Backes and Praveen Manoharan and Esfandiar Mohammadi[ expand ]
09:17 [Pub][ePrint]Linear Cryptanalysis of Round Reduced Variants of SIMON, by Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya[ expand ]
09:17 [Pub][ePrint]Fine-Tuning Groth-Sahai Proofs, by Alex Escala and Jens Groth[ expand ]
09:17 [Pub][ePrint]Anonymous aggregation for lightweight multiparty computations, by Constantinos Patsakis[ expand ]
09:17 [Pub][ePrint]Discrete Logarithms and Mordell-Weil Groups , by Mohammad Sadek[ expand ]
04:41 [Event][New]PUFFIN: Physically Unclonable Functions Workshop[ expand ]
04:34 [Job][New]Security Consultant, ESCRYPT Inc., Ann Arbor[ expand ]
04:33 [Job][New]Lecturer, University College London, UK, EU[ expand ]


2013-10-22
09:36 [Event][New]Summer school on Design and security of crypto algorithms and devices[ expand ]
06:42 [Job][New]two Ph.D. positions, Worcester Polytechnic Institute[ expand ]
06:42 [Job][New]Ph.D. Research Training Group, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]



2013-10-21
06:49 [Job][New]Two faculty Positions in Computer Engineering, New York University Polytechnic School of Engineering, USA, North America[ expand ]
06:49 [Job][New]Junior Researcher, Senior Researcher, Charles University, Prague, Czech Republic[ expand ]
06:48 [Job][New]Assistant Professor, Charles University, Prague, Czech Republic[ expand ]


2013-10-18
05:18 [Job][New]Postdoc Fellowship (1 year), Norwegian University of Science and Technology (NTNU)[ expand ]


2013-10-15
09:17 [Pub][ePrint]A provable secure anonymous proxy signature scheme without random oracles, by Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh[ expand ]
09:17 [Pub][ePrint]Parallel authenticated encryption with the duplex construction, by Pawel Morawiecki and Josef Pieprzyk[ expand ]
09:17 [Pub][ePrint]New Trapdoor Projection Maps for Composite-Order Bilinear Groups, by Sarah Meiklejohn and Hovav Shacham[ expand ]
09:17 [Pub][ePrint]Bias-based modeling and entropy analysis of PUFs, by Robbert van den Berg and Boris Skoric and Vincent van der Leest[ expand ]
09:17 [Pub][ePrint]Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version), by Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel[ expand ]
09:17 [Pub][ePrint]Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter, by Baodong Qin and Shengli Liu[ expand ]
09:17 [Pub][ePrint]RKA-KDM secure encryption from public-key encryption, by Florian Böhl and Gareth T. Davies and Dennis Hofheinz[ expand ]
09:17 [Pub][ePrint]Efficient Modular Arithmetic for SIMD Devices, by Wilke Trei[ expand ]
09:17 [Pub][ePrint]A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound, by Sanjit Chatterjee and Chethan Kamath[ expand ]
09:17 [Pub][ePrint]On Extractability Obfuscation, by Elette Boyle and Kai-Min Chung and Rafael Pass[ expand ]
09:17 [Pub][ePrint]Security Analysis of Password-Authenticated Key Retrieval, by SeongHan Shin and Kazukuni Kobara[ expand ]
09:17 [Pub][ePrint]Integral Distinguishers for Reduced-round Stribog, by Riham AlTawy and Amr M. Youssef[ expand ]
04:47 [Event][New]SEC 2014: 29th IFIP TC11 SEC 2014 Int Conf ICT Systems Security & Privacy Protection[ expand ]
04:46 [Event][New]CHES 2014: Cryptographic Hardware and Embedded Systems[ expand ]


2013-10-14
16:30 [Job][New]Two PhD Positions, University of Bristol[ expand ]



2013-10-11
13:03 [Job][New]Two Post-Docs, Nanyang Technological University, Singapore[ expand ]


2013-10-10
18:17 [Pub][ePrint]A note on high-security general-purpose elliptic curves, by Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira[ expand ]
18:17 [Pub][ePrint]Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles, by Johannes Blömer and Gennadij Liske[ expand ]
15:17 [Pub][ePrint]FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession, by Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin K\\\"up\\c{c}\\\"u and \\\"Oznur \\\"Ozkasap[ expand ]
15:17 [Pub][ePrint]Elliptic and Hyperelliptic Curves: a Practical Security Analysis, by Joppe W. Bos and Craig Costello and Andrea Miele[ expand ]
15:17 [Pub][ePrint]There is no Indistinguishability Obfuscation in Pessiland, by Tal Moran and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation, by Dan Boneh and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall, by Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen[ expand ]
15:17 [Pub][ePrint]Communication-Efficient MPC for General Adversary Structures, by Joshua Lampkins and Rafail Ostrovsky[ expand ]


2013-10-08
22:35 [Job][New]PhD Scholarship, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]


2013-10-07
14:17 [Job][New]Tenured, Tenure-track Faculty positions, Sejong University, Seoul, Korea[ expand ]
14:16 [Job][New]Researcher (postdoc) in Cryptography (or Quantum Crypto), Institute of Computer Science, University of Tartu, Estonia, EU[ expand ]



2013-10-06
21:24 [Event][New]CECC14: Central European Conference on Cryptology[ expand ]


2013-10-05
15:17 [Pub][ePrint]Differentially 4-Uniform Bijections by Permuting the Inverse Function, by Deng Tang and Claude Carlet and Xiaohu Tang[ expand ]
15:17 [Pub][ePrint]DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption, by Somindu C. Ramanna[ expand ]
15:17 [Pub][ePrint]Detection of Algebraic Manipulation in the Presence of Leakage, by Hadi Ahmadi and Reihaneh Safavi-Naini[ expand ]
15:17 [Pub][ePrint]SCARE of Secret Ciphers with SPN Structures, by Matthieu Rivain and Thomas Roche[ expand ]
15:17 [Pub][ePrint]Universal security; from bits and mips to pools, lakes -- and beyond, by Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé[ expand ]
15:17 [Pub][ePrint]Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
15:17 [Pub][ePrint]Four Measures of Nonlinearity, by Joan Boyar and Magnus Find and Rene Peralta[ expand ]


2013-10-04
23:47 [Event][New]WiSec'14: The 7th ACM Conference on Security and Privacy[ expand ]
06:34 [Event][New]COSADE'14: Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
06:25 [Job][New]Two Postdoc Positions, Technical University of Denmark, DTU[ expand ]
06:25 [Job][New]Lecturer in Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK[ expand ]


2013-10-01
21:17 [Pub][ePrint]Combined Modeling and Side Channel Attacks on Strong PUFs, by Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar[ expand ]
21:17 [Pub][ePrint]Protecting Obfuscation Against Algebraic Attacks, by Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai[ expand ]
15:05 [Election]IACR Election & Referendum - Please Vote[ expand ]



2013-09-30
18:17 [Pub][ePrint]Estimating Key Sizes For High Dimensional Lattice Based Systems, by Joop van de Pol and Nigel P. Smart[ expand ]
18:17 [Pub][ePrint]Secure Key Management in the Cloud, by Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter[ expand ]
18:17 [Pub][ePrint]Parallelizable Authenticated Encryption from Functions, by Kazuhiko Minematsu[ expand ]
18:17 [Pub][ePrint]Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud, by Jiawei Yuan and Shucheng Yu[ expand ]
18:17 [Pub][ePrint]Improved Linear Attacks on the Chinese Block Cipher Standard, by Mingjie Liu and Jiazhe Chen[ expand ]


2013-09-29
18:17 [Pub][ePrint]Securing the Data in Big Data Security Analytics, by Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos[ expand ]


2013-09-28
18:17 [Pub][ePrint]New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption, by Xiaolin Cao and Ciara Moore[ expand ]
18:17 [Pub][ePrint]Off-Path Hacking: The Illusion of Challenge-Response Authentication, by Yossi Gilad and Amir Herzberg and Haya Shulman[ expand ]
18:17 [Pub][ePrint]Decentralized Anonymous Credentials, by Christina Garman and Matthew Green and Ian Miers[ expand ]


2013-09-27
15:17 [Pub][ePrint]Multi-LHL protocol, by Marika Mitrengová[ expand ]
15:17 [Pub][ePrint]Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications, by Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi[ expand ]
15:17 [Pub][ePrint]Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
15:17 [Pub][ePrint]Security Amplification against Meet-in-the-Middle Attacks Using Whitening, by Pierre-Alain Fouque and Pierre Karpman[ expand ]
15:17 [Pub][ePrint]Some results concerning global avalanche characteristics of two $q$-ary functions, by Brajesh Kumar Singh[ expand ]



2013-09-26
03:17 [Pub][ePrint]Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction, by Xiaolin Cao, Ciara Moore, Maire O\'Neill, Elizabeth O\'Sullivan and Neil Hanle[ expand ]
03:17 [Pub][ePrint]Privacy and Verifiability in Voting Systems: Methods, Developments and Trends, by Hugo Jonker and Sjouke Mauw and Jun Pang[ expand ]
03:17 [Pub][ePrint]Is extracting data the same as possessing data?, by Douglas R. Stinson and Jalaj Upadhyay[ expand ]


2013-09-24
06:33 [Job][New]Cryptographic Researcher, Security Innovation, Wilmington, MA, USA[ expand ]
06:33 [Job][New]Associate Professor, School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia[ expand ]
06:17 [Pub][ePrint]Recomputing with Permuted Operands: A Concurrent Error Detection Approach, by Xiaofei Guo and Ramesh Karri[ expand ]


2013-09-23
07:41 [Event][New]ACNS'14: 12th International Conference on Applied Cryptography and Network Security[ expand ]
06:17 [Pub][ePrint]Sub-linear Blind Ring Signatures without Random Oracles, by Essam Ghadafi[ expand ]
06:17 [Pub][ePrint]Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful, by Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki[ expand ]
06:17 [Pub][ePrint]Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]Ultra Low-Power implementation of ECC on the ARM Cortex-M0+, by Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede[ expand ]
06:17 [Pub][ePrint]How to Further Increase Leakage Exploitation Rate in Profiled Side-Channel Attacks?, by Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng[ expand ]
06:17 [Pub][ePrint]Cryptanalysis of Full RIPEMD-128, by Franck Landelle and Thomas Peyrin[ expand ]
06:17 [Pub][ePrint]Revocable quantum timed-release encryption, by Dominique Unruh[ expand ]
06:17 [Pub][ePrint]Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC., by Masao KAS[ expand ]
06:17 [Pub][ePrint]Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos, by Jörg Schwenk[ expand ]
03:17 [Pub][ePrint]Invariance-Based Concurrent Error Detection for Advanced Encryption Standard, by Xiaofei Guo and Ramesh Karri[ expand ]


2013-09-22
14:26 [Job][New]Assistant Professor (Lecturer, Senior Lecturer), Ariel University, Israel[ expand ]



2013-09-19
15:17 [Pub][ePrint]Two-round secure MPC from Indistinguishability Obfuscation, by Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova[ expand ]
15:17 [Pub][ePrint]Improved Cryptanalysis of Reduced RIPEMD-160, by Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Factoring RSA keys from certified smart cards: Coppersmith in the wild, by Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Som[ expand ]
15:17 [Pub][ePrint]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version, by Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and Da[ expand ]
15:17 [Pub][ePrint]Efficient Pairings Computation on Jacobi Quartic Elliptic Curves, by Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa[ expand ]
15:17 [Pub][ePrint]On the Efficacy of Solving LWE by Reduction to Unique-SVP, by Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert[ expand ]


2013-09-18
22:03 [Job][New]Tenure-track Assistant Professors , Florida State University, Tallahassee, Florida, Southern USA[ expand ]
13:32 [Job][New]Ph.D./Post-Docs, University of Haifa, Israel[ expand ]
13:32 [Job][New]MSc Student, University of Warsaw, Poland, European Union[ expand ]
13:32 [Job][New]PhD Student, University of Warsaw, Poland, European Union[ expand ]
13:31 [Job][New]Post-Doc, University of Warsaw, Poland, European Union[ expand ]
13:30 [Event][New]ACISP 2014: 19th Australasian Conference on Information Security and Privacy[ expand ]


2013-09-15
00:17 [Pub][ePrint]Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study, by Michael Shantz and Edlyn Teske[ expand ]
00:17 [Pub][ePrint]Enhanced certificate transparency (how Johnny could encrypt), by Mark D. Ryan[ expand ]
00:17 [Pub][ePrint]A Local-Global Approach to Solving Ideal Lattice Problems, by Yuan Tian and Rongxin Sun and Xueyong Zhu[ expand ]
00:17 [Pub][ePrint]One-Sided Adaptively Secure Two-Party Computation, by Carmit Hazay and Arpita Patra[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of the Toorani-Falahati Hill Ciphers, by Liam Keliher and Anthony Z. Delaney[ expand ]
00:17 [Pub][ePrint]Analysis of the Rainbow Tradeoff Algorithm Used in Practice, by Jung Woo Kim and Jin Hong and Kunsoo Park[ expand ]
00:17 [Pub][ePrint]EyeDecrypt -- Private Interactions in Plain Sight, by Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis[ expand ]
00:17 [Pub][ePrint]Smashing MASH-1, by Vladimir Antipkin[ expand ]


2013-09-14
13:27 [Event][New]DigitalSec: The International Conference on Digital Security and Forensics[ expand ]
09:17 [Pub][ePrint]SPHF-Friendly Non-Interactive Commitments, by Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval[ expand ]
03:17 [Pub][ePrint]ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments, by Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo[ expand ]
03:17 [Pub][ePrint]Generic related-key and induced chosen IV attacks using the method of key differentiation, by Enes Pasalic and Yongzhuang Wei[ expand ]
03:17 [Pub][ePrint]On Algebraic Immunity of $\\Tr(x^{-1})$ over $\\mathbb{F}_{2^n}, by Xiutao Feng[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of GOST R Hash Function, by Zongyue Wang, Hongbo Yu, Xiaoyun Wang[ expand ]
03:17 [Pub][ePrint]polynomial selection for the number field sieve in geometric view, by Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang[ expand ]
03:17 [Pub][ePrint]The Special Number Field Sieve in $\\F _{p^{n}}$, Application to Pairing-Friendly Constructions, by Antoine Joux and Cécile Pierrot[ expand ]
03:17 [Pub][ePrint]PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones, by Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma[ expand ]
03:17 [Pub][ePrint]Random Projections, Graph Sparsification, and Differential Privacy, by Jalaj Upadhyay[ expand ]
00:17 [Pub][ePrint]On Measurable Side-Channel Leaks inside ASIC Design Primitives, by Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino[ expand ]
00:17 [Pub][ePrint]A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent, by Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov[ expand ]
00:17 [Pub][ePrint]Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique, by Luís T. A. N. Brandão[ expand ]
00:17 [Pub][ePrint]Extended Criterion for Absence of Fixed Points, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
00:17 [Pub][ePrint]Equivalence between MAC and PRF for Blockcipher based Constructions, by Nilanjan Datta and Mridul Nandi[ expand ]



2013-09-12
12:24 [Job][New]PhD scholarship, TU Berlin and DLR and HRS ST, Germany, Europe[ expand ]
09:33 [Job][New]Professors (all ranks), Nazarbayev University, Kazakhstan[ expand ]
09:27 [Event][New]IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet The rapid[ expand ]


2013-09-11
09:41 [Job][New]Assistant/Associate Professor, Texas Tech University, the Big State, USA[ expand ]


2013-09-10
10:26 [PhD][New]C. Eric (Carl) Bach[ expand ]
10:25 [PhD][New][ expand ]


2013-09-09
03:17 [Pub][ePrint]Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher, by Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay[ expand ]
03:17 [Pub][ePrint]Efficient General-Adversary Multi-Party Computation, by Martin Hirt and Daniel Tschudi[ expand ]
03:17 [Pub][ePrint]New Efficient Identity-Based Encryption From Factorization, by Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao[ expand ]
03:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of the Speck Family of Block Ciphers, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
03:17 [Pub][ePrint][ expand ]
03:17 [Pub][ePrint]Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation, by Jeroen Delvaux and Ingrid Verbauwhede[ expand ]



2013-09-08
02:34 [Event][New]Africacrypt 2014[ expand ]
02:31 [Job][Update]Lead Digital Currency Crypto Contractor, Currency Instruments, Illinois (USA)[ expand ]


2013-09-06
17:47 [Job][New]Lead Digital Currency Crypto Engineer, Currency Instruments, Illinois (USA)[ expand ]


2013-09-05
21:17 [Pub][ePrint]Non-Malleable Coding Against Bit-wise and Split-State Tampering, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Capacity of Non-Malleable Codes, by Mahdi Cheraghchi and Venkatesan Guruswami[ expand ]
21:17 [Pub][ePrint]Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, by Zvika Brakerski and Guy N. Rothblum[ expand ]
21:17 [Pub][ePrint]Self-pairings on supersingular elliptic curves with embedding degree $three$, by Binglong Chen and Chang-An~Zhao[ expand ]
06:04 [Job][Update]Ph.D. student, DemTech/IT University of Copenhagen, Denmark[ expand ]
06:04 [Job][New]PhD position on Privacy Engineering, University of Ulm, Institute of Distributed Systems, Germany[ expand ]
06:04 [Job][New]Ph.D. student, DemTech/IT University of Copenhagen[ expand ]


2013-09-04
15:17 [Pub][ePrint]Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis, by Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus[ expand ]
15:17 [Pub][ePrint]Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time, by Ben Morris and Phillip Rogaway[ expand ]
15:17 [Pub][ePrint]A Constructive Approach to Functional Encryption, by Christian Matt and Ueli Maurer[ expand ]
15:17 [Pub][ePrint]Practical approaches to varying network size in combinatorial key predistribution schemes, by Kevin Henry and Maura B. Paterson and Douglas R. Stinson[ expand ]
15:17 [Pub][ePrint]Black-Box Obfuscation for d-CNFs, by Zvika Brakerski and Guy N. Rothblum[ expand ]
15:17 [Pub][ePrint]Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012, by Oleksandr Kazymyrov and Valentyna Kazymyrova[ expand ]
15:17 [Pub][ePrint]Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design, by Ueli Maurer and Björn Tackmann and Sandro Coretti[ expand ]
15:17 [Pub][ePrint]Formally Proved Security of Assembly Code Against Leakage, by Pablo Rauzy and Sylvain Guilley and Zakaria Najm[ expand ]
15:17 [Pub][ePrint]Multi-Valued Byzantine Broadcast: the $t < n$ Case, by Martin Hirt and Pavel Raykov[ expand ]
15:17 [Pub][ePrint]More Efficient Oblivious Transfer and Extensions for Faster Secure Computation, by Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner[ expand ]
15:17 [Pub][ePrint]Puzzle Encryption Algorithm, by Gregory Alvarez and Charles Berenguer[ expand ]
15:17 [Pub][ePrint]More Efficient Cryptosystems From k-th Power Residues, by Zhenfu Cao, Xiaolei, Licheng Wang and Jun Shao[ expand ]
15:17 [Pub][ePrint]Equations System coming from Weil descent and subexponential attack for algebraic curve , by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Decomposition formula of the Jacobian group of plane curve, by Koh-ichi Nagao[ expand ]
15:17 [Pub][ePrint]Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks, by Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang[ expand ]
15:17 [Pub][ePrint]TRS-80 with a grain of salt, by Jean-Marie Chauvet[ expand ]
13:32 [Event][New]Crypto 2014[ expand ]



2013-09-03
20:48 [Job][New]Junior Professorship in Mobile Security, Ruhr-Universität Bochum, Germany[ expand ]
06:30 [Event][New]CS2-2014: First Workshop on Cryptography and Security in Computing Syste[ expand ]


2013-08-30
21:47 [Job][New]UTRCI Research Scientist, Cyber-physical Systems Security , United Technologies Research Centre, Cork - Ireland[ expand ]
21:46 [Job][New]Ph.D.student, Hochschule Furtwangen University, Germany, EEA[ expand ]
21:43 [Event][New]SHA3: The 2014 SHA3 Workshop[ expand ]
15:17 [Pub][ePrint]Private Over-threshold Aggregation Protocols over Distributed Databases, by Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim[ expand ]
15:17 [Pub][ePrint]Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes, by Christian Hanser and Daniel Slamanig[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the SIMON Family of Block Ciphers, by Hoda A. Alkhzaimi and Martin M. Lauridsen[ expand ]
15:17 [Pub][ePrint]Searching for Nonlinear Feedback Shift Registers with Parallel Computing, by Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt[ expand ]
15:17 [Pub][ePrint]Lattice-Based FHE as Secure as PKE, by Zvika Brakerski and Vinod Vaikuntanathan[ expand ]
15:17 [Pub][ePrint]On the security of a password-only authenticated three-party key exchange protocol, by Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won[ expand ]
12:17 [Pub][ePrint]Rebound attacks on Stribog, by Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Practical Issues with TLS Client Certificate Authentication, by Arnis Parsovs[ expand ]
12:17 [Pub][ePrint]Inter-FSP Funds Transfer Protocol, by Amir Herzberg and Shay Nachmani[ expand ]
12:17 [Pub][ePrint]A Three-Level Sieve Algorithm for the Shortest Vector Problem, by Feng Zhang and Yanbin Pan and Gengran Hu[ expand ]
12:17 [Pub][ePrint]Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms, by Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede[ expand ]
12:17 [Pub][ePrint]Efficient Unobservable Anonymous Reporting against Strong Adversaries, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]Gossip Latin Square and The Meet-All Gossipers Problem, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves, by Takakazu Satoh[ expand ]
12:17 [Pub][ePrint]On the Limits of Provable Anonymity, by Nethanel Gelernter and Amir Herzberg[ expand ]
12:17 [Pub][ePrint]The Parallel-Cut Meet-In-The-Middle Attack, by Ivica Nikolic, Lei Wang and Shuang Wu[ expand ]
09:17 [Pub][ePrint]How to Withstand Mobile Virus Attacks, Revisited, by Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky[ expand ]
09:17 [Pub][ePrint]Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption, by Somindu C. Ramanna and Palash Sarkar[ expand ]
09:17 [Pub][ePrint]The Spammed Code Offset Method, by Boris Skoric and Niels de Vreede[ expand ]
09:17 [Pub][ePrint]Differential Cryptanalysis of Reduced-Round Simon, by Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Catena: A Memory-Consuming Password Scrambler, by Christian Forler and Stefan Lucks and Jakob Wenzel[ expand ]
09:17 [Pub][ePrint]Threshold Secret Image Sharing, by Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren[ expand ]
09:17 [Pub][ePrint]White-Box Security Notions for Symmetric Encryption Schemes, by Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain[ expand ]
09:17 [Pub][ePrint]The Resistance of PRESENT-80 Against Related-Key Differential Attacks, by Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Multiple Limited-Birthday Distinguishers and Applications, by Jérémy Jean and María Naya-Plasencia and Thomas Peyrin[ expand ]


2013-08-26
14:13 [Event][New]Practical Cryptography: Algorithms and Implementations using C++[ expand ]
14:12 [Event][New]Practical Cryptography: Algorithms & Implementations using C++[ expand ]
11:01 [Event][New]CfP: Special Issue Crypto: Discrete Structures / Side Channels[ expand ]
07:09 [Event][New]IJISS: International Journal of Information Security Science[ expand ]


2013-08-25
22:42 [Service]Volunteer wanted to edit video[ expand ]



2013-08-24
08:59 [Event][New]CARDIS 2013: Twelfth Smart Card Research and Advanced Application Conference[ expand ]


2013-08-23
17:15 [Election]Nominations are Now Open[ expand ]


2013-08-22
14:05 [PhD][New]Daniel Wichs: Cryptographic Resilience to Continual Information Leakage[ expand ]
14:02 [PhD][Update]Marina Samokhina: The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
08:51 [Event][New]ANTS XI: Algorithmic Number Theory Symposium XI[ expand ]
03:17 [Pub][ePrint]Locally Updatable and Locally Decodable Codes, by Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky[ expand ]


2013-08-21
03:17 [Pub][ePrint]Montgomery Multiplication Using Vector Instructions, by Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]Universal Leaky Random Oracle Model, by Guangjun Fan and Yongbin Zhou and Dengguo Feng[ expand ]
03:17 [Pub][ePrint]Improvement of One Adaptive Oblivious Transfer Scheme , by Zhengjun Cao and Lihua Liu[ expand ]
03:17 [Pub][ePrint]MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials, by Melissa Chase and Gregory M. Zaverucha[ expand ]
03:17 [Pub][ePrint]When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol, by Changyu Dong and Liqun Chen and Zikai Wen[ expand ]
03:17 [Pub][ePrint]Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited, by Jia Xu and Jianying Zhou[ expand ]
03:17 [Pub][ePrint]Enforcing Language Semantics Using Proof-Carrying Data, by Stephen Chong and Eran Tromer and Jeffrey A. Vaughan[ expand ]



2013-08-20
15:40 [Service]Free Access to IACR Publications at Springer[ expand ]
15:31 [News]Clarification on the new IACR publication and copyright policy[ expand ]
15:03 [Event][New]CT-RSA '14: Cryptographers' Track at the RSA Conference[ expand ]
15:00 [Job][Update]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]


2013-08-19
08:59 [Job][New]1 Post-Doc position in Privacy-preserving biometrics , Chalmers University of Technology, Sweden[ expand ]
08:59 [Job][New]PhD students, Queensland University of Technology, Brisbane, Australia[ expand ]
08:59 [Job][Update]Post-Doc, University of Athens, Greece[ expand ]


2013-08-17
21:17 [Pub][ePrint]Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences , by Jingguo Bi and Phong Q. Nguyen[ expand ]
21:17 [Pub][ePrint]Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT, by Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers, by Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick W[ expand ]
21:17 [Pub][ePrint]Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation, by Susan Hohenberger and Amit Sahai and Brent Waters[ expand ]
21:17 [Pub][ePrint]Multi-Key Searchable Encryption, by Raluca Ada Popa and Nickolai Zeldovich[ expand ]
21:17 [Pub][ePrint]SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge, by Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza[ expand ]
21:17 [Pub][ePrint]A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA, by Pablo Rauzy and Sylvain Guilley[ expand ]
21:17 [Pub][ePrint]Improvement of One Anonymous Identity-Based Encryption, by Zhengjun Cao and Lihua Liu[ expand ]
21:17 [Pub][ePrint]A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves, by Reza Azarderakhsh and Koray Karabina[ expand ]
21:17 [Pub][ePrint]On secret sharing with nonlinear product reconstruction, by Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing[ expand ]


2013-08-15
09:17 [Pub][ePrint]Proving TLS-attack related open biases of RC4, by Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]Type-Based Analysis of Protected Storage in the TPM (full version), by Jianxiong Shao and Dengguo Feng and Yu Qin}[ expand ]
09:17 [Pub][ePrint]Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups, by Ran Canetti and Vinod Vaikuntanathan[ expand ]
09:17 [Pub][ePrint]Limits on the Power of Cryptographic Cheap Talk, by Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen[ expand ]
09:17 [Pub][ePrint]Non-Malleable Codes from Two-Source Extractors, by Stefan Dziembowski and Tomasz Kazana and Maciej Obremski[ expand ]
09:17 [Pub][ePrint]Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme, by Zhengjun Cao and Hanyue Cao[ expand ]
09:17 [Pub][ePrint]Rational Protocol Design: Cryptography Against Incentive-driven Adversaries, by Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas[ expand ]
09:17 [Pub][ePrint]Revocable IBE Systems with Almost Constant-size Key Update, by Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang[ expand ]
09:17 [Pub][ePrint]Differential Fault Attack against Grain family with very few faults and minimal assumptions, by Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra[ expand ]
09:17 [Pub][ePrint]A new class of semi-bent quadratic Boolean functions, by Chunming Tang and Yanfeng Qi[ expand ]
09:17 [Pub][ePrint]Cryptographically Enforced RBAC, by Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi[ expand ]
09:17 [Pub][ePrint]Improved OT Extension for Transferring Short Secrets, by Vladimir Kolesnikov and Ranjit Kumaresan[ expand ]
09:17 [Pub][ePrint]For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes, by Masoumeh Safkhani, Nasour Bagheri[ expand ]
09:17 [Pub][ePrint]An Efficient Scheme for Centralized Group Key Management in Collaborative Environments, by Constantinos Patsakis and Agusti Solanas[ expand ]
09:17 [Pub][ePrint]Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency, by Kwangsu Lee and Dong Hoon Lee[ expand ]



2013-08-14
15:17 [Pub][ePrint]A New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and Indranil Sengupta[ expand ]
15:17 [Pub][ePrint]Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification, by Jiawei Yuan and Shucheng Yu[ expand ]
15:17 [Pub][ePrint]A Variant of Coppersmith\'s Algorithm with Improved Complexity and Efficient Exhaustive Search, by Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun[ expand ]
15:17 [Pub][ePrint]Bounds in Shallows and in Miseries, by Céline Blondeau and Andrey Bogdanov and Gregor Leander[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012, by Yosuke Todo and Keita Xagawa[ expand ]
15:17 [Pub][ePrint]Efficient Multiparty Protocols via Log-Depth Threshold Formulae, by Gil Cohen, Ivan Bjerre Damg{\\aa}rd, Yuval Ishai, Jonas K\\\"{o}lker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum[ expand ]
15:17 [Pub][ePrint]Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks, by B. Skoric[ expand ]
15:17 [Pub][ePrint]Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach, by Stefan G. Weber[ expand ]
15:17 [Pub][ePrint]Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing, by Renaud Dubois and Margaux Dugardin and Aurore Guillevic[ expand ]
15:17 [Pub][ePrint]Distinguishing WPA, by Sourav Sen Gupta and Subhamoy Maitra and Willi Meier[ expand ]
15:17 [Pub][ePrint]Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition, by Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao[ expand ]
15:17 [Pub][ePrint]Handling Authentication and Detection Probability in Multi-tag RFID Environment, by Subhasish Dhal and Indranil Sengupta[ expand ]


2013-08-12
11:28 [Event][New]SSPA2013: Smart Sensor Protocols and Algorithms 2013[ expand ]


2013-08-10
18:27 [Event][New]Congress on privacy and surveillance[ expand ]


2013-08-09
20:42 [Event][New]ISC 2013: Sixteenth Information Security Conference[ expand ]
06:58 [Event][New]Inscrypt'13: 9th China International Conference on Information Security and Cryptology[ expand ]



2013-08-08
21:17 [Forum][IACR Publication Reform] Response to the invitation for comments by eoswald[ expand ]


2013-08-06
11:10 [Event][New]TCC: Theory of Cryptography Conference[ expand ]


2013-08-05
18:07 [News]Revisiting the IACR Publication Strategy: An Invitation for Comments[ expand ]
15:17 [Forum][IACR Publication Reform] Re: IACR publication reform - background material by nigel[ expand ]


2013-08-04
19:50 [Job][New]Senior / Scientists, A*STAR, Data Storage Institute, Singapore[ expand ]



2013-08-03
10:40 [Job][New]Computing Security Department Chair, Rochester Institute of Technology, Rochester, NY, USA[ expand ]
06:17 [Pub][ePrint]A note on verifying the APN property, by Pascale Charpin and Gohar M. Kyureghyan[ expand ]
06:17 [Pub][ePrint]Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications, by Zhengjun Cao[ expand ]
06:17 [Pub][ePrint]The Norwegian Internet Voting Protocol, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Partially blind password-based signatures using elliptic curves, by Kristian Gjøsteen[ expand ]
06:17 [Pub][ePrint]Obfuscating Conjunctions, by Zvika Brakerski and Guy N. Rothblum[ expand ]
06:17 [Pub][ePrint]Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, by Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]


2013-08-02
15:17 [Pub][ePrint]Verifiable Delegation of Computation on Outsourced Data, by Michael Backes and Dario Fiore and Raphael M. Reischuk[ expand ]
15:17 [Pub][ePrint]How To Construct Extractable One-Way Functions Against Uniform Adversaries, by Nir Bitansky and Ran Canetti and Omer Paneth[ expand ]
15:17 [Pub][ePrint]Analysis of BLAKE2, by Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu[ expand ]
15:17 [Pub][ePrint]Efficient computation of addition-subtraction chains using generalized continued Fractions, by Amadou Tall and Ali Yassin Sanghare[ expand ]
08:05 [Job][New]Post-Doc, Telecom ParisTech, Communication and Electrical Engineering Department, Sophia-Antipolis, France[ expand ]
06:17 [Pub][ePrint]Practical & Provably Secure Distance-Bounding, by Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay[ expand ]
06:17 [Pub][ePrint]Towards A Practical JCJ / Civitas Implementation, by Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig[ expand ]
06:17 [Pub][ePrint]Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel, by Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref[ expand ]
06:17 [Pub][ePrint]Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data, by Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese[ expand ]


2013-08-01
09:17 [Pub][ePrint]HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware, by Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu[ expand ]


2013-07-29
06:17 [Pub][ePrint]Solving Terminal Revocation in EAC by Augmenting Terminal Authentication, by Rafik Chaabouni[ expand ]
06:17 [Pub][ePrint]Reset Indifferentiability and its Consequences, by Paul Baecher and Christina Brzuska and Arno MIttelbach[ expand ]



2013-07-27
17:40 [Job][New]Post-Doc Positions, University of Bristol[ expand ]
17:39 [Job][New]Post-doc, LIX, École polytechnique, France[ expand ]
03:17 [Pub][ePrint]Exponentiating in Pairing Groups, by Joppe W. Bos and Craig Costello and Michael Naehrig[ expand ]
03:17 [Pub][ePrint]Deduction Soundness: Prove One, Get Five for Free, by Florian Böhl and Véronique Cortier and Bogdan Warinschi[ expand ]
03:17 [Pub][ePrint]On the Security of Group-based Proxy Re-encryption Scheme, by Purushothama B R and B B Amberker[ expand ]


2013-07-23
17:09 [Job][New]1 PhD student in Information Security, Chalmers University of Technology, Gothenburg, Sweden[ expand ]
15:17 [Pub][ePrint]Another Nail in the Coffin of White-Box AES Implementations, by Tancrède Lepoint and Matthieu Rivain[ expand ]
15:17 [Pub][ePrint]How to Use Indistinguishability Obfuscation: Deniable Encryption, and More, by Amit Sahai and Brent Waters[ expand ]


2013-07-22
15:17 [Pub][ePrint]Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags, by Nasour Bagheri, Masoumeh Safkhani[ expand ]
15:17 [Pub][ePrint]Secure Channel Coding Schemes based on Polar Codes, by Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram[ expand ]
15:17 [Pub][ePrint]Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits, by Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters[ expand ]
15:17 [Pub][ePrint]Revisiting the BGE Attack on a White-Box AES Implementation, by Yoni De Mulder and Peter Roelse and Bart Preneel[ expand ]
15:17 [Pub][ePrint]A Note On the Storage Requirement for AKS Primality Testing Algorithm, by Zhengjun Cao[ expand ]
15:17 [Pub][ePrint]Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, by Yuval Yarom and Katrina Falkner[ expand ]
15:17 [Pub][ePrint]Dynamic Runtime Methods to Enhance Private Key Blinding, by Karine Gandolfi-Villegas and Nabil Hamzi[ expand ]
15:17 [Pub][ePrint]Weakness of $\\mbox{${\\mathbb F}$}_{3^{6 \\cdot 509}}$ for Discrete Logarithm Cryptography, by Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr\\\'iguez-Henr\\\'iquez[ expand ]
15:17 [Pub][ePrint]Implementing Lightweight Block Ciphers on x86 Architectures, by Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin[ expand ]
15:17 [Pub][ePrint]Sequential message authentication code without random oracles, by Bin Wang and Xiaojing Hong[ expand ]
15:17 [Forum][2010 Reports] Re: 2010/251 PUF exaggeration by GeorgeBest[ expand ]
14:28 [Job][New]Post-doc in e-voting and related research topics, Newcastle University, UK[ expand ]
08:48 [Event][New]FSE'14: Fast Software Encryption 2014[ expand ]


2013-07-19
00:17 [Pub][ePrint]Optimally Anonymous and Transferable Conditional E-cash, by Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu[ expand ]
00:17 [Pub][ePrint]On Fair Exchange, Fair Coins and Fair Sampling, by Shashank Agrawal and Manoj Prabhakaran[ expand ]



2013-07-18
21:17 [Pub][ePrint]On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences, by Yongge Wang[ expand ]
21:17 [Pub][ePrint]Information Theoretic Security for Encryption Based on Conditional Renyi Entropies, by Mitsugu Iwamoto and Junji Shikata[ expand ]
21:17 [Pub][ePrint]Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID, by Peter Pessl and Michael Hutter[ expand ]
21:17 [Pub][ePrint]Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, by Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl[ expand ]


2013-07-17
15:17 [Pub][ePrint]A Uniform Min-Max Theorem with Applications in Cryptography, by Salil Vadhan and Colin Jia Zheng[ expand ]
15:17 [Pub][ePrint]Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs --- Extended Version, by Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang[ expand ]


2013-07-16
19:46 [Event][New]USENIX Security '13: 22nd USENIX Security Symposium[ expand ]
15:05 [Job][New]Ph.D. students, University of Luxembourg[ expand ]


2013-07-15
13:52 [Job][New]Head of Card Authentication Services, Large, prestigious Bank in Manchester, England[ expand ]
13:51 [Job][Update]Head of Card Cryptography, Large, prestigious financial institution in the United Kingdom[ expand ]



2013-07-13
06:17 [Pub][ePrint]Efficient Cryptosystems From $2^k$-th Power Residue Symbols, by Marc Joye and Benoit Libert[ expand ]
06:17 [Pub][ePrint]Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures, by Susan Hohenberger and Amit Sahai and Brent Waters[ expand ]
06:17 [Pub][ePrint]On Symmetric Encryption with Distinguishable Decryption Failures, by Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam[ expand ]
06:17 [Pub][ePrint]How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling, by Eric Brier and David Naccache and Li-yao Xia[ expand ]


2013-07-09
21:17 [Pub][ePrint]Practical-Time Attacks Against Reduced Variants of MISTY1, by Orr Dunkelman and Nathan Keller[ expand ]
10:18 [Job][New]Scientific Assistant (m/f, E13 TV-G-U), Deutsche Telekom Chair, Goethe University Frankfurt, Germany, EEA[ expand ]
09:33 [Job][Update]Assistant/Associate Professors, University of Washington Tacoma, USA[ expand ]
09:32 [Event][New]VizSec '13: 10th Visualization for Cyber Security Workshop[ expand ]
09:31 [Event][New]DIPECC2013: The International Conference on Digital Information Processing, E-Business[ expand ]


2013-07-07
17:43 [Job][New]Fully Funded PhD Student, Université Paris II Panthéon-Assas, PRES Sorbonne Universités, France, European Union[ expand ]


2013-07-05
18:17 [Pub][ePrint]Security of the Misty Structure Beyond the Birthday Bound, by Jooyoung Lee[ expand ]
09:01 [Job][New]Post-Doc in System Security, University of Twente, The Netherlands[ expand ]



2013-07-03
17:22 [Event][New]WAMPC: Workshop on Applied Multi-Party Computation[ expand ]
11:51 [PhD][Update]Alexander Meurer: A Coding-Theoretic Approach to Cryptanalysis[ expand ]
10:03 [PhD][New]Alexander Meurer: A Coding-Theoretic Approach to Cryptanalysis[ expand ]
09:17 [Pub][ePrint]DupLESS: Server-Aided Encryption for Deduplicated Storage, by Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart[ expand ]
09:17 [Pub][ePrint]Faster 128-EEA3 and 128-EIA3 Software, by Roberto Avanzi and Billy Bob Brumley[ expand ]
09:17 [Pub][ePrint]Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials, by Jiangtao Han and Haining Fan[ expand ]


2013-07-02
21:17 [Pub][ePrint]Private Database Queries Using Somewhat Homomorphic Encryption, by Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu[ expand ]
21:17 [Pub][ePrint]Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results), by Valentina Banciu and Simon Hoerder and Dan Page[ expand ]
21:17 [Pub][ePrint]The Holey Grail: A special score function for non-binary traitor tracing, by B. Skoric and J.-J. Oosterwijk and J. Doumen[ expand ]
21:17 [Pub][ePrint]How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE, by Rikke Bendlin and Sara Krehbiel and Chris Peikert[ expand ]
21:17 [Pub][ePrint]Efficient Garbling from a Fixed-Key Blockcipher, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway[ expand ]
21:17 [Pub][ePrint]Break WEP Faster with Statistical Analysis, by Rafik Chaabouni[ expand ]
21:17 [Pub][ePrint]Instantiating Random Oracles via UCEs, by Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi[ expand ]
21:17 [Pub][ePrint]Locally Computable UOWHF with Linear Shrinkage, by Benny Applebaum and Yoni Moses[ expand ]
16:00 [Job][New]Assistant/Associate Professors, University of Washington Tacoma, USA, Earth[ expand ]


2013-07-01
19:27 [PhD][Update]Viet Tung Hoang: Foundations of garbled circuits[ expand ]
19:11 [PhD][New]Viet Tung Hoang: Foundations of garbled circuits[ expand ]
19:10 [PhD][New]Phillip Rogaway: The Round Complexity of Secure Protocols[ expand ]
13:54 [PhD][New]Jeroen Doumen: Some Applications of Coding Theory in Cryptography[ expand ]
13:54 [PhD][New]Prof.dr.ir. H.C.A. van Tilborg[ expand ]
13:47 [Event][New]FC14: Financial Cryptography and Data Security 2014[ expand ]


2013-06-30
20:20 [Conf]Report on ICITS[ expand ]
20:16 [PhD][New]Yossef Oren: Secure Hardware - Physical Attacks and Countermeasures[ expand ]
20:14 [PhD][New][ expand ]
20:14 [PhD][New]Avishai Wool: Quorum Systems for Distributed Control Protocols[ expand ]



2013-06-29
09:17 [Forum][IACR Publication Reform] Re: Testable change by amitsahai[ expand ]


2013-06-28
21:35 [Event][New]PKC 2014: 17th International Conference on Practice and Theory of Public-Key[ expand ]
15:35 [Event][New]TClouds '13: Workshop on Trustworthy Clouds[ expand ]
14:26 [Job][New][ expand ]
14:02 [Job][New]Ph.D. Position in Applied Cryptography, University of Twente, The Netherlands[ expand ]
11:21 [Job][New]Research Assistant, TU Darmstadt, Germany, EEA[ expand ]
03:47 [Event][New]ISPEC '14: Information Security Practice & Experience Conference[ expand ]


2013-06-26
09:30 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven, the Netherlands[ expand ]
09:04 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven, the Netherlands, Taaluni[ expand ]
09:03 [Job][Update]Assistant Professor (tenure track), Technische Universiteit Eindhoven[ expand ]


2013-06-25
22:35 [Job][New]PhD studentship, University College London, United Kingdom, European Union[ expand ]
18:17 [Pub][ePrint]Highly Controlled, Fine-grained Delegation of Signing Capabilities, by Michael Backes and Sebastian Meiser and Dominique Schröder[ expand ]
18:17 [Pub][ePrint]Automated Security Proofs for Almost-Universal Hash for MAC verification, by Martin Gagné and Pascal Lafourcade and Yassine Lakhnech[ expand ]
18:17 [Pub][ePrint]Policy-Based Signatures, by Mihir Bellare and Georg Fuchsbauer[ expand ]
18:17 [Pub][ePrint]Moduar Form Aprroach to Solving Lattice Problems, by Yuan Tian, Xueyong Zhu, Rongxin Sun[ expand ]
18:17 [Pub][ePrint]Security Analysis of Lightweight Authentication Protocol from WISTP 2013, by Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan[ expand ]
18:17 [Pub][ePrint]Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI, by Yossi Gilad and Amir Herzberg[ expand ]
18:17 [Pub][ePrint]Order-Preserving Encryption Secure Beyond One-Wayness, by Tal Malkin and Isamu Teranishi and Moti Yung[ expand ]
18:17 [Pub][ePrint]Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited, by Nils Fleischhacker and Tibor Jager and Dominique Schröder[ expand ]
18:17 [Pub][ePrint]The Improved Cube Attack on Grain-v1, by Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang[ expand ]
18:17 [Pub][ePrint]Computational Fuzzy Extractors, by Benjamin Fuller and Xianrui Meng and Leonid Reyzin[ expand ]
18:17 [Pub][ePrint]Short collision search in arbitrary SL2 homomorphic hash functions, by Ciaran Mullan and Boaz Tsaban[ expand ]
18:17 [Pub][ePrint]A novel certificateless deniable authentication protocol, by Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li[ expand ]
16:43 [Job][New]Assistant Professor (tenure track), Technische Universiteit Eindhoven[ expand ]
16:36 [Event][New]PETShop'13: PETShop: Workshop on Language Support for Privacy Enhancing Technologies[ expand ]
12:35 [Event][New]RISC '13: The 5th International Workshop on RFID/IoT Security and Cryptography[ expand ]



2013-06-24
16:47 [Event][New]SEC@SAC'14: 13th Computer Security track at the 29th ACM Symposium on Applied Computing[ expand ]
09:17 [Forum][IACR Publication Reform] Re: two-stage review process by cbw[ expand ]


2013-06-23
21:17 [Forum][IACR Publication Reform] Re: two-stage review process by Orr[ expand ]
15:17 [Forum][IACR Publication Reform] Re: Testable change by cbw[ expand ]
12:17 [Forum][IACR Publication Reform] two-stage review process by Joan Daemen[ expand ]


2013-06-22
21:17 [Forum][IACR Publication Reform] Re: Testable change by Orr[ expand ]


2013-06-21
09:07 [Event][New]Indocrypt 2013: 14th International Conference on Cryptology in India[ expand ]



2013-06-20
18:56 [PhD][Update]Enrico Thomae: About the Security of Multivariate Quadratic Public Key Schemes[ expand ]
12:17 [Pub][ePrint][ expand ]
12:17 [Pub][ePrint][ expand ]
12:17 [Pub][ePrint][ expand ]
12:17 [Pub][ePrint]Efficient Two-Pass Anonymous Identity Authentication Using Smart Card, by Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4[ expand ]
12:17 [Pub][ePrint]Functional Signatures and Pseudorandom Functions, by Elette Boyle and Shafi Goldwasser and Ioana Ivan[ expand ]
12:17 [Pub][ePrint]A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic, by Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé[ expand ]
12:17 [Pub][ePrint][ expand ]
06:28 [PhD][New]Enrico Thomae: About the Security of Multivariate Quadratic Public Key Schemes[ expand ]


2013-06-19
06:17 [Forum][ expand ]
06:17 [Forum][IACR Publication Reform] Automatic follow up by cbw[ expand ]


2013-06-18
15:17 [Pub][ePrint][ expand ]
12:17 [Pub][ePrint]ASICS: Authenticated Key Exchange Security Incorporating Certification Systems, by Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila[ expand ]
12:17 [Pub][ePrint]Practical Secure Logging: Seekable Sequential Key Generators, by Giorgia Azzurra Marson and Bertram Poettering[ expand ]
12:17 [Forum][IACR Publication Reform] Testable change by amitsahai[ expand ]
09:43 [Event][New]EBW 2014: The 2nd International Conference on E-Technologies and Business on the Web[ expand ]
09:43 [Event][New]RWC 2014: Real World Cryptography Workshop 2014[ expand ]
09:17 [Pub][ePrint]Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption, by Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada[ expand ]
09:17 [Forum][IACR Publication Reform] Re: The speed of science: two case studies by hoerder[ expand ]
09:17 [Pub][ePrint]A Public Key Cryptoscheme Using the Bit-pair Method, by Shenghui Su and Maozhi Xu and Shuwang Lu[ expand ]
09:17 [Pub][ePrint]On the Practical Security of a Leakage Resilient Masking Scheme, by Emmanuel Prouff and Matthieu Rivain and Thomas Roche[ expand ]
09:17 [Pub][ePrint]Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\\mbox{AES}^{2}$, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
09:17 [Pub][ePrint]Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model, by Yong Li and Zheng Yang[ expand ]
09:17 [Pub][ePrint]Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves, by Christian Hanser and Daniel Slamanig[ expand ]
09:17 [Pub][ePrint]Pickle: A HASH Design, by Lan Luo and Yalan Ye and Zehui Qu and Sharon Goldberg and Xan Du[ expand ]
00:17 [Forum][IACR Publication Reform] Re: The speed of science: two case studies by cbw[ expand ]


2013-06-17
22:33 [Job][Update]PostDoc Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg[ expand ]
22:32 [Job][Update]Professor of Cyber Security, Tallinn University of Technology, Estonia[ expand ]
22:24 [Job][New]Professor of Cyber Security, Tallinn University of Technology, Estonia[ expand ]
21:19 [Pub][JoC][IACR Publication Reform] The speed of science: two case studies by djb[ expand ]
15:17 [Pub][ePrint]Sequential Aggregate Signatures Made Shorter, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
15:17 [Pub][ePrint]Lattice Signatures and Bimodal Gaussians, by Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky[ expand ]
15:17 [Pub][ePrint]To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC, by Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro[ expand ]
15:17 [Pub][ePrint]Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Gr{\\o}stl, by Bingke Ma and Bao Li and Ronglin Hao[ expand ]
15:17 [Pub][ePrint]A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes, by Jan-Jaap Oosterwijk and Boris \\v{S}kori\\\'c and Jeroen Doumen[ expand ]
15:17 [Pub][ePrint]Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions, by Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyohsi Takagi[ expand ]
15:17 [Pub][ePrint]Cryptographically Protected Prefixes for Location Privacy in IPv6, by Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain[ expand ]



2013-06-15
01:51 [Job][New]Ph.D. student, Hochschule Furtwangen University, Germany, Euroepan Union[ expand ]


2013-06-12
20:02 [PhD][Update][ expand ]
19:45 [Job][New]Scientific Assistant (m/f, E13 TV-G-U), Goethe University Frankfurt, Frankfurt am Main, Germany[ expand ]
15:26 [Job][New][ expand ]
15:17 [Pub][ePrint][ expand ]
15:17 [Pub][ePrint]Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions, by François-Xavier Standaert and Olivier Pereira and Yu Yu[ expand ]
15:17 [Pub][ePrint]Block Ciphers that are Easier to Mask: How Far Can we Go?, by Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]A note on quantum related-key attacks, by Martin Roetteler and Rainer Steinwandt[ expand ]
15:17 [Pub][ePrint]An Algebraic Framework for Diffie-Hellman Assumptions, by Alex Escala and Gottfried Herold and Eike Kiltz and Carla R\\`afols and Jorge Villar[ expand ]
15:17 [Pub][ePrint]An Accurate Probabilistic Reliability Model for Silicon PUFs, by Roel Maes[ expand ]
15:17 [Pub][ePrint]NaCl on 8-Bit AVR Microcontrollers, by Michael Hutter and Peter Schwabe[ expand ]
15:17 [Pub][ePrint]A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN, by Majid Bayat, Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]Injective Encoding to Elliptic Curves, by Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Practical Bootstrapping in Quasilinear Time, by Jacob Alperin-Sheriff and Chris Peikert[ expand ]
15:17 [Pub][ePrint]Comments on Three Multi-Server Authentication Protocols, by Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3[ expand ]
15:17 [Pub][ePrint]Delegatable Pseudorandom Functions and Applications, by Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias[ expand ]
11:22 [Job][New]Senior Scientist Medical Security, Philips Research Europe, Netherlands-North Brabant-Eindhoven [ expand ]


2013-06-10
21:17 [Pub][ePrint]A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC. -- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present da[ expand ]
21:17 [Pub][ePrint]A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor, by Shigeo MITSUNARI[ expand ]
21:17 [Pub][ePrint]Linearly Homomorphic Structure-Preserving Signatures and Their Applications, by Benoit Libert and Thomas Peters and Marc Joye and Moti Yung[ expand ]
21:17 [Pub][ePrint]Achieving the limits of the noisy-storage model using entanglement sampling, by Frédéric Dupuis and Omar Fawzi and Stephanie Wehner[ expand ]
21:17 [Pub][ePrint]Security in $O(2^n)$ for the Xor of Two Random Permutations\\\\ -- Proof with the standard $H$ technique--, by Jacques Patarin[ expand ]
21:17 [Pub][ePrint]On the Security of TLS-DH and TLS-RSA in the Standard Model, by Florian Kohlar and Sven Schäge and Jörg Schwenk[ expand ]
21:17 [Pub][ePrint]Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128, by Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin[ expand ]
21:17 [Pub][ePrint]Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model, by Zheng Yang[ expand ]
21:17 [Pub][ePrint]On the Achievability of Simulation-Based Security for Functional Encryption, by Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O\'Neill and Omer Paneth and Giuseppe Persiano[ expand ]
20:44 [PhD][New]Martin M. Lauridsen: Lightweight Cryptography[ expand ]
20:43 [PhD][New]Hao Chen[ expand ]
20:42 [PhD][New]Christian Rechberger[ expand ]
18:55 [Job][New]1 post-doc and 2 PhD posotions , University of Luxembourg[ expand ]
15:17 [Pub][ePrint]Time-Optimal Interactive Proofs for Circuit Evaluation, by Justin Thaler[ expand ]
15:17 [Pub][ePrint]Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions, by Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam[ expand ]
15:17 [Pub][ePrint]Counter-cryptanalysis, by Marc Stevens[ expand ]
15:17 [Pub][ePrint]The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE, by Dmitry Khovratovich and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Verifying computations with state, by Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish[ expand ]
15:17 [Pub][ePrint]New Attacks against Transformation-Based Privacy-Preserving Linear Programming, by Peeter Laud and Alisa Pankova[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions in the Multilinear Setting, by Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks[ expand ]
15:17 [Pub][ePrint]Profiling DPA: Efficacy and efficiency trade-offs, by Carolyn Whitnall and Elisabeth Oswald[ expand ]
15:17 [Pub][ePrint]Constrained Pseudorandom Functions and Their Applications, by Dan Boneh and Brent Waters[ expand ]
15:17 [Pub][ePrint]A heuristic for finding compatible differential paths with application to HAS-160, by Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef[ expand ]
12:17 [Pub][ePrint]Multi-file proofs of retrievability for cloud storage auditing, by Bin Wang and Xiaojing Hong[ expand ]
12:17 [Pub][ePrint]A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation, by Martin Hirt and Ueli Maurer and Christoph Lucas[ expand ]
05:27 [Event][New]GreHack 13: Symp on Research in Grey-Hat Hacking (Applied Cryptography & Cryptanalysis)[ expand ]


2013-06-09
21:17 [Pub][ePrint]Limits of provable security for homomorphic encryption, by Andrej Bogdanov and Chin Ho Lee[ expand ]
21:17 [Pub][ePrint]Quantum one-time programs, by Anne Broadbent and Gus Gutoski and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices, by Xiang Xie and Rui Xue[ expand ]
21:17 [Pub][ePrint]Trapdoor Smooth Projective Hash Functions, by Fabrice Benhamouda and David Pointcheval[ expand ]
21:17 [Pub][ePrint]STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data, by Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]Using Bleichenbacher\'s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA, by Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson[ expand ]
21:17 [Pub][ePrint]Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012, by Arnab Roy and Srinivas Vivek[ expand ]
03:17 [Pub][ePrint]Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based, by Craig Gentry and Amit Sahai and Brent Waters[ expand ]



2013-06-07
21:14 [Event][New]Analyzing Animal Vocal Communication Sequences[ expand ]
18:17 [Pub][ePrint]On the Security of the TLS Protocol: A Systematic Analysis, by Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee[ expand ]


2013-06-06
09:30 [Conf][Crypto]Report on SAC 2012[ expand ]
03:47 [Event][New]PQCrypto 2014: 6th International Conference on Post-Quantum Cryptography[ expand ]


2013-06-04
16:48 [Conf][Crypto]Report on Crypto 2012[ expand ]
12:36 [Pub]IACR Publication Reform - Open Discussion[ expand ]
08:53 [Conf]Report on Inscrypt 2012[ expand ]
08:48 [Conf]Report on TCC 2012[ expand ]
08:42 [Job][New]Research fellow in computer security, University of Bergen, Norway, EEA[ expand ]
08:33 [Event][New]Pairing 2013: The 6th International Conference on Pairing-Based Cryptography[ expand ]


2013-06-03
15:17 [Pub][ePrint]Attribute-Based Encryption for Circuits, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
15:17 [Pub][ePrint]A Novel Technique in Linear Cryptanalysis, by Wen-Long Sun Jie Guan Lin Ding[ expand ]
15:17 [Pub][ePrint]Parallel and Dynamic Searchable Symmetric Encryption, by Seny Kamara and Charalampos Papamanthou[ expand ]
15:17 [Pub][ePrint]Protecting PUF Error Correction by Codeword Masking, by Dominik Merli and Frederic Stumpf and Georg Sigl[ expand ]
15:17 [Pub][ePrint]Double-authentication-preventing signatures, by Bertram Poettering and Douglas Stebila[ expand ]
15:17 [Pub][ePrint]A method for obtaining lower bounds on the higher order nonlinearity of Boolean function, by Mikhail S. Lobanov[ expand ]
15:17 [Pub][ePrint]Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs[ expand ]



2013-06-02
18:17 [Pub][ePrint]Fully-Anonymous Functional Proxy-Re-Encryption, by Yutaka Kawai and Katsuyuki Takashima[ expand ]
18:17 [Pub][ePrint]Anon-Pass: Practical Anonymous Subscriptions, by Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel[ expand ]
18:17 [Pub][ePrint]Elligator: Elliptic-curve points indistinguishable from uniform random strings, by Daniel J. Bernstein and Anna Krasnova and Tanja Lange[ expand ]
18:17 [Pub][ePrint]Sieve-in-the-Middle: Improved MITM Attacks (Full Version), by Anne Canteaut and Maria Naya-Plasencia and Bastien Vayssière[ expand ]
18:17 [Pub][ePrint]Encryption Schemes with Post-Challenge Auxiliary Inputs, by Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu[ expand ]
18:17 [Pub][ePrint]BLAKE2: simpler, smaller, fast as MD5, by Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O\'Hearn and Christian Winnerlein[ expand ]
18:17 [Pub][ePrint]Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security, by Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote[ expand ]
18:17 [Pub][ePrint]Instantaneous Frequency Analysis, by Roman Korkikian and David Naccache and Guilherme Ozari de Almeida[ expand ]
18:17 [Pub][ePrint]On the use of continued fractions for stream ciphers, by Amadou Moctar Kane[ expand ]
18:17 [Pub][ePrint]New Constructions and Applications of Trapdoor DDH Groups, by Yannick Seurin[ expand ]
18:17 [Pub][ePrint]Trapdoor Privacy in Asymmetric Searchable Encryption Schemes, by Afonso Arriaga and Qiang Tang[ expand ]
18:17 [Pub][ePrint]Protocol Variants and Electronic Identification, by Kristian Gjøsteen[ expand ]
18:17 [Pub][ePrint]A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis, by Nicky Mouha and Bart Preneel[ expand ]
18:17 [Pub][ePrint]A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack, by Shenghui Su and Tao Xie and Shuwang Lu[ expand ]
18:17 [Pub][ePrint]Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig, by Mihir Bellare and Sarah Meiklejohn and Susan Thomson[ expand ]
17:27 [Job][New]Post-Doc, Radboud University Nijmegen[ expand ]


2013-05-30
17:27 [News]Turing Award for Shafi Goldwasser and Silvio Micali [ expand ]
17:22 [Conf]Report on Africacrypt 2012[ expand ]
16:50 [News]Gödel Prize for Antoine Joux, and the team of Dan Boneh and Matthew K. Franklin[ expand ]


2013-05-29
07:10 [Conf][EC]Report on Eurocrypt 2012[ expand ]
05:30 [Job][New]Senior Researcher in the areas of Security and Privacy, NEC Labs in Heidelberg, Germany[ expand ]
00:17 [Pub][ePrint]Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations, by José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir[ expand ]
00:17 [Pub][ePrint]Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes, by Albrecht Petzoldt[ expand ]
00:17 [Pub][ePrint]Keyed Side-Channel Based Hashing for IP Protection using Wavelets, by Timo Bartkewitz[ expand ]
00:17 [Pub][ePrint]Reducing Pairing Inversion to Exponentiation Inversion\\\\using Non-degenerate Auxiliary Pairing, by Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee[ expand ]
00:17 [Pub][ePrint]Families of fast elliptic curves from Q-curves, by Benjamin Smith[ expand ]
00:17 [Pub][ePrint]Four Dimensional GLV via the Weil Restriction, by Aurore Guillevic and Sorina Ionica[ expand ]


2013-05-28
19:53 [Conf]Report on FDTC 2012[ expand ]
19:50 [Conf][CHES]Report CHES 2012[ expand ]
14:56 [Conf]Report CANS 2012[ expand ]
14:54 [Conf][PKC]Report PKC 2012[ expand ]
11:54 [Conf][AC]Asiacrypt 2012 Report[ expand ]
08:52 [Event][New]DIAC 2013: Directions in Authenticated Ciphers 2013[ expand ]
05:22 [Pub][ePrint]Authenticated Key Exchange with Synchronized State, by Zheng Yang[ expand ]
05:22 [Pub][ePrint]The analytical property for $\\zeta(s)$, by Sheng-Ping Wu[ expand ]
05:22 [Pub][ePrint]Reusable Garbled Circuits and Succinct Functional Encryption, by Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich[ expand ]
05:22 [Pub][ePrint]Biclique Cryptanalysis Of PRESENT, LED, And KLEIN, by Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
05:22 [Pub][ePrint]A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles, by Zheng Yang[ expand ]
05:22 [Pub][ePrint]Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions, by Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia[ expand ]
05:22 [Pub][ePrint]Attacks and Security Proofs of EAX-Prime, by Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata[ expand ]
05:22 [Pub][ePrint]Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions, by Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta[ expand ]
05:22 [Pub][ePrint]Optical PUFs Reloaded, by Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek[ expand ]
05:22 [Pub][ePrint]Non-malleable Codes from Additive Combinatorics, by Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett[ expand ]
05:22 [Pub][ePrint]Throughput Optimized Implementations of QUAD, by Jason R. Hamlet and Robert W. Brocato[ expand ]
05:22 [Pub][ePrint]A Security Framework for Analysis and Design of Software Attestation, by Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann[ expand ]
05:22 [Pub][ePrint]Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors, by Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas[ expand ]
05:22 [Pub][ePrint]An Analysis of the EMV Channel Establishment Protocol, by Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson[ expand ]
05:22 [Pub][ePrint]Private Interactive Communication Across an Adversarial Channel, by Ran Gelles and Amit Sahai and Akshay Wadia[ expand ]
05:22 [Pub][ePrint]Towards Adoption of DNSSEC: Availability and Security Challenges, by Amir Herzberg and Haya Shulman[ expand ]
05:22 [Pub][ePrint]Fully Homomorphic Encryption for Mathematicians, by Alice Silverberg[ expand ]
05:22 [Pub][ePrint]How to Factor N_1 and N_2 When p_1=p_2 mod 2^t, by Kaoru Kurosawa and Takuma Ueda[ expand ]
05:22 [Pub][ePrint]Another Look at Security Theorems for 1-Key Nested MACs, by Neal Koblitz and Alfred Menezes[ expand ]
05:22 [Pub][ePrint]AE5 Security Notions: Definitions Implicit in the CAESAR Call, by Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton[ expand ]
05:22 [Pub][ePrint]L-P States of RC4 Stream Cipher , by Jing Lv and Dongdai Lin[ expand ]
05:22 [Pub][ePrint]Attribute-Based Encryption with Fast Decryption, by Susan Hohenberger and Brent Waters[ expand ]
05:22 [Pub][ePrint]Encrypted Secret Sharing and Analysis by Plaintext Randomization, by Stephen R. Tate and Roopa Vishwanathan and Scott Weeks[ expand ]
05:22 [Pub][ePrint]Speeding up QUAD, by Albrecht Petzoldt[ expand ]
05:22 [Pub][ePrint]An efficient FHE based on the hardness of solving systems of non-linear multivariate equations, by Gérald Gavin[ expand ]
05:22 [Pub][ePrint]Secure information transmission based on physical principles, by Dima Grigoriev and Vladimir Shpilrain[ expand ]
05:22 [Pub][ePrint]From Weak to Strong Zero-Knowledge and Applications, by Kai-Min Chung and Edward Lui and Rafael Pass[ expand ]
05:22 [Pub][ePrint]Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions, by Deepak Kumar Dalai[ expand ]
05:22 [Pub][ePrint]Cryptography Challenges for Computational Privacy in Public Clouds, by Sashank Dara[ expand ]
05:22 [Pub][ePrint]The Legal Classification of Identity-Based Signatures, by Christoph Sorge[ expand ]
05:22 [Pub][ePrint]Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters, by Yu Yu[ expand ]
05:22 [Pub][ePrint]Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion, by Jonathan Trostle[ expand ]
05:22 [Pub][ePrint]Dynamic Cube Attack on Grain-v1, by Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref[ expand ]
05:22 [Pub][ePrint]Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction, by S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee[ expand ]
05:22 [Pub][ePrint]Pinocchio: Nearly Practical Verifiable Computation, by Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova[ expand ]
05:22 [Pub][ePrint]A Frequency Leakage Model and its application to CPA and DPA, by S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine[ expand ]
05:22 [Pub][ePrint]ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, by Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo[ expand ]
05:22 [Pub][ePrint]Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs, by David Bernhard and Stephan Neumann and Melanie Volkamer[ expand ]
05:22 [Pub][ePrint]The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures, by Johannes Braun and Gregor Rynkowski[ expand ]
05:22 [Pub][ePrint]A time series approach for profiling attack, by Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch[ expand ]
05:22 [Pub][ePrint]Salvaging Indifferentiability in a Multi-stage Setting, by Arno Mittelbach[ expand ]
05:22 [Pub][ePrint]A Novel Proof on Weil Pairing, by Sutirtha Sanyal[ expand ]
05:22 [Pub][ePrint]A Secure Paper-Based Electronic Voting With No Encryption, by Asghar Tavakkoli, Reza Ebrahimi Atani[ expand ]
05:22 [Pub][ePrint]Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption, by Dan Boneh and Ananth Raghunathan and Gil Segev[ expand ]
05:22 [Pub][ePrint]Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes, by Goutam Paul and Anupam Chattopadhyay[ expand ]
05:22 [Pub][ePrint]Adapting Lyubashevsky\'s Signature Schemes to the Ring Signature Setting, by Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit[ expand ]
05:22 [Pub][ePrint]Path ORAM: An Extremely Simple Oblivious RAM Protocol, by Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas[ expand ]
05:22 [Pub][ePrint]A Leakage Resilient MAC, by Dan Martin and Elisabeth Oswald and Martijn Stam[ expand ]
05:22 [Pub][ePrint]On Diffie-Hellman-like Security Assumptions, by Antoine Joux and Antoine Rojat[ expand ]
05:22 [Pub][ePrint]Massive Group Message Authentication with Revocable Anonymity, by Boaz Catane and Amir Herzberg[ expand ]
05:22 [Pub][ePrint]Secure Second Price Auctions with a Rational Auctioneer, by Boaz Catane and Amir Herzberg[ expand ]
05:22 [Pub][ePrint]Key Classification Attack on Block Ciphers, by Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi[ expand ]
05:22 [Pub][ePrint]The failure of McEliece PKC based on Reed-Muller codes., by I. V. Chizhov and M. A. Borodin[ expand ]
05:21 [Pub][ePrint]A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices, by Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W\\\'{o}jcik[ expand ]
05:21 [Pub][ePrint]Improvement and Efficient Implementation of a Lattice-based Signature Scheme, by Rachid El Bansarkhani and Johannes Buchmann[ expand ]
05:21 [Pub][ePrint]Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption, by Morten Dahl and Ivan Damgård[ expand ]
05:21 [Pub][ePrint]Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, by Micka\\\"el Cazorla and Kevin Marquet and Marine Minier[ expand ]
05:21 [Pub][ePrint]Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis, by Colin O\'Flynn and Zhizhang (David) Chen[ expand ]
05:21 [Pub][ePrint]A Toolkit for Ring-LWE Cryptography, by Vadim Lyubashevsky and Chris Peikert and Oded Regev[ expand ]
05:21 [Pub][ePrint]Maliciously Circuit-private FHE, by Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky[ expand ]
05:21 [Pub][ePrint]Solving a $6120$-bit DLP on a Desktop Computer, by Faruk G\\\"olo\\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\\\"agel[ expand ]
05:21 [Pub][ePrint]Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis, by Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc [ expand ]
05:21 [Pub][ePrint]Secure PRNG Seeding on Commerial-of-the-Shelf Microcontrollers, by Anthony Van Herrewege and Vincent van der Leest and Andr\\\'e Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede[ expand ]
05:21 [Pub][ePrint]Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions, by Shivam Bhasin and Claude Carlet and Sylvain Guilley[ expand ]
05:21 [Pub][ePrint]Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors, by Nicolas T. Courtois[ expand ]
05:21 [Pub][ePrint]Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128, by Zheng Yuan and Xian Li and Haixia Liu[ expand ]
05:21 [Pub][ePrint]A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups, by Allison Lewko and Sarah Meiklejohn[ expand ]
05:21 [Pub][ePrint]Computing class polynomials for abelian surfaces, by Andres Enge and Emmanuel Thomé[ expand ]
05:21 [Pub][ePrint]MinimaLT: Minimal-latency Networking Through Better Security, by W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange[ expand ]
05:21 [Pub][ePrint]Bypassing Passkey Authentication in Bluetooth Low Energy, by Tomas Rosa[ expand ]
05:21 [Pub][ePrint]Lattice-Based Group Signatures with Logarithmic Signature Size, by Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle[ expand ]



2013-05-26
06:59 [Job][New]Professor / Associate Professor in Information Security, Queensland University of Technology, Brisbane, Australia[ expand ]


2013-05-24
03:02 [Job][New]Ph.D. scholarship in cryptographic protocols, Norwegian University of Science and Technology (NTNU), Trondheim, Norway[ expand ]


2013-05-21
21:02 [Job][New]Junior Professorship (W1), Carl von Ossietzky University Oldenburg[ expand ]
20:56 [Event][New]CryptoBG*2013: CryptoBG*2013 Summmer School - Cryptology and Cyber Resilience[ expand ]
20:55 [Event][New]TrustED 2013: Third International Workshop on Trustworthy Embedded Devices[ expand ]


2013-05-17
04:10 [Event][New]WESS 2013: 8th Workshop on Embedded Systems Security[ expand ]



2013-05-16
18:17 [Job][New]2 Post-Doc, University of Luxembourg[ expand ]


2013-05-15
16:44 [Job][New]PhD/MSc positions in Cryptography, Security, and Privacy, Koç University, Istanbul, Turkey[ expand ]


2013-05-14
17:31 [Job][New]Security Researcher , Intel Corporation, Guadalajara, Mexico[ expand ]
17:21 [Event][New]FOSAD13: 13th School on Foundations of Security Analysis and Design (w. CryptoForma)[ expand ]
17:20 [Event][New]LATIN 2014: 11th Latin American Theoretical Informatics Symposium[ expand ]


2013-05-10
12:59 [Event][New]DATE 2014: Design Automation and Test in Europe Conference[ expand ]



2013-05-09
13:02 [Job][New]6 Ph.D. Student scholarships in privacy, security and/or cryptography, Universitat Rovira i Virgili, Tarragona, Catalonia, Spain[ expand ]


2013-05-08
11:05 [Event][New]14th IMA Cryptography and Coding[ expand ]


2013-05-06
13:40 [Event][New]WISA '13: 14th International Workshop on Information Security Applications[ expand ]


2013-05-03
07:14 [Event][New]STM 2013: 9th International Workshop on Security and Trust Management[ expand ]
07:13 [Job][New]Ph.D. Scholarship , University of Wollongong, Wollongong, New South Wales, Australia[ expand ]



2013-04-29
20:25 [Job][New]PhD positions in Quantum and Postquantum Cryptography, University of Tartu, Estonia[ expand ]
15:18 [Pub][Software]A Generator for LWE and Ring-LWE Instances[ expand ]


2013-04-27
15:08 [Event][New]Number Theory, Geometry and Cryptography[ expand ]
15:08 [Event][New]CANS 2013: 12th International Conference on Cryptology and Network Security[ expand ]


2013-04-22
18:03 [Event][New]WEWoRC 2013: Western European Workshop on Research in Cryptology[ expand ]
13:51 [Job][New]two Ph.D. students, University of Luxembourg[ expand ]


2013-04-19
13:54 [Event][New]POST'14: 3rd Conference on Principles of Security and Trust[ expand ]
09:26 [Event][New]ARES-IND 2013: Industrial Track at the Eighth International ARES Conference[ expand ]
07:56 [Job][New]Associate Research Fellow, University of Wollongong, Wollongong, New South Wales, Australia[ expand ]



2013-04-17
09:55 [Event][New]FPS'2013: Foundation and Practice of Security[ expand ]


2013-04-16
09:12 [Event][New]crypt@b-it 2013[ expand ]


2013-04-15
13:10 [Job][New]Research Assistant/Software Development (multiple positions available), University of New Brunswick, Canada[ expand ]


2013-04-11
12:17 [Conf][EC]Early Bird Rgistration Notice[ expand ]
05:38 [Event][New]GeoCrypto 2013: Conference on Geometry and Cryptography[ expand ]



2013-04-10
17:47 [Job][New]Quantum Cryptography or Cryptography Engineer, Confidential Classfied Level 5 (Private Business)[ expand ]


2013-04-09
06:46 [Event][New]DPM'2013: 8th International Workshop on Data Privacy Management[ expand ]
04:25 [News]2013 IACR Fellows[ expand ]


2013-04-08
17:51 [Job][New]PostDoc Position in Lightweight Cryptography for the Internet of Things, University of Luxembourg[ expand ]


2013-04-07
07:32 [Job][New]Postdoc, University of California San Diego (UCSD), La Jolla, California, USA[ expand ]



2013-04-05
13:54 [Event][New]Indocrypt 2013: 14th International Conference on Cryptology in India[ expand ]


2013-04-04
14:03 [Job][New]Associate Professors in Computer Science at Aarhus University, Department of Computer Science, Aarhus University, Denmark[ expand ]
14:02 [Job][New]PhD studentship in zero-knowledge proofs, University College London, UK, EU, EEA[ expand ]
05:25 [Job][New]Senior Lecturer, RMIT University, Melbourne, Australia[ expand ]


2013-04-03
12:35 [Event][New]SPACE 2013: Conference on Security, Privacy, and Applied Cryptography Engineering[ expand ]


2013-04-02
17:54 [Job][New]Post Doc, Applied Cryptography & Telecom Group, Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France[ expand ]
17:54 [Job][New]Post-Doc, Dept. of Computer Science, Aarhus University, Denmark[ expand ]
15:17 [Pub][ePrint]On the (Im)possibility of Projecting Property\\\\, by Jae Hong Seo[ expand ]
15:17 [Pub][ePrint]Security Analysis of Linearly Filtered NLFSRs, by Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett[ expand ]
15:17 [Pub][ePrint]A generalisation of Miller\'s algorithm and applications to pairing computations on abelian varieties, by David Lubicz and Damien Robert[ expand ]
15:17 [Pub][ePrint]Improved Differential Fault Analysis on ARIA using Small Number of Faults, by Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong[ expand ]
15:17 [Pub][ePrint]Power Analysis Attacks against FPGA Implementations of KLEIN, by Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong[ expand ]
15:17 [Pub][ePrint]Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes, by Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah[ expand ]
15:17 [Pub][ePrint]A family of 6-to-4-bit S-boxes with large linear branch number, by Daniel Loebenberger and Michael Nüsken[ expand ]
15:17 [Pub][ePrint]Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model, by Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo[ expand ]
12:17 [Pub][ePrint]The Vernam cipher is robust to small deviations from randomness, by Boris Ryabko[ expand ]



2013-04-01
15:17 [Pub][ePrint]Practical Multilinear Maps over the Integers, by Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi[ expand ]
15:17 [Pub][ePrint]Collusion-Resistant Domain-Specific Pseudonymous Signatures, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
15:17 [Pub][ePrint]On the evaluation of modular polynomials, by Andrew V. Sutherland[ expand ]
15:17 [Pub][ePrint]A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\\Sigma\\Pi$PKC,Constructed Based on Maximum Length Code, by Masao KASAHARA[ expand ]
15:17 [Pub][ePrint]Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials, by Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of RC4(n,m) Stream Cipher, by Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld[ expand ]


2013-03-31
00:17 [Pub][ePrint]On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems\", by Ray Perlner and Daniel Smith-Tone[ expand ]
00:17 [Pub][ePrint]A generic construction for voting correctness at minimum cost - Application to Helios, by Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene[ expand ]
00:17 [Pub][ePrint]Distinguishing Attacks on RC4 and A New Improvement of the Cipher, by Jing Lv and Bin Zhang and Dongdai Lin[ expand ]
00:17 [Pub][ePrint]Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes, by Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key, by Deukjo Hong and Daesung Kwon[ expand ]


2013-03-30
18:17 [Pub][ePrint]On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version), by Raphael Spreitzer and Thomas Plos[ expand ]
18:17 [Pub][ePrint]Confined Guessing: New Signatures From Standard Assumptions, by Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks[ expand ]
18:17 [Pub][ePrint]Fast Collision Attack on MD5, by Tao Xie and Fanbao Liu and Dengguo Feng[ expand ]


2013-03-29
06:17 [Pub][ePrint]Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries, by David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner[ expand ]



2013-03-28
18:17 [Pub][ePrint]On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage, by Simon Hoerder and Kimmo Järvinen and Dan Page[ expand ]
15:17 [Pub][ePrint]A New Security and Privacy Framework for RFID In Cloud Computing, by Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi[ expand ]
15:17 [Pub][ePrint]Single Password Authentication, by Tolga Acar and Mira Belenkiy and Alptekin Küpçü[ expand ]
15:17 [Pub][ePrint]On generalized semi-bent (and partially bent) Boolean functions, by Brajesh Kumar Singh[ expand ]


2013-03-27
15:19 [Job][New]Research Scientist/Senior Research Scientist in Security, Palo Alto Research Center (PARC, a Xerox Company), CA, USA[ expand ]
09:09 [Job][New]PhD positions in Network Security, University of New Brunswick, Canada[ expand ]


2013-03-26
15:17 [Pub][ePrint]A Non Asymptotic Analysis of Information Set Decoding, by Yann Hamdaoui and Nicolas Sendrier[ expand ]
15:17 [Pub][ePrint]Completeness Theorems for All Finite Stateless 2-Party Primitives, by Daniel Kraschewski[ expand ]
15:17 [Pub][ePrint]Interactive Coding, Revisited, by Kai-Min Chung and Rafael Pass and Sidharth Telang[ expand ]
15:17 [Pub][ePrint]Improving the Message-ciphertext Rate of Lewko\'s Fully Secure IBE Scheme, by Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei[ expand ]
15:17 [Pub][ePrint]Keep Calm and Stay with One (and p>3), by Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez[ expand ]
15:17 [Pub][ePrint]The fragility of AES-GCM authentication algorithm , by Shay Gueron and Vlad Krasnov[ expand ]
15:17 [Pub][ePrint]Provably Secure LWE-Encryption with Uniform Secret, by Daniel Cabarcas and Florian Göpfert and Patrick Weiden[ expand ]
15:17 [Pub][ePrint]Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions, by Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan[ expand ]


2013-03-25
15:31 [Event][New]CrossFyre 2013: CrossFyre 2013[ expand ]
15:29 [Event][New]ISCTURKEY 2013: 6th International Conference on Information Security and Cryptology[ expand ]
15:29 [Event][New]CRiSIS 2013: 8th International Conference on Risks and Security of Internet and Systems[ expand ]
15:28 [Event][New]Eurocrypt: Eurocrypt 2014[ expand ]
15:27 [Job][New]Software Engineer, Embedded Data Security, ESCRYPT Inc, Ann Arbor, Michigan, USA[ expand ]
15:25 [Job][New]PhD Position on Privacy Enhancing Technologies and Anonymous Communications (NR27372), University of Cambridge, UK[ expand ]
15:24 [Job][New]Research Assistant in Mobile Forensics, University of Bristol, UK, EU[ expand ]
15:24 [Job][New]Senior Lecturer / Associate Professor, University of Cape Town, South Africa[ expand ]



2013-03-20
03:06 [Event][New]ICISC 2013: The 16th International Conference on Information Security and Cryptology[ expand ]
03:05 [Event][New]ICISS 2013: 9th International Conference on Information Systems Security[ expand ]


2013-03-19
21:17 [Pub][ePrint]Incentivizing Outsourced Computation, by Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya[ expand ]


2013-03-15
06:17 [Pub][ePrint]A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms , by Naomi Benger and Manuel Charlemagne[ expand ]
06:17 [Pub][ePrint]Optimal Suspicion Functions for Tardos Traitor Tracing Schemes, by Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen[ expand ]
06:17 [Pub][ePrint]On the security of a certicateless signature scheme in the standard model, by Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang[ expand ]
06:17 [Pub][ePrint]Policy-based Secure Deletion, by Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti[ expand ]
06:17 [Pub][ePrint]Some Fixes To SSH, by xu zijie[ expand ]
06:17 [Pub][ePrint]Practical (Second) Preimage Attacks on TCS_SHA-3, by Gautham Sekar and Soumyadeep Bhattacharya[ expand ]
06:17 [Pub][ePrint]Secure and Constant Cost Public Cloud Storage Auditing with Deduplication, by Jiawei Yuan and Shucheng Yu[ expand ]
06:17 [Pub][ePrint]AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again), by Alexander Rostovtsev[ expand ]
06:17 [Pub][ePrint]MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions, by Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi[ expand ]


2013-03-14
03:17 [Pub][ePrint]High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition, by Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter[ expand ]



2013-03-13
11:24 [Job][New]Ph.D. studentships, Royal Holloway, University of London, UK[ expand ]
06:17 [Pub][ePrint]Key Wrapping with a Fixed Permutation, by Dmitry Khovratovich[ expand ]
06:17 [Pub][ePrint]On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes, by Gordon Procter and Carlos Cid[ expand ]
06:17 [Pub][ePrint]An architecture for practical actively secure MPC with dishonest majority, by Marcel Keller and Peter Scholl and Nigel P. Smart[ expand ]
06:17 [Pub][ePrint]A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES, by Kisoon YOON[ expand ]
00:17 [Pub][ePrint]Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton, by M. Shakiba and M. Dakhilalian and H. Mala[ expand ]
00:17 [Pub][ePrint]Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures, by Marc Fischlin and Nils Fleischhacker[ expand ]
00:17 [Pub][ePrint]Rethinking Definitions of Security for Session Key Agreement, by Wesley George and Charles Rackoff[ expand ]


2013-03-11
09:54 [Job][New]PhD students and Postdocs in Symmetric Crypto, DTU, Copenhagen, Denmark[ expand ]


2013-03-09
22:17 [Pub][ePrint]Multi-bit homomorphic encryption based on learning with errors over rings, by Zhang Wei, Liu Shuguang, Yang Xiaoyuan[ expand ]
22:17 [Pub][ePrint]How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation, by Payman Mohassel and Saeed Sadeghian[ expand ]
22:17 [Pub][ePrint]2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers, by Dieter Schmidt[ expand ]


2013-03-08
22:16 [Job][New]Three Faculty Positions in Information Security (Lecturer/Senior Lecturer), University College London, United Kingdom, European Union[ expand ]
09:25 [Job][New]2 Postdoc + 2 Ph.D. scholarships/Post-Master/Post-Bachelor in Side-Channel and Fault Attacks, Phys. Analysis and Crypto Engineering, Nanyang Technological University, Singapore[ expand ]



2013-03-07
19:17 [Pub][ePrint]An MQ/Code Cryptosystem Proposal, by Leonard J. Schulman[ expand ]
19:17 [Pub][ePrint]Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields, by Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Wkeith III[ expand ]
19:17 [Pub][ePrint]New Lattice Based Signature Using The Jordan Normal Form, by Hemlata Nagesh and Birendra Kumar Sharma[ expand ]
19:17 [Pub][ePrint]Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme, by Niu Liu and Shaohua Tang and Lingling Xu[ expand ]
19:17 [Pub][ePrint]Two is the fastest prime, by Thomaz Oliveira and Juilo López and Diego F. Aranha and Francisco Rodríguez-Henríquez[ expand ]
19:17 [Pub][ePrint]Blank Digital Signatures, by Christian Hanser and Daniel Slamanig[ expand ]
16:17 [Pub][ePrint]Attribute-Based Encryption for Circuits from Multilinear Maps, by Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters[ expand ]
16:17 [Pub][ePrint]An Ideal-Security Protocol for Order-Preserving Encoding, by Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich[ expand ]


2013-03-06
19:51 [Event][New]SeCIHD'13: 3rd Inter. Work. on Security and Cognitive Informatics for Homeland Defense[ expand ]
19:51 [Event][New]RFIDsec'13 Asia: The 2013 Workshop on RFID and IoT Security[ expand ]
19:50 [Event][New]ICITS 2013: The 7th International Conference on Information Theoretic Security[ expand ]
00:07 [Job][New]Assistant Professor Position, Crypto Group - University of Versailles-St-Quentin-en-Yvelines (France)[ expand ]
00:07 [Job][New]Post-Doc, University of Waterloo, Canada[ expand ]


2013-03-05
15:25 [Job][New]Ph.D. student, Radboud University Nijmegen, the Netherlands, European Union[ expand ]
15:24 [Job][New]Integrated circuit designer, PhD, INVIA, Aix en Provence, France[ expand ]
13:17 [Pub][ePrint]Tamper Resilient Cryptography Without Self-Destruct, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi[ expand ]
13:17 [Pub][ePrint]Analysis and Improvement of Lindell\'s UC-Secure Commitment Schemes, by Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud[ expand ]
13:17 [Pub][ePrint]Practical collision attack on 40-step RIPEMD-128, by Gaoli Wang[ expand ]
13:17 [Pub][ePrint]Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes, by Helger Lipmaa[ expand ]
13:17 [Pub][ePrint]An Attack Against Fixed Value Discrete Logarithm Representations, by Gergely Alp\\\'ar and Jaap-Henk Hoepman and Wouter Lueks[ expand ]
13:17 [Pub][ePrint]Speeding up Ate Pairing Computation in Affine Coordinates, by Duc-Phong Le and Chik How Tan[ expand ]
13:17 [Pub][ePrint]Speed Optimized Implementations of the QUAD Algorithm, by Jason Hamlet and Robert Brocato[ expand ]
13:17 [Pub][ePrint]Oblivious PAKE and Efficient Handling of Password Trials, by Franziskus Kiefer and Mark Manulis[ expand ]
13:17 [Pub][ePrint]Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key, by Aysajan Abidin and Jan-Åke Larsson[ expand ]
13:17 [Pub][ePrint]Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions, by Ananth Raghunathan and Gil Segev and Salil Vadhan[ expand ]


2013-03-01
18:01 [PhD][Update]Marc Stevens: Attacks on Hash Functions and Applications[ expand ]
18:00 [Job][Update]Postdoc, Macquarie University, Sydney, Australia, British Commonwealth[ expand ]
18:00 [Job][New]Postdoc, Macquarie University, Sydney, Australie, British Commonwealth[ expand ]



2013-02-27
19:17 [Pub][ePrint]Learning with Rounding, Revisited: New Reduction, Properties and Applications, by Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs[ expand ]
19:17 [Pub][ePrint]Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher, by Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref[ expand ]
19:17 [Pub][ePrint]State convergence in bit-based stream ciphers, by Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson[ expand ]
19:17 [Pub][ePrint]On the Complexity of Broadcast Setup, by Martin Hirt and Pavel Raykov[ expand ]
19:17 [Pub][ePrint]On the Negative Effects of Trend Noise and \\\\, by Yuchen Cao, Yongbin Zhou and Zhenmei Yu[ expand ]
19:17 [Pub][ePrint]Notions of Black-Box Reductions, Revisited, by Paul Baecher and Christina Brzuska and Marc Fischlin[ expand ]
19:17 [Pub][ePrint]Attacks and Comments on Several Recently Proposed Key Management Schemes, by Niu Liu and Shaohua Tang and Lingling Xu[ expand ]
19:17 [Pub][ePrint]Secure Two-Party Computation via Leaky Generalized Oblivious Transfer, by Samuel Ranellucci and Alain Tapp[ expand ]
19:17 [Pub][ePrint]Message Authentication Codes Secure against Additively Related-Key Attacks, by Keita Xagawa[ expand ]
19:17 [Pub][ePrint]Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness, by Gilad Asharov and Yehuda Lindell and Tal Rabin[ expand ]
19:17 [Pub][ePrint]Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces, by Charanjit S. Jutla and Arnab Roy[ expand ]
19:17 [Pub][ePrint]Unconditionally Secure and Universally Composable Commitments from Physical Assumptions, by Ivan Damgard and Alessandra Scafuro[ expand ]
19:17 [Pub][ePrint]On the Arithmetic Complexity of Strassen-Like Matrix Multiplications, by Murat Cenk and M. Anwar Hasan[ expand ]
19:17 [Pub][ePrint]URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme, by Roohallah Rastaghi[ expand ]
19:17 [Pub][ePrint]Lossy Chains and Fractional Secret Sharing, by Yuval Ishai and Eyal Kushilevitz and Omer Strulovich[ expand ]
19:17 [Pub][ePrint]A Tutorial on White-box AES, by James A. Muir[ expand ]
19:17 [Pub][ePrint]On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s, by Namhun Koo and Gook Hwa Cho and Soonhak Kwon[ expand ]
19:17 [Pub][ePrint]The Algorithm of AAES, by Shiyong Zhang and Gongliang Chen and Lei Fan[ expand ]
19:17 [Pub][ePrint]A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release, by Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang[ expand ]
19:17 [Pub][ePrint]Public Key Exchange Using Matrices Over Group Rings, by Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain[ expand ]
19:17 [Pub][ePrint]Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA, by Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki[ expand ]
19:17 [Pub][ePrint]PUF Modeling Attacks on Simulated and Silicon Data, by Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and[ expand ]
06:57 [Event][New]Central European Conference on Cryptology 2013[ expand ]
06:56 [Event][New]ECC 2013: 17th Workshop on Elliptic Curve Cryptography[ expand ]


2013-02-25
16:56 [Event][New]SPE2013: IEEE 2013 Third International Workshop on Security and Privacy Engineering[ expand ]
16:55 [Event][New]VizSec 2013: 10th International Symposium on Visualization for Cyber Security[ expand ]


2013-02-23
18:32 [Job][New]Post-Doc, Aalto University School of Science, Helsinki, Finland[ expand ]


2013-02-22
18:00 [Event][New]SIN'13: The 6th Intl Conf on Security of Information and Networks[ expand ]



2013-02-21
20:47 [Event][New]Keccak & SHA-3 Day[ expand ]
20:46 [Event][New]RFIDsec '13: Workshop on RFID Security[ expand ]
13:17 [Pub][ePrint]A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic, by Antoine Joux[ expand ]


2013-02-20
19:17 [Pub][ePrint]Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs, by Vadim Lyubashevsky and Daniel Masny[ expand ]
19:17 [Pub][ePrint]Systematic Construction and Comprehensive Evaluation of the Kolmogorov-Smirnov Test based Side-Channel Distinguishers, by Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang[ expand ]
19:17 [Pub][ePrint]Functional Encryption Supporting Recursive Languages, by Somindu C. Ramanna and Palash Sarkar[ expand ]
19:17 [Pub][ePrint]Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis., by James McLaughlin and John A. Clark[ expand ]
19:17 [Pub][ePrint]Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World, by Dan Boneh and Mark Zhandry[ expand ]
19:17 [Pub][ePrint]On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, by Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan[ expand ]
19:17 [Pub][ePrint]On the security of a certificateless aggregate signature scheme, by Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou[ expand ]
18:44 [Job][New]Canada Excellence Research Chair in Security & Privacy, University of Waterloo, Canada[ expand ]
13:17 [Pub][ePrint]Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR, by Travis Mayberry and Erik-Oliver Blass and Agnes Chan[ expand ]
13:17 [Pub][ePrint]Between a Rock and a Hard Place: Interpolating Between MPC and FHE, by Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart[ expand ]
13:17 [Pub][ePrint]Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks, by Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse[ expand ]
13:17 [Pub][ePrint]Towards Provably Secure Software Attestation, by Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann[ expand ]
13:17 [Pub][ePrint]Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1)), by Namhun Koo and Gook Hwa Cho and Soonhak Kwon[ expand ]
10:17 [Pub][ePrint]Hardness of SIS and LWE with Small Parameters, by Daniele Micciancio and Chris Peikert[ expand ]
10:17 [Pub][ePrint]Why Proving HIBE Systems Secure is Difficult, by Allison Lewko and Brent Waters[ expand ]
10:17 [Pub][ePrint]Power Analysis of Hardware Implementations Protected with Secret Sharing, by Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche[ expand ]
10:17 [Pub][ePrint]Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard, by Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref[ expand ]
10:17 [Pub][ePrint]Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme, by Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig[ expand ]
10:17 [Pub][ePrint]On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\\F_{2^{1971}}$, by Faruk Gologlu and Robert Granger and Gary McGuire and Jens Zumb[ expand ]
10:17 [Pub][ePrint]Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently, by Marek Jawurek and Florian Kerschbaum and Claudio Orlandi[ expand ]
10:17 [Pub][ePrint]The UC approach: an application view, by István Vajda[ expand ]
10:17 [Pub][ePrint]Relation collection for the Function Field Sieve, by Jérémie Detrey and Pierrick Gaudry and Marion Videau[ expand ]
10:17 [Pub][ePrint]Related-key Attacks Against Full Hummingbird-2, by Markku-Juhani O. Saarinen[ expand ]
10:17 [Pub][ePrint]Secret Sharing, Rank Inequalities and Information Inequalities, by Sebastia Martin and Carles Padro and An Yang[ expand ]
10:17 [Pub][ePrint]Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose, by Yan Huang and Jonathan Katz and Dave Evans[ expand ]
10:17 [Pub][ePrint]An efficient attack of a McEliece cryptosystem variant based on convolutional codes, by Grégory Landais and Jean-Pierre Tillich[ expand ]
10:17 [Pub][ePrint]Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries, by Yehuda Lindell[ expand ]
10:17 [Pub][ePrint]Broadcast Steganography, by Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera[ expand ]
10:17 [Pub][ePrint]UC-Secure Multi-Session OT Using Tamper-Proof Hardware , by Kaoru Kurosawa and Ro Nojima and Le Trieu Phong[ expand ]
10:17 [Pub][ePrint]Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors, by Ling Ren and Xiangyao Yu and Christopher Fletcher and Marten van Dijk and Srinivas Devadas[ expand ]


2013-02-19
23:46 [Job][New]Full-time Ph.D. or Postdoc Position, University of Trier, Germany[ expand ]
23:41 [Event][New]Crypto: CryptoIdeaLab: Early Career Researchers/Efficient Homomorphic Encyption[ expand ]


2013-02-18
09:51 [Event][New]SAC 2013: Selected Areas in Cryptography 2013[ expand ]
09:50 [Event][New]ECTCM 2013: First International Workshop on Emerging Cyberthreats and Countermeasures[ expand ]



2013-02-14
12:19 [Event][New]RISI 2013: The Third International Workshop on Resilience and IT-Risk in Social Infra[ expand ]


2013-02-12
10:17 [Pub][ePrint]Instantiating Treeless Signature Schemes, by Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann[ expand ]
10:17 [Pub][ePrint]Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols, by Sven Laur and Bingsheng Zhang[ expand ]
10:17 [Pub][ePrint]A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol, by Christian L. F. Corniaux and Hossein Ghodosi[ expand ]
10:17 [Pub][ePrint]Symbolic Universal Composability, by Florian Böhl and Dominique Unruh[ expand ]
08:52 [Event][New]ICICS'13: 15th International Conference on Information and Communications Security[ expand ]


2013-02-07
07:46 [Event][New]SSTiC 2013: International Summer School on Trends in Computing[ expand ]


2013-02-06
19:17 [Pub][ePrint]On the Indifferentiability of Key-Alternating Ciphers, by Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger[ expand ]
19:17 [Pub][ePrint]On FHE without bootstrapping, by Aayush Jain[ expand ]
19:17 [Pub][ePrint]Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers, by Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of the Dragonfly Key Exchange Protocol, by Dylan Clarke and Feng Hao[ expand ]
16:53 [Job][New]PhD Positions, Vernam Lab at WPI, Worcester, MA[ expand ]
16:17 [Pub][ePrint]Some Improved Results for uSVP and GapSVP, by Kuan Cheng[ expand ]
16:17 [Pub][ePrint]Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation , by Payman Mohassel and Ben Riva[ expand ]
16:17 [Pub][ePrint]Cryptanalysis and Improvement of Akleylek et al.\'s cryptosystem, by Roohallah Rastaghi[ expand ]
16:17 [Pub][ePrint]CRT-based Fully Homomorphic Encryption over the Integers, by Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon[ expand ]
16:17 [Pub][ePrint]On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography, by Kishan Chand Gupta and Indranil Ghosh Ray[ expand ]
16:17 [Pub][ePrint]Secrecy without one-way functions, by Dima Grigoriev and Vladimir Shpilrain[ expand ]
16:17 [Pub][ePrint]Joint Compartmented Threshold Access Structures, by Ali Aydın Selçuk and Ramazan Yılmaz[ expand ]
16:17 [Pub][ePrint]A revocable certificateless signature scheme, by Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng[ expand ]



2013-02-05
09:46 [Job][New]PhD Position in Matching and social relationship management for decentralized healthcare services , University of Twente, The Netherlands[ expand ]
09:46 [Job][New]Post-Doc in security for virtualized software systems, Swedish Institute of Computer Science (SICS)[ expand ]
09:07 [Event][New]MITC 2013: School + Workshop on Mathematics of Information-Theoretic Cryptography[ expand ]
09:07 [Event][New]PRISMS 2013: International Conference on Privacy and Security in Mobile Systems[ expand ]
09:05 [Event][New]AisaJCIS2013: The 8th Asia Joint Conference on Information Security[ expand ]


2013-02-01
12:59 [Job][New]Post-Doc, Orange Labs, Caen, France[ expand ]
12:59 [Job][New]PhD Position in System Security and Secure Electronic Identity, Technische Universität Darmstadt, Germany[ expand ]
12:59 [Job][New]Post-Doc in security in virtualized software systems, The Security Lab at Swedish Institute of Computer Science (SICS), Sweden[ expand ]
04:17 [Pub][ePrint]Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses, by Christopher Meyer and Jörg Schwenk[ expand ]
04:17 [Pub][ePrint]Power Balanced Circuits for Leakage-Power-Attacks Resilient Design, by Basel Halak, Julian Murphy, Alex Yakovlev[ expand ]


2013-01-30
19:17 [Pub][ePrint]Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes, by Carles Padro[ expand ]
04:17 [Pub][ePrint]Fast and Maliciously Secure Two-Party Computation Using the GPU, by Tore Kasper Frederiksen and Jesper Buus Nielsen[ expand ]
04:17 [Pub][ePrint]Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud, by anonymized for paper review[ expand ]
04:17 [Pub][ePrint]Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions, by Fangguo Zhang and Xu Ma and Shengli Liu[ expand ]
01:17 [Pub][ePrint]EMV Key Agreement, by Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson[ expand ]
01:17 [Pub][ePrint]Creating a Challenge for Ideal Lattices, by Thomas Plantard and Michael Schneider[ expand ]
01:17 [Pub][ePrint]Verifiable Data Streaming, by Dominique Schröder and Heike Schröder[ expand ]
01:17 [Pub][ePrint]Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles, by Jayaprakash Kar[ expand ]
01:17 [Pub][ePrint]Batch Fully Homomorphic Encryption over the Integers, by Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi[ expand ]
01:17 [Pub][ePrint]Improvements to NFC Mobile Transaction and Authentication Protocol, by Muhammad Qasim Saeed[ expand ]
01:17 [Pub][ePrint]New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange, by Fabrice Ben Hamouda and Olivier Blazy and C{\\\'e}line Chevalier and David Pointcheval and Damien Vergnaud[ expand ]
01:17 [Pub][ePrint]CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems, by Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao[ expand ]
01:17 [Pub][ePrint]Detection of Cheaters in Non-interactive Polynomial Evaluation, by Maki Yoshida and Satoshi Obana[ expand ]
01:17 [Pub][ePrint]Differential Fault Attack on the PRINCE Block Cipher, by Ling Song and Lei Hu[ expand ]
01:17 [Pub][ePrint]Complexity of Multi-Party Computation Functionalities, by Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek[ expand ]
01:17 [Pub][ePrint]Trace Expression of r-th Root over Finite Field, by Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon[ expand ]
01:17 [Pub][ePrint]An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model, by Roohallah Rastaghi[ expand ]


2013-01-24
22:17 [Pub][ePrint]RSA private key reconstruction from random bits using SAT solvers, by Constantinos Patsakis[ expand ]
22:17 [Pub][ePrint]The IITM Model: a Simple and Expressive Model for Universal Composability, by Ralf Kuesters and Max Tuengerthal[ expand ]
22:17 [Pub][ePrint]New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field, by Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon[ expand ]
22:17 [Pub][ePrint]On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks, by Haiyan Sun[ expand ]
22:17 [Pub][ePrint]A Differential Fault Attack on MICKEY 2.0, by Subhadeep Banik and Subhamoy Maitra[ expand ]
22:17 [Pub][ePrint]More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96, by Stanislav Bulygin[ expand ]
22:17 [Pub][ePrint]Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol, by Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson[ expand ]
09:19 [Event][New]Summer School: Design and Security of Cryptographic Functions, Algorithms and Devices[ expand ]
09:18 [Event][New]Summer School on Design and Security of Cryptographic Functions, Algorithms and[ expand ]
05:54 [Job][New]Associate or Assistant Professor in Cryptology , Technical University of Denmark[ expand ]
05:53 [Job][New]Ph.D. student, University of Paderborn, Faculty for Electrical Engineering, Computer Science and Mathematics[ expand ]
05:53 [Job][New]Ph.D. Student, University of Bordeaux /CWI /Leiden University[ expand ]
05:52 [Event][New]IH&MMSec: ACM Information Hiding and Multimedia Security Workshop[ expand ]
05:51 [Event][New]PQCrypto 2013: 5th Conference on Post-Quantum Cryptography 2013[ expand ]
05:50 [Event][New]Design and Security of Cryptographic Functions, Algorithms and Devices[ expand ]
05:50 [Event][New]CHES: Cryptographic Hardware and Embedded Systems[ expand ]
05:50 [Event][New]MoCrySEn '13: 2nd International Workshop on Modern Cryptography and Security Engineering[ expand ]
05:50 [Event][New]ESORICS 2013: 18th European Symposium on Research in Computer Security[ expand ]



2013-01-21
08:34 [Event][New]ISDFS '13: The First International Symposium on Digital Forensics and Security[ expand ]
08:33 [Event][New]Ice Break 2013: Ice Break 2013 - Summer School on Symmetric Cryptology[ expand ]
08:32 [Event][New]SECITC '13: The 6th International Conference on Security for IT&C[ expand ]
08:32 [Event][New]SAM'13: The 2013 International Conference on Security and Management[ expand ]


2013-01-18
13:17 [Pub][ePrint]Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography, by Graham Enos[ expand ]
13:17 [Pub][ePrint]On formal and automatic security verification of WSN transport protocols, by Ta Vinh Thong and Amit Dvir[ expand ]
13:17 [Pub][ePrint]Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations., by James McLaughlin and John A. Clark[ expand ]
13:17 [Pub][ePrint]Rate-Limited Secure Function Evaluation: Definitions and Constructions, by Özgür Dagdelen and Payman Mohassel and Daniele Venturi[ expand ]
13:17 [Pub][ePrint]Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles, by Markus Rückert and Dominique Schroeder[ expand ]
13:17 [Pub][ePrint]On the Security of Plain and Randomized Cascades, by Peter Gazi[ expand ]
13:17 [Pub][ePrint]Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption, by Jae Hong Seo and Keita Emura[ expand ]
13:17 [Pub][ePrint]Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions, by Alexandra Boldyreva and Robert Lychev[ expand ]
13:17 [Pub][ePrint]Revocable Identity-Based Encryption Revisited: Security Model and Construction, by Jae Hong Seo and Keita Emura[ expand ]
13:17 [Pub][ePrint]A New Practical Identity-Based Encryption System, by Jong Hwan Park and Dong Hoon Lee[ expand ]


2013-01-12
10:17 [Pub][ePrint]Efficiently Outsourcing Multiparty Computation under Multiple Keys, by Andreas Peter and Erik Tews and Stefan Katzenbeisser[ expand ]
10:17 [Pub][ePrint]Tropical cryptography, by Dima Grigoriev and Vladimir Shpilrain[ expand ]
10:17 [Pub][ePrint]Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity., by James McLaughlin and John A. Clark[ expand ]
10:17 [Pub][ePrint]Simultaneous Resettable WI from One-way Functions, by Kai-Min Chung and Rafael Pass[ expand ]
10:17 [Pub][ePrint]Achieving Anonymity Against Major Face Recognition Algorithms, by Benedikt Driessen and Markus Dürmuth[ expand ]
10:17 [Pub][ePrint]Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security, by Kai-Min Chung and Rafael Pass and Karn Seth[ expand ]


2013-01-11
22:17 [Pub][ePrint]Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA, by Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Raba^a, Ammar Bouallegue and Faouzi Chekir[ expand ]
22:17 [Pub][ePrint]Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices, by Damien Stehlé and Ron Steinfeld[ expand ]
22:17 [Pub][ePrint]A Matrix Approach for Constructing Quadratic APN Functions, by Yuyin Yu and Mingsheng Wang and Yongqiang Li[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, by Qingfeng Cheng[ expand ]



2013-01-07
13:55 [Event][New]Asiacrypt: Asiacrypt 2013[ expand ]
13:54 [Event][New]Asiacrypt: Asiacrypt[ expand ]
13:23 [PhD][Update]Dries Schellekens: Design and Analysis of Trusted Computing Platforms[ expand ]
13:13 [PhD][New]Dries Schellekens: Design and Analysis of Trusted Computing Platforms[ expand ]
10:47 [PhD][New]Junko Takahashi: Security Evaluation of Side-Channel Resistance for Symmetric Ciphers Using Experimental and Theoretical Approaches[ expand ]
06:25 [Job][New]Research + Teaching Assistant / Ph.D. student, University of Applied Sciences Offenburg, Germany[ expand ]
06:15 [PhD][New]Yang Li: New Fault-Based Physical Attacks and Their Countermeasures[ expand ]
06:15 [PhD][New]Edoardo Persichetti: Improving the Efficiency of Code-Based Cryptography[ expand ]
06:14 [PhD][Update]Dwaine Clarke: Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]


2013-01-05
16:17 [Pub][ePrint]On Formal Expressions of BRW-polynomials, by Guillermo Morales-Luna[ expand ]


2013-01-04
22:17 [Pub][ePrint]Generalized (Identity-Based) Hash Proof System and Its Applications , by Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao[ expand ]
22:17 [Pub][ePrint]Shielding circuits with groups, by Eric Miles and Emanuele Viola[ expand ]


2013-01-03
15:11 [Job][New]Post-Doc, University of Twente, the Netherlands[ expand ]
15:03 [Event][New]PETS'13: Privacy Enhancing Technologies Symposium[ expand ]
15:03 [Event][New]WISTP '03: Seventh Workshop in Information Security Theory and Practices[ expand ]



2013-01-01
16:17 [Pub][ePrint]Defensive Leakage Camouflage, by E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin[ expand ]
16:17 [Pub][ePrint]Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond, by Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich[ expand ]
16:17 [Pub][ePrint]Non-Interactive Key Exchange, by Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson[ expand ]
16:17 [Pub][ePrint]Time-memory Trade-offs for Near-collisions, by Gaëtan Leurent[ expand ]
16:17 [Pub][ePrint]Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes, by Dalin Chu and Johann Gro{\\ss}sch{\\\"a}dl and Zhe Liu[ expand ]
16:17 [Pub][ePrint]On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography, by Nir Bitansky and Omer Paneth[ expand ]


2012-12-28
19:17 [Pub][ePrint]A Coding-Theoretic Approach to Recovering Noisy RSA Keys, by Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn[ expand ]
19:17 [Pub][ePrint]On the Impossibility of Sender-Deniable Public Key Encryption, by Dana Dachman-Soled[ expand ]
19:17 [Pub][ePrint]Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting, by Marc Obrador and Paz Morillo and Sandra Guasch[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol, by Qingfeng Cheng[ expand ]


2012-12-27
19:17 [Pub][ePrint]Systematic Treatment of Remote Attestation, by Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik[ expand ]
19:17 [Pub][ePrint]On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis, by Farzaneh Abed and Eik List and Stefan Lucks[ expand ]
19:17 [Pub][ePrint]On the (In)security of Fischlin\'s Paradigm, by Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao[ expand ]
19:17 [Pub][ePrint]Faster index calculus for the medium prime case. Application to a 1175-bit finite field, by Antoine Joux[ expand ]
19:17 [Pub][ePrint]An ideal multi-secret sharing scheme based on minimal privileged coalitions , by Yun Song , Zhihui Li[ expand ]
19:17 [Pub][ePrint]Succinct Non-Interactive Arguments via Linear Interactive Proofs, by Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth[ expand ]
19:17 [Pub][ePrint]Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing, by Jan Camenisch and Anna Lysyanskaya and Gregory Neven[ expand ]
19:17 [Pub][ePrint]Attribute-Based Functional Encryption on Lattices, by Xavier Boyen[ expand ]
19:17 [Pub][ePrint]New Impossible Differential Attack on $\\text{SAFER}_{+}$ and $\\text{SAFER}_{++}$, by Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng[ expand ]
19:17 [Pub][ePrint]Sampling Discrete Gaussians Efficiently and Obliviously, by Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai[ expand ]
19:17 [Pub][ePrint]Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks, by Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis[ expand ]
19:17 [Pub][ePrint]Hardness Preserving Reductions via Cuckoo Hashing, by Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor[ expand ]


2012-12-23
16:51 [Job][New]6-month Internship on Baseband Modem security, Intel Corporation, Hillsboro, Oregon, USA[ expand ]
16:48 [Event][New]ACNS 2013: 11th International Conference on Applied Cryptography and Network Security[ expand ]
16:47 [Event][New]AReS 2013: Eighth International Conference on Availability, Reliability and Security[ expand ]
16:47 [Event][New]IWSEC2013: The 8th International Workshop on Security[ expand ]
16:46 [Job][New]Post?Doc, Electronic Health Information Laboratory, CHEO Research Institute, Canada, North America[ expand ]



2012-12-19
19:17 [Pub][ePrint]Unprovable Security of Two-Message Zero Knowledge, by Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass[ expand ]
19:17 [Pub][ePrint]Non Observability in the Random Oracle Model, by Prabhanjan Ananth and Raghav Bhaskar[ expand ]
19:17 [Pub][ePrint]Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers, by Qun-Xiong Zheng and Wen-Feng Qi[ expand ]
17:36 [Job][New]Post-doc (three posts), Centre for Cybercrime and Computer Security, Newcastle University, UK, EU[ expand ]
12:54 [Job][Update]PostDoc in Cryptography, University of Bristol, UK, EU[ expand ]
12:53 [Job][New]PostDoc in Cryptography, University of Bristol[ expand ]


2012-12-18
14:23 [Event][New]Vote-ID '13: Fourth international conference on E-voting and Identity[ expand ]
13:17 [Pub][ePrint]Why \"Fiat-Shamir for Proofs\" Lacks a Proof, by Nir Bitansky and Sanjam Garg and Daniel Wichs[ expand ]
13:17 [Pub][ePrint]On the Non-malleability of the Fiat-Shamir Transform, by Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi[ expand ]
13:17 [Pub][ePrint]Profiled Model Based Power Simulator for Side Channel Evaluation, by Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le[ expand ]
13:17 [Pub][ePrint]Cryptanalysis of RAPP, an RFID Authentication Protocol, by Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador[ expand ]
13:17 [Pub][ePrint]Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors, by Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu[ expand ]
13:17 [Pub][ePrint]Calling out Cheaters: Covert Security With Public Verifiability, by Gilad Asharov and Claudio Orlandi[ expand ]
13:17 [Pub][ePrint]Cryptanalysis of WIDEA, by Gaëtan Leurent[ expand ]
13:17 [Pub][ePrint]On the (In)security of the Fiat-Shamir Paradigm, Revisited, by Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt[ expand ]


2012-12-17
14:09 [Job][New]PostDoc Position in Lightweight Cryptography for the Internet of Things, Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg[ expand ]
07:01 [Event][New]STCT-CISIS2013: Security and Trusted Computing Track at CISIS 2013[ expand ]


2012-12-15
13:12 [Event][New]PST 2013: Eleventh annual Conference on Privacy, Security and Trust[ expand ]
13:11 [Job][Update]GCHQ Sponsored PhD Studentship , Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK[ expand ]
13:11 [Job][New]GCHQ Sponsored PhD Studentship , Queen’s University Belfast, Centre for Secure Information Technologies (CSIT)[ expand ]



2012-12-14
22:17 [Pub][ePrint]5PM: Secure Pattern Matching, by Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler[ expand ]
22:17 [Pub][ePrint]Verifiable Elections That Scale for Free, by Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn[ expand ]
22:17 [Pub][ePrint]Cryptanalysis of RAKAPOSHI Stream Cipher, by Lin Ding and Jie Guan[ expand ]
22:17 [Pub][ePrint]Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS, by Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou[ expand ]
22:17 [Pub][ePrint]Is Public-Key Encryption Based on LPN Practical?, by Ivan Damg{\\aa}rd and Sunoo Park[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of matrix conjugation schemes, by A. D. Myasnikov and A. Ushakov[ expand ]
19:17 [Pub][ePrint]Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits, by Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters[ expand ]
19:17 [Pub][ePrint]Automated Analysis and Synthesis of Padding-Based Encryption Schemes, by Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Santiago Zanella-Béguelin[ expand ]


2012-12-11
08:57 [Job][New]faculty position, EPFL, Lausanne, Switzerland, EEA[ expand ]
06:38 [Job][New]Research Science, University of Houston, Houston Texas USA[ expand ]


2012-12-10
13:17 [Pub][ePrint]Natural Generalizations of Threshold Secret Sharing, by Oriol Farras,Carles Padro,Chaoping Xing, and An Yang[ expand ]
13:17 [Pub][ePrint]Hiding the Input-Size in Secure Two-Party Computation, by Yehuda Lindell and Kobbi Nissim and Claudio Orlandi[ expand ]
13:17 [Pub][ePrint]The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions, by Karyn Benson and Hovav Shacham and Brent Waters[ expand ]
13:17 [Pub][ePrint]Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\\o}stl, by Jian Zou and Wenling Wu and Shuang Wu and Le Dong[ expand ]
13:17 [Pub][ePrint]Square root computation over even extension fields , by Gora Adj and Francisco Rodr\\\'iguez-Henr\\\'iquez[ expand ]
13:17 [Pub][ePrint]Generic Related-key Attacks for HMAC, by Thomas Peyrin and Yu Sasaki and Lei Wang[ expand ]
13:17 [Pub][ePrint]Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster, by Gildas Avoine and Adrien Bourgeois and Xavier Carpent[ expand ]
13:17 [Pub][ePrint]Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud, by Jiawei Yuan and Shucheng Yu[ expand ]
13:17 [Pub][ePrint]Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations, by Guang Gong and Mark Aagaard and Xinxin Fan[ expand ]
13:17 [Pub][ePrint]Integrated PKE and PEKS - Stronger Security Notions and New Constructions , by Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin[ expand ]
13:17 [Pub][ePrint]Root Optimization of Polynomials in the Number Field Sieve, by Shi Bai and Richard P. Brent and Emmanuel Thom\\\'e[ expand ]
13:17 [Pub][ePrint]The Weakness of Integrity Protection for LTE, by Teng Wu and Guang Gong[ expand ]
13:17 [Pub][ePrint]Cryptography Using CAPTCHA Puzzles, by Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia[ expand ]
13:17 [Pub][ePrint]A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem, by Jintai Ding[ expand ]


2012-12-08
22:30 [Job][New]Postdoctoral Research Fellow, Queensland University of Technology, Brisbane, Australia[ expand ]



2012-12-07
10:05 [Event][New]CTCrypt 2013: 2nd Workshop on Current Trends in Cryptology[ expand ]


2012-12-06
15:56 [Job][New]Two Ph.D. studentships, Royal Holloway, University of London, UK[ expand ]
15:56 [Job][New]Post-Doc in Security and Privacy, Technische Universität Darmstadt, Germany[ expand ]


2012-12-05
05:53 [Event][New]ACISP 2013: 18th Australasian Conference on Information Security and Privacy[ expand ]
05:52 [Job][Update]Assistant Professor, Sejong University, Seoul, South Korea[ expand ]
05:50 [Job][New]Assistant Professor, Sejong University, Seoul, South Korea[ expand ]


2012-12-04
09:14 [Job][New]Assistant Professor, Florida Atlantic University[ expand ]



2012-12-01
01:17 [Pub][ePrint]Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output, by Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall[ expand ]


2012-11-30
16:17 [Pub][ePrint]What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher, by Jialin Huang and Xuejia Lai[ expand ]
16:17 [Pub][ePrint]Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan, by Julia Borghoff[ expand ]
16:17 [Pub][ePrint]Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA, by Yoshinori Aono[ expand ]
16:17 [Pub][ePrint]Lecture Notes in Secret Sharing, by Carles Padro[ expand ]


2012-11-29
10:17 [Pub][ePrint]Robust Encryption, Revisited, by Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia[ expand ]
08:12 [Event][New]TAEECE2013: Intl Con: Technological Advances in Electrical, Electronics & Computer Eng.[ expand ]


2012-11-28
19:17 [Pub][ePrint]Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption, by Zhen Liu and Zhenfu Cao and Duncan S. Wong[ expand ]
19:17 [Pub][ePrint]Construction of Differential Characteristics in ARX Designs -- Application to Skein, by Gaetan Leurent[ expand ]
19:17 [Pub][ePrint]False Negative probabilities in Tardos codes, by Antonino Simone and Boris Skoric[ expand ]
19:17 [Pub][ePrint]Estimating the $\\phi(n)$ of Upper/Lower Bound in its RSA Cryptosystem, by Rock C. Liu and Zhiwi Yeh[ expand ]
19:17 [Pub][ePrint]Uniform Compression Functions Can Fail to Preserve \"Full\" Entropy, by Daniel R. L. Brown[ expand ]
19:17 [Pub][ePrint]PRE- Stronger Security Notion and Efficient Construction with New Property, by Jiang Zhang \\and Zhenfeng Zhang \\and Yu Chen[ expand ]
19:17 [Pub][ePrint]Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?, by Alexander Rostovtsev[ expand ]
19:17 [Pub][ePrint]Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3, by Itai Dinur and Orr Dunkelman and Adi Shamir[ expand ]
19:17 [Pub][ePrint]Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, by Tatsuaki Okamoto and Katsuyuki Takashima[ expand ]
19:17 [Pub][ePrint]Two is Greater than One, by Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter[ expand ]



2012-11-27
14:09 [Job][New]Ph.D. / M.Sc. and Summer Internship, Cryptography, Security, and Privacy Research Group, Koç University, Turkey[ expand ]


2012-11-26
13:40 [Event][New]CASE-13: 1st International workshop on Cloud Computing Applications and SEcurity[ expand ]
06:58 [Job][New]Two Ph.D. Positions in Lightweight Cryptography for the Internet of Things, University of Luxembourg[ expand ]
06:58 [Job][New]Post-Doc, Ben-Gurion University of the Negev, Israel[ expand ]
04:17 [Pub][ePrint]Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks, by Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpz[ expand ]
04:17 [Pub][ePrint]Digital Signatures with Minimal Overhead, by Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy[ expand ]
04:17 [Pub][ePrint]Fixed Argument Pairing Inversion on Elliptic Curves, by Sungwook Kim and Jung Hee Cheon[ expand ]
04:17 [Pub][ePrint]Asynchronous Physical Unclonable Functions - AsyncPUF, by Julian Murphy[ expand ]
04:17 [Pub][ePrint]Breaking Another Quasigroup-Based Cryptographic Scheme, by Markus Dichtl and Pascale B\\\"offgen[ expand ]
04:17 [Pub][ePrint]Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm, by Munivel E and Rajeswari Mukesh[ expand ]


2012-11-22
01:17 [Pub][JoC]Concurrent Zero Knowledge, Revisited[ expand ]


2012-11-21
19:17 [Pub][ePrint]Privacy Preserving Revocable Predicate Encryption Revisited, by Kwangsu Lee and Intae Kim and Seong Oun Hwang[ expand ]
19:17 [Pub][ePrint]Refine the Concept of Public Key Encryption with Delegated Search, by Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma[ expand ]
19:17 [Pub][ePrint]How powerful are the DDH hard groups?, by Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis[ expand ]
19:17 [Pub][ePrint]Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma, by Vipul Goyal and Omkant Pandey and Amit Sahai[ expand ]
19:17 [Pub][ePrint]TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems, by Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren[ expand ]
19:17 [Pub][ePrint]Formal analysis of privacy in Direct Anonymous Attestation schemes, by Ben Smyth and Mark D. Ryan and Liqun Chen[ expand ]
19:17 [Pub][ePrint]Security Evaluation of Rakaposhi Stream Cipher, by Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld[ expand ]
16:17 [Pub][ePrint]Search in Encrypted Data: Theoretical Models and Practical Applications, by Qiang Tang[ expand ]
16:17 [Pub][ePrint]A Measure of Security for Ideal Functions, by Daniel Smith-Tone and Cristina Tone[ expand ]
16:17 [Pub][ePrint]Galindo-Garcia Identity-Based Signature Revisited, by Sanjit Chatterjee and Chethan Kamath and Vikas Kumar[ expand ]
16:17 [Pub][ePrint]A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption , by Yannick Seurin and Joana Treger[ expand ]
15:41 [Event][New]RCD-2013: Romanian Cryptology Days, RCD-2013[ expand ]
10:28 [Event][New]DBSec: 27th IFIP WG 11.3 Working Conference on Data and Application and Privacy[ expand ]



2012-11-20
14:47 [Job][New]Post Doc, DFG Research Training Group UbiCrypt, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]
13:17 [Pub][ePrint]Protocols for Multiparty Coin Toss With Dishonest Majority, by Amos Beimel and Eran Omri and Ilan Orlov[ expand ]
13:17 [Pub][ePrint]Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes, by Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering[ expand ]
13:17 [Pub][ePrint]Impossibility Results for Indifferentiability with Resets, by Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel[ expand ]


2012-11-19
13:41 [Job][New]PHD Studentship, University of Bristol, United Kingdom of Great Britain and Northern Ireland[ expand ]
13:32 [Event][New]AsiaARES 2013: The 2013 Asian Conference on Availability, Reliability and Security[ expand ]
13:32 [Event][New]SECRYPT: 10th International Conference on Security and Cryptography (SECRYPT 2013)[ expand ]


2012-11-14
09:55 [Job][New]PhD , University of Luxembourg[ expand ]
09:55 [Job][New]Ph.D. student, DFG Research Training Group UbiCrypt, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany[ expand ]
06:25 [Job][New]Ph.D. student or Post-Doc, Bar-Ilan University, Israel[ expand ]
06:24 [Event][New]DICTAP2013: The Third International Conference on Digital Information and Communication[ expand ]


2012-11-12
12:36 [Job][New]Postdoc, Karlsruhe Institute of Technology, Germany[ expand ]



2012-11-11
19:17 [Pub][ePrint]Secure Outsourced Attribute-based Encryption, by Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong[ expand ]
19:17 [Pub][ePrint]Cryptanalysis of Double-Block-Length Hash Mode MJH, by Deukjo Hong and Daesung Kwon[ expand ]
19:17 [Pub][ePrint]New Preimage Attack on MDC-4, by Deukjo Hong and Daesung Kwon[ expand ]
19:17 [Pub][ePrint]Pairings on Generalized Huff Curves, by Abdoul Aziz Ciss and Djiby Sow[ expand ]
19:17 [Pub][ePrint]Message-Locked Encryption and Secure Deduplication, by Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart[ expand ]
19:17 [Pub][ePrint]Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits, by Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart[ expand ]
19:17 [Pub][ePrint]A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure, by Bin Wang[ expand ]
19:17 [Pub][ePrint]Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function, by Gaoli Wang and Yanzhao Shen[ expand ]
19:17 [Pub][ePrint]Coarse-grained integer - Smooth? Rough? Both!, by Daniel Loebenberger and Michael Nüsken[ expand ]
19:17 [Pub][ePrint]Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme, by Cai-xue Zhou[ expand ]
19:17 [Pub][ePrint]Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification, by Aviad Kipnis and Eliphaz Hibshoosh[ expand ]
19:17 [Pub][ePrint]On the Complexity of the BKW Algorithm on LWE, by Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret[ expand ]


2012-11-08
19:10 [Event][New]ProvSec 2013: The Seventh International Conference on Provable Security[ expand ]
16:17 [Pub][ePrint]SCAPI: The Secure Computation Application Programming Interface, by Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell[ expand ]
16:17 [Pub][ePrint]Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems, by Muhammad Yasir Malik[ expand ]
16:17 [Pub][ePrint]Efficient Group Signatures in the Standard Model, by Laila el Aimani and Olivier Sanders[ expand ]
16:17 [Pub][ePrint]Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis, by Xi Xiong and Haining Fan[ expand ]
16:17 [Pub][ePrint]On the Security of TLS Renegotiation, by Florian Giesen and Florian Kohlar and Douglas Stebila[ expand ]


2012-11-07
14:54 [Event][New]TRUST '13: 6th International Conference on Trust & Trustworthy Computing[ expand ]
12:29 [Event][New]CSF'13: 2013 IEEE 26th Computer Security Foundations Symposium[ expand ]


2012-11-06
15:57 [Event][New]CBC2013: Fourth Code-based Cryptography Workshop 2013[ expand ]
04:17 [Pub][JoC]Fully Leakage-Resilient Signatures[ expand ]



2012-11-05
16:17 [Pub][ePrint]Resolving the conflict between generality and plausibility in verified computation, by Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish[ expand ]
16:17 [Pub][ePrint]Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED, by Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong[ expand ]
16:17 [Pub][ePrint]Solving Subset Sum Problems of Densioty close to 1 by \"randomized\" BKZ-reduction, by Claus P. Schnorr and Taras Shevchenko[ expand ]
16:17 [Pub][ePrint]Asynchronous Computational VSS with Reduced Communication Complexity, by Michael Backes and Amit Datta and Aniket Kate[ expand ]
16:17 [Pub][ePrint]Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, by Alexandra Boldyreva and Nathan Chenette and Adam O\'Neill[ expand ]
16:17 [Pub][ePrint]Order-Preserving Symmetric Encryption, by Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O\'Neill[ expand ]
16:17 [Pub][ePrint]{Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, by David McGrew[ expand ]
07:15 [Election]Independent verifier[ expand ]


2012-11-02
17:54 [Job][Update]Cryptography Engineer/Cryptography Scientist, Mile 20 Recruiting, LLC, in Bethesda, MD/USA[ expand ]
12:09 [PhD][New]Shi Bai: Polynomial selection for the number field sieve[ expand ]
12:08 [PhD][New]Richard Brent[ expand ]
12:06 [PhD][New]Flavio D. Garcia: Formal and Computational Cryptography: Protocols, Hashes and Commitments[ expand ]
12:06 [PhD][New]Jaap-Henk Hoepman[ expand ]
12:06 [PhD][New]Bart Jacobs[ expand ]
12:05 [PhD][New]Christophe Clavier[ expand ]
12:05 [PhD][New]Hans Dobbertin: Verfeinerungsmonoide, Vaught Monoide und Boolesche Algebren[ expand ]
12:04 [PhD][New]Benoit Feix[ expand ]
12:03 [PhD][New]Pouyan Sepehrdad: Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives[ expand ]
12:03 [PhD][New]Vincent Verneuil: Elliptic curve cryptography and security of embedded devices[ expand ]
12:03 [PhD][New]Joern-Marc Schmidt: Implementation Attacks - Manipulating Devices to Reveal Their Secrets[ expand ]
12:00 [PhD][New]Karim Belabas[ expand ]
11:59 [PhD][New]Marc Stevens: Attacks on Hash Functions and Applications[ expand ]
11:59 [PhD][New]Benne de Weger[ expand ]
11:57 [PhD][New]Ronald Cramer[ expand ]
11:56 [PhD][New]Eike Kiltz: Complexity Theoretic Lower Bounds on Cryptographic Functions[ expand ]
06:48 [Job][New]Cryptography Engineer/Cryptography Scientist, Mile 20 Recruiting, LLC, USA[ expand ]


2012-11-01
18:17 [Pub][ePrint]A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage, by Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay[ expand ]
18:17 [Pub][ePrint]Towards fully collusion-resistant ID-based establishment of pairwise keys, by Oscar Garcia Morchon and Ludo Tolhuizen and Domingo Gomez and Jaime Gutierrez[ expand ]
18:17 [Pub][ePrint]Security Analysis of an Open Car Immobilizer Protocol Stack, by Stefan Tillich and Marcin W\\\'{o}jcik[ expand ]
18:17 [Pub][ePrint]Hardness Preserving Constructions of Pseudorandom Functions, Revisited, by Nishanth Chandran and Sanjam Garg[ expand ]
18:17 [Pub][ePrint]Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols, by Boaz Tsaban[ expand ]
18:17 [Pub][ePrint]An arithmetic intersection formula for denominators of Igusa class polynomials, by Kristin Lauter and Bianca Viray[ expand ]
18:17 [Pub][ePrint]Resource-Restricted Indifferentiability, by Grégory Demay and Peter Gazi and Martin Hirt and Ueli Maurer[ expand ]
18:17 [Pub][ePrint]Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff, by Byoung-il Kim and Jin Hong[ expand ]


2012-10-31
10:21 [Event][New]SPW 2013: Twenty-first International Workshop on Security Protocols[ expand ]



2012-10-30
00:17 [Pub][JoC]FlipIt: The Game of “Stealthy Takeover”[ expand ]


2012-10-29
15:17 [Pub][ePrint]On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting, by Marina Blanton and Mehrdad Aliasgari[ expand ]
15:17 [Pub][ePrint]Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials\'\' Problem, by Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber[ expand ]
15:17 [Pub][ePrint]Quantum-Secure Message Authentication Codes, by Dan Boneh and Mark Zhandry[ expand ]
15:17 [Pub][ePrint]Candidate Multilinear Maps from Ideal Lattices and Applications, by Sanjam Garg and Craig Gentry and Shai Halevi[ expand ]
15:17 [Pub][ePrint]A New Approach to Discrete Logarithm Problem with Auxiliary Inputs, by Taechan Kim and Jung Hee Cheon[ expand ]
08:26 [Event][New]ISCTURKEY: International Conference on Information Security and Cryptology[ expand ]
08:25 [Event][New]ICIA2013: The Second International Conference on Informatics & Applications[ expand ]


2012-10-27
00:17 [Pub][JoC]A One-Time Stegosystem and Applications to Efficient Covert Communication[ expand ]


2012-10-26
15:17 [Pub][ePrint]Secure Outsourced Attribute-Based Signatures, by Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo[ expand ]



2012-10-25
15:17 [Pub][ePrint]Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps, by Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani[ expand ]
15:17 [Pub][ePrint]Attribute-Based Encryption for Circuits from Multilinear Maps, by Amit sahai and Brent Waters[ expand ]
15:17 [Pub][ePrint]Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers, by Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel[ expand ]
15:17 [Pub][ePrint]An Efficient Three-Party Authenticated Key Exchange Protocol for Mobile-Commerce Environments Using Elliptic Curve Cryptography, by Nishant Doshi[ expand ]
15:17 [Pub][ePrint]A Novel Approach for RSA-based Certificateless Signature Scheme, by Nishant Doshi[ expand ]
15:17 [Pub][ePrint]Breaking Public Keys - How to Determine an Unknown RSA Public Modulus, by Hans-Joachim Knobloch[ expand ]
15:17 [Pub][ePrint]The LED Block Cipher, by Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw[ expand ]
15:17 [Pub][ePrint]Some observations to speed the polynomial selection in the number field sieve, by Min Yang, Qingshu Meng, Zhangyi Wang, Huanguo Zhang[ expand ]
15:17 [Pub][ePrint]Taking proof-based verified computation a few steps closer to practicality (extended version), by Srinath Setty and Victor Vu and Benjamin Braun and Andrew J. Blumberg and Michael Walfish[ expand ]
15:17 [Pub][ePrint]A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA, by Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj[ expand ]
15:17 [Pub][ePrint]Evaluating User Privacy in Bitcoin, by Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun[ expand ]
15:17 [Pub][ePrint]Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes, by Oriol Farras and Carles Padro[ expand ]
15:17 [Pub][ePrint]Improved Impossible Differential Attack on Reduced Version of Camellia-192/256, by Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li[ expand ]
15:17 [Pub][ePrint]Leakage-Resilient Cryptography from Minimal Assumptions, by Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Collecting Data while Preserving Individuals\' Privacy: A Case Study, by Alexis Bonnecaze and Robert Rolland[ expand ]
15:17 [Pub][ePrint]A note on invariant linear transformations in multivariate public key cryptography, by Andreas Wiemers[ expand ]
15:17 [Pub][ePrint]How to Garble RAM Programs, by Steve Lu and Rafail Ostrovsky[ expand ]


2012-10-23
12:35 [Event][New]ICT-EurAsia 2013: Information Communication Technology-Eurasia Conference 2013[ expand ]
05:41 [Job][New]Senior Cryptographic Systems Engineer - 35824 - , Raytheon, Goleta, CA, US[ expand ]


2012-10-22
06:15 [Event][New]FSE 2010: The 17th International Workshop on Fast Software Encryption[ expand ]


2012-10-20
19:12 [Job][New]Postdoctoral Researcher, Department of Computer Science, University of Helsinki[ expand ]



2012-10-18
00:17 [Pub][JoC]A Note on Constant-Round Zero-Knowledge Proofs of Knowledge[ expand ]


2012-10-16
18:17 [Pub][ePrint]Symbolic computation in block cipher with application to PRESENT, by Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang[ expand ]
15:17 [Pub][ePrint]Nanoelectronic Solutions for Hardware Security, by Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki[ expand ]
15:17 [Pub][ePrint]New Constructions and Proof Methods for Large Universe Attribute-Based Encryption, by Yannis Rouselakis and Brent Waters[ expand ]
15:17 [Pub][ePrint]Using Randomizers for Batch Verification of ECDSA Signatures, by Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury[ expand ]
15:17 [Pub][ePrint]On the security of two smart-card-based remote user authentication schemes for WSN, by Ding Wang and Chun-guang Ma[ expand ]
15:17 [Pub][ePrint]Cryptanalysis of the OKH Authenticated Encryption Scheme, by Peng Wang and Wenling Wu and Liting Zhang[ expand ]
15:17 [Pub][ePrint]Defending Against the Unknown Enemy: Applying FlipIt to System Security, by Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandop[ expand ]
15:17 [Pub][ePrint]Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? , by Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert[ expand ]
15:17 [Pub][ePrint]A Framework for Unique Ring Signatures, by Matthew Franklin and Haibin Zhang[ expand ]
15:17 [Pub][ePrint]Concurrent Signatures without Random Oracles, by Xiao Tan and Qiong Huang and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]SHADE: Secure HAmming DistancE computation from oblivious transfer, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
15:17 [Pub][ePrint]ON PROVABLY SECURE CODE-BASED SIGNATURE AND SIGNCRYPTION SCHEME, by Preetha Mathew K and Sachin Vasant and C Pandu Rangan[ expand ]
15:17 [Pub][ePrint]Quantitative Analysis of the Full Bitcoin Transaction Graph, by Dorit Ron and Adi Shamir[ expand ]
05:35 [Event][New]ICEND 2013: 2nd International Conference on e-Technologies and Networks for Development[ expand ]


2012-10-15
19:49 [Event][New]Africacrypt 2013[ expand ]
02:41 [Event][New]NSS 2013: The 7th International Conference on Network and System Security (NSS 2013)[ expand ]
02:41 [Event][New]ICICS 2013: The 4th International Conference on Information and Communication Systems[ expand ]


2012-10-14
15:17 [Pub][ePrint]On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption, by Divya Gupta and Amit Sahai[ expand ]
15:17 [Pub][ePrint]Improved side channel attack on the block cipher NOEKEON, by Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang[ expand ]
15:17 [Pub][ePrint]Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock , by Hadi Soleimany[ expand ]
15:17 [Pub][ePrint]Quantum algorithm for the discrete logarithm problem for matrices over finite group rings, by A. D. Myasnikov and A. Ushakov[ expand ]
15:17 [Pub][ePrint]On the Power of Random Oracles, by Iftach Haitner and Eran Omri and Hila Zarosim[ expand ]



2012-10-07
21:17 [Pub][ePrint]Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications, by San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang[ expand ]
21:17 [Pub][ePrint]On Transaction Pseudonyms with Implicit Attributes, by Stefan G. Weber[ expand ]
21:17 [Pub][ePrint]Leakage Squeezing of Order Two, by Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi[ expand ]
21:17 [Pub][ePrint]Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes, by Joep de Groot and Boris Skoric and Niels de Vreede and Jean-Paul Linnartz[ expand ]
21:17 [Pub][ePrint]Packed Ciphertexts in LWE-based Homomorphic Encryption, by Zvika Brakerski and Craig Gentry and Shai Halevi[ expand ]
21:17 [Pub][ePrint]Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing, by Mihir Bellare and Viet Tung Hoang and Phillip Rogaway[ expand ]
21:17 [Pub][ePrint]Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions, by Kai-Min Chung and Huijia Lin and Rafael Pass[ expand ]


2012-10-04
20:25 [Event][New]HOST: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST[ expand ]


2012-10-03
17:11 [News]SHA-3 Winner: Keccak[ expand ]
14:53 [Event][New]LightSec 2013: International Workshop on Lightweight Cryptography for Security & Privacy[ expand ]


2012-10-02
15:17 [Pub][ePrint]Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
15:17 [Pub][ePrint]An Attack on a Fully Homomorphic Encryption Scheme, by Hu Yupu, Wang Fenghe[ expand ]
14:26 [Job][New]Postdoc, EPFL, Lausanne, Switzerland[ expand ]
14:26 [Job][New]PhD student, EPFL, Lausanne, Switzerland[ expand ]
09:05 [Event][New]ECRYPT II AES Day[ expand ]
07:01 [Job][Update]Tenure track Assistant Professor, Digital Security, Radboud University Nijmegen[ expand ]
05:35 [Job][New]Post-doctoral Researcher, Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK[ expand ]
05:35 [Job][New]Faculty Members, Indian Statistical Institute, Kolkata[ expand ]



2012-09-30
03:17 [Pub][ePrint]Computational Soundness of Coinductive Symbolic Security under Active Attacks, by Mohammad Hajiabadi, Bruce M. Kapron[ expand ]
03:17 [Pub][ePrint]Plaintext Awareness in Identity-Based Key Encapsulation, by Mark Manulis and Bertram Poettering and Douglas Stebila[ expand ]
03:17 [Pub][ePrint]Domain-Specific Pseudonymous Signatures for the German Identity Card, by Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler[ expand ]
03:17 [Pub][ePrint]PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version), by Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rozic, Ahmad-Reza Sadeg[ expand ]


2012-09-28
05:29 [Election]List of Candidates[ expand ]


2012-09-27
15:17 [Pub][ePrint]Resource-based Corruptions and the Combinatorics of Hidden Diversity, by Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung[ expand ]
15:17 [Pub][ePrint]New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation, by Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Am[ expand ]
15:17 [Pub][ePrint]Security weakness in the Proof of Storage with Deduplication, by Youngjoo Shin, Junbeom Hur, Kwangjo Kim[ expand ]
15:17 [Pub][ePrint]Bellcore attack in practice, by Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos[ expand ]
15:17 [Pub][ePrint]Provably Secure Concurrent Error Detection Against Differential Fault Analysis, by Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri[ expand ]


2012-09-26
05:31 [Event][New]CCH: 14th Cryptologic History Symposium[ expand ]
05:12 [Job][New]Senior Principal Engineer- Secure Hardware Design , Cryptography Research Inc. (CRI) San Francisco, California[ expand ]
05:12 [Job][New]Senior Member Technical Staff II-Security Engineering, Cryptography Research Inc. (CRI) San Francisco,California[ expand ]



2012-09-24
06:17 [Pub][ePrint]Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists, by Liangze Li and Hongfeng Wu and Fan Zhang[ expand ]


2012-09-22
15:17 [Pub][ePrint]Rotational cryptanalysis of round-reduced Keccak, by Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny[ expand ]
15:17 [Pub][ePrint]Dynamic Proofs of Retrievability via Oblivious RAM, by David Cash and Alptekin Kupcu and Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Faster batch forgery identification, by Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk[ expand ]
15:17 [Pub][ePrint]New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments, by Helger Lipmaa and Bingsheng Zhang[ expand ]
15:17 [Pub][ePrint]Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity, by Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta[ expand ]


2012-09-20
12:17 [Pub][ePrint]Enhanced Chosen-Ciphertext Security and Applications, by Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O\'Neill[ expand ]
12:17 [Pub][ePrint]Salus: A System for Server-Aided Secure Function Evaluation, by Seny Kamara and Payman Mohassel and Ben Riva[ expand ]
12:17 [Pub][ePrint]2048XKS - A Software Oriented High Security Block Cipher, by Dieter Schmidt[ expand ]
12:17 [Pub][ePrint]A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms, by Ga Won Lee and Jin Hong[ expand ]
12:17 [Pub][ePrint]Efficient Implementation of RSA Algorithm with MKE, by Sami A. Nagar and Dr. Saad Alshamma[ expand ]
12:17 [Pub][ePrint]Private Top-k Aggregation Protocols, by Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim[ expand ]
12:17 [Pub][ePrint]A Versatile Multi-Input Multiplier over Finite Fields, by Haibo Yi, Shaohua Tang[ expand ]
12:17 [Pub][ePrint]Differential Analysis of the LED Block Cipher, by Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici[ expand ]
09:17 [Pub][ePrint]A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Gr{\\o}stl, by Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki[ expand ]
09:17 [Pub][ePrint]A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes, by Maura B. Paterson and Douglas R. Stinson[ expand ]
09:17 [Pub][ePrint]Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems, by Thijs Laarhoven and Joop van de Pol and Benne de Weger[ expand ]
09:17 [Pub][ePrint]Pairing computation on Edwards curves with high-degree twists, by Liangze Li and Hongfeng Wu and Fan Zhang[ expand ]
09:17 [Pub][ePrint]Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens, by Özgür Dagdelen and Marc Fischlin[ expand ]
09:17 [Pub][ePrint]Secret Sharing and Secure Computing from Monotone Formulae, by Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen[ expand ]
06:59 [Event][New]DIMACS Workshop on Information-Theoretic Network Security[ expand ]
06:59 [Event][New]3rd Bar-Ilan Winter School on Crypto: Bilinear Pairings in Cryptography[ expand ]
06:58 [Job][New]two PhD positions, University of Luxembourg[ expand ]
06:57 [Job][New]Tenure track Assistant Professor, Digital Security, Radboud University Nijmegen[ expand ]


2012-09-15
00:17 [Pub][JoC]Enhancements of Trapdoor Permutations[ expand ]



2012-09-12
21:47 [Election]Nomination now open[ expand ]


2012-09-11
16:48 [Event][New]MCCCC26: 26th Midwest Conference on Combinatorics, Cryptography and Computing[ expand ]
16:47 [Event][New]JSC: Journal of Symbolic Computation[ expand ]
16:46 [Event][New]ICIEIS2013: The Second International Conference on Informatics Engineering & Informatio[ expand ]
16:45 [Job][New]Post-Doc in Security and Privacy, Saarland University, Germany[ expand ]
16:45 [Job][New]PhD Studentship in Zero-Knowledge Proofs, University College London, United Kingdom[ expand ]


2012-09-10
00:17 [Pub][JoC]An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers[ expand ]


2012-09-08
15:17 [Pub][ePrint]Dynamic Searchable Symmetric Encryption, by Seny Kamara and Charalampos Papamanthou and Tom Roeder[ expand ]
15:17 [Pub][ePrint]PRINCE- A Low-latency Block Cipher for Pervasive Computing Applications (Full version), by Julia Borghoff and Anne Canteaut and Tim G\\\"{u}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R.[ expand ]
15:17 [Pub][ePrint]An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption, by Graham Enos and Yuliang Zheng[ expand ]
15:17 [Pub][ePrint]Generic Construction of Trace and Revoke Schemes, by Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydın Selcuk[ expand ]
11:15 [Job][New]Professor in IT Security / Cloud Security, Graz University of Technology, IAIK[ expand ]
11:14 [Event][New]Crypto: 34th Annual Cryptology Conference[ expand ]



2012-09-07
21:17 [Pub][ePrint]Cryptanalysis of a recent two factor authentication scheme , by Michael Scott[ expand ]
21:17 [Pub][ePrint]Invertible Polynomial Representation for Private Set Operations, by Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon[ expand ]
21:17 [Pub][ePrint]Computing endomorphism rings of abelian varieties of dimension two , by Gaetan Bisson[ expand ]
18:17 [Pub][ePrint]Tahoe - The Least-Authority Filesystem, by Zooko Wilcox-O\'Hearn and Brian Warner[ expand ]


2012-09-06
18:17 [Pub][ePrint]Functional Encryption with Bounded Collusions via Multi-Party Computation, by Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
18:17 [Pub][ePrint]Optimizing Segment Based Document Protection (Corrected Version), by Miroslaw Kutylowski and Maciej Gebala[ expand ]
18:17 [Pub][ePrint]The Curious Case of Non-Interactive Commitments, by Mohammad Mahmoody and Rafael Pass[ expand ]
18:17 [Pub][ePrint]False Positive probabilities in q-ary Tardos codes: comparison of attacks, by A. Simone and B. Skoric[ expand ]
12:51 [Job][New]TENURE-TRACK OR TENURED POSITION , Aalto University School of Science, Helsinki, Finland[ expand ]
12:51 [Job][New]PhD + job in industry, Université Paris 1 Panthéon-Sorbonne[ expand ]
12:51 [Job][New]PhD + job in industry, Université Paris 7[ expand ]
12:50 [Job][New]Ph.D. student + an industrial job., Université Paris 1, Panthéon-Sorbonne.[ expand ]
12:50 [Job][New]Research Associate in Zero-Knowledge Proofs, University College London[ expand ]
09:17 [Pub][JoC]Compact Proofs of Retrievability[ expand ]
08:12 [Job][New]Ph.D. position, Research Group Cryptographic Algorithms, Saarland University, Germany[ expand ]


2012-09-05
18:17 [Pub][ePrint]Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition, by Mihir Bellare and Adam O\'Neill[ expand ]
18:17 [Pub][ePrint]RKA Security beyond the Linear Barrier, by Mihir Bellare and Kenneth G. Paterson and Susan Thomson[ expand ]
18:17 [Pub][ePrint]Faster implementation of scalar multiplication on Koblitz curves, by Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez[ expand ]
18:17 [Pub][ePrint]Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, by Kwangsu Lee and Dong Hoon Lee and Moti Yung[ expand ]
18:17 [Pub][ePrint]Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity, by Ashish Choudhury and Martin Hirt and Arpita Patra[ expand ]
18:17 [Pub][ePrint]Garbling XOR Gates ``For Free\'\' in the Standard Model, by Benny Applebaum[ expand ]
06:10 [Job][New]Research Scientist / Senior Research Scientist, Palo Alto Research Center (PARC, a Xerox Company)[ expand ]
06:10 [Job][New]Lecturer or Senior Lecturer, University of Cape Town, South Africa[ expand ]


2012-09-04
00:07 [News]Videos from Crypto 2012[ expand ]



2012-09-03
15:17 [Pub][ePrint]Efficient Query Integrity for Outsourced Dynamic Databases, by Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese[ expand ]
15:17 [Pub][ePrint]A Method for Generating Full Cycles by a Composition of NLFSRs, by Elena Dubrova[ expand ]
15:17 [Pub][ePrint]On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown, by Lidong Han and Wei Wei and Mingjie Liu[ expand ]
15:17 [Pub][ePrint]Desynchronization Attack on RAPP Ultralightweight Authentication Protocol, by Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref[ expand ]
15:17 [Pub][ePrint]On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation, by Meicheng Liu and Yin Zhang and Dongdai Lin[ expand ]
15:17 [Pub][ePrint]The low-call diet: Authenticated Encryption for call counting HSM users, by Mike Bond and George French and Nigel P. Smart and Gaven J. Watson[ expand ]
15:17 [Pub][ePrint]Updating attribute in CP-ABE: A New Approach, by Nishant Doshi and Devesh Jinwala[ expand ]
15:17 [Pub][ePrint]\"Metaproofs\" (and their Cryptographic Applications), by Alfredo De Santis and Moti Yung[ expand ]
15:17 [Pub][ePrint]Format-Transforming Encryption: More than Meets the DPI, by Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton[ expand ]
15:17 [Pub][ePrint]Scalable Deniable Group Key Establishment, by Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona[ expand ]
15:17 [Pub][ePrint]Hierarchical Identity-Based (Lossy) Trapdoor Functions, by Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols[ expand ]
15:17 [Pub][ePrint]Are We Compromised? Modelling Security Assessment Games, by Viet Pham and Carlos Cid[ expand ]
15:17 [Pub][ePrint]Privacy Amplification with Asymptotically Optimal Entropy Loss, by Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin[ expand ]
15:17 [Pub][ePrint]Constant Ciphertext Length in CP-ABE, by Nishant Doshi and Devesh Jinwala[ expand ]
15:17 [Pub][ePrint]Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey, by Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann[ expand ]
15:17 [Pub][ePrint]Entangled Cloud Storage, by Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi[ expand ]
15:17 [Pub][ePrint]Enabling 3-share Threshold Implementations for any 4-bit S-box, by Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann[ expand ]
15:17 [Pub][ePrint]On 3-share Threshold Implementations for 4-bit S-boxes, by Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang[ expand ]
15:17 [Pub][ePrint]On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs, by Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung[ expand ]
15:17 [Pub][ePrint]Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, by Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefa[ expand ]
15:17 [Pub][ePrint]Succinct Malleable NIZKs and an Application to Compact Shuffles, by Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn[ expand ]
15:17 [Pub][ePrint]On pseudorandomization of information-theoretically secure schemes without hardness assumptions, by Koji Nuida[ expand ]
15:17 [Pub][ePrint]Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems, by Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes[ expand ]
15:17 [Pub][ePrint]Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model, by Ivan Damgard and Sarah Zakarias[ expand ]


2012-09-02
00:59 [Event][New]ICISC 2012: The International Conference on Information Security and Cryptology[ expand ]


2012-08-27
14:07 [Event][New]-: Crypto 2013[ expand ]


2012-08-26
10:36 [Job][New]Security Software Developer, escrypt Inc.[ expand ]



2012-08-24
23:03 [News]IACR BibTeX file available[ expand ]


2012-08-23
11:08 [Job][New]Ph.D. student, University of Trier, Germany[ expand ]
11:08 [Job][New]Assistant Professor, Kanazawa University, Japan[ expand ]
11:08 [Job][New]Faculty position (Professur, W2) , Saarland University, Center for IT-Security, Privacy and Accountability[ expand ]
11:08 [Job][New]PhD student, University of Luxembourg[ expand ]
11:07 [Event][New]Workshop on Real-World Cryptography[ expand ]
11:07 [Event][New]WCC 2013: International Workshop on Coding and Cryptography[ expand ]
11:06 [Event][New]ANTE: Annals of Telecommunications: Special Issue on: Privacy-aware electronic so[ expand ]
00:17 [Pub][ePrint]Computational Soundness without Protocol Restrictions, by Michael Backes and Ankit Malik and Dominique Unruh[ expand ]
00:17 [Pub][ePrint]Exploiting Collisions in Addition Chain-based Exponentiation Algorithms, by Neil Hanley and HeeSeok Kim and Michael Tunstall[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture, by Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui[ expand ]
00:17 [Pub][ePrint]Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols, by Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref[ expand ]
00:17 [Pub][ePrint]Designated Verifier Threshold Proxy Signature Scheme without Random Oracles, by Mohammad Beheshti-Atashgah \\and Majid Bayat \\and Mahmoud Gardeshi \\and Mohammad Reza Aref[ expand ]
00:17 [Pub][ePrint]Short communication: An interpretation of the Linux entropy estimator, by Benjamin Pousse[ expand ]


2012-08-22
00:17 [Pub][ePrint]Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance, by John Steinberger[ expand ]
00:17 [Pub][ePrint]Short Signatures From Diffie-Hellman: Realizing Short Public Key, by Jae Hong Seo[ expand ]
00:17 [Pub][ePrint]Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles, by Mohammad Reza Reyhanitabar and Willy Susilo[ expand ]
00:17 [Pub][ePrint]Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol, by Wang Qinglong, Xu Li[ expand ]
00:17 [Pub][ePrint]Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting, by Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean[ expand ]
00:17 [Pub][ePrint]A j-lanes tree hashing mode and j-lanes SHA-256, by Shay Gueron[ expand ]
00:17 [Pub][ePrint]An Efficient Signcryption Scheme from q-Diffie-Hellman Problems, by Jayaprakash Kar[ expand ]
00:17 [Pub][ePrint]Approaches for the Parallelization of Software Implementation of Integer Multiplication, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]


2012-08-20
00:17 [Pub][JoC]Polynomial Runtime and Composability[ expand ]



2012-08-19
17:48 [Conf][Crypto]CRYPTO 2012 on Facebook[ expand ]


2012-08-18
06:17 [Pub][ePrint]T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags, by Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva[ expand ]
06:17 [Pub][ePrint]Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming, by Carles Padro and Leonor Vazquez and An Yang[ expand ]
06:17 [Pub][ePrint]Semantically Secure Functional Encryption, Revisited, by Manuel Barbosa and Pooya Farshim[ expand ]
06:17 [Pub][ePrint]Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited, by Zhengan Huang and Shengli Liu and Baodong Qin[ expand ]
06:17 [Pub][ePrint]Glitches and Static Power Hand in Hand, by Amir Moradi and Oliver Mischke[ expand ]
06:17 [Pub][ePrint]A Quasigroup Based Random Number Generator for Resource Constrained Environments, by Matthew Battey and Abhishek Parakh[ expand ]
06:17 [Pub][ePrint]Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime, by Sorin Iftene[ expand ]
06:17 [Pub][ePrint]Perfect Keyword Privacy in PEKS Systems, by Mototsugu Nishioka[ expand ]
06:17 [Pub][ePrint]Functional Encryption: New Perspectives and Lower Bounds, by Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee[ expand ]
06:17 [Pub][ePrint]New results on nonexistence of generalized bent functions, by Yupeng Jiang and Yingpu Deng[ expand ]
06:17 [Pub][ePrint]Computational Entropy and Information Leakage, by Benjamin Fuller and Leonid Reyzin[ expand ]
06:17 [Pub][ePrint]Efficient Signatures of Knowledge and DAA in the Standard Model, by David Bernhard and Georg Fuchsbauer and Essam Ghadafi[ expand ]


2012-08-17
05:12 [Job][New]Assistant Professor in Cryptology and Information Security, JAIST, Japan[ expand ]


2012-08-16
20:55 [Event][New]HASP'12: Workshop on Hardware and Architectural Support for Security and Privac[ expand ]
07:59 [Event][New]IEEE ICIT 2013: Special Session on Security and Coding Aspects of Longrange RFID[ expand ]
07:59 [Event][New]ACSW-AISC: Australasian Information Security Conference[ expand ]
07:58 [Job][New]Post-doc, University of Auckland, New Zealand[ expand ]



2012-08-14
09:17 [Pub][ePrint]Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting, by Xiang Xie and Rui Xue and Rui Zhang[ expand ]
09:17 [Pub][ePrint]Perfect Ambiguous Optimistic Fair Exchange, by Yang Wang and Man Ho Au and Willy Susilo[ expand ]
09:17 [Pub][ePrint]Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits, by Nir Bitansky and Alessandro Chiesa[ expand ]


2012-08-13
15:17 [Pub][ePrint]Hush Functions Extended to Any Size Input versus Any Size Output, by Gideon Samid[ expand ]
15:17 [Pub][ePrint]Crowd-Blending Privacy, by Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass[ expand ]
15:17 [Pub][ePrint]Must you know the code of f to securely compute f?, by Mike Rosulek[ expand ]
15:17 [Pub][ePrint]A Probabilistic Quantum Key Transfer Protocol, by Abhishek Parakh[ expand ]
15:17 [Pub][ePrint]Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes, by Yohei Watanabe and Takenobu Seito and Junji Shikata[ expand ]
15:17 [Pub][ePrint]Barriers in Cryptography with Weak, Correlated and Leaky Sources, by Daniel Wichs[ expand ]
15:17 [Pub][ePrint]Computing small discrete logarithms faster, by Daniel J. Bernstein and Tanja Lange[ expand ]
12:17 [Pub][ePrint]New Leakage Resilient CCA-Secure Public Key Encryption, by Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong[ expand ]
12:17 [Pub][ePrint]EPiC: Efficient Privacy-Preserving Counting for MapReduce, by Erik-Oliver Blass and Guevara Noubir and Triet Vo Huu[ expand ]
07:37 [Event][New]TCC2013: The Tenth Theory of Cryptography Conference[ expand ]


2012-08-11
01:26 [Event][New]Qshine-2013: Heterogeneous Networking for Quality, Reliability, Security and Robustness[ expand ]


2012-08-09
16:00 [Job][New]Research Associate in Verifiable Internet Voting (M/F), University of Luxembourg [ expand ]
15:50 [Event][New]RISE'12: Workshop on Redefining and Integrating Security Engineering[ expand ]
15:49 [Event][New]PROOFS: Workshop on Security Proofs for Embedded Systems[ expand ]



2012-08-08
06:17 [Pub][ePrint]Stam\'s Conjecture and Threshold Phenomena in Collision Resistance, by John Steinberger, Xiaoming Sun, Zhe Yang[ expand ]


2012-08-07
21:17 [Pub][ePrint]Tweakable Blockciphers with Beyond Birthday-Bound Security, by Will Landecker and Thomas Shrimpton and R. Seth Terashima[ expand ]
21:17 [Pub][ePrint]Long Term Confidentiality: a Survey, by Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier[ expand ]
21:17 [Pub][ePrint]On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups, by Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt[ expand ]
07:14 [Conf][CHES]invited speakers announced [ expand ]


2012-08-06
15:17 [Pub][ePrint]Differential Fault Analysis of AES: Towards Reaching its Limits, by Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall[ expand ]
15:17 [Pub][ePrint]A note on \'An efficient certificateless aggregate signature with constant pairing computations\', by Debiao He, Miaomiao Tian[ expand ]
15:17 [Pub][ePrint]Factorization of a 1061-bit number by the Special Number Field Sieve, by Greg Childers[ expand ]
15:17 [Pub][ePrint]Improved CRT Algorithm for Class Polynomials in Genus 2, by Kristin Lauter and Damien Robert[ expand ]
15:17 [Pub][ePrint]Multi-receiver Homomorphic Authentication Codes for Network Coding, by Zhaohui Tang, and Hoon Wei Lim[ expand ]
05:51 [Conf][CHES]Early registration deadline Aug. 5[ expand ]


2012-08-05
18:38 [News]Wanted: Volunteers for Crypto (GC) and Websystem[ expand ]
18:17 [Pub][ePrint]Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem, by Ding Wang and Chun-guang Ma[ expand ]
18:17 [Pub][ePrint]Breaking and Repairing GCM Security Proofs, by Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu[ expand ]
18:17 [Pub][ePrint]Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption, by Amit Sahai and Hakan Seyalioglu and Brent Waters[ expand ]
18:17 [Pub][ePrint]Secure Database Commitments and Universal Arguments of Quasi Knowledge, by Melissa Chase and Ivan Visconti[ expand ]
18:17 [Pub][ePrint]Differential Privacy with Imperfect Randomness, by Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan[ expand ]
18:17 [Pub][ePrint]Group Signatures with Almost-for-free Revocation, by Benoit Libert and Thomas Peters and Moti Yung[ expand ]
18:17 [Pub][ePrint]Adaptively Secure Multi-Party Computation with Dishonest Majority, by Sanjam Garg and Amit Sahai[ expand ]
18:17 [Pub][ePrint]New Preimage Attacks Against Reduced SHA-1, by Simon Knellwolf and Dmitry Khovratovich[ expand ]
15:17 [Pub][ePrint]Rational authentication protocols and their use in financial transactions, by Long Hoang Nguyen[ expand ]
15:17 [Pub][ePrint]Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian, by Robert Drylo[ expand ]
15:17 [Pub][ePrint]A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes, by Ed Kendall and Michelle Kendall and Wilfrid S. Kendall[ expand ]
15:17 [Pub][ePrint]The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures, by Gautham Sekar[ expand ]
15:17 [Pub][ePrint]Scalable Group Signatures with Revocation, by Benoit Libert and Thomas Peters and Moti Yung[ expand ]
15:17 [Pub][ePrint]Programmable encryption and key-dependent messages, by Dominique Unruh[ expand ]
15:17 [Pub][ePrint]Biclique Cryptanalysis of TWINE, by Mustafa \\c{C}oban and Ferhat Karako\\c{c} and \\\"{O}zkan Bozta\\c{s}[ expand ]
15:17 [Pub][ePrint]Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, by Dario Fiore and Rosario Gennaro[ expand ]
15:17 [Pub][ePrint]Impossibility Results for Static Input Secure Computation, by Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti[ expand ]
15:17 [Pub][ePrint]TorScan: Tracing Long-lived Connections and Differential Scanning Attacks, by Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann[ expand ]
15:17 [Pub][ePrint]On the Security of Dynamic Group Signatures: Preventing Signature Hijacking, by Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta[ expand ]
15:17 [Pub][ePrint]A formal study of two physical countermeasures against side channel attacks, by Sébastien Briais and Sylvain Guilley and Jean-Luc Danger[ expand ]
15:17 [Pub][ePrint]Simple construction of epsilon-biased distribution, by Long Hoang Nguyen and Andrew William Roscoe[ expand ]



2012-08-03
08:32 [Event][New]COSADE: Constructive Side-Channel Analysis and Secure Design[ expand ]


2012-08-02
15:17 [Pub][ePrint]Security margin evaluation of SHA-3 contest finalists through SAT-based attacks, by Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny[ expand ]
15:17 [Pub][ePrint]A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers, by Denise Demirel and Jeroen van de Graaf[ expand ]


2012-08-01
06:17 [Pub][ePrint]Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials, by Yin Li and Gong-liang Chen and Xiao-ning Xie[ expand ]
06:17 [Pub][ePrint]DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems, by Kan Yang and Xiaohua Jia and Kui Ren[ expand ]
06:17 [Pub][ePrint]Weaknesses of an Improvement Authentication Scheme using , by Rafael Martínez-Peláez and Francisco Rico-Novella[ expand ]
06:17 [Pub][ePrint]Efficient Padding Oracle Attacks on Cryptographic Hardware, by Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay[ expand ]
06:17 [Pub][ePrint]Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal, by Cas Cremers and Michèle Feltz[ expand ]
06:17 [Pub][ePrint]Revisiting Key Schedule\'s Diffusion In Relation With Round Function\'s Diffusion, by Jialin Huang and Xuejia Lai[ expand ]


2012-07-31
16:31 [Event][New]FC13: Financial Crypto[ expand ]



2012-07-30
06:17 [Pub][JoC]A Comparison of Cryptanalytic Tradeoff Algorithms[ expand ]


2012-07-27
07:33 [Job][New]Security Expert for Smart Card and Embedded Devices, Samsung Electronics, Republic of Korea (South Korea)[ expand ]


2012-07-26
14:30 [Job][New]Research and PhD positions, Information Security Group, Royal Holloway, University of London, United Kingdom[ expand ]


2012-07-25
21:17 [Pub][ePrint]Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation, by Mukund Kalyanaraman and Michael Orshansky[ expand ]
21:17 [Pub][ePrint]Probabilistic Infinite Secret Sharing, by Laszlo Csirmaz[ expand ]
21:17 [Pub][ePrint]Infinite Secret Sharing -- Examples, by Alexander Dibert and Laszlo Csirmaz[ expand ]
21:17 [Pub][ePrint]Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme, by Qingfeng Cheng[ expand ]
21:17 [Pub][ePrint]MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, by Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto[ expand ]
05:22 [Job][New]M.Sc. and Ph.D. in Cryptography, Security, and Privacy, Koç University, Turkey[ expand ]
05:19 [Event][New]IPICS 2012: IPICS Summer School 2012[ expand ]



2012-07-24
18:17 [Pub][ePrint]Secret Sharing Schemes for Very Dense Graphs, by Amos Beimel and Oriol Farràs and Yuval Mintz[ expand ]
18:17 [Pub][ePrint]Fully Private Revocable Predicate Encryption, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Dongdong Sun[ expand ]
18:17 [Pub][ePrint]Forward-Secure Hierarchical Predicate Encryption, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Dongdong Sun[ expand ]
18:17 [Pub][ePrint]Efficient Implementation of Bilinear Pairings on ARM Processors, by Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao[ expand ]
18:17 [Pub][ePrint]Cross-Unlinkable Hierarchical Group Signatures, by Julien Bringer and Herve Chabanne and Alain Patey[ expand ]
18:17 [Pub][ePrint]Comments on four multi-server authentication protocols using smart card, by *Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4[ expand ]
18:17 [Pub][ePrint]Secure Computation on Floating Point Numbers, by Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele[ expand ]
04:48 [Event][New](IJCSS): International Journal of Computer Science and Security[ expand ]


2012-07-23
12:17 [Pub][ePrint]On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\\cP S^+$, by Brajesh Kumar Singh[ expand ]
12:17 [Pub][ePrint]A New Efficient Authenticated ID-Based Group Key Agreement Protocol, by Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash[ expand ]
12:17 [Pub][ePrint]An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks, by Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari[ expand ]
12:17 [Pub][ePrint]An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, by Martin Albrecht and Gregor Leander[ expand ]
12:17 [Pub][ePrint]An Algebraic Fault Attack on the LED Block Cipher, by Philipp Jovanovic and Martin Kreuzer and Ilia Polian[ expand ]
12:17 [Pub][ePrint]Differential Fault Analysis on Block Cipher Piccolo, by Kitae Jeong[ expand ]
12:17 [Pub][ePrint]PIRMAP: Efficient Private Information Retrieval for MapReduce, by Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan[ expand ]
12:17 [Pub][ePrint]Cross-Domain Password-Based Authenticated Key Exchange Revisited, by Liqun Chen and Hoon Wei Lim and Guomin Yang[ expand ]


2012-07-21
00:17 [Pub][ePrint]A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings, by Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat[ expand ]


2012-07-20
21:17 [Pub][ePrint]ID Based Signcryption Scheme in Standard Model, by S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan[ expand ]



2012-07-19
06:17 [Pub][ePrint]Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy, by Shaohui Wang,Sujuan Liu,Danwei Chen[ expand ]


2012-07-18
18:17 [Event][New]ICDIPC: 3rd Inter. Conf. on Digital Information Processing & Communications[ expand ]
08:35 [Event][New]Inscrypt 2012: The 8th China International Conference on Information Security and Cryptology[ expand ]
08:35 [Event][New]Inscrypt'2012: The 8th China International Conference on Information Security and Cryptology[ expand ]


2012-07-16
18:39 [Event][New]WESS 2012: 7th Workshop on Embedded Systems Security[ expand ]
15:20 [Conf][Crypto]CRYPTO 2012 - CALL FOR PARTICIPATION[ expand ]
03:17 [Pub][ePrint]Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three, by Chol-Sun Sin[ expand ]
03:17 [Pub][ePrint]Wide Strong Private RFID Identification based on Zero-Knowledge, by Roel Peeters and Jens Hermans[ expand ]
03:17 [Pub][ePrint]The Arithmetic Codex, by Ignacio Cascudo and Ronald Cramer and Chaoping Xing[ expand ]
03:17 [Pub][ePrint]New cryptographic constructions using generalized learning with errors problem, by Jintai ding[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of Sood et al.\'s Authentication Scheme using Smart Cards, by Rafael Martínez-Peláez and Francisco Rico-Novella[ expand ]
03:17 [Pub][ePrint]CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing, by Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen[ expand ]


2012-07-14
07:01 [Job][New]Senior Level Cryptography Lead at Seagate, Seagate, Longmont, CO, USA[ expand ]



2012-07-12
18:17 [Pub][ePrint]Functional Encryption for Regular Languages, by Brent Waters[ expand ]
14:03 [Event][New]CSE2012: ECRYPT Summer School: Challenges in Security Engineering 2012[ expand ]
13:01 [Conf][Crypto]GREAT NEWS: More Stipends are available to Students Attending CRYTPO[ expand ]


2012-07-11
18:17 [Pub][ePrint]Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles, by Zheng Yang and J\\\"org Schwenk[ expand ]
18:17 [Pub][ePrint]Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited, by Junji Shikata[ expand ]
18:17 [Pub][ePrint]On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification, by Afonso Arriaga and Manuel Barbosa and Pooya Farshim[ expand ]
12:23 [Job][Update]Teaching Position (Tenure), Salary A13/A14, Ruhr University Bochum, Germany[ expand ]


2012-07-09
11:49 [Job][New]Teaching Position (Tenure), Salary A13/A14, Ruhr University Bochum, Germany[ expand ]
05:48 [PhD][New]Tal Malkin[ expand ]
05:47 [PhD][New]Ilya Kizhvatov: Physical Security of Cryptographic Algorithm Implementations[ expand ]
05:47 [PhD][New]Seung Geol Choi: On Adaptive Security and Round Efficiency in Secure Multi-party Computation[ expand ]


2012-07-08
12:52 [Conf][Crypto]Early Registration Deadline for CRYPTO is TODAY![ expand ]



2012-07-06
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\\Sigma\\Pi$PKC, Constructed Based on Maximum Length Code, by Masao KASAHARA[ expand ]
21:17 [Pub][ePrint][ expand ]
21:17 [Pub][ePrint]Enhancing Location Privacy for Electric Vehicles (at the right time), by Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou[ expand ]
21:17 [Pub][ePrint]A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption, by Liangliang Xiao and I-Ling Yen[ expand ]
21:17 [Pub][ePrint]A Differential Fault Attack on Grain-128a using MACs, by Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar[ expand ]
21:17 [Pub][ePrint]Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption, by Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven[ expand ]
21:17 [Pub][ePrint]Algebraic Differential Fault Attacks on LED using a Single Fault Injection, by Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji[ expand ]
21:17 [Pub][ePrint]Edwards model of elliptic curves defined over any fields, by Oumar DIAO and Emmanuel FOUOTSA[ expand ]
21:17 [Pub][ePrint]Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output, by Arno Mittelbach[ expand ]
21:17 [Pub][ePrint]On Reconfigurable Fabrics and Generic Side-Channel Countermeasures, by Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik[ expand ]
21:17 [Pub][ePrint]On Hashing Graphs, by Ashish Kundu, Elisa Bertino[ expand ]
21:17 [Pub][ePrint]SipHash: a fast short-input PRF, by Jean-Philippe Aumasson and Daniel J. Bernstein[ expand ]
21:17 [Pub][ePrint]Quantum Key Distribution in the Classical Authenticated Key Exchange Framework, by Michele Mosca and Douglas Stebila and Berkant Ustaoglu[ expand ]
21:17 [Pub][ePrint]Multiple Differential Cryptanalysis using \\LLR and $\\chi^2$ Statistics, by Céline Blondeau and Benoît Gérard and Kaisa Nyberg[ expand ]
21:17 [Pub][ePrint]Another look at non-uniformity, by Neal Koblitz and Alfred Menezes[ expand ]
21:17 [Pub][ePrint]PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --, by Gilles Piret and Thomas Roche and Claude Carlet[ expand ]
21:17 [Pub][ePrint]Publicly Verifiable Ciphertexts, by Juan Manuel Gonz{\\\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Fully Anonymous Attribute Tokens from Lattices, by Jan Camenisch and Gregory Neven and Markus Rückert[ expand ]
21:17 [Pub][ePrint]Never trust a bunny, by Daniel J. Bernstein and Tanja Lange[ expand ]
21:17 [Pub][ePrint]Securing Circuits Against Constant-Rate Tampering, by Dana Dachman-Soled and Yael Tauman Kalai[ expand ]
21:17 [Pub][ePrint]Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy, by Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin[ expand ]
21:17 [Pub][ePrint]Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions, by Ivan Damgard and Adriana Lopez-Alt[ expand ]
21:17 [Pub][ePrint]A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions, by Anne Canteaut and Thomas Fuhr and Mar\\\'{i}a Naya-Plasencia and Pascal Paillier and Jean-Ren\\\'{e} Reinh[ expand ]
21:17 [Pub][ePrint]Achieving Constant Round Leakage-Resilient Zero-Knowledge, by Omkant Pandey[ expand ]
21:17 [Pub][ePrint]New Preimage Attacks on Hash Modes of AES-256, by Deukjo Hong and Dong-Chan Kim and Daesung Kwon[ expand ]
21:17 [Pub][ePrint]Simultaneous hashing of multiple messages , by Shay Gueron and Vlad Krasnov[ expand ]
21:17 [Pub][ePrint]Improved Broadcast Encryption Scheme with Constant-Size Ciphertext, by Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton[ expand ]
21:17 [Pub][ePrint]Factorisation of RSA-704 with CADO-NFS, by Shi Bai and Emmanuel Thom\\\'e and Paul Zimmermann[ expand ]
21:17 [Pub][ePrint]Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs, by Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid [ expand ]
21:17 [Pub][ePrint]On Continual Leakage of Discrete Log Representations, by Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]A Framework for Efficient Fully-Equipped UC Commitments, by Eiichiro Fujisaki[ expand ]
21:17 [Pub][ePrint]Multiparty Proximity Testing with Dishonest Majority from Equality Testing, by Ran Gelles and Rafail Ostrovsky and Kina Winoto[ expand ]
21:17 [Pub][ePrint]Distributed Key Generation in the Wild, by Aniket Kate and Yizhou Huang and Ian Goldberg[ expand ]
21:17 [Pub][ePrint]Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem, by Colleen M. Swanson and Douglas R. Stinson[ expand ]
21:17 [Pub][ePrint]How to Store some Secrets, by Reto E. Koenig and Rolf Haenni[ expand ]
21:17 [Pub][ePrint]Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption, by Omar Choudary and Felix Grobert and Joachim Metz[ expand ]
21:17 [Pub][ePrint]Optimal Lower Bound for Differentially Private Multi-Party Aggregation, by T-H. Hubert Chan and Elaine Shi and Dawn Song[ expand ]
21:17 [Pub][ePrint]Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices, by Ioana Boureanu and Serge Vaudenay[ expand ]
15:03 [Job][New]Post-Doc Applied Cryptography, University of Twente, Enschede, The Netherlands[ expand ]
09:43 [Job][New]Research Fellows and Ph.D. students, Nanyang Technological University, Singapore[ expand ]
00:15 [Event][New]ACNS'13: 11th International Conference on Applied Cryptography and Network Security[ expand ]


2012-07-05
14:45 [Conf][Crypto]Early registration deadline for CRYPTO is July 8![ expand ]
05:40 [Job][New]Post-Doc Positions, IT University of Copenhagen, Denmark[ expand ]


2012-07-04
13:18 [Job][Update]Post-Doc, University of Warsaw, Poland[ expand ]
13:18 [Job][Update]PhD Student, University of Warsaw, Poland[ expand ]
13:18 [Job][Update]MSc Student, University of Warsaw, Poland[ expand ]
13:17 [Job][New]PhD Student, University of Warsaw[ expand ]


2012-07-03
12:22 [Job][New]PKI Officer, Federal Office of Police, Bern[ expand ]
12:14 [Event][New]Inscrypt 2012: China International Conference on Information Security and Cryptology[ expand ]
12:12 [Event][New]FSE 2013: 20th International Workshop on Fast Software Encryption[ expand ]



2012-07-02
05:26 [Job][New]Mobile Application Developers with , Cellcrypt, London, UK[ expand ]
05:25 [Job][New]Post-Doc, Department of Electrical Engineering, Linköping University, Linköping, Sweden[ expand ]
05:24 [Job][New]2 Research Scientists, Temasek Laboratories, National University of Singapore, Singapore[ expand ]
05:16 [Event][New]IJCSS: International Journal of Computer Science and Security[ expand ]


2012-06-29
21:15 [Conf][Crypto][ expand ]
05:16 [Event][New]PKC 2013: Public Key Cryptography 2013[ expand ]


2012-06-28
05:42 [Event][New]DATE 2013: Design Automation and Test in Europe - Topic Track on Secure Systems[ expand ]


2012-06-25
00:17 [Pub][JoC]Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles[ expand ]



2012-06-24
10:50 [Event][New]TCC2013: The Tenth Theoretical Cryptography Conference[ expand ]
09:29 [PhD][New]Billy Bob Brumley: Covert Timing Channels, Caching, and Cryptography[ expand ]


2012-06-23
10:42 [PhD][New]Sujoy Sinha Roy: Design and Analysis of Elliptic Curve Cryptosystems on FPGAs[ expand ]


2012-06-22
08:09 [Conf][EC]Videos from Eurocrypt 2012[ expand ]


2012-06-20
15:41 [Event][Update]Indocrypt 2012[ expand ]
15:41 [Event][Update]Crypto 2013[ expand ]



2012-06-19
18:59 [Event][Update]CT-RSA 2013: The Cryptographers' Track at RSA Conference[ expand ]
15:45 [Job][New]Senior Researcher, Software Technology and Applications Competence Center, Tartu, Estonia[ expand ]


2012-06-18
14:49 [Job][New]Post-doc, Universite catholique de Louvain[ expand ]
11:04 [Event][Update]ESTEL-SEC 2012: ESTEL Security and Privacy Special Track[ expand ]
11:03 [Job][New]Ph.D. Student, Post-Doc, Intel Collaborative Research Institute
for Secure Computing (ICRI-SC) at TU-Darmstadt
[ expand ]


2012-06-13
10:57 [Job][New]PhD studentship in Applied Cryptography, Royal Holloway, University of London[ expand ]
05:26 [Job][New]Postdoctoral and Research Fellowships, Queensland University of Technology, Brisbane, Australia[ expand ]


2012-06-12
08:23 [PhD][Update]Nicky Mouha: Automated Techniques for Hash Function and Block Cipher Cryptanalysis[ expand ]
08:20 [Event][New]ESTEL-SEC 2012: ESTEL Security and Privacy Special Track[ expand ]
06:17 [Pub][ePrint]Security Analysis of RAPP An RFID Authentication Protocol based on Permutation, by Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei[ expand ]
06:17 [Pub][ePrint]New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques, by Allison Lewko and Brent Waters[ expand ]
06:17 [Pub][ePrint]A note on generalized bent criteria for Boolean functions, by Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica[ expand ]
06:17 [Pub][ePrint]3D Hardware Canaries, by Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and T[ expand ]
06:17 [Pub][ePrint]ML Confidential: Machine Learning on Encrypted Data, by Thore Graepel and Kristin Lauter and Michael Naehrig[ expand ]
06:17 [Pub][ePrint]Revisiting Dedicated and Block Cipher based Hash Functions, by Anupam Pattanayak[ expand ]
06:17 [Pub][ePrint]DECT Security Analysis, by Erik Tews[ expand ]
06:17 [Pub][ePrint]The Discrete Logarithm Problem in non-representable rings, by Matan Banin and Boaz Tsaban[ expand ]
06:17 [Pub][ePrint]Homomorphic A-codes for Network Coding, by Zhaohui Tang[ expand ]
06:17 [Pub][ePrint]A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences, by Xu ZiJie and Xu Ke[ expand ]
06:17 [Pub][ePrint]An Analysis of ZVP-Attack on ECC Cryptosystems, by Claude Crépeau and Raza Ali Kazmi[ expand ]
06:17 [Pub][ePrint]The Multivariate Probabilistic Encryption Scheme MQQ-ENC, by Danilo Gligoroski and Simona Samardjiska[ expand ]



2012-06-11
14:41 [Event][New]ICMLA 2012: Special Session on Machine Learning in Information and System Security[ expand ]
14:41 [Event][New]PQCrypto 2013: Post-Quantum Crypto 2013[ expand ]
09:37 [Job][New]Security and Cryptography Researcher, Safemarket Ltd, Thessaloniki, Greece[ expand ]


2012-06-08
19:24 [PhD][New]Roel Peeters: Security Architecture for Things That Think[ expand ]


2012-06-06
05:16 [PhD][New]U. Rajeswar Rao[ expand ]
05:16 [PhD][New]Rayanki Balakrishna: Multihop Performace Issuess in Wire less Mobile Ad Hoc networks[ expand ]
05:15 [PhD][New]U.Rajeswar Rao[ expand ]


2012-06-05
20:52 [Event][Update]SPACE'12: Int. Conference on Security, Privacy and Applied Cryptography Engineering[ expand ]
18:17 [Pub][ePrint]Using Variance to Analyze Visual Cryptography Schemes, by Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou[ expand ]
18:17 [Pub][ePrint]Bounds on the Threshold Gap in Secret Sharing over Small Fields, by Ignacio Cascudo and Ronald Cramer and Chaoping Xing[ expand ]
18:17 [Pub][ePrint]Non-uniform cracks in the concrete: the power of free precomputation, by Daniel J. Bernstein and Tanja Lange[ expand ]
18:17 [Pub][ePrint]A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) , by Markku-Juhani O. Saarinen and Daniel Engels[ expand ]
18:17 [Pub][ePrint]Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker, by Gergei Bana and Pedro Adão and Hideki Sakurada[ expand ]
05:55 [Job][New]Research Scientist / Senior Research Scientist, PARC, Palo Alto, CA, USA[ expand ]



2012-06-04
04:59 [PhD][New]Erik Tews: DECT Security Analysis[ expand ]
04:59 [PhD][New]Johannes Buchmann[ expand ]
00:17 [Pub][ePrint]Tightly Secure Signatures and Public-Key Encryption, by Dennis Hofheinz and Tibor Jager[ expand ]
00:17 [Pub][ePrint]A mathematical problem for security analysis of hash functions and pseudorandom generators, by Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata[ expand ]
00:17 [Pub][ePrint]Fast and compact elliptic-curve cryptography, by Mike Hamburg[ expand ]
00:17 [Pub][ePrint]Verified Security of Redundancy-Free Encryption from Rabin and RSA, by Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin[ expand ]
00:17 [Pub][ePrint]Multi-Channel Broadcast Encryption, by Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh[ expand ]
00:17 [Pub][ePrint]Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols, by Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp[ expand ]
00:17 [Pub][ePrint]Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography, by Duong Hieu Phan and Viet Cuong Trinh[ expand ]
00:17 [Pub][ePrint]Generation of Nonlinear Feedback Shift Registers with special-purpose hardware, by Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki[ expand ]
00:17 [Pub][ePrint]An anonymous proxy signature scheme without random oracles, by Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh[ expand ]
00:17 [Pub][ePrint]Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol, by Debiao He[ expand ]


2012-06-03
21:17 [Pub][ePrint]Anonymous Credentials Light , by Foteini Baldimtsi and Anna Lysyanskaya[ expand ]
21:17 [Pub][ePrint]Tamper and Leakage Resilience in the Split-State Model, by Feng-Hao Liu and Anna Lysyanskaya[ expand ]
21:17 [Pub][ePrint]In the blink of an eye: There goes your AES key, by Sergei Skorobogatov and Christopher Woods[ expand ]
21:17 [Pub][ePrint]Broadcast-enhanced Key Predistribution Schemes, by Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson[ expand ]
21:17 [Pub][ePrint]Two grumpy giants and a baby, by Daniel J. Bernstein and Tanja Lange[ expand ]
21:17 [Pub][ePrint]New Transference Theorems on Lattices Possessing n^\\epsilon-unique Shortest Vectors, by Wei Wei and Chengliang Tian and Xiaoyun Wang[ expand ]
21:17 [Pub][ePrint]Actively Secure Two-Party Evaluation of any Quantum Operation, by Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail[ expand ]
21:17 [Pub][ePrint]On The Distribution of Linear Biases: Three Instructive Examples, by Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander[ expand ]
21:17 [Pub][ePrint]On instance separation in the UC-framework, by István Vajda[ expand ]
21:17 [Pub][ePrint]A Public Shuffle without Private Permutations, by Myungsun Kim and Jinsu Kim and Jung Hee Cheon[ expand ]
21:17 [Pub][ePrint]Threshold Implementations of all 3x3 and 4x4 S-boxes, by B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.St\\\"{u}tz[ expand ]
21:17 [Pub][ePrint]Differential Power Analysis on ZUC Algorithm, by TANG Ming, CHENG PingPan ,QIU ZhenLong[ expand ]
15:06 [Conf][Crypto]Crypto 2012 list of accepted papers[ expand ]


2012-06-01
13:45 [Event][New]FPS 2012: 5th International Symposium on Foundations & Practice of Security[ expand ]


2012-05-30
02:23 [Conf][Crypto]Crypto 2012 online registration is open[ expand ]



2012-05-29
21:17 [Pub][ePrint]Boomerang and Slide-Rotational Analysis of the SM3 Hash Function, by Aleksandar Kircanski and Amr M. Youssef[ expand ]
21:17 [Pub][ePrint]Public-Key Cryptography from New Multivariate Quadratic Assumptions, by Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang[ expand ]
21:17 [Pub][ePrint]Passive Corruption in Statistical Multi-Party Computation, by Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub[ expand ]
21:17 [Pub][ePrint]Homomorphic Signature for Identity Authentication in Cloud Computing, by Zhiwei Wang, Guozi Sun and Danwei Chen[ expand ]
21:17 [Pub][ePrint]Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings, by Enrico Thomae[ expand ]
21:17 [Pub][ePrint]Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications, by Dario Fiore and Rosario Gennaro[ expand ]