IACR NewsletterThe newsletter of the International Association for Cryptologic Research .
Vol. 26, No. 1, Spring 2011, (Publication date: 3 March 2011 ).
- Survey IACR Elections 2010
- Book Reviewers needed
- Upcoming Events
- IACR Fellows 2011 selected
- IACR Elections 2010 / Results
- Message from the President
- On the Memory of Prof. Chi-Sung Laih
- Mobile Phone Security Algorithms - New Version
- Service to members and the cryptographic community
- Reports on past events
- Book Reviews
- List of books for review
- Cryptology ePrint Archive: Top 20 Downloads
Survey IACR Elections 2010
In order to evaluate the past IACR election , a survey has been set up. Please help us to identify the strong and weak points by participating!
Detailed results of the 2010 election are given below .
Book Reviewers needed
Have you read a book lately? Do you got an opinion about it? Was the book about cryptography (or some related subject)? If the answer for all three questions was "yes!" - why not helping the cryptographic community by writing a book review ?
You find a list of books still looking for a reviewer at our book review site or at the end of this newsletter . You can also find some sample reviews there.
If you have any questions, please contact Axel Poschmann (books (at) iacr.org) directly.
- Eurocrypt 2011 , May 15-May 19, 2011, Tallinn, Estonia. Early registration is open.
- Crypto 2011 , August 14-August 18, 2011, Santa Barbara, USA.
- Asiacrypt 2011 , December 4-December 8, 2011, Seoul, Korea.
- Eurocrypt 2012, April 15-19, 2012, Cambridge, UK.
- Crypto 2012, August 19-23, 2012, Santa Barbara, USA.
- 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011) , March 6-March 9, 2011, Taormina, Italy. Late registration is open.
- Theory of Cryptography Conference (TCC 2011) , March 27-March 30, 2011, Providence, RI, USA. Late registration is open.
- 13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2011) , September 25-September 28, 2011, Tokyo, Japan.
- 15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012), March 6-9, 2012, Tokyo, Japan.
Events in cooperation with IACR
- IEEE Symposium on Security and Privacy (IEEE S&P 2011) , May 22-25, 2011, Berkeley, USA.
- Africacrypt 2011 , July 4-8, 2011, Dakar, Senegal.
- International Conference on Security and Cryptography (SECRYPT'11) , July 18-21, 2011, Seville, Spain.
- The 18th Workshop on Selected Areas in Cryptography (SAC 2011) , August 11-12, 2011, Toronto, Canada.
Further events can be found here . You can also add your events or calls for special issues of journals there.
IACR Fellows 2011 selected
- David Kahn: For being cryptography's foremost historian and a co-founder of the IACR.
- Charlie Rackoff: For pioneering contributions to the scientific foundations of cryptology and for sustained leadership in cryptographic education.
- Richard Schroeppel: For pioneering and analysing the sieving technique underlying subexponential factoring and discrete logarithm methods.
- Scott Vanstone: For essential work on the deployment of Elliptic Curve Cryptography, sustained educational leadership in applied cryptology, and service to the IACR.
IACR Elections 2010 / Results
The 2010 IACR elections included races for all IACR Officer positions (President, Vice-President, Treasurer, and Secretary) and three rotating Director positions. There was one candidate for President, two for each of the three other Officer positions, and six candidates for the three Director positions (one candidate ran both for an Officer and Director position).
For the first time, the IACR elections were conducted electronically using the Helios cryptographically-verifiable voting system. Despite a small number of concerns and complaints about possible security issues with online voting (even with a universally-verifiable system), the election seemed quite successful with a participation rate approximately 50% higher than with prior paper-based postal elections. The electronic system also reduced costs, substantially decreased lead time, and eliminated disqualification of ballots due to voter errors. Additionally, members who previously did not have an opportunity to vote because the IACR did not have a current physical address or because of slow mail service were able to participate in this election. Voting credentials were sent to 1555 IACR members - including 52 for whom the IACR had no physical address. A total of 499 ballots were cast by 475 distinct voters (only the last ballot submitted by each voter is included in the tally). An additional 26 optional â€œchallengeâ€� ballots were submitted for inclusion in the election audit - these challenge ballots helped to ensure the integrity of the Helios voting clients. Candidate names on the ballot were randomly ordered by the election chair using dice rolls. The results, as follows, were verified by the Helios election auditor as well as an independent auditor written and hosted by UC Louvain.
Election of Officers
Seven candidates stood for the four open officer positions. The candidates with the highest number of votes were elected. They are marked in bold :
President: Bart Preneel (429) Vice President: Christian Cachin (268) Helena Handschuh (179) Secretary: Martijn Stam (265) James Hughes (162) Treasurer: Greg Rose (275) Marcelo Kaihara (141)
Their terms will expire on 31 December 2013.
Election of Directors
Six candidates stood for the three open positions of Director. The three candidates with the highest number of votes were elected. Their names are in bold .
- David Pointcheval (230)
- Mitsuru Matsui (216)
- Christof Paar (210)
- Amit Sahai (169)
- John Kelsey (130)
- Christian Cachin (199) Not eligible as a director as already voted as vice-president
Their terms will expire on 31 December 2013.
Message from the President
In the Fall of 2010, the IACR has held for the first time elections using the Helios system. The election process was run very smoothly. Participation was up by about 50% compared to the previous years. I would like to thank the Helios team and the members of the Election Committee and the Board members who have made this happen. If you have suggestions for the improvement of Helios or the election procedures, we would like to hear from you. This is also the right time to thank Ed Dawson for his long service on the IACR Board (as Director, Vice President and Asiacrypt Steering Committee Chair), Helena Handschuh for her service as Treasurer, and Tom Shrimpon for serving as Membership Secretary.
You will also find in this newsletter the upcoming events for the next months; with three workshops and one conference the period February-May is always always a peak period for the IACR. I would like to thank the general chairs and program chairs of these events for their hard work; special thanks also to the IACR team that supports these events behind the scenes, and in particular Shai Halevi (membership secretary), Helena Handschuh (outgoing treasurer) and Greg Rose (new treasurer).
In the coming period, IACR will make a shift towards electronic publishing. By listening to your feedback, we have learned that there is a growing number of members who no longer want to receive publications on paper. A natural starting point to offer this option is the Journal of Cryptology, as this can bring a substantial cost reduction; in a later stage we may expand this to the workshops and conferences.
On the Memory of Prof. Chi-Sung Laih
It is with great sorrow that we learned the passing of Professor Chi Sung Laih.
Professor Chi-Sung Laih was one of Taiwan's most distinguished researchers in cryptography and information security. He was born in 1956, in a remote village in southern Taiwan. After graduating from a vocational high school, he worked for Chunghwa Telecom. At the same time, he also studied as a part-time student at National Cheng Kung University (NCTU). After receiving his bachelor's degree, he went on to obtain a master degree and then a doctorate degree in Electrical Engineering from the same university. He graduated with his doctorate degree in 1990 and then joined the faculty of NCKU.
Professor Laih was a dedicated professor and researcher. He tried his very best in doing everything. He published in many prestigious journals and conferences. His research area includes public-key cryptography, information security, error correcting codes, and communication systems.
In 1994, working together with other professors, Professor Laih contributed to the formation of the Chinese Cryptography and Information Security Association (CCISA) in Taiwan. This organization has not only enabled researchers in Taiwan to pool their resources and ideas, but has also fastened interactions with similar organizations in other parts of the world.
Professor Chi-Sung Laih served two terms as the Chairman of the Board of Directors of CCISA. In his tenure, he sought to host an Asiacrypt conference in Taiwan. This was the first attempt for Taiwan to host such a conference. Through his hard work, the CCISA was able to secure financial support, overcoming all sorts of difficulties during the initial stage of the preparation. His efforts contributed greatly to the eventual success of the ASIACRYPT 2003.
Professor Laih was awarded "The Excellence Research Award" by National Science Council in 1996 and 1998. Starting from 2002, he was appointed as the Chair Professor at NCTU. He was invited to give invited speech and awarded "The Best Paper Award" in many conferences. In addition to the academic achievement, he also helped many government agencies, as well as private companies, to enhance their information security infrastructure.
Professor Chi-Sung Laih passed away on August 29, 2010. His contributions to cryptography and information security will be missed by all of us.
Asiacrypt Steering Committee (ASC) of IACR & Chinese Cryptology and Information Security Association (CCISA) .
Mobile Phone Security Algorithms - New Version
Previously on this web site and also in the September 2010 IACR Newsletter we reported that a new set of cryptographic algorithms was being proposed for inclusion in the "4G" mobile standard called LTE (Long Term Evolution). The crypto community was invited to analyse the algorithms and report results.
The algorithms are:
The public evaluation yielded valuable results. Some flaws were identified in the algorithms. New versions of the algorithms have now been produced, correcting those problems, and a new period of public evaluation has begun.
- a stream cipher called ZUC, which is the core of both new LTE algorithms;
- the LTE encryption algorithm called 128-EEA3, defined straightforwardly using ZUC;
- the LTE integrity algorithm called 128-EIA3, designed as a Universal Hash Function using ZUC as its core.
The algorithms are here: http://gsmworld.com/our-work/programmes-and-initiatives/fraud-and-security/gsm_security_algorithms.htm. The design and evaluation report (Document 4) includes details of what has changed and why.
Analysis of the new algorithm versions is invited, before a final decision is taken in (probably) July 2011 as to whether to include the new algorithms in the LTE standard. The discussion forum http://zucalg.forumotion.net/ is still the right place to post any evaluation results.
Service to members and the cryptographic community
Among others, IACR offers the following benefits:
- IACR Reading Room
- Open Positions
- IACR Archive
a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link
b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis.
c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.
d. The proceedings of some conferences past are made available by the IACR in an archive . The copyright for these papers is held by the IACR.
Reports on Past Events
Asiacrypt 2010 , December 5-9, 2010, Singapore
Asiacrypt 2010 was held at Swissôtel Merchant Court, Singapore, on 5 - 9 December 2010.
A total of 35 research papers, categorized into 12 sessions, were presented, selected from 219 submissions. Bart Preneel, President of IACR, and Krawczyk Hugo from IBM Research delivered the invited lectures on the topics "Cryptographic Hash Functions and the SHA-3 Competition" and "Cryptography, from Theory to Practice: A Personal Perspective", respectively. The Rump Session was chaired by Ed Dawson. Most of the presentation slides for the technical sessions and all the slides for the rump session can be found on the conference website at http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/Program.html and http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/rumpsession.html , respectively.
The conference banquet was held at Grand Shanghai Restaurant, a 15-minute stroll along the banks of the Singapore River from the conference hotel, on Wednesday evening. The best paper award was also presented during the banquet to Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger for their paper "Rotational Rebound Attacks on Reduced Skein".
The conference ended successfully on 9 December, having attracted 239 participants (50 being students), from 30 countries, mainly from Asia (146), Europe (61) and North America (21). We thank the sponsors for their generous support and contributions to the success of the conference.
Program Chair was Masayuki Abe and General Chair was San Ling.
Fast Software Encryption 2011 , February 13-16, 2011, Lyngby, Denmark
FSE 2011 took place from February 13 to February 16, 2011, in Denmark. The general co-chairs were Lars R. Knudsen and Gregor Leander and the program chair Antoine Joux. This was the 18th edition of FSE. The venue was the Technical University of Denmark which is some 30 kilometres north of Copenhagen. There were about 150 attendees most of which stayed in hotels downtown Copenhagen.
Each morning there were FSE buses from a central hotel to the conference venue and buses the other way in the afternoon. There was a rump session on the Monday chaired this time by Vincent Rijmen. The registration fee for normal attendees was 350 US$ (not including the 70$ IACR membership fee). As a new initiative the printed proceedings will not be sent to the attendees but all have access to the electronic version when published through the IACR reading room at Springer. Moreover, FSE 2011 did not have printed pre-proceedings, but instead made the papers available online before and during the conference.
There was a record number of submissions, 106 (matching the number from 2006) of which 22 were accepted for presentation. There were two invited talks, one by Willi Meier and one by Ivan Damgaard.
Inscrypt 2010 , October 20-23, 2010, Shanghai, China
Inscrypt 2010 was held in Shanghai China from October 20 to 23, there were nearly 110 participants from 16 countries and regions.
This conference was held in the Academic Activity Center (AAC-Hotel) at Min-Huang Campus of Shanghai Jiaotong University. The banquet was held at the Xiao Nan Guo Restaurant in the evening of October 22. The conference organizers are State Key Laboratory of Information Security, Chinese Association for Cryptologic Research and Shanghai Jiaotong University. Programme chairs are Xuejia Lai and Moti Yung, General chair was Dengguo Feng.
The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas.
If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available ! In general, new books will be added around January and July to these lists.
An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all reviews added since the last newsletter was sent out. You can access the full list via the following link .
Jonathan Katz and Yehuda Lindell: "Introduction to Modern Cryptography", 2008:
Introduction to Modern Cryptography provides a very well-balanced and thorough introduction to cryptography. This it book highlights precise definitions and rigorous proofs that have shaped cryptography into its current mathematically enriched form. It covers fundamental notions of modern cryptography ranging from public, private key encryption to data integrity and signatures. This is a must-read for researchers in cryptography.
Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-584-885-511
Review written by Ladan Mahabadi (McGill University, Melbourne, Canada). (Date: 2011-03-01)
A previous review of this book by Cristina Onete can be found here . (Date: 2010-01-13)
B. Schneier: "Beyond Fear", 2006:
This book is about security in general. In contrast to many other books, Schneier explains how security works in the most general case, starting from protecting the diary of your sister to protecting the nation from global terrorism. Schneiers book does not focus on cryptography or network security, instead it uses examples of systems everyone is expected to be familiar with, e.g. airport security. The book entertains the reader and encourages him thinking rational about security threads and security solutions. I would recommend the book to everybody who starts working in the security business, but not for readers who are searching for technical details about any kind of security systems.
Review written by Erik Tews (TU Darmstadt, Germany). (PDF)
Publisher: Springer. ISBN: 978-0-387-02620-6 (Date: 2010-11-03)
J. Smith: "Introduction to Abstract Algebra", 2008:
This is a careful treatment of the principal topics of Abstract Algebra in 327 pages. Taking a different approach from several books, it helps the reader to have a solid introduction to abstract algebra and establishes the link between it and the cryptographic world in many "Study projects". This is an attractive book which could be read by everybody because the author supposes not so much knowledge from the reader and gives all the necessary information to continue the reading from a chapter to the next. I believe that the readers, students and even experienced researchers may benefit strongly from this book.
Review written by Frederic A.B. Edoukou (CCRG, Nanyang Technical University, Singapore). (PDF)
Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-6371-4 (Date: 2010-10-11)
A. Joux: "Algorithmic Cryptanalysis", 2009:
Algorithmic Cryptanalysis is a high level book that covers many interesting topics, so it is impossible to go into all details of the different topics. However, for each topic the reader can Ãžnd several references, which is a convenient extra of the book. I would recommend this book for graduate students with a strong mathematical background, a cryptographic background, knowledge in C-programming and an interest in implementing cryptanalytic attacks.
Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (PDF)
Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-7002-6 (Date: 2010-10-07)
C. Paar and J. Pelzl: "Understanding Cryptography", 2010:
This book does not make any assumptions on prior knowledge in neither mathematics nor computer science. It is therefore not only suited for undergraduate students in mathe- matics or in the computer science Ãželd, but rather also for students from other domains requiring crypto skills such as legal people for example. I would certainly recommend this book for the audience it is targeting.
Review written by Luigi Lo Iacono (European University of Applied Sciences). (PDF)
Publisher: Springer. ISBN: 978-3-642-04100-6 (Date: 2010-10-07)
S. Mangard, E. Oswald and T. Popp: "Power Analysis Attacks: Revealing the Secrets of Smart Cards", 2007:
This book provides a very clear, complete and highly illustrated presentation of power analysis methods used to extract secret information from cryptosystems such as smart cards. All concepts are progressively introduced, mathematically analyzed and illustrated using many real attacks results. The main attack methods and some variants as well as standard countermeasures are presented and their limitations and efficiency aspects are discussed. Both software and hardware implementations on smart cards are targeted. I highly recommend this very nice book.
Review written by Arnaud Tisserand (CNRS, IRISA Laboratory, Lannion, France). (PDF)
Publisher: Springer. ISBN: 978-0-387-30857-9 (Date: 2010-10-07)
List of books for review
The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . New book reviews are posted continiously.
Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name] .Go to titles from:
SpringerBelow you find a selection of books from Springer. Further titles are available via Springer's website .
- Adjeroh: The Burrows-Wheeler Transform
- Bella: Formal Correctness of Security Protocols
- Buchmann: Binary Quadratic Forms
- Calmet: Mathematical Methods in Computer Science
- Camp: Economics of Identity Theft
- Dietzfelbinger: Primality Testing in Polynomial Time
- Di Pietro: Intrusion Detection Systems
- Fine: Number Theory
- Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
- Hromkovic: Algorithmic Adventures
- Kuo: Precoding Techniques for Digital Communication Systems
- Li: An Introduction to Kolmogorov Complexity and Its Applications
- Mehlhorn: Algorithms and Data Structures
- Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
- Portnoy: Global Initiatives to Secure Cyberspace
- Robshaw: New Stream Cipher Designs
- Rodríguez-HenrÃquez: Cryptographic Algorithms on Reconfigurable Hardware
- Rosen: Concurrent Zero-Knowledge
- Salomon: A Concise Introduction to Data Compression
- Sammes: Forensic Computing
- Schellekens: A Modular Calculus for the Average Cost of Data Structuring
- Schroeder: Number Theory in Science and Communication
- Shi: Transactions on Data Hiding and Multimedia Security III
- Traynor: Security for Telecommunications Networks
- Tuyls: Security with Noisy Data
- Vadhan: A Study of Statistical Zero-Knowledge Proofs
- Vöcking: Taschenbuch der Algorithmen [German]
- Yeung: Information Theory and Network Coding
Taylor & FrancisBelow you find a selection of books from Taylor & Francis.
- Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices
- Thuraisingham, Bhavani: Secure Semantic Service-Oriented Systems
- Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words
- Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications
- Chartrand, Gary: Chromatic Graph Theory
- Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering
- Erickson, Martin: Introduction to Number Theory
- Gross, Jonathan L.: Combinatorial Methods with Computer Applications
- Gould, Ronald J: Mathematics in Games, Sports, and Gambling
- Hsu, Lih-Hsing: Graph Theory and Interconnection Networks
- Johnson, Norman: Handbook of Finite Translation Planes
- Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
- Lindner, Charles C.: Design Theory, Second Edition
- Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies
- Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems
- Mollin, Richard A.: Advanced Number Theory with Applications
- Newman, Robert C.: Computer Forensics: Evidence Collection and Management
- Paulsen, William: Abstract Algebra. An interactive Approach
- Peeva, Irena: Syzygies and Hilbert Functions
- Roberts, Fred: Applied Combinatorics, Second Edition
- Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations
- Szabo, Sandor: Factoring Groups into Subsets
- Talukder, Asoke K.: Architecting Secure Software Systems
- Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition
- Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing
- Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
- Zhang, Y.: Security in Wireless Mesh Networks
Cryptology ePrint Archive: Top 20 Downloads in the last 6 monthThis report includes all downloads from the ePrint archive between September 1, 2010 and Februars 28, 2011.
) with 29078 downloads
- Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
- Aurelien Francillon and Boris Danev and Srdjan Capkun
- 2007/120 ( PDF ) with 7903 downloads
- Breaking 104 bit WEP in less than 60 seconds
- Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
- 2004/314 ( PDF ) with 7435 downloads
- A Technical Comparison of IPSec and SSL
- AbdelNasir Alshamsi and Takamichi Saito
- 2010/006 ( PDF ) with 5088 downloads
- Factorization of a 768-bit RSA modulus
- Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thom
and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
- 2011/035 ( PDF ) with 2954 downloads
- A New Family of Practical Non-Malleable Protocols
- Andrew C. Yao and Yunlei Zhao
- 2010/643 ( PDF ) with 2650 downloads
- Construct MD5 Collisions Using Just A Single Block Of Message
- Tao Xie and Dengguo Feng
- 2010/439 ( PDF ) with 2581 downloads
- Embedded Extended Visual Cryptography Schemes
- Feng Liu and Chuankun Wu
- 2004/199 ( PDF ) with 2315 downloads
- Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
- Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
- 2009/223 ( PDF ) with 1998 downloads
- How To Find Weak Input Differences For MD5 Collision Attacks
- Tao Xie and Dengguo Feng
- 2008/469 ( PS PS.GZ PDF ) with 1920 downloads
- Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
- Stephane Manuel
- 2006/231 ( PS PS.GZ PDF ) with 1820 downloads
- A handy multi-coupon system
- Sebastien Canard and Aline Gouget and Emeline Hufschmitt
- 2006/262 ( PDF ) with 1806 downloads
- Logical Concepts in Cryptography
- Simon Kramer
- 2011/018 ( PDF ) with 1621 downloads
- Homomorphic Signatures for Polynomial Functions
- Dan Boneh and David Mandell Freeman
- 2006/105 ( PDF ) with 1568 downloads
- Tunnels in Hash Functions: MD5 Collisions Within a Minute
- Vlastimil Klima
- 2004/203 ( PS PS.GZ PDF ) with 1546 downloads
- How to Cheat at Chess: A Security Analysis of the Internet Chess Club
- John Black and Martin Cochran and Ryan Gardner
- 2009/579 ( PDF ) with 1413 downloads
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou
- 2010/594 ( PDF ) with 1372 downloads
- Cache Games - Bringing Access Based Cache Attacks on AES to Practice
- Endre Bangerter and David Gullasch and Stephan Krenn
- 2010/337 ( PDF ) with 1332 downloads
- Practical-Titled Attack on AES-128 Using Chosen-Text Relations
- Vincent Rijmen
- 2002/045 ( PS PS.GZ PDF ) with 1233 downloads
- Cryptanalysis of S-DES
- Dr. K. S. Ooi, Brain Chin Vito
- 2007/471 ( PDF ) with 1212 downloads
- Attacks on the WEP protocol
- Erik Tews
You may opt out of the newsletter either by editing your contact information and preferences here .
Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org .
IACR contact information . Current newsletter editor is Christopher Wolf.