IACR Test-of-Time Awards
The IACR Test-of-Time Award is given annually for each one of the three IACR General Conferences (Eurocrypt, Crypto, and Asiacrypt). An award will be given at a conference for a paper which has had a lasting impact on the field and was published 15 years prior. More information about the Test-of-Time award can be found in the policy guidelines document and the nominations page.
The individual conferences CHES, TCC, and PKC each have their own Test-of-Time award for papers published at these conferences. These follow slightly different policies.
Award Recipients2021 Recipients (for papers published in 2006)
From Eurocrypt 2006:
A provable-security treatment of the key-wrap problem, by Phillip Rogaway and Thomas ShrimptonFrom Crypto 2006:
For placing the important real world primitive of key-wrapping on a solid theoretic foundation.
New proofs for NMAC and HMAC: Security without collision-resistance, by Mihir BellareFrom Asiacrypt 2006:
For proving that the security of the widely deployed HMAC construction does not depend on the collision resistance of the underlying hash function.
Simulation-sound NIZK proofs for a practical language and constant size group signatures, by Jens Groth
For constructing asymptotically optimal NIZK proofs and group signatures without using random oracles, and paving the way to practical constructions.
2020 Recipients (for papers published in 2005)
From Eurocrypt 2005:
Fuzzy Identity-Based Encryption , by Amit Sahai and Brent WatersFrom Crypto 2005:
For laying the foundations of attribute-based encryption and other advanced notions of encryption.
Finding collisions in the full SHA-1 , by Xiaoyun Wang, Yiqun Lisa Yin and Hongbo YuFrom Asiacrypt 2005:
For a breakthrough in the cryptanalysis of hash functions.
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log, by Pascal Paillier and Damien Vergnaud
For developing a new meta-reduction approach in the security proof of cryptosystems
2019 Recipients (for papers published in 2004)
From Eurocrypt 2004:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , by Yevgeniy Dodis, Leonid Reyzin, Adam D. SmithFrom Crypto 2004:
For introducing new techniques for entropy extraction from noisy data.
The full version of this Eurocrypt 2004 paper was later published in the SIAM Journal on Computing, 38 (1), 97-139, 2008 , together with Rafail Ostrovsky as an additional author. The authors gratefully acknowledge his contribution to their joint work.
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , by Antoine JouxFrom Asiacrypt 2004:
For the development of an important attack on a widely-used class of collision resistant hash functions.
How Far Can We Go Beyond Linear Cryptanalysis? , by Thomas Baignères, Pascal Junod, Serge Vaudenay
For introducing new techniques in linear cryptanalysis of block ciphers.
Nominations and Contact Information
Nomination information can be found here. The chair of the Selection Committee can be reached by email at .