IACR Newsletter The newsletter of the International Association for Cryptologic Research. Vol. 26, No. 1, Spring 2011, (Publication date: 3 March 2011). To avoid problems with spam filters, most links were omitted in this sending. You find a version with all links at http://www.iacr.org/newsletter/v26n1/ Contents * Survey IACR Elections 2010 * Book Reviewers needed * Upcoming Events * IACR Fellows 2011 selected * IACR Elections 2010 / Results * Message from the President * On the Memory of Prof. Chi-Sung Laih * Mobile Phone Security Algorithms - New Version * Service to members and the cryptographic community * Reports on past events * Book Reviews * List of books for review * Cryptology ePrint Archive: Top 20 Downloads Survey IACR Elections 2010 In order to evaluate the past IACR election, a survey has been set up. Please help us to identify the strong and weak points by participating! Detailed results of the 2010 election are given below. Book Reviewers needed Have you read a book lately? Do you got an opinion about it? Was the book about cryptography (or some related subject)? If the answer for all three questions was "yes!" - why not helping the cryptographic community by writing a book review? You find a list of books still looking for a reviewer at our book review site or at the end of this newsletter. You can also find some sample reviews there. If you have any questions, please contact Axel Poschmann (books (at) iacr.org) directly. Upcoming Events IACR Conferences * Eurocrypt 2011, May 15-May 19, 2011, Tallinn, Estonia. Early registration is open. * Crypto 2011, August 14-August 18, 2011, Santa Barbara, USA. * Asiacrypt 2011, December 4-December 8, 2011, Seoul, Korea. * Eurocrypt 2012, April 15-19, 2012, Cambridge, UK. * Crypto 2012, August 19-23, 2012, Santa Barbara, USA. IACR Workshops * 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011), March 6-March 9, 2011, Taormina, Italy. Late registration is open. * Theory of Cryptography Conference (TCC 2011), March 27-March 30, 2011, Providence, RI, USA. Late registration is open. * 13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2011), September 25-September 28, 2011, Tokyo, Japan. * 15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012), March 6-9, 2012, Tokyo, Japan. Events in cooperation with IACR * IEEE Symposium on Security and Privacy (IEEE S&P 2011), May 22-25, 2011, Berkeley, USA. * Africacrypt 2011, July 4-8, 2011, Dakar, Senegal. * International Conference on Security and Cryptography (SECRYPT'11), July 18-21, 2011, Seville, Spain. * The 18th Workshop on Selected Areas in Cryptography (SAC 2011), August 11-12, 2011, Toronto, Canada. Further events can be found here. You can also add your events or calls for special issues of journals there. IACR Fellows 2011 selected * David Kahn: For being cryptography's foremost historian and a co-founder of the IACR. * Charlie Rackoff: For pioneering contributions to the scientific foundations of cryptology and for sustained leadership in cryptographic education. * Richard Schroeppel: For pioneering and analysing the sieving technique underlying subexponential factoring and discrete logarithm methods. * Scott Vanstone: For essential work on the deployment of Elliptic Curve Cryptography, sustained educational leadership in applied cryptology, and service to the IACR. IACR Elections 2010 / Results The 2010 IACR elections included races for all IACR Officer positions (President, Vice-President, Treasurer, and Secretary) and three rotating Director positions. There was one candidate for President, two for each of the three other Officer positions, and six candidates for the three Director positions (one candidate ran both for an Officer and Director position). For the first time, the IACR elections were conducted electronically using the Helios cryptographically-verifiable voting system. Despite a small number of concerns and complaints about possible security issues with online voting (even with a universally-verifiable system), the election seemed quite successful with a participation rate approximately 50% higher than with prior paper-based postal elections. The electronic system also reduced costs, substantially decreased lead time, and eliminated disqualification of ballots due to voter errors. Additionally, members who previously did not have an opportunity to vote because the IACR did not have a current physical address or because of slow mail service were able to participate in this election. Voting credentials were sent to 1555 IACR members - including 52 for whom the IACR had no physical address. A total of 499 ballots were cast by 475 distinct voters (only the last ballot submitted by each voter is included in the tally). An additional 26 optional “challengeâ€� ballots were submitted for inclusion in the election audit - these challenge ballots helped to ensure the integrity of the Helios voting clients. Candidate names on the ballot were randomly ordered by the election chair using dice rolls. The results, as follows, were verified by the Helios election auditor as well as an independent auditor written and hosted by UC Louvain. Election of Officers Seven candidates stood for the four open officer positions. The candidates with the highest number of votes were elected. They are marked in bold (* *): President: *Bart Preneel* (429) Vice President: *Christian Cachin* (268) Helena Handschuh (179) Secretary: *Martijn Stam* (265) James Hughes (162) Treasurer: *Greg Rose* (275) Marcelo Kaihara (141) Their terms will expire on 31 December 2013. Election of Directors Six candidates stood for the three open positions of Director. The three candidates with the highest number of votes were elected. Their names are in bold (* *). * *David Pointcheval* (230) * *Mitsuru Matsui* (216) * *Christof Paar* (210) * Amit Sahai (169) * John Kelsey (130) * Christian Cachin (199) /Not eligible as a director as already voted as vice-president/ Their terms will expire on 31 December 2013. Message from the President In the Fall of 2010, the IACR has held for the first time elections using the Helios system. The election process was run very smoothly. Participation was up by about 50% compared to the previous years. I would like to thank the Helios team and the members of the Election Committee and the Board members who have made this happen. If you have suggestions for the improvement of Helios or the election procedures, we would like to hear from you. This is also the right time to thank Ed Dawson for his long service on the IACR Board (as Director, Vice President and Asiacrypt Steering Committee Chair), Helena Handschuh for her service as Treasurer, and Tom Shrimpon for serving as Membership Secretary. You will also find in this newsletter the upcoming events for the next months; with three workshops and one conference the period February-May is always always a peak period for the IACR. I would like to thank the general chairs and program chairs of these events for their hard work; special thanks also to the IACR team that supports these events behind the scenes, and in particular Shai Halevi (membership secretary), Helena Handschuh (outgoing treasurer) and Greg Rose (new treasurer). In the coming period, IACR will make a shift towards electronic publishing. By listening to your feedback, we have learned that there is a growing number of members who no longer want to receive publications on paper. A natural starting point to offer this option is the Journal of Cryptology, as this can bring a substantial cost reduction; in a later stage we may expand this to the workshops and conferences. Bart Preneel IACR President On the Memory of Prof. Chi-Sung Laih It is with great sorrow that we learned the passing of Professor Chi Sung Laih. Professor Chi-Sung Laih was one of Taiwan's most distinguished researchers in cryptography and information security. He was born in 1956, in a remote village in southern Taiwan. After graduating from a vocational high school, he worked for Chunghwa Telecom. At the same time, he also studied as a part-time student at National Cheng Kung University (NCTU). After receiving his bachelor's degree, he went on to obtain a master degree and then a doctorate degree in Electrical Engineering from the same university. He graduated with his doctorate degree in 1990 and then joined the faculty of NCKU. Professor Laih was a dedicated professor and researcher. He tried his very best in doing everything. He published in many prestigious journals and conferences. His research area includes public-key cryptography, information security, error correcting codes, and communication systems. In 1994, working together with other professors, Professor Laih contributed to the formation of the Chinese Cryptography and Information Security Association (CCISA) in Taiwan. This organization has not only enabled researchers in Taiwan to pool their resources and ideas, but has also fastened interactions with similar organizations in other parts of the world. Professor Chi-Sung Laih served two terms as the Chairman of the Board of Directors of CCISA. In his tenure, he sought to host an Asiacrypt conference in Taiwan. This was the first attempt for Taiwan to host such a conference. Through his hard work, the CCISA was able to secure financial support, overcoming all sorts of difficulties during the initial stage of the preparation. His efforts contributed greatly to the eventual success of the ASIACRYPT 2003. Professor Laih was awarded "The Excellence Research Award" by National Science Council in 1996 and 1998. Starting from 2002, he was appointed as the Chair Professor at NCTU. He was invited to give invited speech and awarded "The Best Paper Award" in many conferences. In addition to the academic achievement, he also helped many government agencies, as well as private companies, to enhance their information security infrastructure. Professor Chi-Sung Laih passed away on August 29, 2010. His contributions to cryptography and information security will be missed by all of us. Asiacrypt Steering Committee (ASC) of IACR & Chinese Cryptology and Information Security Association (CCISA). Mobile Phone Security Algorithms - New Version Previously on this web site and also in the September 2010 IACR Newsletter we reported that a new set of cryptographic algorithms was being proposed for inclusion in the "4G" mobile standard called LTE (Long Term Evolution). The crypto community was invited to analyse the algorithms and report results. The algorithms are: * a stream cipher called ZUC, which is the core of both new LTE algorithms; * the LTE encryption algorithm called 128-EEA3, defined straightforwardly using ZUC; * the LTE integrity algorithm called 128-EIA3, designed as a Universal Hash Function using ZUC as its core. The public evaluation yielded valuable results. Some flaws were identified in the algorithms. New versions of the algorithms have now been produced, correcting those problems, and a new period of public evaluation has begun. The algorithms are here: http://gsmworld.com/our-work/programmes-and-initiatives/frau d-and-security/gsm_security_algorithms.htm. The design and evaluation report (Document 4) includes details of what has changed and why. Analysis of the new algorithm versions is invited, before a final decision is taken in (probably) July 2011 as to whether to include the new algorithms in the LTE standard. The discussion forum http://zucalg.forumotion.net/ is still the right place to post any evaluation results. Service to members and the cryptographic community Among others, IACR offers the following benefits: a. IACR Reading Room b. Open Positions c. ePrint d. IACR Archive a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis. c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions. d. The proceedings of some conferences past are made available by the IACR in an archive. The copyright for these papers is held by the IACR. Reports on Past Events Asiacrypt 2010, December 5-9, 2010, Singapore Asiacrypt 2010 was held at Swissôtel Merchant Court, Singapore, on 5 - 9 December 2010. A total of 35 research papers, categorized into 12 sessions, were presented, selected from 219 submissions. Bart Preneel, President of IACR, and Krawczyk Hugo from IBM Research delivered the invited lectures on the topics "Cryptographic Hash Functions and the SHA-3 Competition" and "Cryptography, from Theory to Practice: A Personal Perspective", respectively. The Rump Session was chaired by Ed Dawson. Most of the presentation slides for the technical sessions and all the slides for the rump session can be found on the conference website at http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/Program.html and http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/rumpsession. html, respectively. The conference banquet was held at Grand Shanghai Restaurant, a 15-minute stroll along the banks of the Singapore River from the conference hotel, on Wednesday evening. The best paper award was also presented during the banquet to Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger for their paper "Rotational Rebound Attacks on Reduced Skein". The conference ended successfully on 9 December, having attracted 239 participants (50 being students), from 30 countries, mainly from Asia (146), Europe (61) and North America (21). We thank the sponsors for their generous support and contributions to the success of the conference. Program Chair was Masayuki Abe and General Chair was San Ling. Fast Software Encryption 2011, February 13-16, 2011, Lyngby, Denmark FSE 2011 took place from February 13 to February 16, 2011, in Denmark. The general co-chairs were Lars R. Knudsen and Gregor Leander and the program chair Antoine Joux. This was the 18th edition of FSE. The venue was the Technical University of Denmark which is some 30 kilometres north of Copenhagen. There were about 150 attendees most of which stayed in hotels downtown Copenhagen. Each morning there were FSE buses from a central hotel to the conference venue and buses the other way in the afternoon. There was a rump session on the Monday chaired this time by Vincent Rijmen. The registration fee for normal attendees was 350 US$ (not including the 70$ IACR membership fee). As a new initiative the printed proceedings will not be sent to the attendees but all have access to the electronic version when published through the IACR reading room at Springer. Moreover, FSE 2011 did not have printed pre-proceedings, but instead made the papers available online before and during the conference. There was a record number of submissions, 106 (matching the number from 2006) of which 22 were accepted for presentation. There were two invited talks, one by Willi Meier and one by Ivan Damgaard. Inscrypt 2010, October 20-23, 2010, Shanghai, China Inscrypt 2010 was held in Shanghai China from October 20 to 23, there were nearly 110 participants from 16 countries and regions. This conference was held in the Academic Activity Center (AAC-Hotel) at Min-Huang Campus of Shanghai Jiaotong University. The banquet was held at the Xiao Nan Guo Restaurant in the evening of October 22. The conference organizers are State Key Laboratory of Information Security, Chinese Association for Cryptologic Research and Shanghai Jiaotong University. Programme chairs are Xuejia Lai and Moti Yung, General chair was Dengguo Feng. Book Reviews The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas. If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available! In general, new books will be added around January and July to these lists. An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all reviews added since the last newsletter was sent out. You can access the full list via the following link. * Jonathan Katz and Yehuda Lindell: "Introduction to Modern Cryptography", 2008: Introduction to Modern Cryptography provides a very well-balanced and thorough introduction to cryptography. This it book highlights precise definitions and rigorous proofs that have shaped cryptography into its current mathematically enriched form. It covers fundamental notions of modern cryptography ranging from public, private key encryption to data integrity and signatures. This is a must-read for researchers in cryptography. Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-584-885-511 Review written by Ladan Mahabadi (McGill University, Melbourne, Canada). (Date: 2011-03-01) A previous review of this book by Cristina Onete can be found here. (Date: 2010-01-13) * B. Schneier: "Beyond Fear", 2006: This book is about security in general. In contrast to many other books, Schneier explains how security works in the most general case, starting from protecting the diary of your sister to protecting the nation from global terrorism. Schneiers book does not focus on cryptography or network security, instead it uses examples of systems everyone is expected to be familiar with, e.g. airport security. The book entertains the reader and encourages him thinking rational about security threads and security solutions. I would recommend the book to everybody who starts working in the security business, but not for readers who are searching for technical details about any kind of security systems. Review written by Erik Tews (TU Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-0-387-02620-6 (Date: 2010-11-03) * J. Smith: "Introduction to Abstract Algebra", 2008: This is a careful treatment of the principal topics of Abstract Algebra in 327 pages. Taking a different approach from several books, it helps the reader to have a solid introduction to abstract algebra and establishes the link between it and the cryptographic world in many "Study projects". This is an attractive book which could be read by everybody because the author supposes not so much knowledge from the reader and gives all the necessary information to continue the reading from a chapter to the next. I believe that the readers, students and even experienced researchers may benefit strongly from this book. Review written by Frederic A.B. Edoukou (CCRG, Nanyang Technical University, Singapore). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-6371-4 (Date: 2010-10-11) * A. Joux: "Algorithmic Cryptanalysis", 2009: Algorithmic Cryptanalysis is a high level book that covers many interesting topics, so it is impossible to go into all details of the different topics. However, for each topic the reader can Þnd several references, which is a convenient extra of the book. I would recommend this book for graduate students with a strong mathematical background, a cryptographic background, knowledge in C-programming and an interest in implementing cryptanalytic attacks. Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-7002-6 (Date: 2010-10-07) * C. Paar and J. Pelzl: "Understanding Cryptography", 2010: This book does not make any assumptions on prior knowledge in neither mathematics nor computer science. It is therefore not only suited for undergraduate students in mathe- matics or in the computer science Þeld, but rather also for students from other domains requiring crypto skills such as legal people for example. I would certainly recommend this book for the audience it is targeting. Review written by Luigi Lo Iacono (European University of Applied Sciences). (PDF) Publisher: Springer. ISBN: 978-3-642-04100-6 (Date: 2010-10-07) * S. Mangard, E. Oswald and T. Popp: "Power Analysis Attacks: Revealing the Secrets of Smart Cards", 2007: This book provides a very clear, complete and highly illustrated presentation of power analysis methods used to extract secret information from cryptosystems such as smart cards. All concepts are progressively introduced, mathematically analyzed and illustrated using many real attacks results. The main attack methods and some variants as well as standard countermeasures are presented and their limitations and efficiency aspects are discussed. Both software and hardware implementations on smart cards are targeted. I highly recommend this very nice book. Review written by Arnaud Tisserand (CNRS, IRISA Laboratory, Lannion, France). (PDF) Publisher: Springer. ISBN: 978-0-387-30857-9 (Date: 2010-10-07) List of books for review The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. New book reviews are posted continiously. Available Books Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name]. Go to titles from: * Springer * Taylor & Francis Springer Below you find a selection of books from Springer. Further titles are available via Springer's website. 1. Adjeroh: The Burrows-Wheeler Transform 2. Bella: Formal Correctness of Security Protocols 3. Buchmann: Binary Quadratic Forms 4. Calmet: Mathematical Methods in Computer Science 5. Camp: Economics of Identity Theft 6. Dietzfelbinger: Primality Testing in Polynomial Time 7. Di Pietro: Intrusion Detection Systems 8. Fine: Number Theory 9. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms 10. Hromkovic: Algorithmic Adventures 11. Kuo: Precoding Techniques for Digital Communication Systems 12. Li: An Introduction to Kolmogorov Complexity and Its Applications 13. Mehlhorn: Algorithms and Data Structures 14. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications 15. Portnoy: Global Initiatives to Secure Cyberspace 16. Robshaw: New Stream Cipher Designs 17. Rodríguez-HenrÃquez: Cryptographic Algorithms on Reconfigurable Hardware 18. Rosen: Concurrent Zero-Knowledge 19. Salomon: A Concise Introduction to Data Compression 20. Sammes: Forensic Computing 21. Schellekens: A Modular Calculus for the Average Cost of Data Structuring 22. Schroeder: Number Theory in Science and Communication 23. Shi: Transactions on Data Hiding and Multimedia Security III 24. Traynor: Security for Telecommunications Networks 25. Tuyls: Security with Noisy Data 26. Vadhan: A Study of Statistical Zero-Knowledge Proofs 27. Vöcking: Taschenbuch der Algorithmen [German] 28. Yeung: Information Theory and Network Coding Taylor & Francis Below you find a selection of books from Taylor & Francis. 1. Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices 2. Thuraisingham, Bhavani: Secure Semantic Service-Oriented Systems 3. Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words 4. Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications 5. Chartrand, Gary: Chromatic Graph Theory 6. Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography 7. Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering 8. Erickson, Martin: Introduction to Number Theory 9. Gross, Jonathan L.: Combinatorial Methods with Computer Applications 10. Gould, Ronald J: Mathematics in Games, Sports, and Gambling 11. Hsu, Lih-Hsing: Graph Theory and Interconnection Networks 12. Johnson, Norman: Handbook of Finite Translation Planes 13. Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications 14. Lindner, Charles C.: Design Theory, Second Edition 15. Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies 16. Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems 17. Mollin, Richard A.: Advanced Number Theory with Applications 18. Newman, Robert C.: Computer Forensics: Evidence Collection and Management 19. Paulsen, William: Abstract Algebra. An interactive Approach 20. Peeva, Irena: Syzygies and Hilbert Functions 21. Roberts, Fred: Applied Combinatorics, Second Edition 22. Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations 23. Szabo, Sandor: Factoring Groups into Subsets 24. Talukder, Asoke K.: Architecting Secure Software Systems 25. Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition 26. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing 27. Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks 28. Zhang, Y.: Security in Wireless Mesh Networks Cryptology ePrint Archive: Top 20 Downloads in the last 6 month This report includes all downloads from the ePrint archive between September 1, 2010 and Februars 28, 2011. 1. 2010/332 ( PDF ) with 29078 downloads Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurelien Francillon and Boris Danev and Srdjan Capkun 2. 2007/120 ( PDF ) with 7903 downloads Breaking 104 bit WEP in less than 60 seconds Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin 3. 2004/314 ( PDF ) with 7435 downloads A Technical Comparison of IPSec and SSL AbdelNasir Alshamsi and Takamichi Saito 4. 2010/006 ( PDF ) with 5088 downloads Factorization of a 768-bit RSA modulus Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thom and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann 5. 2011/035 ( PDF ) with 2954 downloads A New Family of Practical Non-Malleable Protocols Andrew C. Yao and Yunlei Zhao 6. 2010/643 ( PDF ) with 2650 downloads Construct MD5 Collisions Using Just A Single Block Of Message Tao Xie and Dengguo Feng 7. 2010/439 ( PDF ) with 2581 downloads Embedded Extended Visual Cryptography Schemes Feng Liu and Chuankun Wu 8. 2004/199 ( PDF ) with 2315 downloads Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu 9. 2009/223 ( PDF ) with 1998 downloads How To Find Weak Input Differences For MD5 Collision Attacks Tao Xie and Dengguo Feng 10. 2008/469 ( PS PS.GZ PDF ) with 1920 downloads Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1 Stephane Manuel 11. 2006/231 ( PS PS.GZ PDF ) with 1820 downloads A handy multi-coupon system Sebastien Canard and Aline Gouget and Emeline Hufschmitt 12. 2006/262 ( PDF ) with 1806 downloads Logical Concepts in Cryptography Simon Kramer 13. 2011/018 ( PDF ) with 1621 downloads Homomorphic Signatures for Polynomial Functions Dan Boneh and David Mandell Freeman 14. 2006/105 ( PDF ) with 1568 downloads Tunnels in Hash Functions: MD5 Collisions Within a Minute Vlastimil Klima 15. 2004/203 ( PS PS.GZ PDF ) with 1546 downloads How to Cheat at Chess: A Security Analysis of the Internet Chess Club John Black and Martin Cochran and Ryan Gardner 16. 2009/579 ( PDF ) with 1413 downloads Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou 17. 2010/594 ( PDF ) with 1372 downloads Cache Games - Bringing Access Based Cache Attacks on AES to Practice Endre Bangerter and David Gullasch and Stephan Krenn 18. 2010/337 ( PDF ) with 1332 downloads Practical-Titled Attack on AES-128 Using Chosen-Text Relations Vincent Rijmen 19. 2002/045 ( PS PS.GZ PDF ) with 1233 downloads Cryptanalysis of S-DES Dr. K. S. Ooi, Brain Chin Vito 20. 2007/471 ( PDF ) with 1212 downloads Attacks on the WEP protocol Erik Tews __________________________________________________________ You may opt out of the newsletter either by editing your contact information and preferences here: https://secure.iacr.org/membership/members/update.html Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org. IACR contact information: Current newsletter editor is Christopher Wolf. You reach him via newsletter (at) iacr.org