IACR logo

IACR Newsletter

The newsletter of the International Association for Cryptologic Research .

Vol. 25, No. 1, Summer 2010, (Publication date: 15 June 2010 ).

Contents

Registration for Crypto and CHES open

Both for Crypto 2010 and CHES 2010, the registration is open now. A novum this year, both events are co-located in Santa Barbara, CA, USA.
At a glance:

Crypto 2010, August 15-19
University of California, Santa Barbara
Early bird registration: Thursday, July 15, 2010
Homepage: http://www.iacr.org/conferences/crypto2010/

CHES 2010, August 17-20
University of California, Santa Barbara
Early bird registration: Thursday, July 15, 2010
Homepage: http://www.cs.ucsb.edu/~koc/ches/ches2010/

Message from the President

I would like to invite you to read the Spring 2010 edition of our Newsletter. Christopher Wolf has done an excellent job in bringing you the news of our association; his initiative to start with book reviews has been an overwhelming success.

In spite of financial crisis and the ash cloud in the European skies, IACR is doing well: we have about 1600 members, and our finances are in good shape. This is only possible through the continuous efforts of the volunteers, who generously donate their time to run the website, update the membership database and archive, manage our finances, and organize our flagship conferences and workshops. I would like to express my sincere thanks to all these volunteers, as well as to those who are involved in the scientific dimension, by running program committees, editing the Journal of Cryptology, and reviewing or writing papers.

The Eurocrypt 2010 membership meeting has accepted the proposal from the Board to reduce the membership fee for 2012 (charged during 2011 events) from US$88 to US$70 (and from US$44 to US$35 for students). This reduction is justified because a move towards an electronic infrastructure has results in decreasing operating costs.

The IACR Board is working on our publication strategy: we are planning to gradually move away from paper as distribution format (by making it optional) and we are considering to evolve towards free access to all our scientific publications.

In 2010, the terms of three Directors and four Officers will expire. If you are interested in contributing to the IACR, please contact the members of the 2010 election committee (Josh Benaloh, Jean-Jacques Quisquater, and Serge Vaudenay).

After a successful trial this Winter (see http://www.iacr.org/elections/eVoting/ ), the following resolution was submitted by the IACR Board and approved at the Eurocrypt 2010 membership meeting: "The IACR will adopt the Helios remote e-voting system for future IACR elections, after correcting issues that arose during the recent demo election; this includes the provision of a solution for non-Java clients. At the same time, the IACR will clearly publish a statement that its use of this system does not constitute an endorsement of this or other remote-voting systems for public-sector elections." In the next months, the remaining issues will hopefully be resolved; if so, a second vote will be held at the Crypto 2010 membership meeting. I would like to thank the Helios team (Ben Adida, Olivier de Marneffe, Olivier Pereira) and the IACR e-voting committee (Josh Benaloh, Stuart Haber, Shai Halevi) for their contributions.

Bart Preneel
IACR President

IACR Elections 2009 / Results

Election of Directors

The elected directors are: Their terms started on 1 January 2010 and will expire on 31 December 2012.
We thank all the candidates, whether they were successful or not, for their significant support of IACR.

In total, 325 ballots were cast. The detailed results are also available on the IACR-website.

The members of the IACR 2009 Election Committee were Josh Benaloh, Ed Dawson, Christian Cachin

Upcoming Events

IACR Conferences

IACR Workshops

Events in cooperation with IACR

Further events can be found here . You can also add your events or calls for special issues of journals there.

Service to members and the cryptographic community

Among others, IACR offers the following benefits:

  1. IACR Reading Room
  2. Open Positions
  3. ePrint
  4. IACR Archive

a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link

b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis.

c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.

d. The proceedings of some conferences past are made available by the IACR in an archive . The copyright for these papers is held by the IACR.

Book Reviews

The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available ! In general, new books will be added around January and July to these lists.

An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all 42 reviews added since September 2009. You can access the full list via the following link .

Reports on Past Events

Crypto 2009 , August 16-20th, 2009, Santa Barabara, USA

CRYPTO 2009 was held, as always, in Santa Barbara, California, from August 16 to 20 under mostly-clear skies. The schedule was standard, with catered dinners Sunday and Monday along with a beach bbq on Wednesday. In attendance were 352 delegates from 37 countries, 113 being students. Delegates enjoyed a schedule of 38 regular conference presentations and two invites talks, one by Ed Felten and the other by Ueli Maurer. Dan Bernstein was Rump Session chair. Video and slides for most talks and the rump session can be found on the conference site at http://www.iacr.org/conferences/crypto2009/program.html .
Providing a small-font copy of the conference schedule as a badge insert turned out to be a hit, as were the black fleece vests. Any delegates who paid full registration and did not receive a vest should have been mailed one; if not, contact CRYPTO 2009 General Chair John Black.
The conference puzzle was \sum_{n=0}^\infty (2n^7+n6^+n^5)/n! which turned out to be 2009e. Eight correct answers were received, with the winner being randomly drawn from them to earn his locally-produced bottle of wine.
Many thanks to all who worked hard to produce this successful conference, especially to Program Chair Shai Halevi and his Program Committee along with Sally Vito and her staff as well as the tireless IACR board.

Asiacrypt 2009 , December 6-10, 2009, Tokyo, Japan

Asiacrypt 2009 was held in Tokyo Japan from December 6 to 10. There were more than 300 participants from over 35 countries. The program included 41 papers selected out of 300 submissions, a rump session in the evening of December 7 and an IACR distinguished lecture given by Dr. Tatsuaki Okamoto in the afternoon session of December 9. All these technical sessions were held at Hitotsubashi Memorial Hall and the banquet was held at Meiji Kinenkan in the evening of December 9 with Japanese food and Mochitsuki (Rice ball cooking) and Koto (Japanese traditional instruments) performances.
General chair was Eiji Okamoto and program chair was Mitsuru Matsui.

Eurocrypt 2010 , May 30-June 3, 2010, French Riviera, France

Eurocrypt 2010 was held May 30-June 3, 2010 on the French Riviera: the technical sessions were held at the Grimaldi Forum in Monaco while the social event took place on the beach in Nice.
The conference was attended by 389 participants 88 of whom were students. The participants came from 40 countries. After an intensive reviewing process (606 reports were produced) of the 188 valid submissions, 33 papers were eventually selected (17.6% acceptation rate). The conference program covered a very large range of topics among which lattice based designs, cryptanalyses, and cryptographic protocols. The best paper award was given to David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert for their paper "Bonsai Trees, or How to Delegate a Lattice Basis". Moti Yung gave the 2010 IACR Distinguished Lecture entitled "Cryptography between Wonderland and Underland". Dan Bernstein and Tanja Lange served as rump session chairs and their four vuvuzela holders enforced the time schedule for the 23 presentations. The full program can be seen at http://crypto.rd.francetelecom.com/events/eurocrypt2010/program .
The conference organizers are grateful to the sponsors I3S, Ingenico, Microsoft, Nagravision, Oberthur, Orange Labs, Sagem Sécurité, Technicolor, and Qualcomm for their generous support in the difficult economical setting. Qualcomm's support allowed the fees of 7 students attendees to be waived.
Program chair was Henri Gilbert, general chairs were Olivier Billet and Matt Robshaw.

CHES 2009 , September 6-9, 2009, Lausanne, Switzerland

The 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009) was held in Lausanne, Switzerland, from September 6 to 9. With 312 registered participants from 32 countries (including 70 students), it was not only the largest CHES ever, but also the largest IACR International Workshop. The local organization was in the hands of the Laboratory for Cryptologic Algorithms (LACAL) at the École Polytechnique Fédérale de Lausanne (EPFL).
The conference venue was at the EPFL. On Monday evening, the participants enjoyed a Dinner cruise on Lake Geneva and appreciated the Lavaux vineyards (designated part of the UNESCO World Heritage), the Chillon Castle and experienced the sunset in the Alpine scenery. The Rump Session took place at the Casino Montbenon, a Centrex for cultural and social event, surrounded by magnificent gardens with an unparalleled view of the mountains and the lake.
The CHES program committee received 148 submissions (the largest number of submissions in CHES ever). After an intensive review and discussion process, 29 regular papers (19.8%) were accepted. The program was complemented by three invited talks: Srini Devadas spoke on "Physical Unclonable Functions and Secure Processors"; Christof Paar on "Crypto Engineering: Some History and Some Case Studies" and Randy Torrance on "The State-of-the-Art in IC Reverse Engineering". The program included two special sessions "DPA Contest" chaired by Elisabeth Oswald and "Benchmarking of Cryptographic Hardware" chaired by Patrick Schaumont. Three best papers were awarded: "Faster and Timing-Attack Resistant AES-GCM" by Emilia Käsper and Peter Schwabe, "Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers" by Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, and Francisco Rodríguez-Henríquez, and "A New Side-Channel Attack on RSA Prime Generation" by Thomas Finke, Max Gebhardt and Wener Schindler.
The rump session chaired by Guido Bertoni consisted on 9 scientific presentations, and 7 funny talks and announcements.
Program co-chairs were Kris Gaj and Christophe Clavier, General chair was Marcelo E. Kaihara.

FSE 2010 , February 7-10, 2010, Seoul, Korea

FSE 2010 was held in Seoul, Korea, from February 7 to 10, 2010. The program included 21 papers that cover wide aspects of symmetric cryptography and two invited talks; "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Also, the program included the rump session which was organized and chaired by Orr Dunkelman. The Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur Ö>zen, Thomas Shrimpton, and Martijn Stam to receive the best paper award.
The workshop took place at Koreana Hotel, and there were 118 participants from 25 countries. On Monday evening, participants enjoyed NANTA, a funny, non-verbal, and rhythmical Korean performance. The gala dinner was held at the traditional Korean restaurant, SamcheongGak on Tuesday evening.
The workshop organizers gratefully acknowledge CIST, Korea University and Korea Institute of Information Security and Cryptology (KIISC) for their support in organizing the workshop. The financial support by Electronics and Telecommunications Research Institute (ETRI), Ellipsis, Korea University, LG CNS, and National Institute for Mathematical Science (NIMS) is also gratefully acknowledged.
Program Co-chairs were Seokhie Hong and Tetsu Iwata, and General Co-chairs were Jongin Lim and Jongsung Kim.

TCC 2010 , February 9-11, 2010, Zurich, Swiss

TCC 2010 took place at ETH Zurich from February 9 to 11. More than 100 researches from 19 countries attended the conference.
The technical program included 33 talks of accepted papers and two invited talks given by Jan Camenisch ("Privacy-enhancing cryptography: From theory into practice") and Yuval Ishai ("Secure computation and its diverse applications"). Furthermore, there were 18 short talks at the rump session, which was chaired by Nelly Fazio.
The social program included, besides the usual lunches, coffee breaks, and rump session dinner, also a Fondue cooked by the participants, and a farewell reception with fresh juices and fruits.
The conference was sponsored by Credit Suisse, Microsoft Research, Omnisec, and Google. Furthermore, we had sponsored chocolate from Laederach and sponsored coffee from Nespresso.
Program chair was Daniele Micciancio, General chairs were Martin Hirt and Ueli Maurer.

Public Key Cryptology (PKC 2010) , May 26-28, 2010, ENS Paris, France

The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010) was held at the École Normale Supérieure (ENS) in Paris, France from May 26 to 28, 2010. With 162 registered participants (including 41 students) from 26 countries, it was the biggest PKC ever. Though most of the participants came from France (49), several countries such as Japan (18), United States (17), United Kingdom (13), Germany (11), and China (7) were also well represented. The local organization was led by the ENS Crypto Team and the Office for Courses and Colloquiums ( Bureau des Cours-Colloques ) from the French National Institute for Research in Computer Science and Control (INRIA).
The conference received a record number of 145 submissions. After an intensive review and discussion process, 29 submissions were selected for publication and presentation at the conference. The final program was well balanced, covering various aspects of public key cryptography. The best paper was awarded to Petros Mol and Scott Yilek for their paper "Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions". The full program also included two invited talks. Jacques Stern from ENS gave a talk titled "Mathematics, Cryptography, Security" and Daniele Micciancio from UCSD spoke about "Duality in Lattice Based Cryptography". The social program involved a banquet at La Maison Des Polytechniciens on the second evening and a cocktail party at ENS on the last day of the conference.
The conference organizers would like to thank our sponsors Google, Ingenico, and Technicolor for their financial support as well as ENS for hosting the conference.
Program Co-chairs were Phong Q. Nguyen and David Pointcheval, and General Co-chairs were Michel Abdalla and Pierre-Alain Fouque.

International Conference on Information Theoretic Security (ICITS 2009) , December 3-6, 2009, Shizuoka, Japan

The 4th International Conference on Information Theoretic Security(ICITS 2009) was held in Shizuoka, Japan from December 3 to 6. There were 75 participants from over 13 contries. The meeting took place at the Shizuoka Convention & Arts Center "GRANSHIP". The banquet was held at the Fugetsuro Restaurant with featured live performances highlighting traditional Japanese culture to delight all those attending.
The ICITS program committee received 50 submissions. After an intensive review and discussion process, 13 papers were accepted.The program was complemented by 6 invited talks. Yevgeniy Dodis "Leakage-Resilience and The Bounded Retrieval Model", Masato Koashi "Security of Key Distribution and Complementarity in Quantum Mechanics", Kazukuni Kobara "Code-Based Public-Key Cryptosystems And Their Applications", Prakash Narayan "Multiterminal Secrecy Generation and Tree Packing", Adi Shamir "Random Graphs in Security and Privacy" and Adam Smith "What Can Cryptography Do for Coding Theory?".
The full program and slides of the invited speakers are available from the following URL.
The conference was received financial support from Support Center for Advance Telecommunications Technology Research and Kayamori Foundation of Informational Science Advancement. We also received local support from Shizuoka Convention & Visitors Bureau.
Program Chair was Kaoru Kurosawa, General Chair was Akira Otsuka.

Inscrypt 2009 , December 12-15, 2009, Beijing, China

Inscrypt 2009 was held in Beijing China from December 12 to 15, there were nearly 130 participants from 17 countries. This conference was held in Beijing Friendship Hotel. The banquet was held at the Ju Xiu Yuan Friendship Palace on the evening of December 14. The conference organizers are State Key Laboratory of Information Security and Chinese Association for Cryptologic Research. Programme chairs are Feng Bao and Moti Yung, General chair was Dengguo Feng.

List of books for review

The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . New book reviews are posted continiously.

If you are interested in reviewing any other books from Taylor & Francis or Springer, please send me an eMail, too. I am pretty sure that I can organize this book. I did not try yet for other publishers, but the process is pretty straight forward, i.e. if you want to review a book from any other publisher, send me an eMail, too. However, it may take a while.

Reviewing Guidelines

So, what should a review look like? Keep in mind that your review should be helpful for the reader. So summarize its content and then give examples for very good and very bad parts. Give an overall conclusion (e.g. this book could be particular helpful for the following group, is over the top / too easy for...). If your review is longer than the book or shorter than the text on its back, something went wrong. Apart from that, there are not guidelines. Just start reviewing and assume you would be reading your review. Would you like it? So the key questions are: Prefered format is PDF, see previous reviews or our LaTeX-Template . In addition, I need a 3-10 line "teaser" which more or less summarizes the whole review. In addition, you can also look at other reviews to get an idea what to cover. When requesting a book, please do also include your surface address! After receiving the book, you have 2 month to complete the review.

If you have any further questions, please contact Axel Poschmann via books at iacr.org .

Available Books

Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name] .

Go to titles from:

Springer
Below you find a selection of books from Springer. Further titles are available via Springer's website .
  1. Adjeroh: The Burrows-Wheeler Transform
  2. [done Gregory Kohring] Aigner: Proofs from THE BOOK
  3. [done Gregory Kohring] Aigner: Das BUCH der Beweise [German]
  4. [2009-12-17 Abdelhak Azhari] Baigneres: A Classical Introduction to Cryptography Exercise Book
  5. [done Yesem Kurt Peker] Baldoni: Elementary Number Theory, Cryptography and Codes
  6. [done Wael Said Abd Elmageed Mohamed] Bard: Algebraic Cryptanalysis
  7. [done Denise Reinert] Bauer: Decrypted Secrets
  8. [done Denise Reinert] Bauer: Entzifferte Geheimnisse [German]
  9. [done Jannik Pewny] Bauer: Historische Notizen zur Informatik [German]
  10. [!2010-05-01 Sebastian Gajek] Bella: Formal Correctness of Security Protocols
  11. [!2010-02-28 Ludovic Perret] Bernstein: Post-Quantum Cryptography
  12. Biggs: Codes: An Introduction to Information Communication and Cryptography
  13. [done S.V.Nagaraj] Biskup: Security in Computing Systems
  14. Buchmann: Binary Quadratic Forms
  15. [done Mohamed Saied Emam Mohamed] Buchmann: Introduction to Cryptography
  16. Calmet: Mathematical Methods in Computer Science
  17. [2009-08-19 Joerg Schwenk] Camp: Economics of Identity Theft
  18. [done Olivier Blazy] Chen: Terrorism Informatics
  19. [!!2010-06-15 Lakshmi Kuppusamy] Choo: Secure Key Establishment
  20. [done Stanislav Bulygin] Cid: Algebraic Aspects of the Advanced Encryption Standard
  21. [done Cristina Onete] Cole: Networked RFID Systems and Lightweight Cryptography
  22. [!2010-06-15 Meiko Jensen] Damiani: Open Source Systems Security Certification
  23. [done Seyyd Hasan Mirjalili] Delfs: Introduction to Cryptography
  24. [not yet published Safuat Hamdy] Desmedt: Secure Public Key Infrastructure
  25. Dietzfelbinger: Primality Testing in Polynomial Time
  26. [done Albrecht Petzold] Ding: Multivariate Public Key Cryptosystems
  27. Di Pietro: Intrusion Detection Systems
  28. Fine: Number Theory
  29. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  30. [done Luigi Lo Iacono] Hafner: Security Engineering for Service-Oriented Architectures
  31. [done Cristina Onete] Henrici: RFID Security and Privacy
  32. [!2010-04-09 Paolo Palmieri] Higgins: Number Story
  33. Hoffstein: An Introduction to Mathematical Cryptography
  34. Hromkovic: Algorithmic Adventures
  35. [not yet published Marc Joye] Katz: Digital Signatures
  36. [done Kilian David] Kizza: Guide to Computer Network Security
  37. Koblitz: Random Curves
  38. [done Azzeddine Ramrami] Koç: Cryptographic Engineering
  39. Kuo: Precoding Techniques for Digital Communication Systems
  40. [2010-01-07 Joerg Gerschuetz] Lee: Botnet Detection
  41. [done Andrew Waterhouse] Lemke: Embedded Security in Cars
  42. Li: An Introduction to Kolmogorov Complexity and Its Applications
  43. [!2010-05-30 Arnaud Tisserand] Mangard: Power Analysis Attacks
  44. [done Eric Diehl] Mayes: Smart Cards, Tokens, Security and Applications
  45. Mehlhorn: Algorithms and Data Structures
  46. [2010-01-27 Ulrich Dürholz] Micheloni: Error Correction Codes for Non-Volatile Memories
  47. [done Luigi Lo Iacono] Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java
  48. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  49. [2010-03-10 Luigi Lo Iacono] Paar: Understanding Cryptography - A Textbook for Students and Practioners
  50. Portnoy: Global Initiatives to Secure Cyberspace
  51. Robshaw: New Stream Cipher Designs
  52. Rodríguez-Henríquez: Cryptographic Algorithms on Reconfigurable Hardware
  53. Rosen: Concurrent Zero-Knowledge
  54. [done Rolf Oppliger] Rothe: Komplexitätstheorie und Kryptologie [German]
  55. [2010-03-31 Eric Diehl] Rousseau: Mathematics and Technology
  56. Salomon: A Concise Introduction to Data Compression
  57. [done Stas Bulygin] Sala: Gröbner Bases, Coding, and Cryptography
  58. Sammes: Forensic Computing
  59. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  60. [!2010-01-30 Erik Tews] Schneier: Beyond Fear
  61. Schroeder: Number Theory in Science and Communication
  62. Shi: Transactions on Data Hiding and Multimedia Security III
  63. [done Jannik Pewny] Singh: Identifying Malicious Code Through Reverse Engineering
  64. [2010-02-28 Steven Galbraith] Stichtenoth: Algebraic Function Fields and Codes
  65. Stolfo: Insider Attack and Cyber Security
  66. [done Choudary Gorantla] Sun: Network-Aware Security for Group Communications
  67. Traynor: Security for Telecommunications Networks
  68. Tuyls: Security with Noisy Data
  69. Vadhan: A Study of Statistical Zero-Knowledge Proofs
  70. [done Jothi Rangasamy] Vaudenay: A Classical Introduction to Cryptography
  71. Vöcking: Taschenbuch der Algorithmen [German]
  72. [!2010-07-15 Mario Strefler] Wang: Computer Network Security
  73. [done Joerg Gerschuetz] Yan: Primality Testing and Integer Factorization in Public-Key Cryptography
  74. [done Yuriy Aydarov] Yan: Cryptanalytic Attacks on RSA
  75. Yeung: Information Theory and Network Coding
Taylor & Francis
Below you find a selection of books from Taylor & Francis. Titles added on 12 February 2010 are marked with New! at the beginning. Further titles are available via Taylor & Francis's website .
  1. Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices
  2. [done Eric Diehl] Avoine, Gildas: Computer System Security: Basic Concepts and Solved Exercises
  3. Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words
  4. [done S.V. Nagaraj] Boudriga, N.: Security of Mobile Communications
  5. Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications
  6. Chartrand, Gary: Chromatic Graph Theory
  7. Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography
  8. Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering
  9. [done Olivier Blazy] Elbirt, Adam J.: Understanding and Applying Cryptography and Data Security
  10. Erickson, Martin: Introduction to Number Theory
  11. Gross, Jonathan L.: Combinatorial Methods with Computer Applications
  12. Gould, Ronald J: Mathematics in Games, Sports, and Gambling
  13. [done Julia Borghoff] Hardy, Darel W.: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition
  14. Heubach, Silvia: Combinatorics of Compositions and Words
  15. [done Jannik Pewny] Hinek, M. Jason: Cryptanalysis of RSA and Its Variants
  16. Hsu, Lih-Hsing: Graph Theory and Interconnection Networks
  17. [done Olivier Blazy] Jacobson, Douglas: Introduction to Network Security
  18. Johnson, Norman: Handbook of Finite Translation Planes
  19. [2009-08-18 David M'Raihi / !2010-01-31 Julia Borghoff] Joux, Antoine: Algorithmic Cryptanalysis
  20. [done Cristina Onete] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  21. [!2010-02-22 Ladan Mahabadi] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  22. Kirovski, D.: Multimedia Watermarking Techniques and Applications
  23. [2010-03-08 Cristina Onete] Kitsos, P.: Security in RFID and Sensor Networks
  24. Koolen, Jack: Applications of Group Theory to Combinatorics
  25. [done Jannik Pewny] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  26. [? 2009-08-24 Landan Mahabadi] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  27. Lindner, Charles C.: Design Theory, Second Edition
  28. Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies
  29. Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems
  30. [done Francesco Sica] Mollin, Richard A.: Fundamental Number Theory with Applications, Second Edition
  31. Mollin, Richard A.: Advanced Number Theory with Applications
  32. [done Ken Radke] Mollin, Richard A.: Codes: The Guide to Secrecy From Ancient to Modern Times
  33. Newman, Robert C.: Computer Forensics: Evidence Collection and Management
  34. Paulsen, William: Abstract Algebra. An interactive Approach
  35. Peeva, Irena: Syzygies and Hilbert Functions
  36. Roberts, Fred: Applied Combinatorics, Second Edition
  37. Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations
  38. [!2010-07-31 Aka Bile Frederic Edoukou] Smith, Jonathan D. H.: Introduction to Abstract Algebra
  39. available from May 2010 Stanoyevitch, A.: Introduction to Cryptography with Mathematical Foundations and Computer Implementations
  40. Szabo, Sandor: Factoring Groups into Subsets
  41. [2010-04-13 Vincent Immler] Talukder, Asoke K.: Architecting Secure Software Systems
  42. [done Jannik Pewny] Valiente, Gabriel: Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R
  43. Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition
  44. [done Vincent Immler] Washington, Lawrence C.: Elliptic Curves: Number Theory and Cryptography, Second Edition
  45. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing
  46. Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
  47. Zhang, Y.: Security in Wireless Mesh Networks
Wiley and Sons
Below you find a selection of books from Wiley and Sons. Further titles are available via Wiley and Sons' website .

You may opt out of the newsletter either by editing your contact information and preferences here .

Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org .

IACR contact information . Current newsletter editor is Christopher Wolf.