IACR logo

IACR Newsletter

The newsletter of the International Association for Cryptologic Research .

Vol. 26, No. 2, Autumn 2011, (Publication date: 25 November 2011 ).

Contents

New News Service available

Stay tuned with latest news from the IACR! This includes new events, jobs, IACR elections, books & book reviews, and further news. They are all bundled at one web-site . In addition, you can get them sent to you as eMail or access them via Twitter and RSS .

Central overview page: http://www.iacr.org/news/ .

Upcoming Events

IACR Conferences

IACR Workshops

Events in cooperation with IACR

Further events can be found here . You can also add your events or calls for special issues of journals there.

Message from the President

The 2011 elections have just been completed. I would like to use this occasion to congratulate the three elected Directors (Josh Benaloh, Shai Halevi, and Nigel Smart) and to thank all the candidates, the election committee (Serge Vaudenay, Greg Rose, and Martijn Stam) as well as Ben Adida and the Helios team. I am very pleased with the record participation rate and I would like to encourage the cryptographic community to continue the research on improving our election systems.

The IACR board has appointed Abi Shelat (University of Virginia) for a three-year team as Membership Secretary starting in January 2012. I would like to thank Abi for accepting his nomination and Shai for his outstanding service as Membership Secretary during the past six years.

The IACR Board is taking further steps to move away from paper publications. Today you can opt out for the paper copies of the Journal of Cryptology and in 2012 the conferences and workshops will transition to an opt-in approach for paper copies of the proceedings. It has also been decided that in the next years we will switch to open access for our proceedings with as goal to make our scientific work available to a broader audience.

I would like to conclude by thanking all the volunteers of the IACR community: it is a real pleasure to work with all you. I would also like to encourage all of you to share your views, concerns and ideas with the Board Members and to contribute to the cryptologic community. Here goes something

IACR Elections 2011 / Result

The 2011 election was held to fill three of nine IACR Director positions. The term of the following three directors expires by the end of 2011: Josh Benaloh, Stuart Haber, and Antoine Joux. This year, we had six candidates: Josh Benaloh, Alexandra Boldyreva, Shai Halevi, Phong Nguyen, Tom Shrimpton, and Nigel Smart ( see below ).

Voting IACR members were invited to cast their votes between October 1 and November 15, 2011. The vote was run electronically by the heliosvoting.org service. This year, IACR switched to "approval voting", meaning that each voter could vote for as many candidates as they desire (but only once for each candidate).

We had 1484 eligible voters. We collected 621 ballots, giving a record participation rate of 41.8%. The tallies are

The three elected directors are Shai Halevi, Nigel Smart, and Josh Benaloh. They are marked in bold above. Their term will run until 2014.

The election committee would like to thank all candidates for their participation, to congratulate the three elected directors, and to warmly thank Ben Adida for his help in running the helios system.

The election committee: Serge Vaudenay (Chair), Greg Rose, and Martijn Stam.

Distinguished Lectures 2012 & 2013

Dan Boneh will hold the IACR Distinguished Lecture 2012 at Asiacrypt in Beijing, China. We are looking forward to his talk!

Eli Biham will hold the IACR Distinguished Lecture 2013 at Eurocrypt in Athens, Greece. We are looking forward to his talk!

Title and abstract of both talks will be posted on the IACR web site close in time to the corresponding talk.

Service to members and the cryptographic community

Among others, IACR offers the following benefits:

  1. IACR Reading Room
  2. Open Positions
  3. ePrint
  4. IACR Archive
  5. News Service

a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link

b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis.

c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.

d. The proceedings of some conferences past are made available by the IACR in an archive . The copyright for these papers is held by the IACR.

e. News from the cryptographic community such as events, jobs, books & their reviews are available at the News Service . It is also posted through RSS, eMail and Twitter.

Conference Announcements

Africacrypt 2012 , Ifrane, Morocco, 10-12 July 2012

After four successful Africacrypt conferences (Dakar Senegal 2011; Stellenbosch, South Africa 2010 ; Gammarth, Tunis, Tunisia, 2009; and Casablanca, Morocco 2008), the fifth edition of Africacrypt (http://www.aui.ma/africacrypt2012) will take place at Al Akhawayn University in Ifrane, Morocco, 10-12 July 2012, whereby establishing a tradition in the science of cryptology and related disciplines in the African continent. Beyond providing an international forum for practitioners and researchers from industry, academia, and government from all over the world, the conference aims at the promotion of cryptography research in Africa, especially among your African researchers. Located in the middle of the Atlas mountains, and at the cross road of major imperial cities, the venue for this edition, that is Ifrane, Morocco, is synonymous of a social program as rich as the scientific program.

Papers must be submitted electronically . More instructions are available in the call for papers.
Important dates:

Reports on Past Events

Crypto 2011 , August 14-18, 2011 in Santa Barbara, USA

Crypto 2011 was held on the campus of the University of California, Santa Barbara, from August 14-18. The Program Chair was Phillip Rogaway, and the General Chair was Thomas Shrimpton. A total of 230 papers were submitted. Of these, 43 were accepted (two were merged in the program), with the paper "Computer-Aided Security Proofs for the Working Cryptographer", by Gilles Barthe, Benjamin Gregoire, Sylvain Heraud, and Santiago Zanella Beguelin, selected to receive the Best Paper award by the program committee.

The IACR Distinguished Lecture, entitled "Illegitimi Non Carborundum", was delivered by Ron Rivest. Roger Dingledine also give an invited talk, "Tor and Circumvention: Lessons Learned". Shai Halevi provided a tutorial lecture on fully homomorphic encryption. Almost all of the talks --regular, tutorial, invited and distinguished-- were video recorded. These videos, along with the authors' slides, will soon be available from the conference program webpage. (Some videos are already available on YouTube.) Dan Bernstein and Tanja Lange organized and co-chaired yet another entertaining Rump Session .

Attendance at Crypto 2011 was quite high, with 412 registered attendees, up from 335 at Crypto 2009, and not far off from the 451 that attended the collocated Crypto/CHES2010. The Program Committee's excellent, broader than usual program was likely the cause for the jump in attendance.

Generous donations from Qualcomm, Microsoft Research and Voltage Security, as well as continuing support from the Marconi Fund for Student Authors, were used to provide registration waivers and travel support for 42 students. The Chairs of Crypto 2011 are very grateful for the terrific work of Sally Vito and the UCSB conference services staff.

Public Key Cryptography 2011 (PKC) , March 6-9, 2011, Taormina, Italy

The 14th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC'11) was held at the Hotel "Villa Diodoro" in Taormina, Italy, on March 6--9, 2011. The organizing committee included Rosario Gennaro (Program Chair), Nelly Fazio and Antonio Nicolosi (General co-Chairs), and Dario Catalano (Local Arrangements Chair).

The technical program featured 28 papers selected from 103 submissions, along with an invited lecture on "New Developments in Leakage-Resilient Cryptography" by Vinod Vaikuntanathan of Microsoft Research. The conference attracted 87 delegates (including 21 students) from 21 countries, mainly from Europe (50), Asia (17), North America (16). The social program included an optional excursion to attend the closing day of the local carnival celebrations (allegorical floats, costumed groups, fireworks and the burning of King Carnival).

The generous support of the conference sponsors was also an important factor for the success of the event, and is gratefully acknowledged.

Theory of Cryptography Conference 2011 (TCC) , March 28-30, 2011, Providence, RI, USA

TCC 2011 took place from March 28 to March 30, 2011, at Brown University, Providence, RI, USA. The general chair was Anna Lysyanskaya and the program chair was Yuval Ishai. This was the eighth edition of TCC.

There were 110 registered participants; 50 of them were students. Most of the participants stayed in hotels in downtown Providence; a block of rooms was arranged for TCC at the Hampton Inn and at the Biltmore. Although the conference venue was only a 20-minute walk from the hotels, the conference provided a shuttle to and from the venue that made several roundtrips in the morning and then several more after the talks ended.

The full registration amount was $272, while the student rate was $136. The IACR membership fee was an additional $70 full and $35 student, but it only applied to those participants who had not attended another IACR meeting this year. Each participant received a copy of the proceedings.

The program consisted of 35 papers, selected from 108 submissions; two invited talks, by Luca Trevisan and Rafael Pass; and the rump session, chaired by Tal Malkin.

Cryptographic Hardware and Embedded Systems (CHES) 2011 , Nara, Japan, Sept 28-Oct 1

CHES 2011 was held at Todai-ji Cultural Center, Nara, Japan, from September 28 to October 1, 2011.

The program co-chairs were Bart Preneel and Tsuyoshi Takagi, and the general chair was Akashi Satoh. CHES 2011 received 119 submissions from 26 different countries, and 32 papers were selected for publication in the proceedings. Two invited talks were given by Tetsuya Tominaga (NTT) and Ernie Brickell (Intel) on the topics "Standardization Works for Security of Electromagnetic Environment" and "Technologies to Improve Platform Security", respectively.

The conference banquet and the rump session were held at Hotel Nikko Nara on Friday evening. The best paper award was also presented during the banquet to Michael Hutter and Erich Wenger for their work "Fast Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors".

All presentation slides for the technical sessions including the invited talks and the rump session can be found on the workshop website at http://www.iacr.org/workshops/ches/ches2011/program.html and http://www.iacr.org/workshops/ches/ches2011/rump.html , respectively.

The workshop ended successfully on October 1, having attracted 315 participants (60 being students), from 27 countries, mainly from Asia (162), Europe (98) and North America (47). We thank the sponsors for their generous support and contributions to the success of CHES 2011.

Africacrypt 2011 , July 5-7, 2011 in Dakar, Senegal.

The 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held July 5-7, 2011 in Dakar, Senegal. The Program Committee, aided by reports from 52 external reviewers, produced a total of 240 reviews in all. The 23 papers presented were carefully reviewed and selected from 76 submissions. They are organized in 10 topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs. The program was completed with 3 invited talks by:

The general chair was Mamadou Sanghare and the general co-chair was Djiby Sow. The program chair was David Pointcheval and the program co-chair was Abderrahmane Nitaj. The African paper entitled "On randomness extraction in elliptic curves" written by Abdoul Aziz Ciss and Djiby Sow was accepted as one of the best papers. The venue was at the AUF conference center next of Dakar University. There was about 90 attendees most of which stayed in hotels near the conference center (Djollof Hotel, Terroubi Hotel and University Hotel). The rump session was organized during the gala diner on the Wednesday at Terroubi Hotel. It was chaired by Peter Schwabe. The registration fee for normal attendees was 350 Euros (and 300 euros for PhDs students). General chair was Mamadou Sanghare, general co-chair was Djiby Sow.

SECRYPT 2011 - The International Conference on Security and Cryptography July 18-21, 2011, University of Seville, Spain.

SECRYPT 2011 was integrated in ICETE (International Conference on e-Business and Telecommunications) a joint conference combining six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security processing and multimedia applications, and wireless networks.

This year SECRYPT received 160 submissions. After a strict selection process, the SECRYPT program included 22 papers as full papers (13.75% of submissions) and 16 as short papers (10% of submissions). Additionally, 20 papers were accepted for poster presentation. With these acceptance ratios, SECRYPT 2011 continues the tradition of previous conferences, a quality conference with high caliber.

The best papers of SECRYPT will be invited to appear in a post-conference book that will be published by Springer-Verlag composed by a selection of papers from ICETE.

In addition to the presentation sessions, SECRYPT 2011 included four outstanding keynote lectures, which are relevant to today’s lines of research and technical innovation. These talks were presented by internationally distinguished researchers, namely: Han-Chieh Chao, National Ilan University, Taiwan� WiMAX?- A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks “, by Vincenzo Piuri, Università degli Studi di Milano, Italy “Biometrics Privacy: Technologies and Applications�, by Enrique Cabello, University Rey Juan Carlos, Spain “Face Biometrics without Intrusion in Airport� and by Winfried Lamersdorf, University of Hamburg, Germany “Paradigms of Distributed Software Systems: Services, Processes, and Self-Organization� who helped enhancing the overall quality of this conference with their contributions.

The papers were organized in 15 sessions ranging the hot topics of nowadays such as statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.

The organizing committee included the ICETE conference co-Chairs Prof. Mohammad S. Obaidat, Monmouth University, USA and Professor José Sevillano, University of Seville, Spain and the SECRYPT program chairs Prof. Pierangela Samarati, Università degli Studi di Milano, Italy and Prof. Javier Lopez, University of Malaga, Spain.

SECRYPT 2011 was sponsored by INSTICC (The Institute for Systems and Technologies of Information, Control and Communication) and technically co-sponsored by IEEE- Institute of Electrical and Electronics Engineers and IEEE Systems Council. The conference was held in cooperation with IACR (International Association for Cryptologic Research), IEICE (The Institute of Electronics, Information and Communication Engineers), SWIM (IEICE Special Interest Group on Software Interprise Modelling), ATI (Associación de Técnicos de Informática), CEPIS( Council of European Professional Informatics Societies), FIDETIA (Fundación para la Investigación y el Desarollo de las Tecnologías de la Información en Andalucía), INES (Iniciativa Española de Software y Servicios), ACM SIGMIS (Special Interest Group on Management Information Systems), ACM SIGSAC (Special Interest Group on Security, Audit and Control), ACM SIGMM (Special Interest Group on Multimedia).

Regarding the best paper award, SECRYPT has recognized the paper, "BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl" from Kazumaro Aoki, Günther Roland, Yu Sasaki and Martin Schläffer as the best paper of the conference. As the best Student Paper Award, SECRYPT acknowledged the paper untitled “A Method for Flexible Reduction over Binary Fields Using a Field Multiplier� by Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan and S. K. Nandy as the best student paper presented at the conference.

The 18th International Conference on Selected Areas in Cryptography , August 11-12, 2011, Ryerson University Toronto, Ontario, Canada

SAC 2011 was held August 11?12, 2011 in the Department of Computer Science, Ryerson University, Toronto, Canada. There were 72 participants from 18 countries. Moreover, the conference had received 92 submissions out of which 23 were accepted. The reception took place the night before the conference started and the banquet dinner, which was held on the first night of the conference, was located in The Trillium Ballroom of the Atlantis Pavilions, a spectacular site on the waterfront of Lake Ontario.

A digital version of the pre-proceedings was provided to the attendees and was also available online on the website of the conference. Revised versions of the accepted papers, along with two invited papers, are going to appear in the proceedings of the conference published by Springer. Kristin Lauter from Microsoft Research and Alfred Menezes from University of Waterloo delivered two invited talks on the topics of `Cryptographic Techniques for Securing the Cloud' and `Another Look at Tightness', respectively.

The co-chairs were Ali Miri and Serge Vaudenay, and the publicity and publication chair was Atefeh Mashatan who wish to gratefully acknowledge the sponsors of SAC 2011, including the Faculty of Engineering, Architecture, and Science and the Department of Computer Science Ryerson University, Fields Institute, and Certicom, for their enthusiastic and generous support.

Fault Diagnosis and Tolerance in Cryptography Workshop (FDTC 2011) , September 28, 2011, Nara, Japan (ICW)

FDTC 2011 was held in Nara, on the 28-th of September 2011. The workshop attracted 117 participants from 10 countries, in descending order, from Asia, Europe and North America. The technical program included 12 papers: two invited presentations, and 10 regular papers, categorized into four sessions, that were selected from 18 submissions. Each paper was reviewed by at least 3 reviewers and detailed discussions were later conducted to reach final decisions. Most of the presentation slides for the technical sessions are now available on the workshop website. The workshop proceedings were published by IEEE CS Press and will soon be available on the IEEE Digital Library. Ingrid Verbauwhede from Leuven University (Belgium) and Rob Bekkers from Brightsight (The Netherlands), delivered the two invited lectures on the topics "The Fault Attack Jungle – A Classification Model to Guide You" and "Fault Injection – A Fast Moving Target in Evaluations," respectively.

Junko Takahashi from NTT (Japan) and Sylvain Guilley from Telecom ParisTech (France), were the program co-chairs. David Naccache from Ecole Normale Supérieure (France) was the invited presentations chair. We thank the sponsors for their generous support and contributions to the success of the conference, as well as Akashi Satoh for his continuous support of FDTC, and Tetsuya Izu and Yumi Sakemi for their tremendous help with the local arrangements.

International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011) , October 19-22, 2011, Haldia, India

InfoSecHiComNet 2011 took place between October 19 to October 22, 2011, in India. The program was organised by Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall, while the local organisation was done by Debasis Giri. The general chairs of the conference were P.K. Saxena and P.D. Srivastava. The proceedings were published as part of the Lecture notes in Computer Science by Springer.
A large amount of submissions were recieved. In total there were, 112 submission. Of these, 14 were accepted to be included in the conference. There were six invited talks, given by Jorn-Marc Schmidt, Ingrid Verbauwhede, Benedikt Gierlich, Saibal Pal, Palash Sarkar, and Sanjay Burman. In addition three tutorials were presented, by Abhijit Das, C. Pandurangan and Michael Tunstall, each of duration  of three hours.
We expect that this conference will be repeated under the less general theme of "Cryptography and Cryptographic Engineering", which we hope will help encourage cryptography research in India. This conference is expected to complement CHES, since the number of submissions generally received by CHES demonstrates the popularity of research into topics related to cryptographic engineering. The intention is also to hold conferences that will not be in direct conflict with Indocrypt.

Book Reviews

The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Cambridge University Press , Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since July 2011, we have many new titles available ! In general, new books will be added around January and July to these lists.

An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all reviews added since the last newsletter was sent out. You can access the full list via the following link . Below you find the 22 new reviews available since the last edition of the newsletter.

List of books for review

The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org . New book reviews are posted continiously.

Available Books

Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name] .

Go to titles from:

Cambridge University Press

Further titles are available via Cambridge University Press' website . Cambridge University Press books available for review:

New arrivals (Sep 2011):

  1. Alpcan: Network Security - A Decision and Game-Theoretic Approach
  2. Buchberger: Gröbner Bases and Applications
  3. Buttyán: Security and Cooperation in Wireless Networks
  4. Churchhouse: Codes and Ciphers
  5. Csiszár: Information Theory - Coding Theorems for Discrete Memoryless Systems, 2nd Edition
  6. Fridrich: Steganography in Digital Media - Principles, Algorithms, and Applications
  7. Goldreich: Foundations of Cryptography Volume: 1
  8. Goldreich: Foundations of Cryptography Volume 2
  9. Golomb: Signal Design for Good Correlation
  10. Hendry: Multi-application Smart Cards - Technology and Applications
  11. Huth: Secure Communicating Systems - Design, Analysis, and Implementation
  12. Kempf: Wireless Internet Security - Architecture and Protocols
  13. Lidl: Finite Fields - 2nd Edition
  14. Loepp: Protecting Information - From Classical Error Correction to Quantum Cryptography
  15. McEliece: The Theory of Information and Coding, 2nd Edition
  16. Obaidat: Security of e-Systems and Computer Networks
  17. Sinkov: Elementary Cryptanalysis, 2nd Edition
  18. van der Lubbe: Basic Methods of Cryptography
  19. Yanofsky: Quantum Computing for Computer Scientists

CRC Press/Taylor & Francis Group

Further titles are available via CRC Press/Taylor & Francis Group's website . CRC Press/Taylor & Francis Group books available for review:

New arrivals (Mai 2011):

  1. McAndrew: Introduction to Cryptography with Open-Source Software
  2. Dua: Data Mining and Machine Learning in Cybersecurity
  3. Buchanan: Introduction to Security and Network Forensics
  4. Landoll: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
  5. Graham: Cyber Security Essentials

Available previously:

  1. Blanchet-Sadri: Algorithmic Combinatorics on Partial Words
  2. Brualdi: A Combinatorial Approach to Matrix Theory and Its Applications
  3. Gross: Combinatorial Methods with Computer Applications
  4. Gould: Mathematics in Games, Sports, and Gambling
  5. Johnson: Handbook of Finite Translation Planes
  6. Lindner: Design Theory, Second Edition
  7. Liu: Security and Policy Driven Computing
  8. Moldovyan: Data-driven Block Ciphers for Fast Telecommunication Systems
  9. Paulsen: Abstract Algebra. An interactive Approach
  10. Peeva: Syzygies and Hilbert Functions
  11. Stanoyevitch: Discrete Structures with Contemporary Applications
  12. Szabo: Factoring Groups into Subsets
  13. Thuraisingham: Secure Semantic Service-Oriented Systems
  14. Wallis: Introduction to Combinatorial Designs, Second Edition
  15. Xiao: Security in Distributed, Grid, Mobile, and Pervasive Computing

Springer

Below you find a selection of books from Springer. Further titles are available via Springer's website .

New arrivals (Mar 2011):

  1. Aycock: Spyware and Adware
  2. Bard: Algebraic Cryptanalysis
  3. Bauer: Origins and Foundations of Computing
  4. Böhme: Advanced Statistical Steganalysis
  5. Sadeghi: Towards Hardware-Intrinsic Security

Available previously:

  1. Adjeroh: The Burrows-Wheeler Transform
  2. Buchmann: Binary Quadratic Forms
  3. Camp: Economics of Identity Theft
  4. Dietzfelbinger: Primality Testing in Polynomial Time
  5. Di Pietro: Intrusion Detection Systems
  6. Fine: Number Theory
  7. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  8. Hromkovic: Algorithmic Adventures
  9. Kuo: Precoding Techniques for Digital Communication Systems
  10. Li: An Introduction to Kolmogorov Complexity and Its Applications
  11. Mehlhorn: Algorithms and Data Structures
  12. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  13. Robshaw: New Stream Cipher Designs
  14. Salomon: A Concise Introduction to Data Compression
  15. Sammes: Forensic Computing
  16. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  17. Shi: Transactions on Data Hiding and Multimedia Security III
  18. Traynor: Security for Telecommunications Networks
  19. Vöcking: Taschenbuch der Algorithmen [German]
  20. Yeung: Information Theory and Network Coding

Cryptology ePrint Archive: Top 20 Downloads in the last 6 month

This report includes the top 20 downloads from the ePrint archive between 1 May 2011 and 31 October 2011.
  1. 2004/314 ( PDF ) with 22474 downloads.
    A Technical Comparison of IPSec and SSL
    AbdelNasir Alshamsi and Takamichi Saito
  2. 2007/120 ( PDF ) with 17528 downloads.
    Breaking 104 bit WEP in less than 60 seconds
    Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
  3. 2011/232 ( PDF ) with 16255 downloads.
    Remote Timing Attacks are Still Practical
    Billy Bob Brumley and Nicola Tuveri
  4. 2011/390 ( PDF ) with 12397 downloads.
    On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs
    Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar
  5. 2010/006 ( PDF ) with 10793 downloads.
    Factorization of a 768-bit RSA modulus
    Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
  6. 2011/391 ( PDF ) with 9523 downloads.
    On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism
    Amir Moradi and Markus Kasper and Christof Paar
  7. 2010/332 ( PDF ) with 7732 downloads.
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
    Aurelien Francillon and Boris Danev and Srdjan Capkun
  8. 2004/199 ( PDF ) with 6926 downloads.
    Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
    Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
  9. 2008/469 ( PS PS.GZ PDF ) with 5943 downloads.
    Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
    Stephane Manuel
  10. 2009/281 ( PDF ) with 5178 downloads.
    Enabling Public Verifiability and Data Dynamics for Storage Security
    Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou
  11. 2009/223 ( PDF ) with 4987 downloads.
    How To Find Weak Input Differences For MD5 Collision Attacks
    Tao Xie and Dengguo Feng
  12. 2006/136 ( PDF ) with 4676 downloads.
    A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
    Gregory V. Bard
  13. 2010/439 ( PDF ) with 4128 downloads.
    Embedded Extended Visual Cryptography Schemes
    Feng Liu and Chuankun Wu
  14. 2007/471 ( PDF ) with 3870 downloads.
    Attacks on the WEP protocol
    Erik Tews
  15. 2011/277 ( PDF ) with 3819 downloads.
    Fully Homomorphic Encryption without Bootstrapping
    Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan
  16. 2009/616 ( PS PS.GZ PDF ) with 3695 downloads.
    Fully Homomorphic Encryption over the Integers
    Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
  17. 2006/086 ( PDF ) with 3506 downloads.
    Analysis of the Linux Random Number Generator
    Zvi Gutterman and Benny Pinkas and Tzachy Reinman
  18. 2011/211 ( PDF ) with 3469 downloads.
    Security Evaluation of GOST 28147-89 In View Of International Standardisation
    Nicolas T. Courtois
  19. 2011/405 ( PDF ) with 3393 downloads.
    Can Homomorphic Encryption be Practical?
    Kristin Lauter and Michael Naehrig and Vinod Vaikuntanathan
  20. 2006/262 ( PDF ) with 3233 downloads.
    Logical Concepts in Cryptography
    Simon Kramer


You may opt out of the newsletter either by editing your contact information and preferences here .

Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org .

IACR contact information . Current newsletter editor is Christopher Wolf.