all InfoSec news
Topic: asiacrypt
Tight Security of Double-Block Nonce-Based MACs
2 days, 13 hours ago |
www.iacr.org
NTRU-based FHE for Larger Key and Message Space
3 weeks, 1 day ago |
www.iacr.org
Asiacrypt 2024: Asiacrypt 2024
1 month, 2 weeks ago |
www.iacr.org
Fast and Designated-verifier Friendly zkSNARKs in the BPK Model
5 months, 3 weeks ago |
www.iacr.org
Secret-Shared Shuffle with Malicious Security
5 months, 3 weeks ago |
www.iacr.org
Announcing the 2023 IACR Test-of-Time Award for Asiacrypt
5 months, 4 weeks ago |
www.iacr.org
New proof systems and an OPRF from CSIDH
6 months, 4 weeks ago |
www.iacr.org
CryptoZoo: A Viewer for Reduction Proofs
7 months ago |
www.iacr.org
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
7 months, 1 week ago |
www.iacr.org
Auditable Obfuscation
7 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of Elisabeth-4
7 months, 3 weeks ago |
www.iacr.org
Quantum Lattice Enumeration in Limited Depth
7 months, 3 weeks ago |
www.iacr.org
Tight Security Bound of 2k-LightMAC Plus
7 months, 3 weeks ago |
www.iacr.org
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
8 months, 2 weeks ago |
www.iacr.org
Radical isogenies and modular curves. (arXiv:2210.12840v2 [math.NT] UPDATED)
11 months, 2 weeks ago |
arxiv.org
On the Quantum Security of HAWK
11 months, 3 weeks ago |
www.iacr.org
PARMESAN: Parallel ARithMEticS over ENcrypted data
1 year, 1 month ago |
www.iacr.org
Subset-optimized BLS Multi-signature with Key Aggregation
1 year, 1 month ago |
www.iacr.org
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
1 year, 1 month ago |
www.iacr.org
Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$
1 year, 1 month ago |
www.iacr.org
Guessing Less and Better: Improved Attacks on GIFT-64
1 year, 2 months ago |
www.iacr.org
Does the Dual-Sieve Attack on Learning with Errors even Work?
1 year, 2 months ago |
www.iacr.org
Generic Models for Group Actions
1 year, 3 months ago |
www.iacr.org
Sequential Half-Aggregation of Lattice-Based Signatures
1 year, 3 months ago |
www.iacr.org
Tight Security of Double-Block Nonce-Based MACs
2 days, 13 hours ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Tight Security of Double-Block Nonce-Based MACs
2 days, 13 hours ago |
www.iacr.org
NTRU-based FHE for Larger Key and Message Space
3 weeks, 1 day ago |
www.iacr.org
Asiacrypt 2024: Asiacrypt 2024
1 month, 2 weeks ago |
www.iacr.org
Fast and Designated-verifier Friendly zkSNARKs in the BPK Model
5 months, 3 weeks ago |
www.iacr.org
Secret-Shared Shuffle with Malicious Security
5 months, 3 weeks ago |
www.iacr.org
Announcing the 2023 IACR Test-of-Time Award for Asiacrypt
5 months, 4 weeks ago |
www.iacr.org
New proof systems and an OPRF from CSIDH
6 months, 4 weeks ago |
www.iacr.org
CryptoZoo: A Viewer for Reduction Proofs
7 months ago |
www.iacr.org
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
7 months, 1 week ago |
www.iacr.org
Auditable Obfuscation
7 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of Elisabeth-4
7 months, 3 weeks ago |
www.iacr.org
Quantum Lattice Enumeration in Limited Depth
7 months, 3 weeks ago |
www.iacr.org
Tight Security Bound of 2k-LightMAC Plus
7 months, 3 weeks ago |
www.iacr.org
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
8 months, 2 weeks ago |
www.iacr.org
Radical isogenies and modular curves. (arXiv:2210.12840v2 [math.NT] UPDATED)
11 months, 2 weeks ago |
arxiv.org
On the Quantum Security of HAWK
11 months, 3 weeks ago |
www.iacr.org
PARMESAN: Parallel ARithMEticS over ENcrypted data
1 year, 1 month ago |
www.iacr.org
Subset-optimized BLS Multi-signature with Key Aggregation
1 year, 1 month ago |
www.iacr.org
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
1 year, 1 month ago |
www.iacr.org
Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$
1 year, 1 month ago |
www.iacr.org
Guessing Less and Better: Improved Attacks on GIFT-64
1 year, 2 months ago |
www.iacr.org
Does the Dual-Sieve Attack on Learning with Errors even Work?
1 year, 2 months ago |
www.iacr.org
Generic Models for Group Actions
1 year, 3 months ago |
www.iacr.org
Sequential Half-Aggregation of Lattice-Based Signatures
1 year, 3 months ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Tight Security of Double-Block Nonce-Based MACs
2 days, 13 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark