Knowledge

International Association for Cryptologic Research

Source đź“ť

38: 346:
volume makes the hosting of TC by the existing TOC and Crypto conferences quite problematic. Furthermore, the perspectives of TOC and Crypto on TC do not necessarily fit the internal perspective of TC and the interests of TC. All these indicate a value in the establishment of an independent specialized conference. A dedicated conference not only provides opportunities for research dissemination and interaction, but helps shape the field, give it a recognizable identity, and communicate its message.
386: 338:, and was also held at MIT in 2005, both times in February. TCC became an IACR-sponsored workshop in 2006. The founding steering committee consists of Mihir Bellare, Ivan Damgard, Oded Goldreich, Shafi Goldwasser, Johan Hastad, Russell Impagliazzo, Ueli Maurer, Silvio Micali, Moni Naor, and Tatsuaki Okamoto. 286:
Eurocrypt is held annually in the spring in various locations throughout Europe. The first workshop in the series of conferences that became known as Eurocrypt was held in 1982. In 1984, the name "Eurocrypt" was first used. Generally, there have been published proceedings including all papers at the
193:
Asiacrypt (also ASIACRYPT) is an international conference for cryptography research. The full name of the conference is currently International Conference on the Theory and Application of Cryptology and Information Security, though this has varied over time. Asiacrypt is a conference sponsored by
345:
The needs of the theoretical cryptography (TC) community are best understood in relation to the two communities between which it resides: the Theory of Computation (TOC) community and the Cryptography/Security community. All three communities have grown in volume in recent years. This increase in
417:
The first CRYPTO was held in 1981. It was the first major conference on cryptology and was all the more important because relations between government, industry and academia were rather tense. Encryption was considered a very sensitive subject and the coming together of delegates from different
225:
Cryptographic Hardware and Embedded Systems (CHES) is a conference for cryptography research, focusing on the implementation of cryptographic algorithms. The two general areas treated are the efficient and the secure implementation of algorithms. Related topics such as random number generators,
282:
Eurocrypt (or EUROCRYPT) is a conference for cryptography research. The full name of the conference is now the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Eurocrypt is one of the IACR flagship conferences, along with CRYPTO and ASIACRYPT.
316:
is often presented there. FSE has been an IACR workshop since 2002, though the first FSE workshop was held in 1993. FSE is held annually in various locations worldwide, mostly in Europe. The dates of the workshop have varied over the years, but recently, it has been held in February.
238:(WPI). It was founded by Çetin Kaya Koç and Christof Paar. CHES 2000 was also held at WPI; after that, the conference has been held at various locations worldwide. After the two CHES' at WPI, the locations in the first ten years were, in chronological order, 171:
Several other conferences and workshops are held in cooperation with the IACR. Starting in 2015, selected summer schools will be officially sponsored by the IACR. CRYPTO '83 was the first conference officially sponsored by the IACR.
325:
PKC or Public-Key Cryptography is the short name of the International Workshop on Theory and Practice in Public Key Cryptography (modified as International Conference on Theory and Practice in Public Key Cryptography since 2006).
341:
The importance of the theoretical study of Cryptography is widely recognized by now. This area has contributed much to the practice of cryptography and secure systems as well as to the theory of computation at large.
307:
with an emphasis on fast, practical techniques, as opposed to theory. Though "encryption" is part of the conference title, it is not limited to encryption research; research on other symmetric techniques such as
2062: 209:, Australia in 1990, and only later did the community decide that the conference should be held in locations throughout Asia. The first conference to be called "Asiacrypt" was held in 1991 in 1183:"For outstanding service to the IACR, for numerous research contributions, for sustained educational leadership, and for effectively leading the European cryptologic research community." 2055: 274:. Since 2009, CHES rotates between the three continents Europe, North America and Asia. The attendance record was set by CHES 2018 in Amsterdam with about 600 participants. 1241:"For founding the Journal of Cryptology, for industrial implementations supporting privacy, and for contributions to secret sharing, attestation, and the cryptanalysis of 520:"For visionary and essential service to the IACR and for numerous valuable contributions to the technical, social, and commercial development of cryptology and security." 627:"For outstanding contributions to cryptologic research and education, and for the establishment and promotion of international cryptologic forums in Asia and elsewhere." 2048: 1289: 418:
countries was unheard-of at the time. The initiative for the formation of the IACR came during CRYPTO '82, and CRYPTO '83 was the first IACR sponsored conference.
1794: 464:"For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security." 451:"For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security." 334:
The Theory of Cryptography Conference, often abbreviated TCC, is an annual conference for theoretical cryptography research. It was first held in 2004 at
194:
the IACR since 2000, and is one of its three flagship conferences. Asiacrypt is now held annually in November or December at various locations throughout
1091:"For opening up new areas in cryptography and computer security, for innovative educational initiatives in cryptography, and for service to the IACR." 1215:"For fundamental contributions to the design and analysis of block ciphers, for contributions to mobile phone security, and for service to the IACR." 1545: 1532: 1226:"For ingenious contributions to areas including primality testing, secure computation, oblivious transfer, interactive proofs, zero knowledge, and 78: 739:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education." 640:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education." 614:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education." 1779: 1540:"For fundamental contributions to cryptology, especially to cryptographic randomness and symmetric-key primitives, and for service to the IACR." 426:
The IACR Fellows Program (FIACR) has been established as an honor to bestow upon its exceptional members. There are currently 68 IACR Fellows.
1579:"For foundational contributions, including black-box separations, multiparty computation, and tamper resilience, and for service to the IACR." 533:"For fundamental contributions to the design and analysis of public-key cryptosystems and for sustained educational leadership in cryptology." 1401:"For essential contributions to the theory of cryptographic protocols, low-complexity cryptography, and other foundations of cryptography. 1373:"For significant contributions to the design and analysis of block ciphers, for founding the SAC conference, and for service to the IACR." 1553:"For essential contributions, including to threshold cryptography, delegated computation, and lower bounds, and for service to the IACR." 1128:"For contributions to the science of cryptology, the co-invention of Pairing-Based Cryptography, and outstanding work on cryptanalysis of 1429:"For broad contributions, especially in public-key encryption and cryptographic protocols, and for dedication to service and education." 1297:"For visionary service to the IACR and fostering the Asian-Pacific cryptographic community, and for important scientific contributions." 287:
conference every year, with two exceptions; in 1983, no proceedings was produced, and in 1986, the proceedings contained only abstracts.
1035:"For fundamental contributions to cryptography and technology transfer of cryptographic research results to secure Internet protocols." 1332:"For cryptographic design, education, and leadership, and for exemplary service to IACR and the Asia-Pacific cryptographic community." 1284:"For numerous groundbreaking contributions spanning the theory and practice of cryptography, and for outstanding service to the IACR." 653:"For fundamental contributions to the scientific foundations of cryptography, and for sustained educational leadership in cryptology." 1194:"For theoretical and practical contributions to areas including encryption, signatures, identification, elliptic-curve cryptosystems, 1104:"For fundamental and innovative contributions to cryptography and its application to the security and privacy of real world systems." 1321:"For co-founding CHES, service to the IACR, and for important contributions to secure and efficient implementation of cryptography." 1003:"For numerous contributions to the scientific foundations of cryptography and for sustained educational leadership in cryptography." 1078:"For fundamental contributions to cryptography, for sustained educational leadership in cryptography, and for service to the IACR." 878:"For pioneering contributions to the scientific foundations of cryptology and for sustained leadership in cryptographic education." 812:"For fundamental contributions to cryptography, for sustained educational leadership in cryptography, and for service to the IACR." 823:"For exemplary service as board member and president of IACR, and for contributions to the preservation of cryptology's heritage." 494:"For numerous foundational and highly influential contributions to the theory and practice of cryptosystem design and analysis." 411: 1310:"For research and service contributions spanning theory and practice, and improving the security of widely deployed protocols." 507:"For numerous seminal contributions to security and privacy research and for visionary leadership in the role of IACR founder." 1271:"For fundamental contributions to public-key cryptography and cryptographic security proofs, and for educational leadership." 1360:"For contributions to the theory and practice of privacy-preserving protocols and impact on government policy and industry." 908:"For outstanding contributions to cryptologic research and education, and for fostering the Australian research community." 601:
and cryptographic protocols and for essential services to the community in furthering publication of cryptologic research."
2025: 990:"For fundamental contributions to the theory and practice of cryptography and for educational leadership in cryptography." 934:"For fundamental contributions to the theory and practice of cryptography and for educational leadership in cryptography." 2111: 1258:"For essential contributions to the theory and practice of real world cryptography and outstanding service to the IACR." 1145:"For numerous contributions to the foundations of cryptography, most importantly his introduction and development of the 1421: 1048:"For fundamental contributions to the design and cryptanalysis of symmetric primitives and for service to the IACR." 292: 288: 367: 770: 235: 37: 1818: 354:
The Real World Crypto Symposium is a conference for applied cryptography research, which was started in 2012 by
1527:"For significant contributions to applied cryptography in industry and academia, and for service to the IACR." 1490: 1163: 680: 563: 1882: 1514:"For essential contributions to the cryptanalysis and design of hash functions, and for service to the IACR." 786:"For basic contributions to cryptographic hardware and to cryptologic education and for service to the IACR." 398:
CRYPTO, the International Cryptology Conference, is an academic conference on all aspects of cryptography and
230:
or special-purpose cryptanalytical machines are also commonly covered at the workshop. It was first held in
1756:"Hash snag: Security shamans shame SHA-1 standard, confirm crucial collisions citing circa $ 45k chip cost" 1755: 1473: 227: 1250: 1129: 837: 671: 359: 313: 309: 185:, an online repository of cryptologic research papers aimed at providing rapid dissemination of results. 1566:"For fundamental contributions to research in symmetric-key cryptography, and for service to the IACR." 1456: 1017: 974: 854: 2090: 2040: 403: 303:
Fast Software Encryption, often abbreviated FSE, is a workshop for cryptography research, focused on
182: 94: 1476:, contributions to the design and cryptanalysis of symmetric primitives, and service to the IACR." 1021: 231: 1146: 960:"For pioneering modern cryptography and for sustained contributions to cryptographic education." 892: 778: 478: 304: 713:
design and analysis, and for sustained contributions to the IACR and to cryptologic education."
571:"For exemplary service as IACR President and essential leadership in IACR information systems." 1444:, and public-key cryptography, and for service to the Japanese and international communities." 584:"For the invention of public-key cryptography and for pioneering open research in cryptology." 555: 17: 181:, in addition to the proceedings of its conference and workshops. The IACR also maintains the 2085: 1599: 1498: 1413: 1040: 858: 371: 177: 90: 1065:, two- and multiparty protocols, information-theoretic security, and quantum cryptography." 1494: 1227: 1195: 598: 378:. Also, the introduction of the E4 chip took place at RWC. Flaws in messaging apps such as 291:
has published all the official proceedings, first as part of Advances in Cryptology in the
8: 1387: 883: 726:"For basic contributions to number theoretic cryptanalysis and for service to the IACR." 139: 205:
Initially, the Asiacrypt conferences were called AUSCRYPT, as the first one was held in
1115:"For fundamental contributions to cryptography, and sustained educational leadership." 1062: 862: 845: 769:"For fundamental contributions to the foundations of cryptography and its relations to 551: 375: 363: 1890: 1858: 1826: 1773: 1441: 1167: 921:"For fundamental contributions to the design and analysis of cryptographic systems." 1053: 840:, sustained educational leadership in applied cryptology, and service to the IACR." 1378: 1365: 1242: 1008: 995: 913: 900: 688: 632: 538: 469: 267: 142:, four area conferences in specific sub-areas of cryptography, and one symposium: 1850: 1199: 926: 870: 589: 486: 366:
is announced at RWC. Announcements made at the symposium include the first known
1347:
to the real world, and for essential contributions to cryptographic standards."
804: 1519: 1464: 1302: 973:"For fundamental contributions to cryptanalysis, including the co-invention of 939: 828: 799:"For basic contributions to cryptographic design and for service to the IACR." 791: 753: 744: 731: 576: 547: 355: 2105: 1894: 1862: 1830: 1390:
and countermeasures, cryptography in practice, and for service to the IACR."
1352: 1070: 982: 718: 606: 525: 399: 243: 947:"For pioneering contributions to cryptography and for service to the IACR." 683:, service to the IACR, and sustained educational leadership in cryptology." 1795:"PGP keys, software security, and much more threatened by new SHA1 exploit" 1506: 1263: 1207: 1175: 1120: 710: 701: 658: 2030: 2020: 1276: 1137: 952: 619: 499: 210: 127: 56: 1914: 1660: 1571: 1558: 1481: 1344: 761: 512: 456: 443: 407: 123: 2070: 2036:
IACR conferences page; contains links to Asiacrypt homepages from 2000
1684: 1459:
and the complexity of lattice problems, and for service to the IACR."
1708: 1622: 1154: 1096: 1083: 965: 645: 255: 199: 2035: 2005: 122:) is a non-profit scientific organization that furthers research in 1938: 1412:
For fundamental contributions at the interface of cryptography and
696:"For pioneering fundamental contributions to modern cryptography." 379: 271: 259: 2010: 2000: 1965: 1611: 1170:, and for leadership on cryptographic research within industry." 558:
and for substantial contributions to the formation of the IACR."
247: 1985: 756:
schemes and for valuable service to the cryptologic community."
126:
and related fields. The IACR was organized at the initiative of
2001:
IACR workshops page, contains links to FSE home pages from 2002
1819:"Facebook Says Encrypting Messenger by Default Will Take Years" 263: 251: 206: 1733: 220: 1883:"WhatsApp Flaws Could Allow Snoops to Slide Into Group Chats" 385: 239: 214: 1416:, and for service to the cryptographic research community." 195: 1851:"An Open Source Effort to Encrypt the Internet of Things" 1635: 335: 2015: 105: 1754:
at 22:21, Thomas Claburn in San Francisco 8 Jan 2020.
393: 138:
The IACR organizes and sponsors three annual flagship
1939:"Annual International Cryptology Conference (CRYPTO)" 1343:"For visionary actions that brought cryptography and 1016:"For contributions to elliptic curve cryptography, 2072:International Association for Cryptologic Research 161:Cryptographic Hardware and Embedded Systems (CHES) 116:International Association for Cryptologic Research 31:International Association for Cryptologic Research 27:Scientific organization for research in cryptology 2103: 666:"For the invention of public-key cryptography." 1709:"The Levchin Prize for Real-World Cryptography" 1440:"For seminal contributions spanning anonymity, 1386:"For fundamental contributions to the study of 349: 2056: 1489:"For fundamental contributions, including to 2021:Bibliography data for Eurocrypt proceedings 1778:: CS1 maint: numeric names: authors list ( 298: 221:Cryptographic Hardware and Embedded Systems 2063: 2049: 1061:"For pioneering work on the foundation of 320: 2031:Asiacrypt/Auscrypt bibliography from 1990 1685:"Theory of Cryptography Conference (TCC)" 836:"For essential work on the deployment of 329: 2026:Conference proceedings online, 1982-1997 384: 412:University of California, Santa Barbara 14: 2104: 1963: 1792: 2044: 1945:. dblp computer science bibliography 1931: 1753: 1162:"For contributions to the theory of 1658: 1633: 891:"For being cryptography's foremost 394:International Cryptology Conference 24: 1602:. The UCSB Current. 21 August 2014 853:"For pioneering and analysing the 681:information-theoretic cryptography 679:"For fundamental contributions to 93:, IACR conferences and workshops, 25: 2123: 1994: 1731: 1147:Universal Composability Framework 709:"For pioneering contributions to 402:. It is held yearly in August in 389:CRYPTO 2003 conference reception. 293:Lecture Notes in Computer Science 167:Real World Crypto Symposium (RWC) 1501:, and for service to the IACR." 1202:, and for service to the IACR." 36: 1979: 1957: 1907: 1875: 1843: 1811: 1786: 895:and a co-founder of the IACR." 236:Worcester Polytechnic Institute 1747: 1725: 1701: 1677: 1652: 1627: 1616: 1605: 1592: 752:"For the invention of general 597:"For breakthrough research in 370:on SHA-1 and the inclusion of 155:Fast Software Encryption (FSE) 130:at the CRYPTO '82 conference. 13: 1: 1585: 158:Public Key Cryptography (PKC) 133: 546:"For pioneering research in 310:message authentication codes 277: 228:physical unclonable function 188: 164:Theory of Cryptography (TCC) 7: 838:Elliptic Curve Cryptography 382:were also presented there. 350:Real World Crypto Symposium 10: 2128: 2112:Cryptography organizations 2006:FSE bibliography from 1993 1793:Goodin, Dan (2020-01-07). 1600:The People Behind the Code 1457:lattice-based cryptography 1132:and discrete logarithms." 1018:pairing based cryptography 975:differential cryptanalysis 857:underlying subexponential 421: 305:symmetric-key cryptography 2091:Cryptology ePrint Archive 2078: 183:Cryptology ePrint Archive 100: 95:Cryptology ePrint Archive 84: 72: 62: 52: 44: 35: 1455:"For pioneering work on 1024:compression algorithm." 299:Fast Software Encryption 232:Worcester, Massachusetts 1245:-based cryptosystems." 779:Jean-Jacques Quisquater 479:public-key cryptography 321:Public Key Cryptography 175:The IACR publishes the 1164:multiparty computation 477:"For the invention of 390: 330:Theory of Cryptography 2086:Journal of Cryptology 1760:www.theregister.co.uk 1499:functional encryption 1414:distributed computing 1041:Lars Ramkilde Knudsen 548:information integrity 388: 372:end-to-end encryption 178:Journal of Cryptology 91:Journal of Cryptology 1915:"Crypto Conferences" 1661:"CHES – Former CHES" 1388:side-channel attacks 599:quantum cryptography 368:chosen prefix attack 362:. The winner of the 152:Asiacrypt (flagship) 149:Eurocrypt (flagship) 2011:IACR workshops page 1449:Daniele Micciancio 32: 1491:secure computation 1472:"For co-designing 1166:, encryption, and 1063:oblivious transfer 863:discrete logarithm 846:Richard Schroeppel 552:information theory 391: 376:Facebook Messenger 30: 2099: 2098: 1964:Roberts, L, Roy. 1623:IACR Publications 1598:Sonia Fernandez: 1583: 1582: 855:sieving technique 771:complexity theory 146:Crypto (flagship) 112: 111: 16:(Redirected from 2119: 2065: 2058: 2051: 2042: 2041: 1988: 1983: 1977: 1976: 1974: 1972: 1961: 1955: 1954: 1952: 1950: 1935: 1929: 1928: 1926: 1925: 1911: 1905: 1904: 1902: 1901: 1879: 1873: 1872: 1870: 1869: 1847: 1841: 1840: 1838: 1837: 1815: 1809: 1808: 1806: 1805: 1790: 1784: 1783: 1777: 1769: 1767: 1766: 1751: 1745: 1744: 1742: 1740: 1729: 1723: 1722: 1720: 1719: 1705: 1699: 1698: 1696: 1695: 1681: 1675: 1674: 1672: 1671: 1659:Schwabe, Peter. 1656: 1650: 1649: 1647: 1646: 1634:Schwabe, Peter. 1631: 1625: 1620: 1614: 1612:IACR Conferences 1609: 1603: 1596: 1366:Stafford Tavares 1188:Tatsuaki Okamoto 1109:Eyal Kushilevitz 1009:Victor S. Miller 996:Rafail Ostrovsky 914:Claus P. Schnorr 901:Jennifer Seberry 689:Michael O. Rabin 633:Shafi Goldwasser 556:secure protocols 539:Gustavus Simmons 470:Whitfield Diffie 429: 428: 268:Washington, D.C. 108: 40: 33: 29: 21: 2127: 2126: 2122: 2121: 2120: 2118: 2117: 2116: 2102: 2101: 2100: 2095: 2074: 2069: 1997: 1992: 1991: 1984: 1980: 1970: 1968: 1962: 1958: 1948: 1946: 1937: 1936: 1932: 1923: 1921: 1913: 1912: 1908: 1899: 1897: 1881: 1880: 1876: 1867: 1865: 1849: 1848: 1844: 1835: 1833: 1817: 1816: 1812: 1803: 1801: 1791: 1787: 1771: 1770: 1764: 1762: 1752: 1748: 1738: 1736: 1730: 1726: 1717: 1715: 1707: 1706: 1702: 1693: 1691: 1683: 1682: 1678: 1669: 1667: 1657: 1653: 1644: 1642: 1632: 1628: 1621: 1617: 1610: 1606: 1597: 1593: 1588: 1546:Rosario Gennaro 1434:Kaoru Kurosawa 1200:electronic cash 927:Phillip Rogaway 871:Charles Rackoff 590:Gilles Brassard 487:Don Coppersmith 424: 396: 352: 332: 323: 301: 280: 223: 191: 136: 104: 87: 75: 65: 28: 23: 22: 15: 12: 11: 5: 2125: 2115: 2114: 2097: 2096: 2094: 2093: 2088: 2082: 2080: 2076: 2075: 2068: 2067: 2060: 2053: 2045: 2039: 2038: 2033: 2028: 2023: 2018: 2013: 2008: 2003: 1996: 1995:External links 1993: 1990: 1989: 1978: 1956: 1930: 1906: 1874: 1842: 1810: 1785: 1746: 1724: 1700: 1676: 1651: 1626: 1615: 1604: 1590: 1589: 1587: 1584: 1581: 1580: 1577: 1574: 1568: 1567: 1564: 1561: 1555: 1554: 1551: 1548: 1542: 1541: 1538: 1535: 1533:Yevgeniy Dodis 1529: 1528: 1525: 1522: 1520:David Naccache 1516: 1515: 1512: 1509: 1503: 1502: 1495:zero knowledge 1487: 1484: 1478: 1477: 1470: 1467: 1465:Vincent Rijmen 1461: 1460: 1453: 1450: 1446: 1445: 1438: 1435: 1431: 1430: 1427: 1424: 1418: 1417: 1410: 1407: 1403: 1402: 1399: 1396: 1392: 1391: 1384: 1381: 1375: 1374: 1371: 1368: 1362: 1361: 1358: 1355: 1349: 1348: 1341: 1338: 1334: 1333: 1330: 1327: 1323: 1322: 1319: 1316: 1312: 1311: 1308: 1305: 1303:Kenny Paterson 1299: 1298: 1295: 1292: 1286: 1285: 1282: 1279: 1273: 1272: 1269: 1266: 1260: 1259: 1256: 1253: 1247: 1246: 1239: 1236: 1235:Ernie Brickell 1232: 1231: 1224: 1221: 1217: 1216: 1213: 1210: 1204: 1203: 1196:zero knowledge 1192: 1189: 1185: 1184: 1181: 1178: 1172: 1171: 1160: 1157: 1151: 1150: 1143: 1140: 1134: 1133: 1130:hash functions 1126: 1123: 1117: 1116: 1113: 1110: 1106: 1105: 1102: 1099: 1093: 1092: 1089: 1086: 1080: 1079: 1076: 1073: 1067: 1066: 1059: 1056: 1054:Claude CrĂ©peau 1050: 1049: 1046: 1043: 1037: 1036: 1033: 1030: 1026: 1025: 1014: 1011: 1005: 1004: 1001: 998: 992: 991: 988: 985: 979: 978: 971: 968: 962: 961: 958: 955: 949: 948: 945: 942: 940:Andrew Odlyzko 936: 935: 932: 929: 923: 922: 919: 916: 910: 909: 906: 903: 897: 896: 889: 886: 880: 879: 876: 873: 867: 866: 851: 848: 842: 841: 834: 831: 829:Scott Vanstone 825: 824: 821: 818: 814: 813: 810: 807: 801: 800: 797: 794: 792:Yvo G. Desmedt 788: 787: 784: 781: 775: 774: 767: 764: 758: 757: 754:secret sharing 750: 747: 745:George Blakley 741: 740: 737: 734: 732:Oded Goldreich 728: 727: 724: 721: 715: 714: 707: 704: 698: 697: 694: 691: 685: 684: 677: 674: 668: 667: 664: 661: 655: 654: 651: 648: 642: 641: 638: 635: 629: 628: 625: 622: 616: 615: 612: 609: 603: 602: 595: 592: 586: 585: 582: 579: 577:Martin Hellman 573: 572: 569: 566: 564:Kevin McCurley 560: 559: 544: 541: 535: 534: 531: 528: 522: 521: 518: 515: 509: 508: 505: 502: 496: 495: 492: 489: 483: 482: 475: 472: 466: 465: 462: 459: 453: 452: 449: 446: 440: 439: 436: 433: 423: 420: 395: 392: 356:Kenny Paterson 351: 348: 331: 328: 322: 319: 314:hash functions 300: 297: 279: 276: 222: 219: 190: 187: 169: 168: 165: 162: 159: 156: 153: 150: 147: 135: 132: 110: 109: 102: 98: 97: 88: 85: 82: 81: 79:Michel Abdalla 76: 73: 70: 69: 68:1702 (in 2013) 66: 63: 60: 59: 54: 50: 49: 46: 42: 41: 26: 9: 6: 4: 3: 2: 2124: 2113: 2110: 2109: 2107: 2092: 2089: 2087: 2084: 2083: 2081: 2077: 2073: 2066: 2061: 2059: 2054: 2052: 2047: 2046: 2043: 2037: 2034: 2032: 2029: 2027: 2024: 2022: 2019: 2017: 2014: 2012: 2009: 2007: 2004: 2002: 1999: 1998: 1987: 1982: 1967: 1966:"Crypto Grab" 1960: 1944: 1940: 1934: 1920: 1916: 1910: 1896: 1892: 1888: 1884: 1878: 1864: 1860: 1856: 1852: 1846: 1832: 1828: 1824: 1820: 1814: 1800: 1796: 1789: 1781: 1775: 1761: 1757: 1750: 1735: 1734:"Crypto Grab" 1732:Senan, Elex. 1728: 1714: 1710: 1704: 1690: 1686: 1680: 1666: 1665:ches.iacr.org 1662: 1655: 1641: 1640:ches.iacr.org 1637: 1630: 1624: 1619: 1613: 1608: 1601: 1595: 1591: 1578: 1575: 1573: 1570: 1569: 1565: 1562: 1560: 1557: 1556: 1552: 1549: 1547: 1544: 1543: 1539: 1536: 1534: 1531: 1530: 1526: 1523: 1521: 1518: 1517: 1513: 1510: 1508: 1505: 1504: 1500: 1496: 1492: 1488: 1485: 1483: 1480: 1479: 1475: 1471: 1468: 1466: 1463: 1462: 1458: 1454: 1451: 1448: 1447: 1443: 1439: 1436: 1433: 1432: 1428: 1425: 1423: 1422:Jonathan Katz 1420: 1419: 1415: 1411: 1408: 1405: 1404: 1400: 1397: 1394: 1393: 1389: 1385: 1382: 1380: 1377: 1376: 1372: 1369: 1367: 1364: 1363: 1359: 1356: 1354: 1353:Jan Camenisch 1351: 1350: 1346: 1342: 1339: 1337:Louis Guillou 1336: 1335: 1331: 1328: 1325: 1324: 1320: 1317: 1315:Christof Paar 1314: 1313: 1309: 1306: 1304: 1301: 1300: 1296: 1293: 1291: 1288: 1287: 1283: 1280: 1278: 1275: 1274: 1270: 1267: 1265: 1262: 1261: 1257: 1254: 1252: 1249: 1248: 1244: 1240: 1237: 1234: 1233: 1229: 1225: 1222: 1219: 1218: 1214: 1211: 1209: 1206: 1205: 1201: 1197: 1193: 1190: 1187: 1186: 1182: 1179: 1177: 1174: 1173: 1169: 1165: 1161: 1158: 1156: 1153: 1152: 1148: 1144: 1141: 1139: 1136: 1135: 1131: 1127: 1124: 1122: 1119: 1118: 1114: 1111: 1108: 1107: 1103: 1100: 1098: 1095: 1094: 1090: 1087: 1085: 1082: 1081: 1077: 1074: 1072: 1071:Ronald Cramer 1069: 1068: 1064: 1060: 1057: 1055: 1052: 1051: 1047: 1044: 1042: 1039: 1038: 1034: 1031: 1029:Hugo Krawczyk 1028: 1027: 1023: 1019: 1015: 1012: 1010: 1007: 1006: 1002: 999: 997: 994: 993: 989: 986: 984: 983:Mihir Bellare 981: 980: 976: 972: 969: 967: 964: 963: 959: 956: 954: 951: 950: 946: 943: 941: 938: 937: 933: 930: 928: 925: 924: 920: 917: 915: 912: 911: 907: 904: 902: 899: 898: 894: 890: 887: 885: 882: 881: 877: 874: 872: 869: 868: 864: 860: 856: 852: 849: 847: 844: 843: 839: 835: 832: 830: 827: 826: 822: 819: 816: 815: 811: 808: 806: 803: 802: 798: 795: 793: 790: 789: 785: 782: 780: 777: 776: 772: 768: 765: 763: 760: 759: 755: 751: 748: 746: 743: 742: 738: 735: 733: 730: 729: 725: 722: 720: 719:Arjen Lenstra 717: 716: 712: 708: 705: 703: 700: 699: 695: 692: 690: 687: 686: 682: 678: 675: 673: 670: 669: 665: 662: 660: 657: 656: 652: 649: 647: 644: 643: 639: 636: 634: 631: 630: 626: 623: 621: 618: 617: 613: 610: 608: 607:Silvio Micali 605: 604: 600: 596: 593: 591: 588: 587: 583: 580: 578: 575: 574: 570: 567: 565: 562: 561: 557: 553: 549: 545: 542: 540: 537: 536: 532: 529: 527: 526:Jacques Stern 524: 523: 519: 516: 514: 511: 510: 506: 503: 501: 498: 497: 493: 490: 488: 485: 484: 480: 476: 473: 471: 468: 467: 463: 460: 458: 455: 454: 450: 447: 445: 442: 441: 437: 434: 431: 430: 427: 419: 415: 413: 409: 405: 404:Santa Barbara 401: 400:cryptanalysis 387: 383: 381: 377: 373: 369: 365: 364:Levchin Prize 361: 357: 347: 343: 339: 337: 327: 318: 315: 311: 306: 296: 294: 290: 284: 275: 273: 269: 265: 261: 257: 253: 249: 245: 244:San Francisco 241: 237: 233: 229: 218: 216: 212: 208: 203: 201: 197: 186: 184: 180: 179: 173: 166: 163: 160: 157: 154: 151: 148: 145: 144: 143: 141: 131: 129: 125: 121: 117: 107: 103: 99: 96: 92: 89: 83: 80: 77: 71: 67: 61: 58: 55: 51: 47: 43: 39: 34: 19: 2079:Publications 2071: 2016:PKC homepage 1986:IACR Fellows 1981: 1969:. Retrieved 1959: 1947:. Retrieved 1942: 1933: 1922:. Retrieved 1919:www.iacr.org 1918: 1909: 1898:. Retrieved 1886: 1877: 1866:. Retrieved 1854: 1845: 1834:. Retrieved 1822: 1813: 1802:. Retrieved 1799:Ars Technica 1798: 1788: 1763:. Retrieved 1759: 1749: 1737:. Retrieved 1727: 1716:. Retrieved 1713:rwc.iacr.org 1712: 1703: 1692:. Retrieved 1689:www.iacr.org 1688: 1679: 1668:. Retrieved 1664: 1654: 1643:. Retrieved 1639: 1629: 1618: 1607: 1594: 1507:Xiaoyun Wang 1264:Victor Shoup 1228:watermarking 1208:Kaisa Nyberg 1176:Bart Preneel 1121:Antoine Joux 817:Andrew Clark 805:Ivan DamgĂĄrd 702:James Massey 659:Ralph Merkle 435:Year awarded 425: 416: 397: 353: 344: 340: 333: 324: 302: 285: 281: 224: 204: 192: 176: 174: 170: 137: 119: 115: 113: 64:Membership 1395:Yuval Ishai 1379:Paul Kocher 1345:smart cards 1326:Kwangjo Kim 1277:Shai Halevi 1251:Nigel Smart 1138:Ran Canetti 953:Manuel Blum 672:Ueli Maurer 620:Hideki Imai 500:David Chaum 360:Nigel Smart 234:in 1999 at 211:Fujiyoshida 140:conferences 128:David Chaum 57:David Chaum 1971:28 January 1924:2020-04-12 1900:2020-03-19 1868:2020-03-19 1836:2020-03-19 1804:2020-03-19 1765:2020-03-19 1718:2020-03-28 1694:2020-04-06 1670:2020-04-06 1645:2020-04-06 1586:References 1572:Tal Malkin 1559:Xuejia Lai 1482:Amit Sahai 1406:Juan Garay 1220:Joe Kilian 1168:signatures 1020:, and the 884:David Kahn 865:methods." 762:Andrew Yao 513:Tom Berson 457:Ron Rivest 444:Adi Shamir 408:California 134:Activities 124:cryptology 86:Main organ 1895:1059-1028 1863:1059-1028 1831:1059-1028 1739:3 October 1290:Ed Dawson 1155:Tal Rabin 1097:Moti Yung 1084:Dan Boneh 966:Eli Biham 893:historian 859:factoring 646:Moni Naor 438:Citation 278:Eurocrypt 256:Edinburgh 200:Australia 189:Asiacrypt 74:President 45:Formation 2106:Category 1949:12 April 1943:dblp.org 1774:cite web 1442:e-voting 1243:knapsack 380:WhatsApp 295:series. 289:Springer 272:Lausanne 260:Yokohama 106:iacr.org 422:Fellows 410:at the 248:Cologne 101:Website 53:Founder 1893:  1861:  1829:  1636:"CHES" 1497:, and 1198:, and 711:cipher 554:, and 432:Fellow 270:, and 264:Vienna 252:Boston 207:Sydney 18:CRYPTO 1887:Wired 1855:Wired 1823:Wired 1576:2020 1563:2020 1550:2020 1537:2020 1524:2020 1511:2019 1486:2019 1469:2019 1452:2019 1437:2019 1426:2019 240:Paris 215:Japan 1973:2022 1951:2020 1891:ISSN 1859:ISSN 1827:ISSN 1780:link 1741:2022 1409:2018 1398:2018 1383:2018 1370:2018 1357:2017 1340:2017 1329:2017 1318:2017 1307:2017 1294:2016 1281:2016 1268:2016 1255:2016 1238:2015 1223:2015 1212:2015 1191:2015 1180:2015 1159:2015 1142:2014 1125:2014 1112:2014 1101:2014 1088:2013 1075:2013 1058:2013 1045:2013 1032:2013 1013:2013 1000:2013 987:2012 970:2012 957:2012 944:2012 931:2012 918:2012 905:2012 888:2011 875:2011 861:and 850:2011 833:2011 820:2010 809:2010 796:2010 783:2010 766:2010 749:2009 736:2009 723:2009 706:2009 693:2009 676:2008 663:2008 650:2008 637:2007 624:2007 611:2007 594:2006 581:2006 568:2005 543:2005 530:2005 517:2004 504:2004 491:2004 474:2004 461:2004 448:2004 358:and 312:and 198:and 196:Asia 120:IACR 114:The 48:1982 1474:AES 1230:." 1149:." 1022:LZW 977:." 773:." 481:." 374:in 336:MIT 2108:: 1941:. 1917:. 1889:. 1885:. 1857:. 1853:. 1825:. 1821:. 1797:. 1776:}} 1772:{{ 1758:. 1711:. 1687:. 1663:. 1638:. 1493:, 550:, 414:. 406:, 266:, 262:, 258:, 254:, 250:, 246:, 242:, 217:. 213:, 202:. 2064:e 2057:t 2050:v 1975:. 1953:. 1927:. 1903:. 1871:. 1839:. 1807:. 1782:) 1768:. 1743:. 1721:. 1697:. 1673:. 1648:. 118:( 20:)

Index

CRYPTO

David Chaum
Michel Abdalla
Journal of Cryptology
Cryptology ePrint Archive
iacr.org
cryptology
David Chaum
conferences
Journal of Cryptology
Cryptology ePrint Archive
Asia
Australia
Sydney
Fujiyoshida
Japan
physical unclonable function
Worcester, Massachusetts
Worcester Polytechnic Institute
Paris
San Francisco
Cologne
Boston
Edinburgh
Yokohama
Vienna
Washington, D.C.
Lausanne
Springer

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑