38:
346:
volume makes the hosting of TC by the existing TOC and Crypto conferences quite problematic. Furthermore, the perspectives of TOC and Crypto on TC do not necessarily fit the internal perspective of TC and the interests of TC. All these indicate a value in the establishment of an independent specialized conference. A dedicated conference not only provides opportunities for research dissemination and interaction, but helps shape the field, give it a recognizable identity, and communicate its message.
386:
338:, and was also held at MIT in 2005, both times in February. TCC became an IACR-sponsored workshop in 2006. The founding steering committee consists of Mihir Bellare, Ivan Damgard, Oded Goldreich, Shafi Goldwasser, Johan Hastad, Russell Impagliazzo, Ueli Maurer, Silvio Micali, Moni Naor, and Tatsuaki Okamoto.
286:
Eurocrypt is held annually in the spring in various locations throughout Europe. The first workshop in the series of conferences that became known as
Eurocrypt was held in 1982. In 1984, the name "Eurocrypt" was first used. Generally, there have been published proceedings including all papers at the
193:
Asiacrypt (also ASIACRYPT) is an international conference for cryptography research. The full name of the conference is currently
International Conference on the Theory and Application of Cryptology and Information Security, though this has varied over time. Asiacrypt is a conference sponsored by
345:
The needs of the theoretical cryptography (TC) community are best understood in relation to the two communities between which it resides: the Theory of
Computation (TOC) community and the Cryptography/Security community. All three communities have grown in volume in recent years. This increase in
417:
The first CRYPTO was held in 1981. It was the first major conference on cryptology and was all the more important because relations between government, industry and academia were rather tense. Encryption was considered a very sensitive subject and the coming together of delegates from different
225:
Cryptographic
Hardware and Embedded Systems (CHES) is a conference for cryptography research, focusing on the implementation of cryptographic algorithms. The two general areas treated are the efficient and the secure implementation of algorithms. Related topics such as random number generators,
282:
Eurocrypt (or EUROCRYPT) is a conference for cryptography research. The full name of the conference is now the Annual
International Conference on the Theory and Applications of Cryptographic Techniques. Eurocrypt is one of the IACR flagship conferences, along with CRYPTO and ASIACRYPT.
316:
is often presented there. FSE has been an IACR workshop since 2002, though the first FSE workshop was held in 1993. FSE is held annually in various locations worldwide, mostly in Europe. The dates of the workshop have varied over the years, but recently, it has been held in
February.
238:(WPI). It was founded by Çetin Kaya Koç and Christof Paar. CHES 2000 was also held at WPI; after that, the conference has been held at various locations worldwide. After the two CHES' at WPI, the locations in the first ten years were, in chronological order,
171:
Several other conferences and workshops are held in cooperation with the IACR. Starting in 2015, selected summer schools will be officially sponsored by the IACR. CRYPTO '83 was the first conference officially sponsored by the IACR.
2062:
325:
PKC or Public-Key
Cryptography is the short name of the International Workshop on Theory and Practice in Public Key Cryptography (modified as International Conference on Theory and Practice in Public Key Cryptography since 2006).
341:
The importance of the theoretical study of
Cryptography is widely recognized by now. This area has contributed much to the practice of cryptography and secure systems as well as to the theory of computation at large.
307:
with an emphasis on fast, practical techniques, as opposed to theory. Though "encryption" is part of the conference title, it is not limited to encryption research; research on other symmetric techniques such as
2055:
209:, Australia in 1990, and only later did the community decide that the conference should be held in locations throughout Asia. The first conference to be called "Asiacrypt" was held in 1991 in
2048:
1183:"For outstanding service to the IACR, for numerous research contributions, for sustained educational leadership, and for effectively leading the European cryptologic research community."
274:. Since 2009, CHES rotates between the three continents Europe, North America and Asia. The attendance record was set by CHES 2018 in Amsterdam with about 600 participants.
1241:"For founding the Journal of Cryptology, for industrial implementations supporting privacy, and for contributions to secret sharing, attestation, and the cryptanalysis of
520:"For visionary and essential service to the IACR and for numerous valuable contributions to the technical, social, and commercial development of cryptology and security."
627:"For outstanding contributions to cryptologic research and education, and for the establishment and promotion of international cryptologic forums in Asia and elsewhere."
1779:
418:
countries was unheard-of at the time. The initiative for the formation of the IACR came during CRYPTO '82, and CRYPTO '83 was the first IACR sponsored conference.
1794:
464:"For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security."
451:"For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security."
334:
The Theory of
Cryptography Conference, often abbreviated TCC, is an annual conference for theoretical cryptography research. It was first held in 2004 at
194:
the IACR since 2000, and is one of its three flagship conferences. Asiacrypt is now held annually in
November or December at various locations throughout
1091:"For opening up new areas in cryptography and computer security, for innovative educational initiatives in cryptography, and for service to the IACR."
1215:"For fundamental contributions to the design and analysis of block ciphers, for contributions to mobile phone security, and for service to the IACR."
1226:"For ingenious contributions to areas including primality testing, secure computation, oblivious transfer, interactive proofs, zero knowledge, and
739:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education."
640:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education."
614:"For fundamental pioneering contributions to the scientific foundations of cryptography and for sustained leadership in cryptographic education."
411:
1540:"For fundamental contributions to cryptology, especially to cryptographic randomness and symmetric-key primitives, and for service to the IACR."
426:
The IACR Fellows Program (FIACR) has been established as an honor to bestow upon its exceptional members. There are currently 68 IACR Fellows.
1579:"For foundational contributions, including black-box separations, multiparty computation, and tamper resilience, and for service to the IACR."
533:"For fundamental contributions to the design and analysis of public-key cryptosystems and for sustained educational leadership in cryptology."
37:
1401:"For essential contributions to the theory of cryptographic protocols, low-complexity cryptography, and other foundations of cryptography.
1373:"For significant contributions to the design and analysis of block ciphers, for founding the SAC conference, and for service to the IACR."
1553:"For essential contributions, including to threshold cryptography, delegated computation, and lower bounds, and for service to the IACR."
1128:"For contributions to the science of cryptology, the co-invention of Pairing-Based Cryptography, and outstanding work on cryptanalysis of
1429:"For broad contributions, especially in public-key encryption and cryptographic protocols, and for dedication to service and education."
1297:"For visionary service to the IACR and fostering the Asian-Pacific cryptographic community, and for important scientific contributions."
287:
conference every year, with two exceptions; in 1983, no proceedings was produced, and in 1986, the proceedings contained only abstracts.
2111:
1035:"For fundamental contributions to cryptography and technology transfer of cryptographic research results to secure Internet protocols."
1332:"For cryptographic design, education, and leadership, and for exemplary service to IACR and the Asia-Pacific cryptographic community."
1284:"For numerous groundbreaking contributions spanning the theory and practice of cryptography, and for outstanding service to the IACR."
653:"For fundamental contributions to the scientific foundations of cryptography, and for sustained educational leadership in cryptology."
1421:
1194:"For theoretical and practical contributions to areas including encryption, signatures, identification, elliptic-curve cryptosystems,
1104:"For fundamental and innovative contributions to cryptography and its application to the security and privacy of real world systems."
1321:"For co-founding CHES, service to the IACR, and for important contributions to secure and efficient implementation of cryptography."
1003:"For numerous contributions to the scientific foundations of cryptography and for sustained educational leadership in cryptography."
1078:"For fundamental contributions to cryptography, for sustained educational leadership in cryptography, and for service to the IACR."
878:"For pioneering contributions to the scientific foundations of cryptology and for sustained leadership in cryptographic education."
812:"For fundamental contributions to cryptography, for sustained educational leadership in cryptography, and for service to the IACR."
292:
823:"For exemplary service as board member and president of IACR, and for contributions to the preservation of cryptology's heritage."
288:
494:"For numerous foundational and highly influential contributions to the theory and practice of cryptosystem design and analysis."
1310:"For research and service contributions spanning theory and practice, and improving the security of widely deployed protocols."
507:"For numerous seminal contributions to security and privacy research and for visionary leadership in the role of IACR founder."
770:
235:
1271:"For fundamental contributions to public-key cryptography and cryptographic security proofs, and for educational leadership."
1490:
1360:"For contributions to the theory and practice of privacy-preserving protocols and impact on government policy and industry."
1163:
680:
563:
908:"For outstanding contributions to cryptologic research and education, and for fostering the Australian research community."
601:
and cryptographic protocols and for essential services to the community in furthering publication of cryptologic research."
2025:
990:"For fundamental contributions to the theory and practice of cryptography and for educational leadership in cryptography."
934:"For fundamental contributions to the theory and practice of cryptography and for educational leadership in cryptography."
1258:"For essential contributions to the theory and practice of real world cryptography and outstanding service to the IACR."
1145:"For numerous contributions to the foundations of cryptography, most importantly his introduction and development of the
1473:
227:
1250:
1129:
837:
671:
359:
313:
309:
1048:"For fundamental contributions to the design and cryptanalysis of symmetric primitives and for service to the IACR."
1456:
1017:
974:
854:
2090:
1021:
403:
182:
94:
1818:
354:
The Real World Crypto Symposium is a conference for applied cryptography research, which was started in 2012 by
1527:"For significant contributions to applied cryptography in industry and academia, and for service to the IACR."
1289:
231:
1882:
1514:"For essential contributions to the cryptanalysis and design of hash functions, and for service to the IACR."
786:"For basic contributions to cryptographic hardware and to cryptologic education and for service to the IACR."
398:
CRYPTO, the International Cryptology Conference, is an academic conference on all aspects of cryptography and
1146:
892:
778:
478:
304:
230:
or special-purpose cryptanalytical machines are also commonly covered at the workshop. It was first held in
1756:"Hash snag: Security shamans shame SHA-1 standard, confirm crucial collisions citing circa $ 45k chip cost"
1755:
555:
185:, an online repository of cryptologic research papers aimed at providing rapid dissemination of results.
2085:
1566:"For fundamental contributions to research in symmetric-key cryptography, and for service to the IACR."
1498:
1413:
1040:
858:
371:
177:
90:
2040:
1545:
1494:
1227:
1195:
598:
303:
Fast Software Encryption, often abbreviated FSE, is a workshop for cryptography research, focused on
1532:
78:
1476:, contributions to the design and cryptanalysis of symmetric primitives, and service to the IACR."
1387:
883:
139:
1062:
960:"For pioneering modern cryptography and for sustained contributions to cryptographic education."
862:
845:
551:
375:
713:
design and analysis, and for sustained contributions to the IACR and to cryptologic education."
571:"For exemplary service as IACR President and essential leadership in IACR information systems."
1444:, and public-key cryptography, and for service to the Japanese and international communities."
584:"For the invention of public-key cryptography and for pioneering open research in cryptology."
1890:
1858:
1826:
1773:
1441:
1167:
1053:
181:, in addition to the proceedings of its conference and workshops. The IACR also maintains the
1599:
1378:
1365:
1242:
1065:, two- and multiparty protocols, information-theoretic security, and quantum cryptography."
1008:
995:
913:
900:
688:
632:
538:
469:
367:
267:
378:. Also, the introduction of the E4 chip took place at RWC. Flaws in messaging apps such as
291:
has published all the official proceedings, first as part of Advances in Cryptology in the
1199:
926:
870:
589:
486:
804:
726:"For basic contributions to number theoretic cryptanalysis and for service to the IACR."
205:
Initially, the Asiacrypt conferences were called AUSCRYPT, as the first one was held in
1519:
1464:
1302:
1115:"For fundamental contributions to cryptography, and sustained educational leadership."
939:
828:
791:
769:"For fundamental contributions to the foundations of cryptography and its relations to
753:
744:
731:
576:
547:
355:
2105:
1352:
1070:
982:
921:"For fundamental contributions to the design and analysis of cryptographic systems."
718:
606:
525:
399:
243:
840:, sustained educational leadership in applied cryptology, and service to the IACR."
1506:
1263:
1207:
1175:
1120:
710:
701:
658:
142:, four area conferences in specific sub-areas of cryptography, and one symposium:
1850:
366:
is announced at RWC. Announcements made at the symposium include the first known
1347:
to the real world, and for essential contributions to cryptographic standards."
1276:
1137:
952:
619:
499:
363:
210:
127:
56:
973:"For fundamental contributions to cryptanalysis, including the co-invention of
799:"For basic contributions to cryptographic design and for service to the IACR."
1571:
1558:
1481:
1344:
761:
512:
456:
443:
407:
123:
1894:
1862:
1830:
1390:
and countermeasures, cryptography in practice, and for service to the IACR."
1154:
1096:
1083:
965:
947:"For pioneering contributions to cryptography and for service to the IACR."
683:, service to the IACR, and sustained educational leadership in cryptology."
645:
255:
199:
1795:"PGP keys, software security, and much more threatened by new SHA1 exploit"
2030:
2020:
379:
271:
259:
17:
1914:
1660:
385:
247:
2036:
IACR conferences page; contains links to Asiacrypt homepages from 2000
1684:
1459:
and the complexity of lattice problems, and for service to the IACR."
1708:
1622:
263:
251:
206:
2035:
2005:
122:) is a non-profit scientific organization that furthers research in
1938:
1412:
For fundamental contributions at the interface of cryptography and
696:"For pioneering fundamental contributions to modern cryptography."
2010:
2000:
384:
239:
214:
1965:
1611:
1170:, and for leadership on cryptographic research within industry."
558:
and for substantial contributions to the formation of the IACR."
1985:
756:
schemes and for valuable service to the cryptologic community."
195:
126:
and related fields. The IACR was organized at the initiative of
2044:
2001:
IACR workshops page, contains links to FSE home pages from 2002
1819:"Facebook Says Encrypting Messenger by Default Will Take Years"
1733:
335:
1883:"WhatsApp Flaws Could Allow Snoops to Slide Into Group Chats"
1416:, and for service to the cryptographic research community."
1851:"An Open Source Effort to Encrypt the Internet of Things"
1635:
2015:
105:
1754:
at 22:21, Thomas Claburn in San Francisco 8 Jan 2020.
138:
The IACR organizes and sponsors three annual flagship
1939:"Annual International Cryptology Conference (CRYPTO)"
1343:"For visionary actions that brought cryptography and
2078:
1016:"For contributions to elliptic curve cryptography,
100:
84:
72:
62:
52:
44:
2072:International Association for Cryptologic Research
161:Cryptographic Hardware and Embedded Systems (CHES)
116:International Association for Cryptologic Research
31:International Association for Cryptologic Research
27:Scientific organization for research in cryptology
666:"For the invention of public-key cryptography."
1709:"The Levchin Prize for Real-World Cryptography"
1440:"For seminal contributions spanning anonymity,
1386:"For fundamental contributions to the study of
2056:
1489:"For fundamental contributions, including to
8:
30:
2021:Bibliography data for Eurocrypt proceedings
1778:: CS1 maint: numeric names: authors list (
221:Cryptographic Hardware and Embedded Systems
2063:
2049:
2041:
1061:"For pioneering work on the foundation of
428:
29:
2031:Asiacrypt/Auscrypt bibliography from 1990
1685:"Theory of Cryptography Conference (TCC)"
836:"For essential work on the deployment of
2026:Conference proceedings online, 1982-1997
1591:
412:University of California, Santa Barbara
1771:
7:
1945:. dblp computer science bibliography
1162:"For contributions to the theory of
891:"For being cryptography's foremost
394:International Cryptology Conference
1602:. The UCSB Current. 21 August 2014
853:"For pioneering and analysing the
681:information-theoretic cryptography
679:"For fundamental contributions to
93:, IACR conferences and workshops,
25:
1147:Universal Composability Framework
709:"For pioneering contributions to
402:. It is held yearly in August in
389:CRYPTO 2003 conference reception.
293:Lecture Notes in Computer Science
167:Real World Crypto Symposium (RWC)
1501:, and for service to the IACR."
1202:, and for service to the IACR."
36:
895:and a co-founder of the IACR."
236:Worcester Polytechnic Institute
752:"For the invention of general
597:"For breakthrough research in
370:on SHA-1 and the inclusion of
155:Fast Software Encryption (FSE)
130:at the CRYPTO '82 conference.
1:
158:Public Key Cryptography (PKC)
546:"For pioneering research in
310:message authentication codes
228:physical unclonable function
164:Theory of Cryptography (TCC)
838:Elliptic Curve Cryptography
382:were also presented there.
350:Real World Crypto Symposium
2128:
2112:Cryptography organizations
2006:FSE bibliography from 1993
1793:Goodin, Dan (2020-01-07).
1600:The People Behind the Code
1457:lattice-based cryptography
1132:and discrete logarithms."
1018:pairing based cryptography
975:differential cryptanalysis
857:underlying subexponential
305:symmetric-key cryptography
2091:Cryptology ePrint Archive
183:Cryptology ePrint Archive
95:Cryptology ePrint Archive
35:
1455:"For pioneering work on
1024:compression algorithm."
299:Fast Software Encryption
232:Worcester, Massachusetts
1245:-based cryptosystems."
779:Jean-Jacques Quisquater
479:public-key cryptography
321:Public Key Cryptography
175:The IACR publishes the
1164:multiparty computation
477:"For the invention of
390:
330:Theory of Cryptography
2086:Journal of Cryptology
1760:www.theregister.co.uk
1499:functional encryption
1414:distributed computing
1041:Lars Ramkilde Knudsen
548:information integrity
388:
372:end-to-end encryption
178:Journal of Cryptology
91:Journal of Cryptology
1915:"Crypto Conferences"
1661:"CHES – Former CHES"
1388:side-channel attacks
599:quantum cryptography
368:chosen prefix attack
362:. The winner of the
152:Asiacrypt (flagship)
149:Eurocrypt (flagship)
2011:IACR workshops page
1449:Daniele Micciancio
32:
1491:secure computation
1472:"For co-designing
1166:, encryption, and
1063:oblivious transfer
863:discrete logarithm
846:Richard Schroeppel
552:information theory
391:
376:Facebook Messenger
2099:
2098:
1964:Roberts, L, Roy.
1623:IACR Publications
1598:Sonia Fernandez:
1583:
1582:
855:sieving technique
771:complexity theory
146:Crypto (flagship)
112:
111:
16:(Redirected from
2119:
2065:
2058:
2051:
2042:
1988:
1983:
1977:
1976:
1974:
1972:
1961:
1955:
1954:
1952:
1950:
1935:
1929:
1928:
1926:
1925:
1911:
1905:
1904:
1902:
1901:
1879:
1873:
1872:
1870:
1869:
1847:
1841:
1840:
1838:
1837:
1815:
1809:
1808:
1806:
1805:
1790:
1784:
1783:
1777:
1769:
1767:
1766:
1751:
1745:
1744:
1742:
1740:
1729:
1723:
1722:
1720:
1719:
1705:
1699:
1698:
1696:
1695:
1681:
1675:
1674:
1672:
1671:
1659:Schwabe, Peter.
1656:
1650:
1649:
1647:
1646:
1634:Schwabe, Peter.
1631:
1625:
1620:
1614:
1612:IACR Conferences
1609:
1603:
1596:
1366:Stafford Tavares
1188:Tatsuaki Okamoto
1109:Eyal Kushilevitz
1009:Victor S. Miller
996:Rafail Ostrovsky
914:Claus P. Schnorr
901:Jennifer Seberry
689:Michael O. Rabin
633:Shafi Goldwasser
556:secure protocols
539:Gustavus Simmons
470:Whitfield Diffie
429:
268:Washington, D.C.
108:
40:
33:
21:
2127:
2126:
2122:
2121:
2120:
2118:
2117:
2116:
2102:
2101:
2100:
2095:
2074:
2069:
1997:
1992:
1991:
1984:
1980:
1970:
1968:
1963:
1962:
1958:
1948:
1946:
1937:
1936:
1932:
1923:
1921:
1913:
1912:
1908:
1899:
1897:
1881:
1880:
1876:
1867:
1865:
1849:
1848:
1844:
1835:
1833:
1817:
1816:
1812:
1803:
1801:
1792:
1791:
1787:
1770:
1764:
1762:
1753:
1752:
1748:
1738:
1736:
1731:
1730:
1726:
1717:
1715:
1707:
1706:
1702:
1693:
1691:
1683:
1682:
1678:
1669:
1667:
1658:
1657:
1653:
1644:
1642:
1633:
1632:
1628:
1621:
1617:
1610:
1606:
1597:
1593:
1588:
1546:Rosario Gennaro
1434:Kaoru Kurosawa
1200:electronic cash
927:Phillip Rogaway
871:Charles Rackoff
590:Gilles Brassard
487:Don Coppersmith
424:
396:
352:
332:
323:
301:
280:
223:
191:
136:
104:
87:
75:
65:
28:
23:
22:
15:
12:
11:
5:
2125:
2123:
2115:
2114:
2104:
2103:
2097:
2096:
2094:
2093:
2088:
2082:
2080:
2076:
2075:
2070:
2068:
2067:
2060:
2053:
2045:
2039:
2038:
2033:
2028:
2023:
2018:
2013:
2008:
2003:
1996:
1995:External links
1993:
1990:
1989:
1978:
1956:
1930:
1906:
1874:
1842:
1810:
1785:
1746:
1724:
1700:
1676:
1651:
1626:
1615:
1604:
1590:
1589:
1587:
1584:
1581:
1580:
1577:
1574:
1568:
1567:
1564:
1561:
1555:
1554:
1551:
1548:
1542:
1541:
1538:
1535:
1533:Yevgeniy Dodis
1529:
1528:
1525:
1522:
1520:David Naccache
1516:
1515:
1512:
1509:
1503:
1502:
1495:zero knowledge
1487:
1484:
1478:
1477:
1470:
1467:
1465:Vincent Rijmen
1461:
1460:
1453:
1450:
1446:
1445:
1438:
1435:
1431:
1430:
1427:
1424:
1418:
1417:
1410:
1407:
1403:
1402:
1399:
1396:
1392:
1391:
1384:
1381:
1375:
1374:
1371:
1368:
1362:
1361:
1358:
1355:
1349:
1348:
1341:
1338:
1334:
1333:
1330:
1327:
1323:
1322:
1319:
1316:
1312:
1311:
1308:
1305:
1303:Kenny Paterson
1299:
1298:
1295:
1292:
1286:
1285:
1282:
1279:
1273:
1272:
1269:
1266:
1260:
1259:
1256:
1253:
1247:
1246:
1239:
1236:
1235:Ernie Brickell
1232:
1231:
1224:
1221:
1217:
1216:
1213:
1210:
1204:
1203:
1196:zero knowledge
1192:
1189:
1185:
1184:
1181:
1178:
1172:
1171:
1160:
1157:
1151:
1150:
1143:
1140:
1134:
1133:
1130:hash functions
1126:
1123:
1117:
1116:
1113:
1110:
1106:
1105:
1102:
1099:
1093:
1092:
1089:
1086:
1080:
1079:
1076:
1073:
1067:
1066:
1059:
1056:
1054:Claude Crépeau
1050:
1049:
1046:
1043:
1037:
1036:
1033:
1030:
1026:
1025:
1014:
1011:
1005:
1004:
1001:
998:
992:
991:
988:
985:
979:
978:
971:
968:
962:
961:
958:
955:
949:
948:
945:
942:
940:Andrew Odlyzko
936:
935:
932:
929:
923:
922:
919:
916:
910:
909:
906:
903:
897:
896:
889:
886:
880:
879:
876:
873:
867:
866:
851:
848:
842:
841:
834:
831:
829:Scott Vanstone
825:
824:
821:
818:
814:
813:
810:
807:
801:
800:
797:
794:
792:Yvo G. Desmedt
788:
787:
784:
781:
775:
774:
767:
764:
758:
757:
754:secret sharing
750:
747:
745:George Blakley
741:
740:
737:
734:
732:Oded Goldreich
728:
727:
724:
721:
715:
714:
707:
704:
698:
697:
694:
691:
685:
684:
677:
674:
668:
667:
664:
661:
655:
654:
651:
648:
642:
641:
638:
635:
629:
628:
625:
622:
616:
615:
612:
609:
603:
602:
595:
592:
586:
585:
582:
579:
577:Martin Hellman
573:
572:
569:
566:
564:Kevin McCurley
560:
559:
544:
541:
535:
534:
531:
528:
522:
521:
518:
515:
509:
508:
505:
502:
496:
495:
492:
489:
483:
482:
475:
472:
466:
465:
462:
459:
453:
452:
449:
446:
440:
439:
436:
433:
423:
420:
395:
392:
356:Kenny Paterson
351:
348:
331:
328:
322:
319:
314:hash functions
300:
297:
279:
276:
222:
219:
190:
187:
169:
168:
165:
162:
159:
156:
153:
150:
147:
135:
132:
110:
109:
102:
98:
97:
88:
85:
82:
81:
79:Michel Abdalla
76:
73:
70:
69:
68:1702 (in 2013)
66:
63:
60:
59:
54:
50:
49:
46:
42:
41:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2124:
2113:
2110:
2109:
2107:
2092:
2089:
2087:
2084:
2083:
2081:
2077:
2073:
2066:
2061:
2059:
2054:
2052:
2047:
2046:
2043:
2037:
2034:
2032:
2029:
2027:
2024:
2022:
2019:
2017:
2014:
2012:
2009:
2007:
2004:
2002:
1999:
1998:
1994:
1987:
1982:
1979:
1967:
1966:"Crypto Grab"
1960:
1957:
1944:
1940:
1934:
1931:
1920:
1916:
1910:
1907:
1896:
1892:
1888:
1884:
1878:
1875:
1864:
1860:
1856:
1852:
1846:
1843:
1832:
1828:
1824:
1820:
1814:
1811:
1800:
1796:
1789:
1786:
1781:
1775:
1761:
1757:
1750:
1747:
1735:
1734:"Crypto Grab"
1732:Senan, Elex.
1728:
1725:
1714:
1710:
1704:
1701:
1690:
1686:
1680:
1677:
1666:
1665:ches.iacr.org
1662:
1655:
1652:
1641:
1640:ches.iacr.org
1637:
1630:
1627:
1624:
1619:
1616:
1613:
1608:
1605:
1601:
1595:
1592:
1585:
1578:
1575:
1573:
1570:
1569:
1565:
1562:
1560:
1557:
1556:
1552:
1549:
1547:
1544:
1543:
1539:
1536:
1534:
1531:
1530:
1526:
1523:
1521:
1518:
1517:
1513:
1510:
1508:
1505:
1504:
1500:
1496:
1492:
1488:
1485:
1483:
1480:
1479:
1475:
1471:
1468:
1466:
1463:
1462:
1458:
1454:
1451:
1448:
1447:
1443:
1439:
1436:
1433:
1432:
1428:
1425:
1423:
1422:Jonathan Katz
1420:
1419:
1415:
1411:
1408:
1405:
1404:
1400:
1397:
1394:
1393:
1389:
1385:
1382:
1380:
1377:
1376:
1372:
1369:
1367:
1364:
1363:
1359:
1356:
1354:
1353:Jan Camenisch
1351:
1350:
1346:
1342:
1339:
1337:Louis Guillou
1336:
1335:
1331:
1328:
1325:
1324:
1320:
1317:
1315:Christof Paar
1314:
1313:
1309:
1306:
1304:
1301:
1300:
1296:
1293:
1291:
1288:
1287:
1283:
1280:
1278:
1275:
1274:
1270:
1267:
1265:
1262:
1261:
1257:
1254:
1252:
1249:
1248:
1244:
1240:
1237:
1234:
1233:
1229:
1225:
1222:
1219:
1218:
1214:
1211:
1209:
1206:
1205:
1201:
1197:
1193:
1190:
1187:
1186:
1182:
1179:
1177:
1174:
1173:
1169:
1165:
1161:
1158:
1156:
1153:
1152:
1148:
1144:
1141:
1139:
1136:
1135:
1131:
1127:
1124:
1122:
1119:
1118:
1114:
1111:
1108:
1107:
1103:
1100:
1098:
1095:
1094:
1090:
1087:
1085:
1082:
1081:
1077:
1074:
1072:
1071:Ronald Cramer
1069:
1068:
1064:
1060:
1057:
1055:
1052:
1051:
1047:
1044:
1042:
1039:
1038:
1034:
1031:
1029:Hugo Krawczyk
1028:
1027:
1023:
1019:
1015:
1012:
1010:
1007:
1006:
1002:
999:
997:
994:
993:
989:
986:
984:
983:Mihir Bellare
981:
980:
976:
972:
969:
967:
964:
963:
959:
956:
954:
951:
950:
946:
943:
941:
938:
937:
933:
930:
928:
925:
924:
920:
917:
915:
912:
911:
907:
904:
902:
899:
898:
894:
890:
887:
885:
882:
881:
877:
874:
872:
869:
868:
864:
860:
856:
852:
849:
847:
844:
843:
839:
835:
832:
830:
827:
826:
822:
819:
816:
815:
811:
808:
806:
803:
802:
798:
795:
793:
790:
789:
785:
782:
780:
777:
776:
772:
768:
765:
763:
760:
759:
755:
751:
748:
746:
743:
742:
738:
735:
733:
730:
729:
725:
722:
720:
719:Arjen Lenstra
717:
716:
712:
708:
705:
703:
700:
699:
695:
692:
690:
687:
686:
682:
678:
675:
673:
670:
669:
665:
662:
660:
657:
656:
652:
649:
647:
644:
643:
639:
636:
634:
631:
630:
626:
623:
621:
618:
617:
613:
610:
608:
607:Silvio Micali
605:
604:
600:
596:
593:
591:
588:
587:
583:
580:
578:
575:
574:
570:
567:
565:
562:
561:
557:
553:
549:
545:
542:
540:
537:
536:
532:
529:
527:
526:Jacques Stern
524:
523:
519:
516:
514:
511:
510:
506:
503:
501:
498:
497:
493:
490:
488:
485:
484:
480:
476:
473:
471:
468:
467:
463:
460:
458:
455:
454:
450:
447:
445:
442:
441:
437:
434:
431:
430:
427:
421:
419:
415:
413:
409:
405:
404:Santa Barbara
401:
400:cryptanalysis
393:
387:
383:
381:
377:
373:
369:
365:
364:Levchin Prize
361:
357:
349:
347:
343:
339:
337:
329:
327:
320:
318:
315:
311:
306:
298:
296:
294:
290:
284:
277:
275:
273:
269:
265:
261:
257:
253:
249:
245:
244:San Francisco
241:
237:
233:
229:
220:
218:
216:
212:
208:
203:
201:
197:
188:
186:
184:
180:
179:
173:
166:
163:
160:
157:
154:
151:
148:
145:
144:
143:
141:
133:
131:
129:
125:
121:
117:
107:
103:
99:
96:
92:
89:
83:
80:
77:
71:
67:
61:
58:
55:
51:
47:
43:
39:
34:
19:
2079:Publications
2071:
2016:PKC homepage
1986:IACR Fellows
1981:
1969:. Retrieved
1959:
1947:. Retrieved
1942:
1933:
1922:. Retrieved
1919:www.iacr.org
1918:
1909:
1898:. Retrieved
1886:
1877:
1866:. Retrieved
1854:
1845:
1834:. Retrieved
1822:
1813:
1802:. Retrieved
1799:Ars Technica
1798:
1788:
1763:. Retrieved
1759:
1749:
1737:. Retrieved
1727:
1716:. Retrieved
1713:rwc.iacr.org
1712:
1703:
1692:. Retrieved
1689:www.iacr.org
1688:
1679:
1668:. Retrieved
1664:
1654:
1643:. Retrieved
1639:
1629:
1618:
1607:
1594:
1507:Xiaoyun Wang
1264:Victor Shoup
1228:watermarking
1208:Kaisa Nyberg
1176:Bart Preneel
1121:Antoine Joux
817:Andrew Clark
805:Ivan DamgĂĄrd
702:James Massey
659:Ralph Merkle
435:Year awarded
425:
416:
397:
353:
344:
340:
333:
324:
302:
285:
281:
224:
204:
192:
176:
174:
170:
137:
119:
115:
113:
64:Membership
1395:Yuval Ishai
1379:Paul Kocher
1345:smart cards
1326:Kwangjo Kim
1277:Shai Halevi
1251:Nigel Smart
1138:Ran Canetti
953:Manuel Blum
672:Ueli Maurer
620:Hideki Imai
500:David Chaum
360:Nigel Smart
234:in 1999 at
211:Fujiyoshida
140:conferences
128:David Chaum
57:David Chaum
1971:28 January
1924:2020-04-12
1900:2020-03-19
1868:2020-03-19
1836:2020-03-19
1804:2020-03-19
1765:2020-03-19
1718:2020-03-28
1694:2020-04-06
1670:2020-04-06
1645:2020-04-06
1586:References
1572:Tal Malkin
1559:Xuejia Lai
1482:Amit Sahai
1406:Juan Garay
1220:Joe Kilian
1168:signatures
1020:, and the
884:David Kahn
865:methods."
762:Andrew Yao
513:Tom Berson
457:Ron Rivest
444:Adi Shamir
408:California
134:Activities
124:cryptology
86:Main organ
1895:1059-1028
1863:1059-1028
1831:1059-1028
1739:3 October
1290:Ed Dawson
1155:Tal Rabin
1097:Moti Yung
1084:Dan Boneh
966:Eli Biham
893:historian
859:factoring
646:Moni Naor
438:Citation
278:Eurocrypt
256:Edinburgh
200:Australia
189:Asiacrypt
74:President
45:Formation
18:Eurocrypt
2106:Category
1949:12 April
1943:dblp.org
1774:cite web
1442:e-voting
1243:knapsack
380:WhatsApp
295:series.
289:Springer
272:Lausanne
260:Yokohama
106:iacr.org
422:Fellows
410:at the
248:Cologne
101:Website
53:Founder
1893:
1861:
1829:
1636:"CHES"
1497:, and
1198:, and
711:cipher
554:, and
432:Fellow
270:, and
264:Vienna
252:Boston
207:Sydney
1887:Wired
1855:Wired
1823:Wired
1576:2020
1563:2020
1550:2020
1537:2020
1524:2020
1511:2019
1486:2019
1469:2019
1452:2019
1437:2019
1426:2019
240:Paris
215:Japan
1973:2022
1951:2020
1891:ISSN
1859:ISSN
1827:ISSN
1780:link
1741:2022
1409:2018
1398:2018
1383:2018
1370:2018
1357:2017
1340:2017
1329:2017
1318:2017
1307:2017
1294:2016
1281:2016
1268:2016
1255:2016
1238:2015
1223:2015
1212:2015
1191:2015
1180:2015
1159:2015
1142:2014
1125:2014
1112:2014
1101:2014
1088:2013
1075:2013
1058:2013
1045:2013
1032:2013
1013:2013
1000:2013
987:2012
970:2012
957:2012
944:2012
931:2012
918:2012
905:2012
888:2011
875:2011
861:and
850:2011
833:2011
820:2010
809:2010
796:2010
783:2010
766:2010
749:2009
736:2009
723:2009
706:2009
693:2009
676:2008
663:2008
650:2008
637:2007
624:2007
611:2007
594:2006
581:2006
568:2005
543:2005
530:2005
517:2004
504:2004
491:2004
474:2004
461:2004
448:2004
358:and
312:and
198:and
196:Asia
120:IACR
114:The
48:1982
1474:AES
1230:."
1149:."
1022:LZW
977:."
773:."
481:."
374:in
336:MIT
2108::
1941:.
1917:.
1889:.
1885:.
1857:.
1853:.
1825:.
1821:.
1797:.
1776:}}
1772:{{
1758:.
1711:.
1687:.
1663:.
1638:.
1493:,
550:,
414:.
406:,
266:,
262:,
258:,
254:,
250:,
246:,
242:,
217:.
213:,
202:.
2064:e
2057:t
2050:v
1975:.
1953:.
1927:.
1903:.
1871:.
1839:.
1807:.
1782:)
1768:.
1743:.
1721:.
1697:.
1673:.
1648:.
118:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.