IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
11 December 2025
University of Vienna, Technical U Vienna, Institute of Science and Technology Austria (ISTA)
FARCry (Foundations & Applications of Resource-Restricted Cryptography) is a joint research project by the University of Vienna, Institute of Science and Technology Austria (ISTA), and TU Wien, funded by the Vienna Science and Technology Fund (WWTF) under grant ICT25-081
We invite applications for PhD positions in cryptography, privacy, and provable security. FARCry investigates cryptographic primitives and protocols whose security and privacy rest on bounded computational resources (work, time, space)—including verifiable delay functions (VDFs), proofs of space/work, memory‑hard functions, and privacy‑enhancing applications such as deniable communication and Sybil‑resistance.
Candidates with a strong background in theoretical computer science and/or mathematics are encouraged to apply. For more information, please contact the respective PI directly (with "FARCry [your name]" in the Subject).
The positions start from October 2026. For ISTA, applications go through the graduate school where the deadline is January 8th
Closing date for applications:
Contact:
- Ass.-Prof. Karen Azari, University of Vienna — karen.azari@univie.ac.at
-
Prof. Krzysztof Pietrzak, ISTA — krzpie@gmail.com
- Prof. Dominique Schröder, TU Wien — dominique.schroeder@@tuwien.ac.at
More information: https://krzpie.github.io/FARCry/
University of Luxembourg
Your role
The successful candidate will join the APSIA Group (Applied Security and Information Assurance), led by Dr. Peter B. Roenne. For further information, you may refer to https://www.uni.lu/snt-en/research-groups/apsia.
The candidate will pursue a doctorate in computer science with a focus on the migration to Post-Quantum Cryptography (PQC) while collaborating with the Ministry for Digitalization in Luxembourg on a joint project. The project aims to provide guidance on the transformation of applications relying on classical cryptography, prone to attacks from quantum computers, to post-quantum cryptography.
Your profile• Master’s degree in Computer Science, Computer Engineering, Software Engineering, Data Science, Information Systems (Engineering), Mathematics, or related fields with robust mathematical expertise
• Strong programming skills in at least one major programming language
• Good presentation and teamworking skills
• A collaborative team player with a desire to make a personal impact within our interdisciplinary research group
• The commitment to participate in the design and implementation of high-quality solutions that solve significant problems
• Self-initiative, creativity, curiosity, flexibility and enthusiasm to work
We offer
• Multilingual and international character. Modern institution with a personal atmosphere. Staff coming from 90 countries. Member of the “University of the Greater Region” (UniGR)
• A modern and dynamic university. High-quality equipment. Close ties to the business world and to the Luxembourg labour market. A unique urban site with excellent infrastructure
• A partner for society and industry. Cooperation with European institutions, innovative companies, the Financial Centre and with numerous non-academic partners such as ministries, local governments, associations, NGOs …
More info & how to apply http://emea3.mrted.ly/40k7p
Closing date for applications:
Contact: For further information, please contact Peter B. Roenne (peter.roenne@uni.lu).
Microsoft Research, Redmond
Overview Research Internships at Microsoft provide a dynamic environment for research careers with a network of world-class research labs led by globally-recognized scientists and engineers, who pursue innovation in a range of scientific and technical disciplines to help solve complex challenges in diverse fields, including computing, healthcare, economics, and the environment. The researchers and engineers in the Cryptography team pursue challenging research that has an impact at Microsoft and the world at large. Most recently we have focused on cryptographic identity, formally verified cryptography, encrypted communications, verifiable elections, zero-knowledge proofs, and high-performance hardware and software implementations of cryptography. We are spinning up new work related to Artificial Intelligence (AI) and the changes and challenges it brings related to cryptography.
Responsibilities Research Interns put inquiry and theory into practice. Alongside fellow doctoral candidates and some of the world’s best researchers, Research Interns learn, collaborate, and network for life. Research Interns not only advance their own careers, but they also contribute to exciting research and development strides. During the 12-week internship, Research Interns are paired with mentors and expected to collaborate with other Research Interns and researchers, present findings, and contribute to the vibrant life of the community. Research internships are available in all areas of research, and are offered year-round, though they typically begin in the summer.
We are especially interested in applicants with expertise in one or more of the following:
- Efficient software and hardware cryptographic systems.
- Fully homomorphic encryption (FHE).
- Efficient zero-knowledge proofs.
- Encrypted and authenticated data structures.
- End-to-end encrypted communications.
- Formalization and formal verification of cryptography.
- Verifiable election technologies.
Closing date for applications:
Contact: Greg Zaverucha (apply at the Microsoft careers website)
More information: https://apply.careers.microsoft.com/careers/job/1970393556640165
Pedro Branco, Abhishek Jain, Akshayaram Srinivasan
To obtain these results, we generalize the ``encrypt-evaluate-decrypt'' paradigm used in prior works by replacing the use of fully homomorphic encryption with succinct secure two-party computation where parties obtain additive output shares (Boyle et al., EUROCRYPT'25 and Abram et al., STOC'25).
Loris Bergerat, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
Mathieu Degré, Patrick Derbez, André Schrottenloher
Over the years, various enhancements such as superposition MITM (Bao et al., CRYPTO 2022) and bidirectional propagations have significantly improved MITM attacks, but at the cost of increasing complexity of automated search models. In this work, we propose a unified mixed integer linear programming (MILP) model designed to improve the search for optimal pre-image MITM attacks against AES-based compression functions.
Our model generalizes previous approaches by simplifying both the modeling and the corresponding attack algorithm. In particular, it ensures that all identified attacks are valid. The results demonstrate that our framework not only recovers known attacks on AES and Whirlpool but also discovers new attacks with lower memory complexities, and new quantum attacks.
Yanpei Guo, Zhanpeng Guo, Wenjie Qu, Jiaheng Zhang
In this work, we initiate the study of architecture-private zkML for neural networks, with a focus on CNN models. Our core contributions includes 1) parametrized rank-one constraint system (pR1CS), a generalization of R1CS, allowing the prover to commit to the model architecture in a more friendly manner; 2) a proof of functional relation scheme to demonstrate the committed architecture is valid.
Our scheme matches the prover complexity of BFG+23 (CCS'23), the current state-of-the-art in zkML for CNNs. Concretely, on VGG16 model, when batch proving 64 instances, our scheme achieves only 30% slower prover time than BFG+23 (CCS'23) and 2.3$\times$ faster than zkCNN (CCS'21). This demonstrates that our approach can hide the architecture in zero-knowledge proofs for neural networks with minor overhead. In particular, proving a matrix multiplication using our pR1CS can be at least 3$\times$ faster than using conventional R1CS, highlighting the effectiveness of our optimizations.
Yanpei Guo, Zhanpeng Guo, Wenjie Qu, Jiaheng Zhang
In this work, we initiate the study of architecture-private zkML for neural networks, with a focus on CNN models. Our core contributions includes 1) parametrized rank-one constraint system (pR1CS), a generalization of R1CS, allowing the prover to commit to the model architecture in a more friendly manner; 2) a proof of functional relation scheme to demonstrate the committed architecture is valid.
Our scheme matches the prover complexity of BFG+23 (CCS'23), the current state-of-the-art in zkML for CNNs. Concretely, on VGG16 model, when batch proving 64 instances, our scheme achieves only 30% slower prover time than BFG+23 (CCS'23) and 2.3$\times$ faster than zkCNN (CCS'21). This demonstrates that our approach can hide the architecture in zero-knowledge proofs for neural networks with minor overhead. In particular, proving a matrix multiplication using our pR1CS can be at least 3$\times$ faster than using conventional R1CS, highlighting the effectiveness of our optimizations.
Suvasree Biswas, Mohit Vaid, Arkady Yerukhimovich
Min Zhang, Yao Sun
Hanyu Wei, Wenqian Li, Shiyu Shen, Hao Yang, Wenbo Guo, Yunlei Zhao
08 December 2025
Tapas Pal, Robert Schädlich
- RABE for logspace Turing machines. We present the first RABE for deterministic and nondeterministic logspace Turing machines (TMs), corresponding to the uniform complexity classes $\mathsf L$ and $\mathsf{NL}$. That is, we consider policies $g$ computable by a TM with a polynomial time bound $T$ and a logarithmic space bound $S$. The public parameters of our schemes scale only with the number of states of the TM, but remain independent of the attribute length and the bounds $T,S$. Thus, our system is capable of verifying unbounded-length attributes $\mathbf y$ while the maximum number of states needs to be fixed upfront.
- RFE for attribute-based attribute-weighted sums (AB-AWS). Building upon our RABE, we develop RFE for AB-AWS. In this functionality, a function is described by a tuple $f=(g,h)$, takes $(\mathbf y, \{(\mathbf x_j, \mathbf z_j)\}_{j\in[N]})$ as input for an unbounded integer $N$, and outputs $\sum_{j\in[N]}\mathbf z_jh(\mathbf x_j)^\top$ if and only if $g(\mathbf y) = 0$. Here, $\{\mathbf z_j\}_j$ are private inputs that are hidden in the ciphertext, whereas $\mathbf y$ and $\{\mathbf x_j\}_j$ can be public. Our construction can instantiate $g,h$ with deterministic logspace TMs, while a previous construction due to [Pal and Schädlich, Eprint 2025] only supports arithmetic branching programs (ABPs), i.e. a non-uniform model of computation.
- RFE for attribute-based quadratic functions (AB-QF). Furthermore, we build the first RFE for AB-QF with compact ciphertexts. In this functionality, a function is described by a tuple $f=(g,\mathbf h)$, takes input $(\mathbf y,(\mathbf z_1,\mathbf z_2))$ and outputs $(\mathbf z_1\otimes\mathbf z_2)\mathbf h^\top$ if and only if $g(\mathbf y)=0$. Here, $(\mathbf z_1, \mathbf z_2)$ are private inputs whereas the attribute $\mathbf y$ is public. Policies can be computed by ABPs or deterministic logspace TMs. Prior to our work, the only known construction of RFE for quadratic functions from standard assumptions [Zhu et al., Eurocrypt 2024] did not provide any access control.
Conceptually, we transfer the framework of [Lin and Luo, Eurocrypt 2020], which combines linear FE with information-theoretic garbling schemes, from standard to registered FE. At the core of our constructions, we introduce a novel RFE for inner products with user-specific pre-constraining of the functions which enables the on-the-fly randomization of garbling schemes akin to standard inner-product FE. This solves an open question raised in [Zhu et al., Asiacrypt 2023] who constructed RABE from predicate encodings but left open the problem of building RABE in a more general setting from linear garbling schemes.
Lissabon, Portugal, 11 July 2026
Submission deadline: 12 March 2026
Notification: 10 April 2026
Universität der Bundeswehr München, Germany
- Advanced public-key encryption: e.g. Homomorphic Encryption (HE), Updatable Public-Key Encryption (UPKE), KEMs with extra propeties, and their use in the design of protocols.
- Lattice-based cryptography: Design, analysis, and prototyping of cryptographic schemes based on hard problems in lattices.
This position is available for a start in April 2026 and is fully funded at federal salary level TVöD E13 (~59k to 64k EUR p.a. depending on qualifications and experience). The initial contract will be for 1.5 years with a possibility of extension. Candidates without doctoral degree but with sufficient research experience, e.g. final-year doctoral students, are also welcome to apply. (More info via URL below.)
Requirements:
- At least a completed Master degree in cryptography, mathematics or computer science
- Strong background knowledge / experience in privacy-enhancing cryptography research and development
- Publications in top-tier cryptography / security / privacy venues
- Fluency in written and spoken English, (German is not essential)
Please send your application including a cover letter, CV, transcripts of grades, and two contacts for academic references as a single PDF document per email with subject line ”Application PACY“.
Closing date for applications:
Contact: Prof. Mark Manulis (mark.manulis [at] unibw.de)
More information: https://www.unibw.de/pacy-en/vacancies
University of Klagenfurt, Klagenfurt, Austria
AAU is seeking to appoint a full professor in cybersecurity (candidates from all technical areas are welcome). Depending on the candidate's academic credentials, the professorship can either be open-ended or fixed-term (with option of a permanent extension).
The professorship is located at the Department of Artificial Intelligence and Cybersecurity, and takes a central role in the department, as well as the delivery of the MSc in AI and Cybersecurity.
A starting date of September 1st 2026 is envisioned. Salary, as well as associated positions (pre-doc and post-doc) are negotiable. For further information about the position please follow the link, and/or get in touch via the context supplied below.
Applications must be made by 14th of January 2026 via: https://jobs.aau.at/en/job/5-2/Closing date for applications:
Contact: Elisabeth . Oswald AT aau.at
More information: https://jobs.aau.at/en/job/5-2/
Aarhus University, Denmark
Candidate profile:
Interns are expected to be current or recent PhD students with a relevant background in at least one of the following research areas:
- Modeling of MPC (security) in general, or of real-world aspects of other types of cryptographic protocols
- Attacks on implementations of advanced cryptographic protocols such as MPC, ZK, or related protocols
- Implementations of MPC protocols and related protocols
Application:
The application deadline is 7 January 2026. Please see the project website (https://mpcinthewild.github.io) for further instructions.
Closing date for applications:
Contact: For more information about the internships, please contact Sabine Oechsner (s.a.oechsner@vu.nl) or Peter Scholl (peter.scholl@cs.au.dk).
More information: https://mpcinthewild.github.io
Panagiotis Chatzigiannis, Suvradip Chakraborty, Shimaa Ahmed
In this work, we present a fully-offline protocol called LifeXP$^{+}$, that allows a user to reconstruct a cryptographically-secure private key from a natural-language story, which a user always remembers, such an memorable life event. To ensure usability of our protocol, key reconstruction can work even when the story is later retold with different wording or grammar, only requiring to preserve the semantics. The protocol combines pre-trained sentence embeddings to capture semantics, locality-sensitive hashing to quantize embeddings into stable bit strings, a cryptographic fuzzy extractor that corrects bit errors caused by paraphrasing, and a biometric factor that is fused with the linguistic factor to boost entropy and enhance security. In our paper we describe the design, show that the protocol achieves the required properties, and provide an evaluation based on publicly-available datasets which runs completely offline on commodity hardware, showcasing its feasibility.