## IACR News

Here you can see all recent updates to the IACR webpage. These updates are also available:

There is currently a problem with the jobs channel, and new jobs listings are not appearing here. Please see the jobs page.

#### 24 July 2019

Announcement
Registration is now open for Selected Areas in Cryptography (SAC) 2019, which is held in cooperation with the IACR. SAC 2019 will be held August 14-16, 2019, at the University of Waterloo near Toronto, Canada, preceded by the SAC Summer School August 12-13. Invited speakers include Craig Costello, Tetsu Iwata, Seny Kamara, Nele Mentens, and Doug Stinson.

The program will include sessions on design and analysis of symmetric key primitives, efficient implementations, mathematical cryptology, real-world cryptography, and post-quantum crypto. Details and program at https://uwaterloo.ca/sac-2019.

Some stipends available to help support attendance of students and early career researchers.
CHES
Cryptographic Hardware and Embedded Systems (CHES) 2019

Atlanta, GA, August 25-28, 2019
https://ches.iacr.org/2019/

The Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on design and evaluation of cryptographic implementations and secure embedded systems. CHES 2019 marks the 20th anniversary of the CHES conference and will take place in the city of Atlanta, U.S.A., August 25–28, 2019, immediately following CRYPTO 2019.

Due to a recent health hazard with Sheraton Atlanta, CHES 2019 will change its venue to the nearby Westin Peachtree Plaza. Please find updated information below regarding registration and hotel booking.

Registration
CHES 2019 registrations are open at https://ches.iacr.org/2019/registration.shtml
The early registration deadline has been extended from July 24, 2019 to Aug. 7th, 2019 to accommodate the venue change.

Hotel
###### Sreyosi Bhattacharyya, Palash Sarkar
ePrint Report
Poly1305 is a polynomial hash function designed by Bernstein in 2005. Presently, it is part of several major platforms including the Transport Layer Security protocol. Vectorised implementation of Poly1305 has been proposed by Goll and Gueron in 2015. We provide some simple algorithmic improvements to the Goll-Gueron vectorisation strategy. Implementation of the modified strategy on modern Intel processors shows marked improvements in speed for short messages.
###### Daniel Smith-Tone
ePrint Report
Recently, an article by Felke appeared in Cryptography and Communications discussing the security of biquadratic C* and a further generalization, k-ary C*. The article derives lower bounds for the complexity of an algebraic attack, directly inverting the public key, under an assumption that the fi rst-fall degree is a good approximation of the solving degree, an assumption that the paper notes requires `greater justi fication and clari fication."

In this work, we provide a practical attack breaking all k-ary C* schemes. The attack is based on differential techniques and requires nothing but the ability to evaluate the public key and solve linear systems. In particular, the attack breaks the parameters provided in CryptoChallenge11 by constructing and solving linear systems of moderate size in a few minutes.