International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

17:49 [Job][New] PhD studentship in Hardware Security, University of Cambridge, England, UK, European Union

  A fully funded 3.5 year PhD Studentship is available from October 2014 to work on “Model-Based Assessment of Compromising Emanations”. The project aims to improve our understanding of electro-magnetic emissions that are unintentionally emitted by computing equipment, and the eavesdropping risks they pose. In particular, it aims to improve test and measurement procedures (TEMPEST) for computing equipment that processes extremely confidential data. We are looking for an Electrical Engineering, Computer Science or Physics graduate with an interest in electronics, radio communication, hardware security, side-channel cryptanalysis, digital signal processing, electromagnetic compatibility, or machine learning.

This Studentship is funded through Government Communication Headquarters (GCHQ) under their Academic Centres of Excellence in Cyber Security Research (ACE-CSR) programme. As part of this programme, the doctoral student will be able to visit and work with GCHQ experts in Cheltenham. To enable such collaboration, this studentship is awarded under the condition that the applicant obtains an advanced UK government security clearance (“developed vetting”). To make this feasible, the applicant should have lived in the UK for the last 10 years and ideally be a British National.

17:33 [Event][New] DIAC 2014: Directions in Authenticated Ciphers

  Submission: 20 June 2014
Notification: 7 July 2014
From August 23 to August 24
Location: Santa Barbara, USA
More Information:

17:18 [Event][New] PKC 2015: 18th Int'l Conference on Practice and Theory in Public-Key Cryptography

  Submission: 6 October 2014
Notification: 15 December 2014
From March 30 to April 1
Location: Washington, D.C., USA
More Information:

17:41 [Job][New] Research Scientist, Temasek Laboratories, National University of Singapore, Singapore

  Temasek Laboratories at National University of Singapore, Singapore is seeking highly motivated professionals interested in conducting research in the area of cryptography.

Applicants are expected to have a PhD degree in Mathematics/Computer Science/Engineering and experience in analysis/design of symmetric ciphers.

Preferred candidates are expected to be proficient in C/C++ language, a team worker and able to conduct independent research.

Review of applications will start immediately and continue until position is filled.

Interested candidates can contact Dr Tan Chik How tsltch (at)

Closing Date for applications : 10 July 2014

17:41 [Job][New] PhD studentship , University of Birmingham, UK

  Applications are invited for a fully funded, four year PhD studentship in the area of embedded security/cryptography for next generation vehicles at the School of Computer Science, University of Birmingham. The studentship is jointly sponsored by Jaguar Land Rover and EPSRC and covers the university fees (UK/EU) and a tax-free annual stipend of £18,0000. The project will additionally provision for a laptop, equipment and travel to attend conferences and workshops.

Research Project:

Modern automotive vehicles have several wireless interfaces, are interconnected with various devices and with the internet. This connectivity adds great functionality but it also introduces a number of security and privacy threats.

This PhD studentship will be focused on improving the security of the next generation electronic vehicle architecture. Develop optimized implementations of cryptographic primitives and protocols for time critical automotive applications.


  • The successful applicant will have at least a strong 2:1 degree in Computer Science, Engineering, Mathematics or a related MSc course as well as excellent programming skills (especially C).
  • A demonstrable interest/background in security, cryptography and/or embedded devices is desirable.
  • International students are encouraged to apply, but the studentship only fully covers UK/EU fees.
  • For non-native English speakers, the university requires IELTS of 6.5 (with no band less than 6.5) or equivalent qualification.
  • The student is expected to collaborate with and visit Jaguar Land Rover on a regular basis.

  • 17:41 [Job][New] Faculty , Istanbul Technical University, Istanbul, Turkey

      The Informatics Institute at Istanbul Technical University (ITU) invites applications from accomplished scholars for several full-time/part time open rank faculty positions in Cyber Security related areas:

    • wireless and network security,

    • secure software,

    • cyber supply chain security,

    • cybersecurity policy,

    • cryptography,

    • multimedia forensics.

    Applicants should have a well-established record of research. Duties of these positions include mainly research and teaching at graduate level. The salaries for these positions are internationally competitive and commensurate with candidates’ qualifications and academic ranks. “Information Security and Cryptography” department is a newly opening division at ITU and the prospective candidates for these positions are supposed to assume duties as early as September, 2015.

    Istanbul Technical University, located at the heart of Istanbul, is one of the most prominent research universities of Turkey. Admission to ITU is highly competitive and the student body is from top scorers of the nationwide university entrance exam. With its well-qualified departments and institutions, ITU provides an excellent research environment for engineers and scientists. As a state university, ITU provides a free of charge health and dental insurance for its faculty members and their families.

    About the application procedure:

    To apply please send your application package including a cover letter, CV, research plan, and the names of 3 or 4 references to:

    hiring (at)

    17:40 [Event][New] ISCTURKEY 2014: International Conference on Information Security and Cryptology

      Submission: 19 July 2014
    From October 17 to October 18
    Location: Istanbul, Turkey
    More Information:

    17:39 [Event][New] WPES 2014: Workshop on Privacy in the Electronic Society

      Submission: 24 July 2014
    Notification: 25 August 2014
    From November 3 to November 3
    Location: Scottsdale, USA
    More Information:

    15:17 [Pub][ePrint] Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants, by Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang

      This paper presents an algorithm to construct cryptographically strong genus 2 curves and their Kummer surfaces via Rosenhain invariants and related Kummer parameters. The most common version of the complex multiplication (CM) algorithm for constructing cryptographic curves in genus 2 relies on the well-studied Igusa invariants and Mestre\'s algorithm for reconstructing the curve. On the other hand, the Rosenhain invariants typically have much smaller height, so computing them requires less precision, and in addition, the Rosenhain model for the curve can be written down directly given the Rosenhain invariants. Similarly, the parameters for a Kummer surface can be expressed directly in terms of rational functions of theta constants.

    CM-values of these functions are algebraic numbers, and when computed to high enough precision, LLL can recognize their minimal polynomials. Motivated by fast cryptography on Kummer surfaces, we investigate a variant of the CM method for computing cryptographically strong Rosenhain models of curves (as well as their associated Kummer surfaces) and use it to generate several example curves at different security levels that are suitable for use in cryptography.

    15:17 [Pub][ePrint] Note of Multidimensional MITM Attack on 25-Round TWINE-128, by Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen

      TWINE is a lightweight block cipher proposed in SAC 2012 by Suzaki et al. TWINE operates on 64-bit block and supports 80 or 128-bit key, denoted as TWINE-80 and TWINE-128 respectively. TWINE has attracted some attention since its publication and its security has been analyzed against several cryptanalytic techniques in both single-key and related-key settings. In the single-key setting, the best attack so far is reported by Bozta\\c{s} et al. at LightSec\'13, where a splice-and-cut attack on 21-round TWINE-128 and a multidimensional meet-in-the-middle (MITM) attack on 25-round TWINE-128 are presented. Yet, the evaluation of the time complexity of the multidimensional MITM attack on 25-round TWINE-128 is somehow controversial in the way we understand. We here describe the attack in detail and explains our concerns about the time complexity of the attack. And it turns out that the multidimensional MITM attack on 25-round TWINE-128 may have a time complexity higher than exhaustive search.

    15:17 [Pub][ePrint] Efficient Authentication and Pseudorandomness from Weaker (Ring-)LPN Assumptions, by Ivan Damg{\\aa}rd and Sunoo Park and Sarah Zakarias

      We propose a two new approaches to authentication based on the (ring-)LPN problem. In contrast to all known approaches, we can use a noise rate for the LPN problem that is arbitrarily close to 1/2, without this affecting the communication complexity of the protocol, and while doing only (poly-)logarithmic depth computation. At the cost of having the prover keep a small amount of state, our approach allows us to ``upgrade\'\' the HB protocol from passive to the man-in-the-middle security (the strongest notion) while maintaining its simple structure.

    A technical contribution of independent interest is a construction of a poly-logarithmic depth PRF from LPN that is secure if at most a predetermined number $\\ell$ of queries are asked; if more queries are asked, the same PRF is still secure, but now under a stronger assumption closely related to LPN. The basic idea of the construction also applies to other problems with a similar structure, such as subset-sum.