International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

06:22 [Election] Results 2011


The 2011 election was held to fill three of nine IACR Director positions. The term of the following three directors expires by the end of 2011: Josh Benaloh, Stuart Haber, and Antoine Joux. This year, we had six candidates: Josh Benaloh, Alexandra Boldyreva, Shai Halevi, Phong Nguyen, Tom Shrimpton, and Nigel Smart

Voting IACR members were invited to cast their votes between October 1 and November 15, 2011. The vote was run electronically by the service. This year, IACR switched to "approval voting", meaning that each voter could vote for as many candidates as they desire (but only once for each candidate).

We had 1484 eligible voters. We collected 621 ballots, giving a record participation rate of 41.8%. The tallies are

  • 339: Shai Halevi
  • 328: Nigel Smart
  • 291: Josh Benaloh
  • 266: Phong Nguyen
  • 234: Alexandra Boldyreva
  • 188: Tom Shrimpton
The three elected directors are Shai Halevi, Nigel Smart, and Josh Benaloh. Their term will run until 2014.

The election committee would like to thank all candidates for their participation, to congratulate the three elected directors, and to warmly thank Ben Adida for his help in running the helios system.

The election committee: Serge Vaudenay (Chair), Greg Rose, and Martijn Stam.

12:29 [PhD][New] Berkant Ustaoglu: Key establishment - security models, protocols and usage

  Name: Berkant Ustaoglu
Topic: Key establishment - security models, protocols and usage
Category: cryptographic protocols


Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment protocols is a non-trivial task. This thesis compares, extends and merges existing security definitions and models for key establishment protocols.


The primary focus is on two-party key agreement schemes in the public-key setting. On one hand new protocols are proposed and analyzed in the existing Canetti-Krawzcyk model. On the other hand the thesis develops a security model and novel definition that capture the essential security attributes of the standardized Unified Model key agreement protocol. These analyses lead to the development of a new security model and related definitions that combine and extend the Canetti-Krawzcyk pre- and post- specified peer models in terms of provided security assurances.


The thesis also provides a complete analysis of a one-pass key establishment scheme. There are security goals that no one-pass key establishment scheme can achieve, and hence the two-pass security models and definitions need to be adapted for one-pass protocols. The analysis provided here includes the description of the required modification to the underlying security model. Finally, a complete security argument meeting these altered conditions is presented as evidence supporting the security of the one-pass scheme.


Lastly, validation and reusing short lived key pairs are related to efficiency, which is a major objective in practice. The thesis considers the formal implication of omitting validation steps and reusing short lived key pairs. The conclusions reached support the generally accepted cryptographic conventions that incoming messages should not be blindly trusted and extra care should be taken when key pairs are reused.


12:00 [Conf][FSE] FSE submission server will close in 24 hours (Nov. 17, 11:59 AM UTC)

  submission deadline: November 17, 11:59 AM UTC

10:13 [News] Eli Biham to hold Distinguished Lecture 2013

  Eli Biham will hold the IACR Distinguished Lecture 2013 at Eurocrypt in Athens, Greece. Title and abstract will be posted on the IACR web site close in time to the talk.

10:12 [News] Dan Boneh to hold Distinguished Lecture 2012

  Dan Boneh will hold the IACR Distinguished Lecture 2012 at Asiacrypt in Beijing, China. Title and abstract will be posted on the IACR web site close in time to the talk.

18:09 [Job][New] Experienced Researchers in Cryptology, Galician Research and Development Center in Advanced Telecommunications (Gradiant), Vigo, Spain

  We are looking for a senior researcher with a strong background on cryptology and its mathematical foundations, with a strong motivation for carrying out applied research in this field and leading projects focused on practical applications.

Research experience is required in at least one of the following topics: secure identity management, privacy by design, trusted computing and secure computation outsourcing, network security, design of efficient cryptosystems, digital rights management, security and usability.

Experienced researcher or 4-10 yrs (Post-Doc)

Nr. Job Positions : 1

10:02 [Job][New] IT Hardware Security Engineer – Smartcards, APPLUS - LGAI DIVISION Barcelona

  Applus+ is seeking an IT Hardware Security Engineer to participate in security evaluations in smartcards and Integrated Circuits.

This is a long term contract position working at the headquarters ITC security laboratory of Applus+ based in Bellaterra (Barcelona). It is important to note that some projects will be in collaboration with one of the site security laboratories that Applus+ has in Shanghai (China), so for this job position is also required travel availability.

We are hiring hardware security analyst with the aim of widen our hardware security team. He/She will be in charge of evaluations related to secure applications/platforms (as banking or identification) using the testing as a tool to investigate possible bugs or security warnings that can be exploited using Side-Channel or Fault analysis attacks. The candidate should have the following skills and knowledge:

  • Strong background in Cryptography algorithms. (AES, DES, RSA, ECDSA…)
  • Expertise in Side-Channel attacks (SPA, DPA, DEMA, SEMA, CPA, Timing…)
  • Expertise in DFA attacks(Laser, glitches...)
  • Knowledge in Smart Cards and HSM (Hardware Security Modules), specially hardware architecture design.
  • Experience in programming (C, C++, Java..).
  • Knowledge in banking security and related specifications.
  • ISO 7816 and ISO14443.
  • Knowledge in Common Criteria specifications.
  • Knowledge in analog and digital signal processing and circuitry development experience for tools development.

High level of written and spoken English is required.

15:24 [Conf] Report on Fault Diagnosis and Tolerance in Cryptography Workshop (FDTC 2011) September 28, 2011, Nara, Japan (ICW)


FDTC 2011 was held in Nara, on the 28-th of September 2011. The workshop attracted 117 participants from 10 countries, in descending order, from Asia, Europe and North America. The technical program included 12 papers: two invited presentations, and 10 regular papers, categorized into four sessions, that were selected from 18 submissions. Each paper was reviewed by at least 3 reviewers and detailed discussions were later conducted to reach final decisions. Most of the presentation slides for the technical sessions are now available on the workshop website. The workshop proceedings were published by IEEE CS Press and will soon be available on the IEEE Digital Library. Ingrid Verbauwhede from Leuven University (Belgium) and Rob Bekkers from Brightsight (The Netherlands), delivered the two invited lectures on the topics "The Fault Attack Jungle – A Classification Model to Guide You" and "Fault Injection – A Fast Moving Target in Evaluations," respectively.

Junko Takahashi from NTT (Japan) and Sylvain Guilley from Telecom ParisTech (France), were the program co-chairs. David Naccache from Ecole Normale Supérieure (France) was the invited presentations chair. We thank the sponsors for their generous support and contributions to the success of the conference, as well as Akashi Satoh for his continuous support of FDTC, and Tetsuya Izu and Yumi Sakemi for their tremendous help with the local arrangements.

14:48 [Conf] Report on Africacrypt 2011 (ICW)

  The 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held July 5-7, 2011 in Dakar, Senegal. The Program Committee, aided by reports from 52 external reviewers, produced a total of 240 reviews in all. The 23 papers presented were carefully reviewed and selected from 76 submissions. They are organized in 10 topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs. The program was completed with 3 invited talks by:
  • Jens Groth on "Efficient Zero-Knowledge Proofs"
  • Tatsuaki Okamoto on "Some Key Techniques on Pairing Vector Spaces" and
  • Bart Preneel on "The NIST SHA-3 Competition: A Perspective on the Final Year"
The general chair was Mamadou Sanghare and the general co-chair was Djiby Sow. The program chair was David Pointcheval and the program co-chair was Abderrahmane Nitaj. The African paper entitled "On randomness extraction in elliptic curves" written by Abdoul Aziz Ciss and Djiby Sow was accepted as one of the best papers. The venue was at the AUF conference center next of Dakar University. There was about 90 attendees most of which stayed in hotels near the conference center (Djollof Hotel, Terroubi Hotel and University Hotel). The rump session was organized during the gala diner on the Wednesday at Terroubi Hotel. It was chaired by Peter Schwabe. The registration fee for normal attendees was 350 Euros (and 300 euros for PhDs students). General chair was Mamadou Sanghare, general co-chair was Djiby Sow.

13:13 [Event][Update] CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems

  Submission: 5 March 2012
Notification: 14 May 2012
From September 9 to September 12
Location: Leuven, Belgium
More Information: