IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
03 September 2025
Kanazawa University, Faculty of Electrical, Information and Communication Engineering, Japan
- Start of employment: February 1st, 2026 or any early possible date afterwards.
- Deadline for application: September 12th, 2025
- Employment status:
- A full-time associate professor (tenured) or
- A full-time assistant professor (non-tenured, 5-year term)* * the employment period may be renewed depending on performance
.
Closing date for applications:
Contact: Masahiro Mambo
More information: https://www.se.kanazawa-u.ac.jp/wp-content/uploads/2025/07/2025091202_ec_en.pdf
Eindhoven University of Technology (TU/e)
We are currently looking for an outstanding candidate for a 4-year PhD researcher position in the area of symmetric-key cryptography. The successful candidate will work under the supervision of Dr. Lorenzo Grassi, towards a PhD degree from the Eindhoven University of Technology.
The research topics will focus on
- design dedicated symmetric-key primitives operating over prime fields and/or integer rings, that can provide efficient solutions for rising applications of practical importance such as Format Preserving Encryption, Multi-Party Computation, Homomorphic Encryption, and Zero-Knowledge;
- analyze the security of those symmetric-key primitives, with the goals to improve the current cryptanalytic results, and to develop new innovative security arguments.
(The implementation of those schemes will *not* be part of the PhD.)
We are looking for a candidate who has recently completed, or is about to complete, a master's degree in cryptography, mathematics, computer sciences, or a closely related field. The master's degree must have been awarded, with good results, before starting the PhD. The candidate must be highly motivated and be able to demonstrate their potential for conducting original research in cryptography.
The vacancy is open until a suitable candidate has been found. Applications will be screened continuously, and we will conclude the recruitment as soon as we find the right candidate. The starting date is negotiable (not before March 2026).
Interested and qualified candidates should apply at https://www.tue.nl/en/working-at-tue/vacancy-overview/phd-on-symmetric-cryptography-over-prime-fields-and-integer-rings?_gl=1*sdu9b*_up*MQ..*_ga*MTI2MTQxMjkxNy4xNzU2NDQ5ODI3*_ga_JN37M497TT*czE3NTY0NDk4MjYkbzEkZzAkdDE3NTY0NDk4MjYkajYwJGwwJGgw
Closing date for applications:
Contact: For specific inquiries relating to the position, please email Dr. Lorenzo Grassi - email: l.grassi@tue.nl
(Important: Do *not* send your application via email!)
Nanyang Technological University, Singapore
Closing date for applications:
Contact: Prof Wang Huaxiong: hxwang@ntu.edu.sg
Input-Output Group - remote
IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally.
About Partner Chains: IOG’s Partner chains Tribe is an innovation project built using Substrate. It aims to simplify blockchain deployment, operation and interoperability by combining modular technology with proven security, liquidity, and reliability. Partner Chains empowers developers and validators to create optimized blockchains without network or technology stack lock-in, fostering a new era of interoperable and scalable solutions.
As a Cryptographic Engineer you will contribute to the design, implementation, and integration of secure cryptographic protocols across Partner Chain initiatives. This role bridges applied research and engineering, focusing on translating cutting-edge cryptographic designs into robust, production-grade systems. The cryptography engineer will collaborate closely with researchers, protocol designers, software architects, product managers, and QA teams to ensure cryptographic correctness, performance, and system alignment. A strong emphasis is placed on high assurance coding, cryptographic soundness, and practical deployment readiness.
Who you are:Closing date for applications:
Contact: Marios Nicolaides
More information: https://apply.workable.com/io-global/j/831252A3E6/
King's College London
Eamonn Postlethwaite and Martin Albrecht are looking to hire an intern for four months to work on the Lattice Estimator. The internship will be based at King’s College London and is funded by a gift from Zama. We are ideally looking for someone in a PhD programme also working on lattice cryptanalysis who is happy to interrupt their studies for a few months to help us improve the estimator. We’re offering a salary of roughly £4,400 per month before tax.
This would involve reviewing and closing tickets, reviewing the literature for what is currently missing from the estimator to add it and reviewing the code already there for correctness.
If you’re interested, please get in touch to discuss this position. We are somewhat flexible on timing.
Closing date for applications:
Contact: Eamonn Postlethwaite <eamonn.postlethwaite@kcl.ac.uk> and Martin R. Albrecht <martin.albrecht@kcl.ac.uk>
More information: https://martinralbrecht.wordpress.com/2025/08/27/internship-position-on-the-lattice-estimator/
NVIDIA; Santa Clara, CA or Remote, US
What you will be doing:
- Develop and optimize scalable high-performance cryptographic primitives, algorithms, and building blocks on the latest GPU hardware architectures.
- Emphasize robust long-term software architectures and designs that effectively utilize many generations of hardware.
- Work closely with internal teams (product management, engineering) and external partners to understand feature and performance requirements and deliver timely cuPQC releases.
- PhD or MSc degree in Applied Mathematics, Computer Science, or a related science or engineering field is preferred (or equivalent experience).
- 5+ years of experience designing and developing software for cryptography in low-latency or high-throughput environments.
- Strong mathematical foundations.
- Advanced C++ skills, including modern design paradigms (e.g., template meta-programming, SFINAE, RAII, constexpr, etc.).
- Strong collaboration, communication, and documentation habits.
- Experience developing libraries consumed by many users.
- Experience with CUDA C++ and GPU computing.
- Programming skills with contemporary automation setups for both building software (e.g., CMake) and testing (e.g., CI/CD, sanitizers).
- Strong understanding of mathematical foundations and algorithms used in cryptography, including but not limited to finite field arithmetic, lattice-based cryptography, and cryptographic hash functions.
Closing date for applications:
Contact: Lukasz Ligowski
More information: https://nvidia.wd5.myworkdayjobs.com/en-US/NVIDIAExternalCareerSite/job/Senior-Math-Libraries-Engineer--Post-Quantum-Cryptography_JR2002083
King's College London
We are recruiting a postdoc to work with us on “practical advanced post-quantum cryptography from lattices”.
Here “advanced” does not mean Functional Encryption or Indistinguishability Obfuscation, but OPRFs, Blind Signatures, Updatable Public-Key Encryption, even NIKE (sadly!).
We are quite flexible on what background applicants bring to the table
- Do you like breaking newfangled (and not so newfangled) lattice assumptions?
- Do you like to build constructions from those assumptions?
- Do you like to reduce lattice problems to each other?
- Do you think we can apply tricks from iO or FE to less fancy protocols?
All of that is in scope. If in doubt, drop us an e-mail and we can discuss.
Closing date for applications:
Contact: Martin Albrecht <martin.albrecht@kcl.ac.uk>
More information: https://martinralbrecht.wordpress.com/2025/08/24/postdoc-position-in-lattice-based-cryptography-2/
University of Surrey, UK
The School of Computer Science and Electronic Engineeringis seeking to recruit a full-time lecturer in Cyber Security to expand our team of dynamic and highly skilled security faculty and researchers. This post is part of a strategic investment of six academic posts across the School in the areas of Cyber Security, AI, Robotics, and Satellite Communications.
The Surrey Centre for Cyber Security (SCCS), within the School, has an international reputation in cyber security and resilience research excellence in applied and post-quantum cryptography, security verification and analysis, security and privacy, distributed systems, and networked systems. SCCS is recognised by the National Cyber Security Centre as an Academic Centre of Excellence for Cyber Security Research (ACE-CSR) and as an Academic Centre of Excellence for Cyber Security Education (ACE-CSE). Its research was also a core contributor to Surrey’s 7th position in the UK for REF2021 outputs within Computer Science. Surrey was recognised as Cyber University of the Year 2023 at the National Cyber Awards and is again shortlisted for 2025.
This post sits within the Surrey Centre for Cyber Security and this role encourages applications in the areas of systems security, web security, cyber-physical systems, cyber resilience, ethical hacking, and machine learning for security. We welcome research with applications across diverse domains, particularly communications, space, banking, and autonomous systems. Candidates with practical security experience and skills will complement our existing strengths in cryptography and formal verification.
Closing date for applications:
Contact: Professor Steve Schneider s.schneider@surrey.ac.uk
More information: https://jobs.surrey.ac.uk/Vacancy.aspx?id=14998
30 August 2025
MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction
Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan
Elena Andreeva, Amit Singh Bhati, Andreas Weninger
Forkciphers, introduced at ASIACRYPT 2019 as expanding symmetric ciphers, have since found applications in encryption, authenticated encryption and key derivation. Kim et al. (ToSC 2020) proposed the first IEM-style forkcipher, FTEM, but their security proof is limited to a 2-round design with tweak processing based on XORing AXU hashes. This offers limited insight into practical forkciphers like ForkSkinny, which use 40 to 56 rounds and a different tweak schedule. No security results currently exist for forked IEM constructions with more than two rounds. We propose a generalized forked IEM construction called GIEM which integrates any tweakey schedule (including tweak-dependent round keys or constant keys) and thus encompasses IEM, FTEM and similar IEM-related constructions.
We define three forkcipher-related instantiations, FEM (2 branches and no tweaks), FTEMid (2 branches and idealized tweakey schedule) and MFTEM (unlimited branches and AXU-based tweakey schedule). We prove that each construction achieves security similar to the respective non-forked construction. This shows the soundness of the forking design strategy and can serve as a basis for new constructions with more than two branches.
In their work, Bogdanov et al. also propose an attack against IEM using $q \approx 2^{rn/(r+1)}$ queries, which is used in a number of follow-up works to argue the tightness of IEM-related security bounds. In this work, we demonstrate that the attack is ineffective with the specified query complexity. To salvage the purported tightness results, we turn to an attack by Gazi (CRYPTO 2013) against cascading block ciphers and provide the necessary parameters to apply it to IEM. This validates the tightness of the known IEM security bound.
Guozhen Liu, Shun Li, Huina Li, Weidong Qiu, Siwei Sun
We demonstrate the technique's effectiveness through extensive cryptanalysis of Ascon-Hash256. For differential-based collision attacks, we conduct an exhaustive search of 2-round collision trails, proving that no collision trail with weight less than 156 exists. Through detailed complexity analysis and parameter optimization, we present an improved 2-round collision attack with complexity $2^{61.79}$. We also discover new Semi-Free-Start (SFS) collision trails that enable practical attacks on both 3-round and 4-round Ascon-Hash256, especially improving the best known 4-round SFS trail from weight 295 to 250.
Furthermore, applying the technique to Meet-in-the-Middle structure search yields improved attacks on 3-round Ascon-Hash256. We reduce the collision attack complexity from $2^{116.74}$ to $2^{114.13}$ with memory complexity $2^{112}$ (improved from $2^{116}$), and the preimage attack complexity from $2^{162.80}$ to $2^{160.75}$ with memory complexity $2^{160}$ (improved from $2^{162}$).
David Lim, Yan Bo Ti
Haikuo Yu, Jiahui Hou, Suyuan Liu, Lan Zhang, Xiang-Yang Li
We implement and evaluate FVES$^+$ using PC and mobile devices as end-devices. FVES$^+$ achieves real-time performance, averaging $35.1$ FPS across three public datasets, including the stages of object detection, encoding, and encryption. When there are $n$ different access requirements by end-users, FVES$^+$ improves video sharing speed by $\Theta(n)\times$ compared to the baseline methods. Our experiments validate the effectiveness and efficiency of FVES$^+$.
Hillel Avni, Shlomi Dolev, Komal Kumari, Stav Perle Elbar, Shantanu Sharma, Jeffrey Ullman, Moti Yung
Peter Schwarz, Erik Pohle, Aysajan Abidin, Bart Preneel
Our protocol, which uses relatively small RMFEs, achieves substantial reductions in communication cost compared to baseline MPC protocols. For example, in a medium-sized setting (with $n = 13$ MPC parties), our protocol reduces the communication cost for an Ascon permutation by roughly $38\%$. For large amounts of parties (e.g., $n=255$), the reduction can reach $50\%$. These improvements are achieved even though RMFEs only pack a few bits per field element, due to favorable amortization of both substitution and linear layers. We also provide a Boolean circuit implementation of Ascon in the MP-SPDZ framework, enabling straightforward benchmarking.
Our findings are particularly beneficial for bandwidth-constrained environments where the use of lightweight ciphers, such as Ascon, is necessary due to the resource limitations of client devices, as in the case of transciphering data from IoT sensors. Since our optimizations target the Ascon permutation, they naturally extend to all cryptographic modes (encryption, decryption, hashing) defined for the standard.
Qingyu Mo, Wenyuan Wu, Jingwei Chen
Taking NASE as the foundation stone, we propose a privacy-preserving two-party kernel SVM training protocol. Based on BFV scheme and MPC technique, we introduce group-batch sampling for sampling in ciphertext and propose the partial rotation method tailored to our scenario to optimize dot product computation. Additionally, we propose an error-tolerant $DReLU$ protocol for secure sign evaluation of secret sharings over a prime field that reduces the communication cost by around $\frac{1}{3}$ compared to the existing method. Our protocol achieves model accuracy comparable to plaintext training according to experiments on real-world datasets, and an order-of-magnitude reduction in both communication and computation overhead is attained compared to the previous work.
Shihui Fu
Due to the significant applicability of inner-product arguments (IPA) in constructing succinct proof systems, in this work, we extend them to work natively in the integer setting. We introduce and construct inner-product commitment schemes over integers that allow a prover to open two committed integer vectors to a claimed inner product. The commitment size is constant and the verification proof size is logarithmic in the vector length. The construction significantly improves the slackness parameter of witness extraction, surpassing the existing state-of-the-art approach. Our construction is based on the folding techniques for Pedersen commitments defined originally over $\mathbb{Z}_p$. We develop general-purpose techniques to make it work properly over $\mathbb{Z}$, which may be of independent interest.
Building upon our IPAs, we first present a novel batchable argument of knowledge of nonnegativity of exponents that can be used to further reduce the proof size of Dew-PCS (Arun et al., PKC 2023). Second, we present a construction for range proofs that allows for extremely efficient batch verification of a large number of range proofs over much larger intervals. We also provide a succinct zero-knowledge argument of knowledge with a logarithmic-size proof for more general arithmetic circuit satisfiability over integers.
Iftach Haitner, Nikolaos Makriyannis
In this work, we show that this quadratic loss is inherent for two natural classes of reductions. For interactive protocols, we prove it for uniform-challenge, black-box reductions, which query the adversary using uniformly sampled challenges. For non-interactive protocols (i.e., in the random-oracle model), we prove it for weakly programmable, black-box reductions, which answer the adversary’s oracle queries with uniformly sampled outputs. Applying our bounds to the reductions from Schnorr identification and signatures to discrete logarithm yields lower bounds that match known positive results—namely, the classical worst-case reduction of Pointcheval and Stern (Journal of Cryptology, 2000) and the higher-moment reduction of Rotem and Segev (Journal of Cryptology, 2024).
Our approach reduces the analysis of such reductions to the values of simple hitting games—combinatorial games that we introduce. Bounding these games is our main technical contribution, and we believe these bounds can enable more modular proofs of related results.
Zhaomin Yang, Chao Niu, Benqiang Wei, Zhicong Huang, Cheng Hong, Tao Wei
Mahdi Rahimi
To address this issue, our work \textbf{first} derives the theoretical statistics of the total latency experienced by a message, revealing a clear correlation between latency and the number of packets. \textbf{Second}, we propose two approaches to reduce this total latency. First, we present a method to adjust the shuffling delays at each hop, offsetting potential anonymity loss by integrating client-generated noise, backed by differential privacy guarantees. Next, we introduce packet-aware routing techniques, offering two novel methods that prioritize messages with more packets, forwarding them through faster links. However, this may cause certain nodes to be overloaded with disproportionate traffic. To solve this, we \textbf{third} introduce an efficient load-balancing algorithm to redistribute traffic without compromising the packet-aware nature of the routing. \textbf{Finally}, through comprehensive analytical and simulation experiments, we validate our theoretical latency bounds and evaluate the efficacy of our latency management strategies. The results confirm both methods substantially reduce latency with minimal impact on anonymity, while the strategic routing method remains robust against advanced adversarial attacks.
Note that this paper is an extended version of PARSAN-Mix (accepted and presented at ACNS 2025), mainly aimed at providing full proofs of the theorems together with additional empirical analysis.