International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

15:17 [Pub][ePrint]


15:17 [Pub][ePrint] Bootstrappable Identity-Based Fully Homomorphic Encryption, by Michael Clear and Ciar\\\'{a}n McGoldrick

  It has been an open problem for a number of years to construct an identity-based fully homomorphic encryption (IBFHE) scheme (first mentioned by Naccache at CHES/CRYPTO 2010). At CRYPTO 2013, Gentry, Sahai and Waters largely settled the problem by presenting leveled IBFHE constructions based on the Learning With Errors problem. However their constructions are not bootstrappable, and as a result, are not ``pure\'\' IBFHE schemes. The major challenge with bootstrapping in the identity-based setting is that it must be possible to non-interactively derive from the public parameters an ``encryption\'\' of the secret key for an arbitrary identity. All presently-known leveled IBFHE schemes only allow bootstrapping if such an ``encryption\'\' of the secret key is supplied out-of-band. In this work, we present a ``pure\'\' IBFHE scheme from indistinguishability obfuscation, and extend the result to the attribute-based setting. Our attribute-based scheme is the first to support homomorphic evaluation on ciphertexts with different attributes. Finally, we characterize presently-known leveled IBFHE schemes with a view to developing a ``compiler\'\' from a leveled IBFHE scheme to a bootstrappable IBFHE scheme, and sufficient conditions are identified.

15:17 [Pub][ePrint]


09:26 [Job][New] Software Security Engineer, CloudFlare Inc.


CloudFlare is looking for a talented software engineer to join our security team. We are working on a number of ambitious projects to secure the web and protect our customers from threats of all sorts. The role of security engineer at CloudFlare is more that of a builder than a breaker. You will have to approach problems with creativity and flexibility and be able to identify and use the best tools for the job or build better ones from scratch. At CloudFlare, we are serious about protecting our customers and advancing the state of the art in computer security.

We are looking for experienced engineers (5+ years of experience preferred) with practical expertise in the areas of:

  • Web Security (web application firewall, authentication, anti-crawler technology, penetration testing)

  • Security Intelligence (IP reputation, machine learning techniques using security data)

  • Systems Security and Trusted Computing (application sandboxing, secure boot, remote attestation, TPMs)

  • Secure Computation and Storage (encrypted databases, data anonymization, secure multi-party computation)

  • Network Security Protocols (DNSSEC, SSL/TLS, SPDY, QUIC, etc.)

  • Applied Cryptography (white-box cryptography, side-channel attacks)


  • Proficiency in C, Go and/or Lua or willingness to learn

  • Experience working on large scale distributed systems and performance-critical applications

  • Desire to create well-crafted software

  • Bonus Points:

  • Contributions to the open source community

  • Understanding of Linux internals

  • Familiarity with compilers or code generation tools

  • Healthy sense of paranoia

  • 2014-06-21
    18:26 [PhD][New] San Ling

      Name: San Ling

    18:26 [PhD][Update] Lei Wei: Analysis of Iterated Block Ciphers

      Name: Lei Wei
    Topic: Analysis of Iterated Block Ciphers
    Category:secret-key cryptography


    A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high performance, it is often the workhorse for providing confidentiality - one of the primary goals of cryptography. Hence the security of a block cipher is of fundamental importance in the entire infrastructure of cryptography, and therefore block ciphers shall be analyzed and evaluated. This practice is called block cipher cryptanalysis. In this thesis, we analyze a few block ciphers in the classic meet-in-the-middle model and in the recently proposed multidimensional linear cryptanalysis model.

    Besides for encryption, block ciphers are also one of the most versatile building blocks used for constructing many other cryptographic primitives. One such example is the compression function of cryptographic hash functions, and there is a close relation between the security analysis of block ciphers and hash functions. In addition, many dedicated cryptographic hash functions are designed with ideas used in block ciphers. Therefore, it is natural that many block cipher cryptanalysis techniques can be transferred to hash function analysis. In this thesis, we analyze hash functions with differential cryptanalysis and techniques inspired by differential cryptanalysis. On the other hand, recent advances in hash function cryptanalysis contribute to the analysis of block ciphers. We give one such example too.

    In total we have four main topics on (or closely related to) the security analysis of block ciphers.

    1. We study the multidimensional extension to Matsui’s Algorithm 1 and find improvements that lower the attack’s costs. The new attacks are applied to 9-round and 4-round Serpent, with interesting observations on these improvements and the framework.
    2. We study meet-in-the-middle attacks and their application to the hardware-oriented block cipher Ktantan family and reduced DES. Several recent hash function analysis techniques are used f[...]

    18:26 [PhD][New] Elisa Gorla

      Name: Elisa Gorla

    18:25 [PhD][New]


    18:25 [PhD][New]


    18:17 [Pub][ePrint]


    18:17 [Pub][ePrint]