International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

07:53 [Event][New] CTCrypt?2015: 4th Workshop on Current Trends in Cryptology

  Submission: 16 February 2015
Notification: 12 April 2015
From June 2 to June 4
Location: Kazan, Russia
More Information:

07:42 [Event][New] Latincrypt 2015

  Submission: 15 March 2015
Notification: 15 May 2015
From August 23 to August 26
Location: Guadalajara, Mexico
More Information:

07:40 [Job][New] two PhD positions, Luxembourg University

  Two PhD positions and one postdoc (RA) position are opening at the University of Luxembourg. The first PhD position is centered on comparing and improving the many security models for authenticated key establishment protocols. The second PhD position is focused on the precise security modelling of quantum key establishment protocols.

Further details on these positions and their requirements are available at the following urls:

PhD 1:

PhD 2:

The research will be conducted at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) in the research group ApSIA (Applied Security and Information Assurance) headed by Prof. Dr. Peter Y.A Ryan. Contact Prof Ryan, peter.ryan (at), for more information.

The University offers highly competitive salaries and is an equal opportunity employer.

17:43 [Job][New] Cryptography Security Analyst, UK Security Lab

  Role and Scope

The Cryptography Security Analyst is responsible for developing and maintaining the internal expertise in cryptography and more particularly in the security of algorithms executed on embedded systems.

This will include the analysis of cryptographic codes embedded in products under evaluation, the development and the realisation of high level of cryptographic side-channel attacks, and the support and the training of engineers for evaluation projects.

It includes the representation of the company in industry forums and the management of complex projects. He/She should have a flexible and an innovative approach.


To undertake chargeable security evaluation tasks or duties with the respect of deadlines and customer requirements. The chargeable tasks may include:

o The vulnerability analysis of cryptographic algorithms, more particularly on payment systems with regards to side-channel, fault injection and protocol attacks.

o The development and the realisation of innovative cryptographic attacks on products under evaluation (side-channel, DFA).

o The generation of expertise reports in compliance with industry best standards

To follow-up the latest technical developments and to contribute to the internal innovation in the security in cryptography area.

To provide high-level technical support to the company and to the operations department. This may include test planning and logistics, test procedure updating, training and quality issue resolving.

To represent my client and promote its Security Evaluation services in conferences, exhibitions or any key industry events.

Person Specifications

A Master Degree in Cryptography with good skills in algorithms in embedded systems.

A good knowledge of uC architectures and their assembly languages would be highly advantageous.

High analytical skills

17:42 [Job][New] Junior professorship with tenure track in computer algebra, University of Ulm, Germany

  A successful candidate should be an excellent young researcher with a focus in computeralgebra specializing for example in number theory, algebraic geometry, cryptography, combinatorics, or symbolic computation. Collaboration within the university and as well as the acquisition of third party funding is desired.

10:17 [Pub][ePrint] Balanced Encoding to Mitigate Power Analysis: A Case Study, by Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye

  Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution

order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models.

Constant leakage is achieved not only for internal state values, but also for

their transitions. The proposed countermeasure provides perfect protection in the theoretical leakage model. To study the practical relevance of

the proposed countermeasure, it is applied to a software implementation

of the block cipher Prince. This case study allows us to give realistic values

for resulting implementation overheads as well as for the resulting side

channel protection levels that can be achieved in realistic implementation


10:17 [Pub][ePrint] The Related-Key Security of Iterated Even-Mansour Ciphers, by Pooya Farshim and Gordon Procter

  The simplicity and widespread use of blockciphers based on the iterated Even--Mansour (EM) construction has sparked recent interest in the theoretical study of their security. Previous work has established their strong pseudorandom permutation and indifferentiability properties, with some matching lower bounds presented to demonstrate tightness. In this work we initiate the study of the EM ciphers under related-key attacks which, despite extensive prior work, has received little attention. We show that the simplest one-round EM cipher is strong enough to achieve non-trivial levels of RKA security even under chosen-ciphertext attacks. This class, however, does not include the practically relevant case of offsetting keys by constants. We show that two rounds suffice to reach this level under chosen-plaintext attacks and that three rounds can boost security to resist chosen-ciphertext attacks. We also formalize how indifferentiability relates to RKA security, showing strong positive results despite counterexamples presented for indifferentiability in multi-stage games.

22:01 [Conf][AC] Asiacrypt proceedings available

  The proceedings for Asiacrypt 2014 are now available from Springer. As a reminder, all IACR proceedings in the last 4 years are freely available online to IACR members. To access them, simply enter your IACR credentials at

21:00 [Job][New] Post-Doc, University of Luxembourg

  The position arises from a recently awarded joint project with the University of Nancy and ENS Cachin Paris. The postdoc position involves the study of process equivalences to model the security of protocols employing weak secrets, such as voting and password based protocols.

Further details on these positions and their requirements are available at the following urls:

The research will be conducted at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) in the research group ApSIA (Applied Security and Information Assurance) headed by Prof. Dr. Peter Y.A Ryan. Contact Prof Ryan, peter.ryan (at), for more information.

The University offers highly competitive salaries and is an equal opportunity employer.

19:17 [Pub][ePrint] Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, by Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda

  Cryptographic primitives based on infinite families of progressively weaker assumptions have been proposed by Hofheinz-Kiltz and by Shacham (the n-Linear assumptions) and by Escala et al. (the Matrix Diffie-Hellman assumptions). All of these assumptions are extensions of the decisional Diffie-Hellman (DDH) assumption. In contrast, in this paper, we construct (additive) homomorphic encryption (HE) schemes based on a new infinite family of assumptions extending the decisional Composite Residuosity (DCR) assumption. This is the first result on a primitive based on an infinite family of progressively weaker assumptions not originating from the DDH assumption. Our assumptions are indexed by rooted trees, and provides a completely different structure compared to the previous extensions of the DDH assumption.

Our construction of a HE scheme is generic; based on a tree structure, we recursively combine copies of building-block HE schemes associated to each leaf of the tree (e.g., the Paillier cryptosystem, for our DCR-based result mentioned above). Our construction for depth-one trees utilizes the \"share-then-encrypt\" multiple encryption paradigm, modified appropriately to ensure security of the resulting HE schemes. We prove several separations between the CPA security of our HE schemes based on different trees; for example, the existence of an adversary capable of breaking all schemes based on depth-one trees, does not imply an adversary against our scheme based on a depth-two tree (within a computational model analogous to the generic group model). Moreover, based on our results, we give an example which reveals a type of \"non-monotonicity\" for security of generic constructions of cryptographic schemes and their building-block primitives; if the building-block primitives for a scheme are replaced with other ones secure under stronger assumptions, it may happen that the resulting scheme becomes secure under a weaker assumption than the original.

19:17 [Pub][ePrint] Modified Alternating Step Generators with Non-Linear Scrambler, by Robert Wicik and Tomasz Rachwalik and RafaƂ Gliwa

  Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or sum of output bits from alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. In order to increase their resistance to attacks, we introduce a nonlinear scrambler at the output of these generators. The role of the scrambler plays the nonlinear feedback shift register. In addition, we propose the Modified Alternating Step Generator (MASG1S) built with the nonlinear scrambler and regularly or irregularly clocked linear feedback shift registers with nonlinear filtering functions.