International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

21:17 [Pub][ePrint] Arithmetic Cryptography, by Benny Applebaum and Jonathan Avron and Christina Brzuska

  We study the possibility of computing cryptographic primitives in a fully-black-box arithmetic model over a finite field $\\F$. In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits which make only a black-box use of the underlying field, and the adversary has a full (non-black-box) access to the field. This model captures many standard information-theoretic constructions.

We prove several positive and negative results in this model for various cryptographic tasks. On the positive side, we show that, under reasonable assumptions, computational primitives like commitment schemes, public-key encryption, oblivious transfer, and general secure two-party computation can be implemented in this model. On the negative side, we prove that garbled circuits, multiplicative-homomorphic encryption, and secure computation with low online complexity cannot be achieved in this model. Our results reveal a qualitative difference between the standard Boolean model and the arithmetic model, and explain, in retrospect, some of the limitations of previous constructions.

21:17 [Pub][ePrint] Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation, by Sujoy Sinha Roy and Kimmo J\\\"arvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede

  We present a hardware architecture for all building blocks required in polynomial ring based fully homomorphic schemes and use it to instantiate the somewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up to a certain multiplicative depth) and we illustrate this capability by evaluating the SIMON-64/128 symmetric key cipher in the encrypted domain. Our implementation provides a fast polynomial operations unit using CRT and NTT for multiplication combined with an optimized memory access scheme; a fast Barrett like polynomial reduction method that allows all possible polynomial moduli; an efficient divide and round unit required in the multiplication of ciphertexts and an efficient CRT unit. These building blocks can be easily reused to instantiate any other polynomial ring based fully homomorphic scheme, including the ones designed for SIMD operations, since no restricting assumptions have been made. These building blocks are integrated in a coprocessor with instructions to execute YASHE, which can be controlled by a computer for evaluating arbitrary functions (up to the multiplicative depth 44 and 128-bit security level). Our architecture was compiled (place-and-route analysis) for a single Xilinx Virtex-7 XC7V1140T FPGA, where it consumes 23\\,\\% of registers, 50\\,\\% of LUTs, 53\\,\\% of DSP slices, and 38\\,\\% of BlockRAM memory. The implementation evaluates SIMON-64/128 in approximately 157.7\\,s (at 143\\,MHz) and it processes 2048 ciphertexts at once giving a relative time of only 77\\,ms per block. This is 26.6 times faster than the leading software implementation on a 4-core Intel Core-i7 processor running at 3.4\\,GHz.

21:17 [Pub][ePrint] Cryptanalysis of a fair anonymity for the tor network, by Amadou Moctar Kane

  The aim of this paper is to present an attack upon the protocol of Diaz et al. \\cite{Diaz}, which goal is to introduce a fair anonymity in the Tor network. This attack allows an attacker to impersonate Tor users with the complicity of an exit node.

16:49 [Job][New] Marie Sklodowska-Curie Research Fellows in Cryptography (Early Stage Researchers - 2 posts), Ruhr-University Bochum

  The Cryptology Group and the Embedded Security Group at Ruhr-University Bochum (Horst-Goertz Institute) are seeking to recruit two Marie Sklodowska-Curie Research Fellows in Cryptography to start in September 2015, as part of the ECRYPT-NET project.

ECRYPT-NET is a research network of six universities and two companies that intends to develop advanced cryptographic techniques for the Internet of Things and the Cloud, and to create efficient and secure implementations of those techniques on a broad range of platforms. ECRYPT-NET is funded by a prestigious Marie Sklodowska-Curie ITN (Integrated Training Network) grant. The network will educate a group of 15 PhD students with a set of interdisciplinary skills in the areas of mathematics, computer science and electrical engineering. The training will be provided in an international context that include Summer Schools, workshops and internships. Participants are expected to spend at least six months abroad with a network partner or in one of the seven associated companies. We are looking for highly motivated candidates, ideally with background on cryptology and with proven research abilities.

Two of the ECRYPT-NET ESR (Early Stage Researcher) positions will be based at Ruhr-University Bochum, to work on the following projects:

  • Fully Homomorphic Encryption - Design and Analysis
  • Post-Quantum Cryptosystems on Embedded Platforms

Marie Curie ITN eligibility criteria apply to both of these positions.

Founded in 2001, the Horst-Görtz Institute at Ruhr-University Bochum is a world-leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst-Görtz Institute has 15 professors and over 80 PhD students. It hosts the only German Research Training Group for Doctoral students in Cryptology.

16:20 [Job][New] Post-Doc, Zhejiang University City College, Hangzhou, CHINA

  We are looking for postdoc fellow with expertise on Cryptographic Protocols (UC-security, multi-party computations), Information Security, Cloud Computing and Big Data Analytics. The candidates should have PhD in Cryptography and Information Security or Cloud Computing or Database Engineering with track record of strong R&D capability.

Please contact with Dr. Huafei Zhu (zhuhf (at) if you are interested in these positions

18:33 [Job][New] Three senior lectureships or lectureships (associate/assistant professor), University of Birmingham, UK

  Two or three of the posts are research-focussed. Candidates are expected to have established research careers, demonstrating sustained excellent publication record and some ability to attract research funding. No particular research areas within cyber security are sought, although we particularly encourage candidates whose research complements and extends the current capabilities of the group**.

One of the posts may be a teaching-focussed position, and would suit someone with significant industry experience who is able to authoritatively teach topics related to cyber security in industry. Applicants for this position are not expected to have a research track record, but should have a track record of achievement in industry.

17:50 [Job][New] Post-Doc, Mathematical Institute, Oxford, UK

  This is a 3-year Postdoctoral Research Assistantship in Post-Quantum Cryptography. Candidates should have expertise in cryptography. Knowledge of quantum computing is desirable but not essential.

16:20 [Job][New] Ph.D. student in Security and Privacy of Cyber-Physical Systems, University College Cork, Ireland

  Project: Secure and Privacy-Preserving Cyber-Physical Systems

Subject to approval from funding agency, the research project will investigate security and privacy issues in Cyber-Physical Systems. A team of 5 researchers will work on the project, including 3 Ph.D. students.

Applications are invited for fixed-term studentships (annual value of €18K, plus fees) from suitably qualified candidates who wish to undertake a PhD within the Department of Computer Science. Applicants should have a Masters degree in computer science or a closely related discipline, although applications from truly exceptional students with a honours bachelor\'s degree will be considered. Ideally, applicants will have some project experience in the areas of network security (intelligent transportation systems or industrial control systems would be a plus), privacy, or more generally computer security. Applicants must have very good mathematical ability and an interest in systems programming and experimental computer science.

Applicants must demonstrate good inter-personal skills, and a high standard of spoken and written English. The positions are open to applicants of any nationality. Non-EU applicants should visit for UCC English Language Requirements.

How to apply:

Applications by email to Mary Noonan m.noonan (at) and must include “PhD Studentship CyPS” in the subject line. Applications must include, in PDF format only:

1. 300 word personal statement explaining your interest in the project and computer security&privacy research;

2. full CV;

3. copy of transcript(s) showing names of all courses taken and grades achieved;

4. summaries of projects (BSc/MSC), internships and relevant work experience completed.

5. names and contact information of at least one reference.

For further information about the position, p

16:18 [Job][New] Post-Doc, Mathematical Institute, Oxford

  This is a 3-year Postdoctoral Research Fellowship in Post-Quantum Cryptography. Candidates should have previous post-doctoral experience, and expertise in cryptography. Knowledge of quantum computing is desirable but not essential.

15:44 [Job][New] Professorship in Cyber Security and Privacy, School of Informatics, University of Edinburgh, UK

  Informatics at Edinburgh is recruiting a new (full) professor in the general area of Cyber Security and Privacy. Specific topics of interest include applied cryptography, systems security, network security, but experts in other areas are encouraged to apply.

Our department is the largest, most research productive Informatics and Computer Science department in the UK; we are also one of the top places for undergraduate teaching. We are looking for an outstanding research leader and educator who can help us grow our existing expertise in the security and privacy area.

Please check the information at the link below and the online vacancy details page for full details of the job specification. We encourage making informal contact before application.

22:02 [Event][New] CANS 2015: The 14th International Conference on Cryptology and Network Security

  Submission: 19 June 2015
Notification: 31 August 2015
From December 8 to December 12
Location: Marrakesh, Morocco
More Information: