International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

09:17 [Pub][ePrint] Single-Cycle Implementations of Block Ciphers, by Pieter Maene and Ingrid Verbauwhede

  Security mechanisms to protect our systems and data from malicious adversaries have become essential. Strong encryption algorithms are an important building block of these solutions. However, each application has its own requirements and it is not always possible to find a cipher that meets them all. This work compares unrolled combinatorial hardware implementations of six lightweight block ciphers, along with an AES implementation as a baseline. Up until now, the majority of such ciphers were designed for area-constrained environments where speed is often not crucial, but recently the need for single-cycle, low-latency block ciphers with limited area requirements has arisen to build security architectures for embedded systems. Our comparison shows that some designers are already on this track, but a lot of work still remains to be done.

09:17 [Pub][ePrint] Diversity and Transparency for ECC, by Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå

  Generating and standardizing elliptic curves to use

them in a cryptographic context is a hard task.

In this note, we don\'t make an explicit proposal

for an elliptic curve, but we deal with the following


Security: We give a list of criteria that should be

satisfied by a secure elliptic curve. Although a few

of these criteria are incompatible, we detail what we

think are the best choices for optimal security.

Transparency: We sketch a way to generate a

curve in a fully transparent way so that it can be

trusted and not suspected to belong to a (not publicly

known to be) vulnerable class. In particular, since the

computational cost of verifying the output of such a

process may be quite high, we sketch out the format

of a certificate that eases the computations. We think

that this format might deserve being standardized.

09:17 [Pub][ePrint] A Hybrid Gaussian Sampler for Lattices over Rings, by Léo Ducas and Thomas Prest

  Gaussian sampling over lattices is a cornerstone of lattice-based cryptography as it allows to build numerous cryptographic primitives. There are two main algorithms performing this task. The first one is due to Klein (SODA 2000) and Gentry, Peikert and Vaikuntanathan (STOC 2008), and outputs vectors of good quality but runs rather slowly, in quadratic time. The second one is due to Peikert (CRYPTO 2010) and outputs vectors of slightly worse quality, but can be made to run in quasilinear time in the ring setting.

We present a Gaussian Sampler optimized for lattices over the ring of integer of a cyclotomic number field. At a high-level it works as Klein\'s sampler but uses an efficient variant of Peikert\'s sampler as a subroutine. The result is a new sampler that samples vectors with a quality close to Klein\'s sampler and achieves the same quasilinear complexity as Peikert\'s sampler. In practice, we get close to the best of both worlds.

09:17 [Pub][ePrint] Cryptanalysis of a modern rotor machine in a multicast setting, by Shane Kepley and David Russo and Rainer Steinwandt

  At FSE \'93, Anderson presented a modern byte-oriented ro-

tor machine that is suitable for fast software implementation. Building

on a combination of chosen ciphertexts and chosen plaintexts, we show

that in a setting with multiple recipients the recovery of an (equivalent) secret key can be feasible within minutes in a standard computer algebra system.

18:16 [Job][New] Two permanent academic posts in Secure Systems at Surrey, University of Surrey

  The Department of Computer Science at the University of Surrey invites applications for two permanent posts of Lecturer (Assistant Professor) in Secure Systems.

The Department of Computer Science embodies the ethos of “applying theory into practice” across its research and teaching activities and is currently ranked 8th in the Guardian League table. Its research activities are focused into two research groups: Secure Systems, and Nature Inspired Computing and Engineering (NICE). These appointments are to enhance the activities of the Secure Systems group. Surrey is recognised as an Academic Centre of Excellence for Cyber Security Research by GCHQ. This is an exciting opportunity in a department that is growing its reputation for delivering quality interdisciplinary and applied research based on strong fundamental principles.

The candidates for the Lectureships will conduct research in areas such as security analysis of systems, cyber-physical and embedded systems security, data privacy or mobile security. We are seeking individuals who can contribute to fundamental research and turn it into practice. An ability to produce high quality outputs is also required.

We are looking for individuals who can inspire students through their curiosity for leading-edge aspects of technology. In particular, the teaching duties of the role includes: delivering high quality teaching to all levels of students, supervising undergraduate project students and postgraduate dissertations and contributing to the teaching of security and other practical areas of Computer Science, such as networking and software engineering.

These are full-time and permanent positions. We would expect appointed candidates to start from September 2015 or as soon as possible thereafter.

16:11 [Event][New] Passwords '15: The 9th International Conference on Passwords

  Submission: 1 September 2015
Notification: 2 November 2015
From December 7 to December 9
Location: Cambridge, UK
More Information:

16:10 [Event][New] CHAE: Challenges in Authenticated Encryption

  Submission: 3 July 2015
From July 17 to July 17
Location: Utrecht, Netherlands
More Information:

09:17 [Pub][ePrint] Homomorphic Signature Schemes - A survey, by Giulia Traverso and Denise Demirel and Johannes Buchmann

  Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-dated survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures, these are the linearly homomorphic signature schemes, the homomorphic schemes supporting polynomial functions, the fully homomorphic signature schemes, and the homomorphic aggregate signature schemes, can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

03:17 [Pub][ePrint] The Pythia PRF Service, by Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart

  Conventional cryptographic services such as hardware-security modules and software-based key-management systems offer the ability to apply a pseudorandom function (PRF) such as HMAC to inputs of a client\'s choosing. These services are used, for example, to harden stored password hashes against offline brute-force attacks.

We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease- of-deployability lacking in prior approaches. The keystone of PYTHIA is a new cryptographic primitive called a verifiable partially-oblivious PRF that reveals a portion of an input message to the service but hides the rest. We give a construction that additionally supports efficient bulk rotation of previously obtained PRF values to new keys. Performance measurements show that our construction, which relies on bilinear pairings and zero-knowledge proofs, is highly practical. We also give accompanying formal definitions and proofs of security.

We implement PYTHIA as a multi-tenant, scalable PRF service that can scale up to hundreds of millions of distinct client applications on commodity systems. In our prototype implementation, query latencies are 15 ms in local-area settings and throughput is within a factor of two of a standard HTTPS server. We further report on implementations of two applications using PYTHIA, showing how to bring its security benefits to a new enterprise password storage system and a new brainwallet system for Bitcoin.

03:17 [Pub][ePrint] Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy, by Cl\\\'{e}mentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen

  An efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy was recently published in ACISP\'15.

It appears that three attacks menace this scheme.

The first one enables the server to store only one block of a file $m$ and still pass the data integrity verification on any number of file blocks.

The second attack permits the server to keep the old version of a file block $m_{i}$ and the corresponding verification metadata $T_{m_{i}}$ after the client asked to modify them by sending the new version of these elements, and still pass the data integrity


The last attack allows the Third Party Auditor (TPA) to distinguish files when processing the data integrity checking.

In this paper, we propose several solution to overcome all the aforementioned issues.

For the two first attacks, we give two new constructions of the scheme, one using index-hash tables and the other based on the Merkle hash trees.

We compare the efficiency of these two new systems with the previous one.

For the third attack, we suggest a weaker security model for data privacy without modifying the current scheme and a new construction to enhance the security and to achieve the strongest data privacy notion.

03:17 [Pub][ePrint] Decomposition attack on SASASASAS, by Alex Biryukov and Dmitry Khovratovich

  We demonstrate the first attacks on the SPN ciphers with 6, 7, 8, and 9 secret components. In particular, we show a decomposition attack on the SASASASAS scheme when the S-box size $m$ and the block length $n$ satisfy the condition $m^2\\leq n$ (for example, 8-bit S-box and 128-bit block).