International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

14:48 [Conf] Report on Africacrypt 2011 (ICW)

  The 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held July 5-7, 2011 in Dakar, Senegal. The Program Committee, aided by reports from 52 external reviewers, produced a total of 240 reviews in all. The 23 papers presented were carefully reviewed and selected from 76 submissions. They are organized in 10 topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs. The program was completed with 3 invited talks by:
  • Jens Groth on "Efficient Zero-Knowledge Proofs"
  • Tatsuaki Okamoto on "Some Key Techniques on Pairing Vector Spaces" and
  • Bart Preneel on "The NIST SHA-3 Competition: A Perspective on the Final Year"
The general chair was Mamadou Sanghare and the general co-chair was Djiby Sow. The program chair was David Pointcheval and the program co-chair was Abderrahmane Nitaj. The African paper entitled "On randomness extraction in elliptic curves" written by Abdoul Aziz Ciss and Djiby Sow was accepted as one of the best papers. The venue was at the AUF conference center next of Dakar University. There was about 90 attendees most of which stayed in hotels near the conference center (Djollof Hotel, Terroubi Hotel and University Hotel). The rump session was organized during the gala diner on the Wednesday at Terroubi Hotel. It was chaired by Peter Schwabe. The registration fee for normal attendees was 350 Euros (and 300 euros for PhDs students). General chair was Mamadou Sanghare, general co-chair was Djiby Sow.

13:13 [Event][Update] CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems

  Submission: 5 March 2012
Notification: 14 May 2012
From September 9 to September 12
Location: Leuven, Belgium
More Information:

06:43 [Conf] Report on CHES 2011, Nara, Japan, Sept 28-Oct 1


CHES 2011 was held at Todai-ji Cultural Center, Nara, Japan, from September 28 to October 1, 2011.

The program co-chairs were Bart Preneel and Tsuyoshi Takagi, and the general chair was Akashi Satoh. CHES 2011 received 119 submissions from 26 different countries, and 32 papers were selected for publication in the proceedings.

Two invited talks were given by Tetsuya Tominaga (NTT) and Ernie Brickell (Intel) on the topics "Standardization Works for Security of Electromagnetic Environment" and "Technologies to Improve Platform Security", respectively.

The conference banquet and the rump session were held at Hotel Nikko Nara on Friday evening. The best paper award was also presented during the banquet to Michael Hutter and Erich Wenger for their work "Fast Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors".

All presentation slides for the technical sessions including the invited talks and the rump session can be found on the workshop website at and, respectively.

The workshop ended successfully on October 1, having attracted 315 participants (60 being students), from 27 countries, mainly from Asia (162), Europe (98) and North America (47). We thank the sponsors for their generous support and contributions to the success of CHES 2011.

06:40 [Conf] Report on Public Key Cryptography 2011 (PKC), March 6-9, 2011, Taormina, Italy


The 14th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC'11) was held at the Hotel "Villa Diodoro" in Taormina, Italy, on March 6--9, 2011. The organizing committee included Rosario Gennaro (Program Chair), Nelly Fazio and Antonio Nicolosi (General co-Chairs), and Dario Catalano (Local Arrangements Chair).

The technical program featured 28 papers selected from 103 submissions, along with an invited lecture on "New Developments in Leakage-Resilient Cryptography" by Vinod Vaikuntanathan of Microsoft Research. The conference attracted 87 delegates (including 21 students) from 21 countries, mainly from Europe (50), Asia (17), North America (16). The social program included an optional excursion to attend the closing day of the local carnival celebrations (allegorical floats, costumed groups, fireworks and the burning of King Carnival).

The generous support of the conference sponsors was also an important factor for the success of the event, and is gratefully acknowledged.

06:46 [Conf] Report on Crypto 2011

Crypto 2011 was held on the campus of the University of California, Santa Barbara, from August 14-18. The Program Chair was Phillip Rogaway, and the General Chair was Thomas Shrimpton.

A total of 230 papers were submitted. Of these, 43 were accepted (two were merged in the program), with the paper "Computer-Aided Security Proofs for the Working Cryptographer", by Gilles Barthe, Benjamin Gregoire, Sylvain Heraud, and Santiago Zanella Beguelin, selected to receive the Best Paper award by the program committee.

The IACR Distinguished Lecture, entitled "Illegitimi Non Carborundum", was delivered by Ron Rivest. Roger Dingledine also give an invited talk, "Tor and Circumvention: Lessons Learned". Shai Halevi provided a tutorial lecture on fully homomorphic encryption.

Almost all of the talks --regular, tutorial, invited and distinguished-- were video recorded. These videos, along with the authors' slides, will soon be available from the conference program webpage. (Some videos are already available on YouTube.)

Dan Bernstein and Tanja Lange organized and co-chaired yet another entertaining Rump Session.

Attendance at Crypto 2011 was quite high, with 412 registered attendees, up from 335 at Crypto 2009, and not far off from the 451 that attended the collocated Crypto/CHES2010. The Program Committee's excellent, broader than usual program was likely the cause for the jump in attendance.

Generous donations from Qualcomm, Microsoft Research and Voltage Security, as well as continuing support from the Marconi Fund for Student Authors, were used to provide registration waivers and travel support for 42 students. The Chairs of Crypto 2011 are very grateful for the terrific work of Sally Vito and the UCSB conference services staff.

06:07 [Event][New] CSIA - 2012: The Third International Conference on Communications Security & Information

  Submission: 30 November 2011
Notification: 30 January 2012
From May 25 to May 27
Location: Delhi, India
More Information:

16:34 [Event][New] CSP EU Forum: Cybersecurity and Privacy EU Forum 2012

  Submission: 9 December 2011
Notification: 19 December 2011
From April 24 to April 25
Location: Berlin, Germany
More Information:

10:56 [Conf] Report on SAC 2011, Ontario, Canada (ICW)

  The 18th International Conference on Selected Areas in Cryptography, August 11-12, 2011, Ryerson University Toronto, Ontario, Canada

SAC 2011 was held August 11-12, 2011 in the Department of Computer Science, Ryerson University, Toronto, Canada. There were 72 participants from 18 countries. Moreover, the conference had received 92 submissions out of which 23 were accepted. The reception took place the night before the conference started and the banquet dinner, which was held on the first night of the conference, was located in The Trillium Ballroom of the Atlantis Pavilions, a spectacular site on the waterfront of Lake Ontario.

A digital version of the pre-proceedings was provided to the attendees and was also available online on the website of the conference. Revised versions of the accepted papers, along with two invited papers, are going to appear in the proceedings of the conference published by Springer. Kristin Lauter from Microsoft Research and Alfred Menezes from University of Waterloo delivered two invited talks on the topics of `Cryptographic Techniques for Securing the Cloud' and `Another Look at Tightness', respectively.

The co-chairs were Ali Miri and Serge Vaudenay, and the publicity and publication chair was Atefeh Mashatan who wish to gratefully acknowledge the sponsors of SAC 2011, including the Faculty of Engineering, Architecture, and Science and the Department of Computer Science Ryerson University, Fields Institute, and Certicom, for their enthusiastic and generous support.

12:47 [Job][New] Mathematicians , GCHQ, UK

  Salary: £25,446 - £39,482 (depending on experience) + benefits

Based in Cheltenham, Gloucestershire

Discover new solutions. Follow in the footsteps of one of our nation\'s greatest mathematicians.

One of Time Magazine\'s 100 Most Important People of the 20th Century, Alan Turing was a brilliant thinker most famous for his codebreaking in the Second World War. As we approach the centenary of his birth, it could be time for you to play a vital role in maintaining national security too.

Encryption is used in so many of the essential things we use in everyday life, that the threat is everywhere. So, as a GCHQ mathematician, you\'ll explore the increasingly complex problems of crypt to help keep our communications secure.

There aren\'t many places where your love of mathematics and problem solving will see you influencing Government, armed forces and law enforcement agency decisions. GCHQ is also one of the few places outside academia where you can practise advanced mathematical research across such a wide range of disciplines. Every day will bring a new challenge to stretch your intellectual ability. Your research will be supported by some of Europe\'s largest computers. And you\'ll share your knowledge with some of the nationís top mathematical minds.

To apply, you should have, or expect to obtain by summer 2012, a 1st or 2nd class honours degree in mathematics, statistics, physics or other subject with significant mathematical content. Additional credit will be given for a Master\'s degree in a mathematical subject.

18:29 [PhD][New] Mark Manulis: Provably Secure Group Key Exchange

  Name: Mark Manulis
Topic: Provably Secure Group Key Exchange
Category: cryptographic protocols

Description: The rapid and promising development of applications and communication systems designed for groups of participants like groupware, computer supported collaborative work systems, or digital conference systems implies exigence of mechanisms providing adequate security properties. These mechanisms can be designed based on the foundations of cryptography.

\r\n\r\nGroup key exchange protocols are multi-party cryptographic protocols those participants compute a shared secret key that can then be used in conjunction with other cryptographic constructions like encryption schemes and message authentication codes for the purpose of privacy, confidentiality and authentication.

\r\n\r\nSecurity confidence of modern cryptographic constructions can be increased via adequate security proofs. The paradigm of provable security gains in importance for all kinds of cryptographic constructions, including group key exchange protocols those security issues represent the scope of this dissertation.

\r\n\r\nWe give an analytical overview of the state-of-the-art research in this area and identify strengths and weaknesses of many previous approaches. We suggest a new approach in form of a security model those stronger definitions provide background for more confident security analyzes and proofs. Additionally, we present a number of generic solutions (compilers) that can be applied to independently designed group key exchange protocols in order to enhance security thereof with respect to various goals considered by our security model. Finally, we present a concrete group key exchange protocol that provably satisfies the apparently strongest currently available formally specified security requirements.[...]