International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

17:23 [Event][New] SAC 2012: The Conference on Selected Areas in Cryptography

  Submission: 10 May 2012
Notification: 10 July 2012
From August 16 to August 17
Location: Windsor, Canada
More Information:

08:57 [PhD][Update] Peter Schwabe: High-Speed Cryptography and Cryptanalysis

  Name: Peter Schwabe
Topic: High-Speed Cryptography and Cryptanalysis


Modern digital communication relies heavily on cryptographic protection to ensure data integrity and privacy. In order to deploy state-of-the art cryptographic primitives and protocols in real-world scenarios, one needs to highly optimize software for both speed and security. This requires careful choices of high-level cryptographic parameters, low-level optimization of software on the assembly level for a given microarchitecture and considerations of the subtle interactions between high-level and low-level optimizations. This thesis considers three examples of cryptographic primitives and describes software implementations of these primitives that set new speed records.

The Advanced Encryption Standard (AES) is one of the most widely used symmetric cryptographic primitives. The traditional implementation approach for AES is based on table lookups. While software based on this approach still achieves best performance for a variety of 32-bit and 64-bit architectures, it is usually vulnerable to cache-timing attacks. Another implementation approach for AES is the bitslic- ing technique. Not only is software based on this approach inherently protected against cache-timing attacks, on some microarchitectures it even achieves better performance.

Elliptic-curve cryptography is the current state of the art of asymmetric cryptography. For elliptic-curve Diffie-Hellman key exchange, Bernstein proposed the Curve25519 function. Several speed-record-setting implementations of this function have been developed for a variety of architectures. Optimizing Curve25519 software for the Synergistic Processor Units of the Cell Broadband Engine is a particularly interesting challenge because the small integer multipliers of this architecture do not seem to make it the best-suited platform for public-key cryptography.

Another use of elliptic curves in cryptography is in the construction of cryptographic pairings. In order to make pairings fas[...]

08:57 [PhD][New] Julia Borghoff: Cryptanalysis of Lightweight Ciphers

  Name: Julia Borghoff
Topic: Cryptanalysis of Lightweight Ciphers
Category: secret-key cryptography

08:56 [PhD][New] Lars Ramkilde Knudsen

  Name: Lars Ramkilde Knudsen

08:56 [PhD][New] Tanja Lange

  Name: Tanja Lange

13:03 [Job][New] Ph.D. Students, Post-Docs, Intel-TU Darmstadt Security Institute, Germany


Starting from January 2012, the new Intel-TU Darmstadt Security Institute will conduct security research for mobile and embedded systems. The Security Institute will be jointly operated by Intel Labs and TU Darmstadt/Center for Advanced Security Research Darmstadt (CASED), Germany. In order to kick off operations, we are currently looking for scientific personnel.

Your Profile

Applicants should hold Diploma, Master or PhD Degree in Computer Science or Electrical Engineering and bring well-founded knowledge and experience in IT-Security. More specifically, we are looking for candidates that have expertise in one or more of the following areas:

  • Mobile operating system security (e.g., Android, iOS)
  • Embedded system security, in particular knowledge in embedded processors such as ARM and Intel Atom
  • Lightweight Cryptography with focus on emerging technologies such as RFID and NFC
  • Hardware security (e.g., Physically Unclonable Functions)
  • Design, development, analysis of System-on-Chip (SoC) IP blocks and associated tools

How to Apply

Your application should include your current curriculum vitae, MSc/Diploma certificates and grades, a letter of motivation stating your interest in the position and your research interests and at least two letters of recommendation.

17:01 [Conf][EC] Registration is now open

  The registration web site for Eurocrypt 2012 is now open. Do not forget to also book your accomodation in Robinson College, a walking tour of Cambridge, and the excursion to Bletchley Park via the main conference web site.

05:06 [Event][New] NSS 2012: The 6th International Conference on Network and System Security

  Submission: 15 June 2012
Notification: 10 August 2012
From November 21 to November 23
Location: Wu Yi Shan, China
More Information:

07:36 [Event][Update] WAIFI 2012: International Workshop on the Arithmetic of Finite Fields

  From July 16 to July 19
Location: Bochum, Germany
More Information:

16:34 [Job][New] Post-Doc, University of Bristol

  Based in the Cryptography group within the Department of Computer Science which has grown considerably in the last year. We are particularly interested in applicants with a background in one of the following areas:

• Analysis of “real world” protocols

• Formal Methods applied to security protocols

• Fully Homomorphic Encryption

• Lattice Based Cryptography

• Multi-Party Computation

• Provable Security, i.e. Protocol and Mechanism design

The post is funded by an ERC Advanced Grant awarded to Professor Nigel Smart.

08:03 [Event][New] FutureTech 2012: The 7th FTRA International Conference on Future Information Technology

  Submission: 15 January 2012
From June 26 to June 28
Location: Vancouver, Canada
More Information: