IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 December 2019
Rome, Italy, 22 June -
Submission deadline: 22 January 2020
Notification: 22 March 2020
Barcelona, Espanya, 20 April - 22 April 2020
Qualcomm, Sophia Antipolis (France)
Qualcomm is a company of inventors that unlocked 5G, ushering in an age of rapid acceleration in connectivity and new possibilities.
In this position you will join the team responsible for the security architecture of Qualcomm Snapdragon processors. The team works at a system level spanning across hardware, software and infrastructure while striving for industry-leading solutions.
In this position you will perform tasks like these:
- Architecture of Security and Cryptographic HW/SW IP blocks that contribute to the overall SoC Security Architecture
- Design of countermeasures to state of the art physical attacks
- Competitive analysis of security systems and features
Minimum Qualifications:
MS degree preferred with 5+ years industry experience required in one or more of the following areas
- Design of HW/SW security blocks and modules such as HW cryptographic engines
- HW/SW threat analysis, security analysis, risk analysis
- Cryptography and protocols using cryptography
- Smart Card HW/SW Security Technologies
Preferred Qualifications Additional skills in the following areas are a plus:
- Security Certification Process and Requirements
- Research background (Publications, Conference)
- Excellent communication and teamwork skills required
- Leadership & management background is required
Education Requirements Required: Bachelor's, Computer Engineering and/or Electrical Engineering
Preferred: Master's, Computer Engineering and/or Electrical Engineering
Closing date for applications:
Contact: Aymeric Vial
More information: https://jobs.qualcomm.com/public/jobDetails.xhtml?requisitionId=1975590
12 December 2019
Christian Paquin, Douglas Stebila, Goutam Tamvada
In this work, we develop and make use of a framework for running such experiments in TLS cheaply by emulating network conditions using networking features of the Linux kernel. Our testbed allows us to independently control variables such as link latency and packet loss rate, and then examine the impact on TLS connection establishment performance of various post-quantum primitives, specifically hybrid elliptic curve/post-quantum key exchange and post-quantum digital signatures, based on implementations from the Open Quantum Safe project. Among our key results, we observe that packet loss rates above 3-5% start to have a significant impact on post-quantum algorithms that fragment across many packets, such as those based on unstructured lattices. The results from this emulation framework are also complemented by results on the latency of loading entire web pages over TLS in real network conditions, which show that network latency hides most of impact from algorithms with slower computations (such as supersingular isogenies).
Claude Carlet, Pierrick Méaux
Bali, Indonesia, 1 November - 5 November 2020
Submission deadline: 28 June 2020
Copenhagen, Denmark, 18 May - 22 May 2020
Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
In this work, we measure the distribution of superblocks in the Bitcoin blockchain. We find that the superblock distribution within the blockchain follows expectation, hence we empirically verify that the distribution of superblocks within the Bitcoin blockchain has not been adversarially biased. NIPoPoWs require that each block in a blockchain points to a sample of previous blocks in the blockchain. These pointers form a data structure called the interlink. We give efficient ways to store the interlink data structure. Repeated superblock references within an interlink can be omitted with no harm to security. Hence, it is more efficient to store a set of superblocks rather than a list. We show that, in honest executions, this simple observation reduces the number of superblock references by approximately a half in expectation. We then verify our theoretical result by measuring the improvement over existing blockchains in terms of the interlink sizes (which we improve by $79\%$) and the sizes of succinct NIPoPoWs (which we improve by $25\%$). As such, we show that deduplication allows superlight clients to synchronize $25\%$ faster.
Abhrajit Sengupta, Ozgur Sinanoglu
Fei Meng
Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
Sarah Azouvi, George Danezis, Valeria Nikolaenko
11 December 2019
San Francisco, USA, 18 May - 20 May 2020
10 December 2019
S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
Fei Meng, Mingqiang Wang
In this paper, we propose a heuristic primitive called reverse outsourcing. Specifically, users outsource part of the decryption work to the cloud, which splits it up and dispatches each to different idle users. Idle users are those whos has some smart devices connected to the internet and not in use. It's like, the cloud employs many idle users to accomplish its own computing tasks. Then, we proposed a reverse outsourced CP-ABE scheme which provable secure under the BDBH assumptions.
Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Quantitatively, we show that a module of rank 2 over a cyclotomic field of degree $n$ can be heuristically reduced within approximation factor $2^{\tilde{O}(n)}$ in time $\tilde{O}(n^2B)$, where $B$ is the bitlength of the entries. For $B$ large enough, this complexity shrinks to $\tilde{O}(n^{\log_2 3}B)$. This last result is particularly striking as it goes below the estimate of $n^2B$ swaps given by the classical analysis of the LLL algorithm using the so-called potential.
Finally, all this framework is fully parallelizable, and we provide a full implementation. We apply it to break multilinear cryptographic candidates on concrete proposed parameters. We were able to reduce matrices of dimension 4096 with 6675-bit integers in 4 days, which is more than a million times faster than previous state-of-the-art implementations. Eventually, we demonstrate a quasicubic time for the Gentry-Szydlo algorithm which finds a generator given the relative norm and a basis of an ideal. This algorithm is important in cryptanalysis and requires efficient ideal multiplications and lattice reductions; as such we can practically use it in dimension 1024.