IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
10 March 2020
Research Fellow
Job PostingClosing date for applications:
Contact: For informal inquiries please contact Mark Ryan; ryanmd@adf.bham.uk
More information: https://bham.taleo.net/careersection/external/jobdetail.ftl?job=190005S3&tz=GMT%2B00%3A00&tzname=Europe%2FLondon
NuCypher; San Francisco, CA (remote possible)
Job PostingNuCypher is a cryptography company that builds privacy-preserving infrastructure and protocols. We are backed by Y Combinator and Polychain Capital.
A successful candidate will lead engineering for the new open-source cryptographic product from the ground up. They will work on problems at the forefront of cryptography and have a leadership role in design decisions of the system. As such, competency in algorithms and low-level design is a must. An interest in compilers and/or optimization would be nice to have.
Given the nature of an early stage product, a successful candidate should work in a fast and iterative style when it comes to prototyping. They will be be motivated by solving tough open-ended problems. Additionally, they should be highly comfortable working in a system programming language such as C or Rust (whether through work experience or side projects).
We offer extremely competitive compensation and a highly flexible working environment (remote-first, headquartered in San Francisco).
Closing date for applications:
Contact: Ravital Solomon
Guildford, United Kingdom, 14 September - 18 September 2020
Event CalendarSubmission deadline: 10 April 2020
Notification: 15 June 2020
York, United Kingdom, 11 June - 12 June 2020
Event Calendar09 March 2020
Yehuda Lindell
ePrint ReportWe note that the examples and references brought in this review article are far from comprehensive, and due to the lack of space many highly relevant works are not cited.
Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
ePrint ReportNir Drucker, Shay Gueron, Dusan Kostic
ePrint ReportKoen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
ePrint ReportIn the present article, we show that the Arakelov class group has more to offer. We start with the development of a new versatile tool: we prove that, subject to the Riemann Hypothesis for Hecke $L$-functions, certain random walks on the Arakelov class group have a rapid mixing property. We then exploit this result to relate the average-case and the worst-case of the Shortest Vector Problem in ideal lattices. Our reduction appears particularly sharp: for Hermite-SVP in ideal lattices of certain cyclotomic number fields, it loses no more than a $\tilde O(\sqrt n)$ factor on the Hermite approximation factor.
Furthermore, we suggest that this rapid-mixing theorem should find other applications in cryptography and in algorithmic number theory.
Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
ePrint ReportLilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
ePrint ReportOlivier Blazy, Patrick Towa, Damien Vergnaud
ePrint Report08 March 2020
FSE
As a consequence of the COVID-19 crisis, the Greek Health ministry took on March 8 the decision to suspend all conference events for the next four weeks (the announcement in Greek can be found here.).
Under these force majeure circumstances, FSE 2020 is postponed.
More details will follow soon.
For any questions please contact the General Chairs at fse2020@iacr.org
07 March 2020
Brisbane, Australia, 16 July - 17 July 2020
Event CalendarSubmission deadline: 24 April 2020
Notification: 4 May 2020
06 March 2020
Benjamin E. Diamond
ePrint ReportApplying these techniques, we construct a protocol for the Anonymous Zether payment systemas proposed in Bünz, Agrawal, Zamani, and Boneh (FC'20)which improves upon the communication complexity attained by existing efforts. We describe an open-source, Ethereum-based implementation of our protocol.
Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
ePrint ReportWhile initially designed for side-channel information, our framework can also be used in other cases: exploiting decryption failures, or simply exploiting constraints imposed by certain schemes (LAC, Round5, NTRU), that were previously not known to (sligthly) benefit from lattice attacks.
We implement a Sage 9.0 toolkit to actually mount such attacks with hints when computationally feasible, and to predict their performances on larger instances. We provide several end-to-end application examples, such as an improvement of a single trace attack on Frodo by Bos et al (SAC 2018). Contrary to ad-hoc practical attacks exploiting side-channel leakage, our work is a generic way to estimate security loss even given very little side-channel information.