IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
26 August 2021
University of Wollongong, Australia
Closing date for applications:
Contact: Prof. Willy Susilo
More information: https://ejgl.fa.ap1.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/1637/?utm_medium=jobshare
University of Twente, Computer Science Department; The Netherlands
The Services and Cybersecurity (SCS) group at the University of Twente invites applications for a 4-years PhD position on the topic of 'evidence-based security response'.
We are looking for candidates with a solid background in network and system security.
More information and the link to apply:
https://www.utwente.nl/en/organisation/careers/!/147/
Deadline for applications: 20 September 2021, 23:59 CET
Closing date for applications:
Contact: Prof. Dr. Andreas Peter (a.peter@utwente.nl)
More information: https://www.utwente.nl/en/organisation/careers/!/147/
Technische Universität Darmstadt
What we offer:
- Highly innovative research, especially within the framework of our participation in the National Research Center for Applied Cybersecurity ATHENE
- Perfection of your research skills using stringent scientific methods
- Independent research as well as research in a team of excellent doctoral and master candidates
- Excellent support for further academic qualification
- Exceptional team spirit and cordial working atmosphere in an international team
- Exposure to cutting-edge research and to an international community of peers
- Appetite for cutting-edge international research and interest to shape the future cybersecurity
- Completed PhD with excellent research record and deep knowledge in one of the stated focus areas
- Experience in writing and publishing scientific work in flagship conferences and journals
- Excellent command of English and preferably good command of German
- Master's level knowledge in computer networks and preferably in artificial intelligence
- Strong interpersonal skills and proven teamwork competencies
- High level of intrinsic motivation and demonstrated ability to perform targeted independent work
Closing date for applications:
Contact: Rolf Egert - egert(at)tk.tu-darmstadt.de
University of Copenhagen, Department of Computer Science (DIKU); Copenhagen, Denmark
The post-doc will be located at DIKU, which is part of the Copenhagen ELLIS unit. The research will be conducted in collaboration with cryptography experts at Aarhus University. The application deadline is September 15, 2021.
Closing date for applications:
Contact: Christian Igel (please apply online via https://jobportal.ku.dk/alle-opslag/?show=154272)
More information: https://jobportal.ku.dk/alle-opslag/?show=154272
The registration site is now open. Registration for CHES 2021 is free for IACR members; non-IACR members will be asked to pay the IACR membership fee (USD 50 regular, USD 25 for students) during registration.
The registration site is now open. For in person attendees, please note that the early bird registration will end on September 17th (anywhere on earth). After that deadline, a late registration fee of $100 will be charged.
A number of affiliated events will take place before the main conference. More information can be found here.
Tarun Chitra, Guillermo Angeris, Alex Evans
Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
Aleksei Udovenko
Olivier Pereira
In this note, we revisit this property in the context of the IVXV version of the Estonian voting system, which has been in used for the Estonian municipal elections of 2017 and for the Estonian and European parliamentary elections of 2019.
We show that a compromised voter device can defeat the individual verifiability mechanism of the current Estonian voting system. Our attack takes advantage of the revoting option that is available in the Estonian voting system, and only requires compromise of the voting client application: it does not require compromising the mobile device verification app, or any server side component.
Ivan Chizhov, Alexandra Davletshina
Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
In this work, we propose Mt. Random, a multi-tiered randomness beacon that combines PVSS and (T)VRF techniques in order to provide an optimal efficiency/quality trade-off without sacrificing security guarantees. Each tier is based on a different technique and provides a constant stream of random outputs offering progressing efficiency vs. quality trade-offs: true uniform randomness is refreshed less frequently than pseudorandomness, which in turn is refreshed less frequently than (bounded) biased randomness. This wide span of efficiency/quality allows for applications to consume random outputs from an optimal point in this trade-off spectrum. In order to achieve these results, we construct two new building blocks of independent interest: GULL, a PVSS-based beacon that preprocesses a large batch of random outputs but allows for gradual release of smaller ``sub-batches'', which is a first in the literature of randomness beacons; and a publicly verifiable and unbiasable protocol for Distributed Key Generation protocol (DKG), which is significantly more efficient than most of previous DKGs secure under standard assumptions and closely matches the efficiency of the currently most efficient biasable DKG protocol.
Mt. Random (and all of its building blocks) can be proven secure under the standard DDH assumption (in the random oracle model) using only a bulletin board as setup, which is a requirement for the vast majority of beacons. We showcase the efficiency of our novel building blocks and of the Mt. Random beacon via benchmarks made with a prototype implementation. Our experimental results confirm the benefits of our multi-tiered approach, showing that even though higher tiers provide fresh random outputs more often, lower tiers can be executed fast enough to keep higher tiers freshly seeded.
Siemen Dhooghe
Siemen Dhooghe, Svetla Nikova
25 August 2021
Yilei Chen, Qipeng Liu, Mark Zhandry
The SIS, EDCP, and LWE problems in their standard forms are as hard as solving lattice problems in the worst case. However, the variants that we can solve are not in the parameter regimes known to be as hard as solving worst-case lattice problems. Still, no classical or quantum polynomial-time algorithms were known for those variants.
Our algorithms for variants of SIS and EDCP use the existing quantum reductions from those problems to LWE, or more precisely, to the problem of solving LWE given LWE-like quantum states. Our main contributions are introducing a filtering technique and solving LWE given LWE-like quantum states with interesting parameters.
Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
In this SoK, we do exactly that, and by bringing new insights, we systematically structure the current knowledge of deep learning in side-channel analysis. We first dissect deep learning-assisted attacks into different phases and map those phases to the efforts conducted so far in the domain. For each of the phases, we identify the weaknesses and challenges that triggered the known open problems.
We connect the attacks to the existing threat models and evaluate their advantages and drawbacks. We finish by discussing other threat models that should be investigated and propose directions for future works.
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
An important hyperparameter is the loss function, which calculates the error or loss between the actual and desired output. The resulting loss is used to update the weights associated with the connections between the neurons or filters of the deep learning neural network. Unfortunately, despite being a highly relevant hyperparameter, there are no systematic comparisons among different loss functions. This work provides a detailed study on the performance of different loss functions in the SCA context. We evaluate five loss functions commonly used in machine learning and two loss functions proposed for SCA. Our results show that one of the SCA-specific loss functions (called CER) performs very well and outperforms other loss functions in most evaluated settings. Finally, our results show that categorical cross-entropy represents a good option for most settings, especially if there is a requirement to work well with different neural network architectures.
Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
While eliminating trust in the trusted authority may not be entirely feasible, can we at least move towards achieving some notion of accountability? We propose a new notion in which, if the CRS authority releases the private inputs of protocol executions to others, we can then provide a publicly-verifiable proof that certifies that the authority misbehaved. We study the feasibility of this notion in the context of non-interactive zero knowledge and two-round secure two-party computation.