IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
29 July 2024
Jelle Vos, Mauro Conti, Zekeriya Erkin
ePrint ReportTheophilus Agama
ePrint Report28 July 2024
Sapporo, Japan, 17 December - 19 December 2024
Event CalendarSubmission deadline: 16 August 2024
Notification: 11 October 2024
27 July 2024
Dfns
Job Posting
- As a Lead Cryptographer, you will:
- Carry out fundamental and applied research with the research team.
- Act as a powerhouse of ideas on all cryptographic and research issues.
- Collaborate with the research and engineering team on technical research tasks.
More information on Dfns Labs and its affiliated projects: dfns.co/labs
Closing date for applications:
Contact: Christopher Grilhault des Fontaines chris@dfns.co
More information: https://www.welcometothejungle.com/en/companies/dfns/jobs/lead-cryptographer_paris?q=577351ed68dbf939d46f6cf0a1b9fc04&o=f45742ac-fac0-4c1b-8afc-7968f5378d33
CIMA.science
Job PostingClosing date for applications:
Contact: Alfio Lanuto (OBJECT: System developer)
More information: https://cima.science
Input-Output Global
Job PostingAs a Cryptographic Engineer in Applied Cryptography, you will play a vital role in developing and implementing cryptographic solutions. You'll work alongside a team of talented individuals, contributing to various projects ranging from prototyping new cryptographic products to optimizing existing ones. You will collaborate closely with software architects, product managers, and other team members to successfully deliver high-quality cryptographic solutions that meet market demands.
You will need to have a strong foundation in engineering principles and a keen interest in cryptography. This role offers an exciting opportunity to work on cutting-edge technologies while continuously learning and growing in applied cryptography.
DutiesAs a Cryptographic Engineer, you'll play a pivotal role in implementing Zero-Knowledge (ZK) circuits tailored for integration within the Midnight chain. Your focus will involve leveraging recursive proof technologies, particularly those based on Halo2, to create proofs regarding the Midnight state. These proofs are designed to interface with other ecosystems, such as Cardano, providing a secure and efficient means to interact and exchange information across platforms. Your duties will include:
Closing date for applications:
Contact: Marios Nicolaides
More information: https://apply.workable.com/io-global/j/E68F9E4337/
University of Wollongong, Australia
Job PostingClosing date for applications:
Contact: Prof. Willy Susilo
More information: https://www.uow.edu.au/about/jobs/jobs-available/#en/sites/CX_1/requisitions/preview/4659/?
Munich, Germany, 23 June - 26 June 2025
Event CalendarSubmission deadline: 9 September 2024
Notification: 11 November 2024
Bhilai, India, 9 January - 11 February 2025
Event CalendarSubmission deadline: 15 August 2024
Notification: 30 September 2024
Taipei, Taiwan, 8 April - 10 April 2025
Event CalendarSubmission deadline: 25 October 2024
Notification: 6 January 2025
Toronto, Canada, 13 August - 15 August 2025
Event Calendar25 July 2024
JAIPUR, India, 16 December - 20 December 2024
Event CalendarXinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin
ePrint ReportQianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng
ePrint ReportPeihan Miao, Xinyi Shi, Chao Wu, Ruofan Xu
ePrint ReportWe implement our protocols and compare them with the two-server PPML protocols presented in SecureML (Mohassel and Zhang, S&P'17) across various settings and ABY2.0 (Patra et al., Usenix Security'21) theoretically. We demonstrate that with the assistance of untrusted clients in the training process, we can significantly improve both the communication and computational efficiency by orders of magnitude. Our protocols compare favorably in all the training algorithms on both LAN and WAN networks.
Jianming Lin, Chang-An Zhao, Yuhao Zheng
ePrint ReportRafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, Pascal Benoit
ePrint ReportHugues RANDRIAMBOLOLONA
ePrint ReportSince its introduction in 1978, this is the first time an analysis of the McEliece cryptosystem breaks the exponential barrier.