IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
13 November 2025
Subham Das, Riccardo Invernizzi, Péter Kutas, Jonas Meers
We provide efficient algorithms that solve various instances of LIPH, leading to efficient \emph{partial key recovery attacks} in practice. More specifically, we present Coppersmith-type attacks that are able to recover an M-SIDH/POKÉ secret key given \(50\%\) (resp. \(86\%\)) of the most-significant bits of an entry of \(\Gamma\), and a FESTA secret key given the 67\% of the most-significant bits of \(\Gamma\). In the case of FESTA we also present a tailored combinatorial attack running in subexponential time $O(2^{\sqrt{n}})$ when $50\%$ of the bits of $\Gamma$ leak at random.
Chenyang Liu, Xukun Wang, Zhifang Zhang
Alessandro Budroni, Marco Defranceschi, Federico Pintore
Christopher Goes, Yulia Khalniyazova, Enrique Larraia, Xuyang Song
Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
\begin{itemize} \item Classically efficiently samplable distributions are verifiable if and only if one-way functions do not exist. \item Quantumly efficiently samplable distributions are verifiable by $\mathbf{P}^\mathbf{PP}$ with a polynomial number of samples. \item Sampling-based quantum advantage can be verified quantumly (with a polynomial number of samples) if one-way puzzles do not exist. \item If QEFID pairs exist, then some quantumly efficiently samplable distributions are not verifiable. \end{itemize}
Hanbeom Shin, Insung Kim, Sunyeop Kim, Byoungjin Seok, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
Mehdi Abri, Jonathan Katz
We explore using forced pruning in the few-time signature scheme used by SPHINCS+ to reduce the overall signature size. Prior work suggested similar ideas, but claimed that the improvement from forced pruning was small. We re-visit this conclusion by performing a detailed theoretical analysis of forced pruning along with a more thorough exploration of its benefits. We show that forced pruning can improve upon SPHINCS+C (Oakland 2023) in all respects, and can reduce the overall signature size for the ''smaller SPHINCS+'' variants proposed by Fluhrer and Dang by up to 20% with minimal effect on signing time. Our results thus show that forced pruning can be a beneficial optimization for hash-based signatures.
Yicheng Liu, Rafail Ostrovsky, Scott Shenker, Sam Kumar
Enis Golaszewski, Alan T. Sherman, Edward Zieglar, Jonathan D. Fuchs, Sophia Hamer
Yueming Li, Long Chen, Zhenfeng Zhang
This paper presents a comprehensive analysis of AKMA+, discovering two critical vulnerabilities: (1) the compromise of the AKMA Anchor Function (AAnF), which enables adversaries to impersonate legitimate users; and (2) the persistent storage of multiple anchor keys, which heightens the risk of key exposure. These vulnerabilities arise from the reliance on the authentication framework inherent in existing AKMA+ models. This architectural dependency introduces fundamental security risks that cannot be adequately mitigated through incremental modifications to the current design.
Furthermore, we observe that AKMA+ faces challenges in aligning with the standard account-based authentication model, which is incompatible with existing user practices within information systems. Additionally, we find that providing account-based authentication functionality without compromising privacy poses significant difficulties.
Benedikt Bünz, Giacomo Fenzi, Ron D. Rothblum, William Wang
We present TensorSwitch, a hash-based PCS for multilinear polynomials that improves the state-of-the-art in two fundamental bottlenecks: prover time and proof size.
We frame our results as an interactive oracle PCS, which can be compiled into a cryptographic PCS using standard techniques. The protocol uses any linear code with rate $\rho$, list-decoding and correlated agreement up to $\delta$, and encoding time $\tau \cdot \ell$, where $\ell$ is the block length. For a size $n$ polynomial, security parameter $\lambda$, and sufficiently large field, it has the following efficiency measures, up to lower order terms: - Commitment time: $(\tau/\rho^{2} + \tau/\rho + 3) \cdot n$ field multiplications. - Opening time: $6 n$ field multiplications. - Query complexity: $\frac{1}{-\log(1-\delta^{2})} \cdot \lambda$. - Verification time: $O(\lambda \log n)$. Moreover, the evaluation proof only contains $O(\log \log n)$ oracles of total size $(\lambda n)^{0.5 + o(1)}$.
With a Reed-Solomon code of rate $1/2$, the query complexity is $2.41 \lambda$ and commitment time is dominated by $(6 \log n + 3) \cdot n$ field multiplications. With an RAA code of rate $1/4$ and distance $0.19$, the query complexity is $19 \lambda$ and the commitment time is $42 n$ field additions and $3 n$ field multiplications. For both instantiations, the opening time is dominated by $6 n$ field multiplications.
Mojtaba Rafiee
11 November 2025
Hashgraph, Remote
We are looking for an Applied Cryptographer to join the Hashgraph engineering team. You will design, build, and integrate privacy-by-design features for enterprise solutions built on Hedera technology. This is a greenfield initiative at the cutting edge of decentralized systems and applied cryptography, with a focus on confidentiality, anonymity, history masking, and end-to-end security at scale.
This is a highly technical role where you will transform the newest research ideas into practical applications by designing, implementing, and optimizing cryptographic primitives and protocols (e.g., ZKPs, MPC, homomorphic encryption, Trusted Execution Environments) and secure smart contracts. You will collaborate closely with existing in-house cryptography researchers, partner with Product to translate customer privacy requirements into a clear roadmap, evaluate emerging solutions across the ecosystem, and work side-by-side with our Hashgraph engineers to prototype, benchmark, and produtize capabilities in HashSphere.
If you enjoy deep technical challenges, have a strong command of modern cryptography, and have experience turning advanced research into reliable, high-performance systems while navigating confidentiality-performance trade-offs, this is an exciting, impact-driven role shaping the privacy foundation for some of the world’s largest enterprises.
Apply here: https://www.hashgraph.com/careers/?gh_jid=8284328002
Closing date for applications:
Contact: pratyay.m@hashgraph.com; rohit@hashgraph.com
More information: https://www.hashgraph.com/careers/?gh_jid=8284328002
KTH Royal Institute of Technology; Stockholm, Sweden
Since this position requires Swedish citizenship, the below description of the position is available in Swedish only.
Centrum för cyberförsvar och informationssäkerhet (CDIS) vid KTH — som är ett samarbete mellan KTH och Försvarsmakten, samt vissa andra myndigheter — söker doktorander. Det rör sig om en bred utlysning inom cybersäkerhetsområdet. Vi vill här särskilt peka ut en möjlig specialisering inom kryptologiområdet.
Mer specifikt har KTH i samarbete med avdelningen för krypto och IT-säkerhet vid Must pågående spetsforskning som syftar till att möta de utmaningar som följer av kvantdatorutvecklingen. Vi söker nu inom ramen för CDIS utlysning en doktorand som kan bidra till den forskningen.
Doktoranden kommer att handledas av Johan Håstad och Martin Ekerå. Tjänsten kommer att omfatta 80% doktorandstudier vid KTH och 20% placering vid Must där möjlighet ges att arbeta med några av Sveriges främsta kryptologer. Resultatet för doktoranden blir en unik kombination av teori och praktik inom kryptologiområdet.
För ytterligare information, kontakta Johan Håstad (johanh@kth.se) eller Martin Ekerå (ekera@kth.se).
Sista ansökningsdag är den 15 december 2025. Observera att svenskt medborgarskap är ett krav för tjänsten, och att tjänsten medför krav på säkerhetsprövning.
Closing date for applications:
Contact: For more information about the position, please contact Johan Håstad (johanh@kth.se) or Martin Ekerå (ekera@kth.se).
More information: https://www.kth.se/lediga-jobb/857957
10 November 2025
TU Wien, Austria
The Security and Privacy Research Unit at TU Wien, as part of the TU Wien Cybersecurity Center (https://cysec.wien/), is offering a PhD student position in provable symmetric cryptography for privacy-friendly protocols within the WWTF CrossPings (Cross-Domain Privacy-Preserving Protocols and Symmetric Cryptography) project.
Our research unit is internationally renowned for its expertise in cryptography, security, and privacy. Our working language is English.
Candidate Profile
- Motivated candidates with excellent academic records
- Completed Master or Diploma in Mathematics, Computer Science, or related fields
- Experience in cryptography or security is a plus
Application
Formal applications must be submitted via the link below. We look forward to receiving your application until 20.12.2025.
Closing date for applications:
Contact: Elena Andreeva
More information: https://academicpositions.com/ad/tu-wien/2025/project-assistant-all-genders-at-the-institute-of-logic-and-computation/240957
Newcastle University; School of Computing; Newcastle, UK
Fully-funded competitive PhD studentship, highly suitable for UK candidates, is available.
Brief Description: Weather forecasting and environmental prediction are vital for managing risks such as flooding, extreme temperatures, and poor air quality. However, most forecasting systems rely on centralised data processing, raising concerns about privacy, data ownership, and resilience to cyber attacks or system failures. These challenges have been largely overlooked in both the UK and globally.
This project builds on recent work by Dr Aydin Abadi and colleagues at Newcastle University, who developed a decentralised weather forecasting framework combining Federated Learning (FL) and blockchain. The approach enables multiple organisations to train shared forecasting models without exchanging raw data. Blockchain ensures transparent model validation, while privacy-preserving methods protect sensitive local observations.
The PhD will extend that research by improving the scalability, accuracy, and security of decentralised environmental forecasting. It will explore advanced cryptographic techniques such as secure aggregation, privacy-preserving consensus, and private set intersection (PSI) to protect participants’ data and evaluate performance on real and synthetic meteorological datasets.
The goal is to deliver a scalable and secure collaborative forecasting framework that strengthens environmental resilience and benefits society.
Closing date for applications:
Contact: Aydin Abadi
More information: https://iapetus.ac.uk/studentships/secure-and-decentralized-federated-learning-for-environmental-forecasting/
09 November 2025
Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
Sulaiman Alhussaini, Sergeı̆ Sergeev
Irene Di Muzio, Martin Feussner, Igor Semaev
Kai-Chun Ning, Lars Ran, Simona Samardjiska
In this paper we turn our focus to multi-homogeneous systems that very often arise in algebraic models. Despite their overwhelming presence, both the theory and the practical solving methods are not complete. Our work fills this gap. We develop a theory for multi-homogeneous systems that extends the one for regular and semi-regular sequences. We define "border-regular" systems and provide exact statements about the rank of a specific submatrix of the Macaulay that we associate to these systems. We then use our theoretical results to define Multi-homogeneous XL - an algorithm that extends XL to the multi-homogeneous case. We further provide fully optimized implementation of Multi-homogeneous XL that uses sparse linear algebra and can handle a vast parameter range of multi-homogeneous systems. To the best of our knowledge this is the first implementation of its kind, and we make it publicly available.