IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
28 June 2015
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
Hitesh Tewari, Eamon O Nuallain
Benoit Libert, Damien Stehle
Igor Semaev
Daniel J. Bernstein, Tung Chou, Peter Schwabe
public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT for fast syndrome computation, and a sorting network to avoid cache-timing attacks.
Shijun Zhao, Qianying Zhang
27 June 2015
London, UK, June 19 - June 22
Notification: 25 March 2016
From June 19 to June 22
Location: London, UK
More Information: http://acns2016.sccs.surrey.ac.uk/
26 June 2015
University of Bristol
Please contact Nigel Smart, as soon as possible, to informally discuss the positions.
25 June 2015
University of Bergen
24 June 2015
Cryptographic Algorithms Group, CISPA, Saarland University, Germany
Requirements: A PhD in cryptography and related areas, excellence in research proven for example by publications in IACR conferences and workshops or venues like IEEE S&P, ACM CCS, NDSS, USENIX Security,…
Applicants interested in the positions should provide the following information in pdf format with the application:
- Research Statement
- CV
- List of publications, mark your top 2
- 2 reference letters
Expected starting date is Nov, 1st.
Cryptographic Algorithms Group: www.ca.cs.uni-saarland.de
CISPA: http://cispa.saarland
Aspera - an IBM Company
• Focus on defining and building out security programs and quality programs
• Develop an analysis framework for vulnerabilities
• Code or help code the security framework components
• Develop patches and new security features to help mitigate security flaws
• Coordinate activities during the deployment of security-relevant features
• Perform security code audits and design reviews
• Architecture, design and coding of Aspera’s end-to-end security framework
• Threat and vulnerability analysis
• Code analysis, scanning
• Pen-test
• Ability to deliver results quickly and efficiently with iterative approache
Requirements:
• Strong software development background - C and C++, systems programming, web application frameworks, JavaScript
• Expert knowledge of applied cryptography and software security
• Ultra familiarity with common software security threats, CWE
• Expert knowledge of applied cryptography and software security
• Proven record - contribution or ownership of security framework design and implementation for large scale software systems
• Authentication and distributed authorization frameworks (SAML, OpenID, OAuth(2))
• Code analysis and scanning tools and processes
• Secure communication protocols, data protection, secure interaction with authentication and authorizations systems, and cloud services (particularly cloud storage)
• To
21 June 2015
Open Letter to the Hon'ble President of India
The International Association of Cryptologic Research (IACR) is dismayed by reports of Professor Bimal Roy being dismissed in all but name as Director of the Indian Statistical Institute in Kolkata. Professor Roy has been a driving force in advancing the important field of cryptology in India, elevating its visibility to international level. Cryptology is a prime application of statistical and probabilistic methods.
The IACR confirms that Professor Roy deserves great recognition for his service to India and to the field of cryptology. He devoted his career to strengthening India's standing in this timely, fast advancing field. Removing him from this position one month before the appointment expires is an act that has put India in a shameful and awkward position in front of the international community of cryptology research and of mathematics in general.
The International Association of Cryptologic Research
June 21, 2015
Denise Demirel, Jean Lancrenon
They allow a prover to commit to a certain value without revealing
any information about it and without the prover being able to change its mind later on. Since the first property holds unconditionally this is an essential primitive for many schemes providing long-term confidentiality. However, the second property only holds computationally. Hence, in the long run bindingness is lost, making the primitive improper for long-lived systems. Thus in this paper, we describe a protocol that, in a sense, prolongs the bindingness of a given Pedersen commitment. More precisely, we demonstrate how to prove in perfect zero-knowledge that a new Pedersen commitment - generated with a larger security parameter - and a corresponding old commitment both commit to the same value. We stress that this is a non-trivial procedure. Up until now the only known perfect zero-knowledge proof techniques for proving message equivalence of two commitments work when both commitments use isomorphic message spaces. However, as we will show in this work, to prolong the security of Pedersen commitments we cannot tolerate this restriction. Our prolonging technique works for non-isomorphic message spaces, is efficient, can be repeated an arbitrary number of times, maintains
unconditional confidentiality, and allows to preserve the format of
the Pedersen commitments. This makes the construction presented here
an important contribution to long-lived systems. Finally, we illustrate this by discussing how commitments with prolongable bindingness can be used to allow for archiving solutions that provide not only integrity but also confidentiality in the long-term.
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang
In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV scheme is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal and strict security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that our scheme is efficient and practical. Compared with the best of the existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. At the same time, in comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server in the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.
Trupil Limbasiya, Nishant Doshi
Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
A.-M. Leventi-Peetz, J.-V. Peetz
software system SageMath the Multivariate Quadratic equation systems (MQ) for the input and output bit variables of a cryptographic S-box starting from its algebraic expressions. Motivation to this work were the results of recent articles which we have verified and extended in an original way, to our knowledge, not yet published elsewhere. At the same time we present results contrary to the published ones which cast serious doubts on the suitability of previously presented formulas, supposed to quantify the resistance of S-boxes against algebraic attacks.
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
Maciej Skorski
Some authors use a heuristic estimate obtained from the Asymptotic Equipartition Property, which yields roughly $n$ extractable bits, where $n$ is the total Shannon entropy amount. However the best known precise form gives only $n-O(\\sqrt{\\log(1/\\epsilon) n})$, where $\\epsilon$ is the distance of the extracted bits from uniform. In this paper we show a matching $ n-\\Omega(\\sqrt{\\log(1/\\epsilon) n})$ upper bound. Therefore, the loss of $\\Theta(\\sqrt{\\log(1/\\epsilon) n})$ bits is necessary. As we show, this theoretical bound is of practical relevance. Namely, applying the imprecise AEP heuristic to a mobile phone accelerometer one might overestimate extractable entropy even by $100\\%$, no matter what the extractor is. Thus, the ``AEP extracting heuristic\'\' should not be used without taking the precise error into account.