IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
10 June 2016
Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
ePrint ReportAmir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
ePrint ReportThomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
ePrint Report08 June 2016
Santa-Barbara, USA, 14 August 2016
Event CalendarHong Kong Applied Science and Technology Research Institute Company Limited
Job Posting
Design and develop innovative yet high quality application software for cybersecurity and FinTech initiatives.
• Responsible for developing technical solutions on Blockchain / Distributed Ledger.
• Implement cryptographic algorithm.
Requirements:
• Bachelor’s degree in Computer Science or related disciplines with 6+ years experience or Master’s degree of equivalent education with 3+ years experience or Ph.D degree holder with less experience. Candidates with less experience will be considered as Engineer.
• Understanding of Blockchain platform such as Bitcoin, Ethereum, HyperLedger, Multichain, etc.
• Deep knowledge in Blockchain technology. Understanding of the cryptographic principles underpinning of Bitcoin and Blockchain Technologies.
• Understanding of distributed system and experience in implementing cryptographic protocols is a plus.
• Must possess extensive hands-on experience in one or more programming languages: Java, Scala, Python, JavaScript, C/C++, Go, Ruby, C#, etc.
• Deep knowledge of objected-oriented programming. Deep understanding of data structure, algorithm and design pattern.
Closing date for applications: 30 June 2016
Contact: charlenechoo (at) astri.org
More information: http://www.astri.org
07 June 2016
Bratislava, Slovakia, 29 June - 1 July 2017
Event CalendarSubmission deadline: 20 May 2017
Heraklion, Crete, Greece, 26 September - 30 September 2016
Event CalendarSubmission deadline: 23 June 2016
Notification: 29 July 2016
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
ePrint ReportShalabh Jain; Jorge Guajardo
ePrint ReportSamaneh Ghandali; Georg T. Becker; Daniel Holcomb; Christof Paar
ePrint ReportNico D\"{o}ttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
ePrint ReportIn this work, we put forward a new candidate construction of obfuscation based on GGH13 multilinear maps for which this gap is polynomial (in the security parameter). Our construction is obtained by tailoring GGH13 multilinear maps to a modification of the Lin's [EUROCRYPT 2016] obfuscation construction. We prove the security of this variant of Lin's construction in the hybrid graded encoding model that captures \emph{all known} vulnerabilities of GGH13 maps and \emph{their conceivable extensions} including the recent annihilation attacks of Miles, Sahai, and Zhandry [CRYPTO 2016].
Ryan Henry
ePrint ReportMargaux Dugardin; Sylvain Guilley; Jean-Luc Danger; Zakaria Najm; Olivier Rioul
ePrint ReportIn this article, we show that there exists a strong negative correlation between extra-reductions of two consecutive operations, provided that the first one feeds the second one. This allows to mount successful attacks even against blinded asymmetrical computations with a regular exponentiation algorithm (such as Square-and-Multiply Always or Montgomery Ladder). We put forward various attack strategies depending on the context (e.g., known modulus or not, known extra-reduction detection probability, etc.), and implement them on two devices (single core ARM Cortex-M4 and dual core ARM Cortex M0-M4)
Mehmet S. Inci; Berk Gulmezoglu; Gorka Irazoqui; Thomas Eisenbarth; Berk Sunar
ePrint ReportThe most commonly exploited leakage in the shared resource systems stem from the cache and the memory. High resolution and the stability of these channels allow the attacker to extract fine grained information. In this work, we employ the \PnP\ attack to retrieve an RSA secret key from a co-located instance. To speed up the attack, we reverse engineer the cache slice selection algorithm for the Intel Xeon E5-2670 v2 that is used in our cloud instances. Finally we employ noise reduction to deduce the RSA private key from the monitored traces. By processing the noisy data we obtain the complete 2048-bit RSA key used during the decryption.
Rei Ueno; Sumio Morioka; Naofumi Homma; Takafumi Aoki
ePrint ReportCesar Pereida García, Billy Bob Brumley, Yuval Yarom
ePrint ReportHeiko Lohrke; Shahin Tajik; Christian Boit; Jean-Pierre Seifert
ePrint ReportLorenzo Grassi, Christian Rechberger, and Sondre Rønjom
ePrint ReportRishabh Poddar, Tobias Boelter, Raluca Ada Popa
ePrint ReportIn this paper, we propose Arx, the first practical and functionally rich database system that encrypts the data only with strong encryption schemes. Arx protects the database with the same level of security as regular AES-based encryption, which by itself is devoid of functionality. We show that Arx supports real applications such as ShareLatex and a health data cloud provider, and that its performance overhead is modest.
Vienna, Austria, 28 October 2016
Event CalendarSubmission deadline: 27 July 2016
Notification: 5 September 2016