IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
23 December 2019
Leo Weissbart, Stjepan Picek, Lejla Batina
In this paper, we investigate the behavior of a multilayer perceptron in detail in the context of the side-channel analysis of AES. By exploring the sensitivity of multilayer perceptron hyperparameters over the performance of the attack, we aim at providing a better understanding of successful hyperparameters tuning, and ultimately, the performance of this algorithm. Our results show that MLP (with a proper hyperparameter tuning) can easily break implementations having a random delay or masking countermeasures.
Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
Lichao Wu, Stjepan Picek
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Jan Camenisch, Maria Dubovitskaya, Patrick Towa
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
In this work, we improve upon the work of PASTA and propose a distributed SSO protocol with proactive and adaptive security (PESTO), guaranteeing security as long as not all servers are compromised at the same time. We prove our scheme secure in the UC framework which is known to provide the best security guarantees for password-based primitives. %as it avoids any unrealistic assumption on password distributions. The core of our protocol are two new primitives we introduce: partially-oblivious distributed PRFs and a class of distributed signature schemes. Both allow for non-interactive refreshs of the secret key material and tolerate adaptive corruptions. We give secure instantiations based on the gap one-more BDH and RSA assumption respectively, leading to a highly efficient 2-round PESTO protocol. We also present an implementation and benchmark of our scheme in Java, realizing OAuth-compatible bearer tokens for SSO, demonstrating the viability of our approach.
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
In this paper, we give a new way to overcome this problem by introducing a generalized notion of NTRU lattices which we call \emph{Module-NTRU}~(MNTRU) lattices, and show how to efficiently generate a trapdoor over MNTRU lattices. Moreover, beyond giving parameter flexibility, we further show that the Gram-Schmidt norm of the trapdoor can be reached to about $q^{1/d},$ where MNTRU covers $d \ge 2$ cases while including NTRU as $d = 2$ case. Since the efficiency of trapdoor-based IBE is closely related to the Gram-Schmidt norm of trapdoor, our trapdoor over MNTRU lattice brings more efficient IBE scheme than the previously best one of Ducas, Lyubashevsky and Prest, while providing the same security level.
Andrew M. K. Nassief
Edward Eaton, Fang Song
22 December 2019
Kyiv, Ukraine, 1 May - 22 May 2020
Submission deadline: 22 February 2020
20 December 2019
University of Wollongong
Closing date for applications:
Contact: Professor Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191851&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
University of Wollongong
Closing date for applications:
Contact: Professor Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191859&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
University of Wollongong
Closing date for applications:
Contact: Willy Susilo
More information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=191858&tz=GMT%2B11%3A00&tzname=Australia%2FSydney
19 December 2019
Paris, France, 8 July - 10 July 2020
Submission deadline: 14 February 2020
Notification: 15 April 2020
18 December 2019
Daniel R. L. Brown
The estimates also suggest somewhat better security assurance from compounding two independent cryptosystems, but perhaps not enough to outweigh the extra cost.
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
We present constructions of ZAPs and NIWI for AM from Minicrypt and worst-case assumptions. We also present (a form of) NIZK with uniform soundness for NP, from Minicrypt and worst-case assumptions. We present analogous fine-grained constructions of all of the above, where the zero- knowledge adversary is limited to NC1. Specifically, we achieve fine-grained ZAPs and NIWI for NP from worst-case assumptions only and achieve a form of fine-grained NIZK with uniform soundness for NP from worst-case and Minicrypt assumptions.