IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 March 2020
Algorand Inc
Job PostingClosing date for applications:
Contact: Makena Stone
University of Edinburgh
Job PostingClosing date for applications:
Contact: Interested persons please email with a cover letter and updated curriculum vitae to mkohlwei@ed.uk.ac. The position will be available until filled; only short-listed candidates will be notified.
Chalmers University of Technology, Sweden
Job PostingPlease apply:
https://www.chalmers.se/en/about-chalmers/Working-at-Chalmers/Vacancies/Pages/default.aspx?rmpage=job&rmjob=p8404
Closing date for applications:
Contact: Professor Aikaterini Mitrokotsa (Networks and Systems), aikmitr@chalmers.se
More information: https://www.chalmers.se/en/about-chalmers/Working-at-Chalmers/Vacancies/Pages/default.aspx?rmpage=job&rmjob=p8404
University of Bergen
Job Posting
- symmetric-key cryptology such as block ciphers, stream ciphers, hash functions, message authentication codes, authenticated encryption schemes, etc.
- post-quantum cryptology
- cryptology for emerging technologies such as IoT and public ledger/blockchain
- side-channel analysis, whitebox cryptography, countermeasures
- implementation aspects of cryptography in software or hardware
- provable security of symmetric cryptographic primitives and modes of operation
More information: https://www.jobbnorge.no/en/available-jobs/job/183156/postdoctoral-research-fellow-position-in-informatics-applied-cryptology
Closing date for applications:
Contact: Prof. Andrey Bogdanov, andrey.bogdanov@uib.no
TU Wien, Vienna Austria
Job PostingSafety and Security in Industry Research Lab (SafeSecLab)
https://karriere.tuwien.ac.at/Job/126869?culture=en
Deadline: 19.03.2020
Cyber-physical production systems (CPPS) need suitable networked architectures that take into account and combine safety (operation of the system must not pose any danger) and security (protection against unauthorized manipulation). As part of the newly founded "TÜV AUSTRIA Safety and Security in Industry Research Lab" (SafeSecLab), several related research questions are addressed within the framework of dissertation projects (3 years funding) at TU Wien.
Open PhD topics:
- Safety and Security Modelling
- Safe and Secure System Architectures
- Automated Risk Management
- Secure Hardware Design
More details can be found on the application website: https://karriere.tuwien.ac.at/Job/126869?culture=en
Closing date for applications:
Contact: Wolfgang Kastner
More information: https://karriere.tuwien.ac.at/Job/126869?culture=en
Evangelia Anna Markatou, Roberto Tamassia
ePrint ReportIstván András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
ePrint ReportJelle Don, Serge Fehr, Christian Majenz
ePrint ReportDusan Klinec Vashek Matyas
ePrint ReportJuliane Krämer, Patrick Struck
ePrint ReportShashank Raghuraman, Leyla Nazhandali
ePrint ReportAhmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
ePrint ReportIn this paper, we first present a new zk-SNARK system that is well-suited for randomized algorithms---in particular it does not encode randomness generation within the arithmetic circuit allowing for more practical prover times. Then, we design a universal circuit that takes as input any arithmetic circuit of a bounded number of operations as well as a possible value assignment, and performs randomized checks to verify consistency. Our universal circuit is linear in the number of operations instead of quasi-linear like other universal circuits. By applying our new zk-SNARK system to our universal circuit, we build MIRAGE, a universal zk-SNARK with very succinct proofs---the proof contains just one additional element compared to the per-circuit preprocessing state-of-the-art zk-SNARK by Groth (Eurocrypt 2016). Finally, we implement MIRAGE and experimentally evaluate its performance for different circuits and in the context of privacy-preserving smart contracts.
Juan Garay, Aggelos Kiayias, Nikos Leonardos
ePrint ReportWhile the original formulation was only accompanied by rudimentary analysis, significant and steady progress has been made in abstracting out the protocols properties and providing a formal analysis under various restrictions, starting with the work by Garay, Kiayias and Leonardos [Eurocrypt 15], for a simplified version of the protocol which excluded PoW difficulty adjustment and assumed a fixed number of parties as well as synchronous communication rounds. These assumptions have since been somewhat relaxed, first by Pass, Seeman and Shelat [Eurocrypt 17] who also focused on the simplified version of the protocol but on the bounded-delay model of communication, and by Garay, Kiayias and Leonardos [Crypto 17] who looked into the full protocol including the PoW difficulty adjustment mechanism with a variable number of parties but assuming synchronous communication and a predetermined schedule of participation. Despite the above progress, the full analysis of the protocol in the more realistic setting of bounded delays and dynamic participation has remained elusive.
This papers main result is the proof that Nakamotos protocol achieves, under suitable conditions, consistency and liveness in bounded-delay networks with adaptive (as opposed to predetermined) dynamic participation assuming, as before, that the majority of the computational power favors the honest parties. While our techniques draw from previous analyses, our objective is significantly more challenging, demanding the introduction of new techniques and insights in order to realize it.
Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
ePrint ReportJannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
ePrint ReportWhile security is fundamental for cryptographic primitives, performance is of similar relevance. Since 2009, processor-integrated instructions have allowed high throughput for the AES round function, which already motivated various constructions based on it. Moreover, the four-fold vectorization of the AES instruction sets in Intel's Ice Lake architecture is yet another leap in terms of performance and gives rise to exploit the AES round function for even more efficient designs.
This work tries to combine all aspects above into a primitive and to build upon years of existing analysis on its components. We propose Pholkos, a family of (1) highly efficient, (2) highly secure, and (3) tweakable block ciphers. Pholkos is no novel round-function design, but utilizes the AES round function, following design ideas of Haraka and AESQ to profit from earlier analysis results. It extends them to build a family of primitives with state and key sizes of $256$ and $512$ bits for flexible applications, providing high security at high performance. Moreover, we propose its usage with a $128$-bit tweak to instantiate high-security encryption and authentication schemes such as SCT, ThetaCB3, or ZAE. We study its resistance against the common attack vectors, including differential, linear, and integral distinguishers using a MILP-based approach and show an isomorphism from the AES to Pholkos-$512$ for bounding impossible-differential, or exchange distinguishers from the AES. Our proposals encrypt at around $1$--$2$ cycles per byte on Skylake processors, while supporting a much more general application range and considerably higher security guarantees than comparable primitives and modes such as PAEQ/AESQ, AEGIS, Tiaoxin346, or Simpira.