IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
19 March 2025
Jesko Dujmovic, Giulio Malavolta, Wei Qi
Hong-Wei Sun
Virtual event, Anywhere on Earth, 18 September - 19 September 2025
Submission deadline: 15 May 2025
Notification: 8 July 2025
27 October - 31 October 2025
Submission deadline: 30 June 2025
Notification: 15 August 2025
UCSD Cryptography Group, Dept of Comp Sci & Eng, La Jolla, CA, USA
Applications are sought for a post-doc position in the cryptography group (CSE Department, UCSD) with Mihir Bellare. Dates are flexible.
Topics of interest include application-relevant theory of two-party computation that in particular continues work such as https://eprint.iacr.org/2024/1476, and provable security for symmetric cryptography, in particular authenticated encryption. Open to considering other topics as well.
Needed background is experience in, and facility with, formal definitions and proofs in the provable-security style.
Apply: To apply, please complete this Google form: https://docs.google.com/forms/d/1iOOKWI1kfU348b6Aw53FILEOu5qIDOnUoB9ngyK5wh8
Closing date for applications:
Contact: Mihir Bellare mbellare AT ucsd DOT edu
More information: https://cseweb.ucsd.edu/~mihir/
Università della Svizzera italiana
Closing date for applications:
Contact: Stefan Wolf, http://usi.to/nbk
More information: https://content.usi.ch/sites/default/files/storage/attachments/inf/inf-assistant-professor-2025.pdf
Friedrich-Alexander-Universität Erlangen-Nürnberg
The Research Training Group "Cybercrime and Forensic Computing" aims to systematically analyze research questions arising from the interaction between computer science and criminal law. More information about the project can be found at https://cybercrime.fau.de.
The following aspects are particularly relevant to the PhD position in the area of Hardware Security:- Computer Architecture
- Embedded Systems
- System-level Design Automation
- Side-channel Analysis
Applicants should have an excellent academic record, hold an MSc or an equivalent university degree in computer science or related disciplines, and have the goal to finish a PhD degree within three years.
For the particular position in hardware security, applicants should have an understanding of computer architectures (particularly RISC-V), hardware description languages, SoC design, and FPGA tools. Applicants should be team-oriented, open-minded, and communicative, with an interest in both theoretical and practical aspects of hardware security and embedded system design.
Closing date for applications:
Contact: Felix Freiling ([email protected]) for general questions and the application process, Jürgen Teich ([email protected]) and Stefan Wildermann ([email protected]) for questions about the position on hardware security.
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
- Hardware Security Verification: We explore how to perform efficient pre-silicon security verification with respect to physical implementation attacks (Side-Channel Analysis / Fault-Injection Analysis).
- Physical Implementation Attacks: We deepen the (theoretical) understanding of active and passive physical implementation attacks to build formal attacker models for security verification.
- Secure Hardware Design: We investigate how to build secure hardware circuits that can resist physical implementation attacks.
- Your CV, including a transcript of records.
- A brief cover letter describing your research interests.
- Contact details of 2-3 potential references.
Closing date for applications:
Contact: Pascal Sasdrich ([email protected])
Gachon University, South Korea
Closing date for applications:
Contact: Professor Seong Oun Hwang
More information: https://ai-security.github.io/index_e.htm
Chalmers University of Technologyrsity
Closing date for applications:
Contact: Only applications via the official portal are considered valid.
More information: https://www.chalmers.se/en/about-chalmers/work-with-us/vacancies/
Pompeu Fabra University
Closing date for applications:
Contact: [email protected]
More information: https://www.upf.edu/documents/1656590/294524599/Bases+ENG-TTPT-2025-8+ENGLISH.docx.pdf/8d0201ec-ba05-868e-699b-0db42e026f85?t=1741351921540
Brandenburg University of Technology, Chair of IT Security
The available position is funded as 100% TV-L E13 tariff in Germany and limited until 31.07.2026, with possibility for extension. Candidates must hold a Master’s degree (PhD degree for Postdocs) or equivalent in Computer Science or related disciplines, or be close to completing it. If you are interested, please send your CV, transcript of records from your Master studies, and an electronic version of your Master's thesis (if possible), as a single pdf file. Applications will be reviewed until the position is filled.
Closing date for applications:
Contact: Ivan Pryvalov ([email protected])
17 March 2025
Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu
In this work, we introduce secureED, a protocol that tackles these limitations, resulting in a significant performance enhancement of approximately $2-24\times$ compared to existing methods. Our protocol computes a secure ED between two genomes, each comprising $1,000$ letters, in just a few seconds. The underlying technique of our protocol is a novel approach that transforms the established approximate matching technique (i.e., the Ukkonen algorithm) into exact matching, exploiting the inherent similarity in human DNA to achieve cost-effectiveness. Furthermore, we introduce various optimizations tailored for secure computation in scenarios with a limited input domain, such as DNA sequences composed solely of the four nucleotide letters.
Dev Mehta, Trey Marcantino, Mohammad Hashemi, Sam Karkache, Dillibabu Shanmugam, Patrick Schaumont, Fatemeh Ganji
Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou
Jing Tian, Yaodong Wei, Dejun Xu, Kai Wang, Anyu Wang, Zhiyuan Qiu, Fu Yao, Guang Zeng
Weizhe Wang, Pierrick Méaux, Deng Tang
Additionally, we provide complexity estimates for the framework and apply the shortcut attack to \textsf{Elisabeth-4} and its patches. As a result, we optimize the DFA on \textsf{Elisabeth-4}, requiring fewer keystreams and running faster than previous methods. Specifically, we achieve a DFA that requires only $3000$ keystreams, which is one-fifth of the previous best result. We also successfully mount a practical DFA on \textsf{Gabriel-4} and provide a theoretical DFA for \textsf{Elisabeth-b4}.
For the latest patch, \textsf{Margrethe-18-4}, which follows the more general Mixed Filter Permutator (MFP) paradigm, we present a DFA in a stronger model. To the best of our knowledge, these are the first DFA results on the patches of \textsf{Elisabeth-4}. Finally, we derive security margins to prevent shortcut attacks on a broad sub-family of MFP ciphers, which can serve as parameter recommendations for designers.
Zhengjun Cao, Lihua Liu
Nilupulee A Gunathilake, Owen Lo, William J Buchanan, Ahmed Al-Dubai
Iftach Haitner, Gil Segev
In this work, we establish a tighter concrete security bound for the Chou-Orlandi protocol. First, we introduce the list square Diffie-Hellman ($\ell\text{-}\mathsf{sqDH}$) problem and present a tight reduction from the security of the protocol to the hardness of solving $\ell\text{-}\mathsf{sqDH}$. That is, we completely shift the task of analyzing the concrete security of the protocol to that of analyzing the concrete hardness of the $\ell\text{-}\mathsf{sqDH}$ problem. Second, we reduce the hardness of the $\ell\text{-}\mathsf{sqDH}$ problem to that of the decisional Diffie-Hellman ($\mathsf{DDH}$) problem without incurring a multiplicative loss. Our key observation is that although $\mathsf{CDH}$ and $\mathsf{DDH}$ have the same assumed concrete hardness, relying on the hardness of $\mathsf{DDH}$ enables our reduction to efficiently test the correctness of the solutions it produces.
Concretely, in groups in which no better-than-generic algorithms are known for the $\mathsf{DDH}$ problem, our analysis yields that an attacker running in time $t$ and issuing $q \leq t$ random-oracle queries breaks the security of the Chou-Orlandi protocol with probability at most $\epsilon \leq t / 2^{\kappa/2}$ (i.e., we eliminate the above multiplicative $q^2$ term). We prove our results within the standard real-vs-ideal framework considering static corruptions by malicious adversaries, and provide a concrete security treatment by accounting for the statistical distance between a real-model execution and an ideal-model execution.