FARCry — Foundations & Applications of Resource‑Restricted Cryptography
A joint project exploring cryptographic primitives where security or privacy relies on bounded work, time, or space, with a special focus on privacy‑enhancing applications.
cryptographyprivacyVDFs & PoSWproofs of spacememory‑hard functions
Lay summary
Resource‑restricted cryptography (RRC) studies schemes that are secure unless an adversary spends significant work, time, or storage. Beyond uses like Proof‑of‑Work or memory‑hard password hashing, FARCry develops new foundations and primitives—with applications to privacy (e.g., deniability, unlinkability), Sybil‑resistance, and privacy‑preserving contact tracing.
Funded by the Vienna Science and Technology Fund (WWTF) — ICT 2025 call, Grant ICT25‑081.
Principal Investigators
Ass.-Prof. Karen Azari
University of Vienna — Faculty of Computer Science
karen.azari@univie.ac.at
Prof. Krzysztof Pietrzak
Institute of Science and Technology Austria (ISTA)
krzpie@gmail.com
To be updated. If you are interested in joining as a PhD student, see Open Positions.
Open Positions — PhD Opportunities
All three PIs are actively looking for PhD students. Strong candidates with interests in cryptography, privacy, verifiable computation, resource‑bounded security (work/space/time), and related areas are encouraged to reach out directly to the respective PI.
PhD
University of Vienna — with Ass.-Prof. Karen Azari
Topics include privacy‑enhancing cryptography, deniable communication, and foundational aspects of resource‑restricted cryptography.
Application materials typically include a CV, transcripts, and a short statement of research interests. Please email the PI directly; if unsure where to apply, contact any PI and we will route your inquiry.
Objectives
Foundations: minimal assumptions; relations between work/space/time; idealized models for space.
New primitives: space‑analogues of timed primitives; efficient space‑locks; multi‑user settings.
Applications: privacy in messaging (deniability), Sybil‑resistance aligned with storage, and contact‑tracing protocols.