IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
17 August 2018
InfoSec Global, Zurich, Switzerland or Toronto, Canada
• Implementation of cryptographic primitives (optimizations, countermeasures)
• Implementation of security protocols
• Side-channel analysis of implementations
• C programming proficiency
• Applied research in cryptography and security
• Patent and standards development
You have a Master in Computer Science with 5 years of experience in Security Engineering or a PhD in Computer Science with a focus on Security and a profound knowledge in cryptography and embedded devices
Skills:
• Software development in C and Java
• Development on embedded devices
• Experience with development on Android and iOS
• Experience with ARM processors
• Experience with side-channel analysis and attacks
• Experience with implementation of cryptographic primitives
• Experience with Latex
• Experience with applied research
Closing date for applications: 19 October 2018
Contact: Jennifer Quaid
ISG
jennifer.quaid (at) infosecglobal.com
InfoSec Global, Zurich, Switzerland
• Writing and publishing and public speaking
• Prototyping, proof of concept development
• Consultancy in the field of asymmetric cryptography
• Applied research in post quantum cryptography
• Patent and standards development
Education Required:
• PhD in Cryptography
• Profound knowledge in cryptography
• Profound knowledge in lattice-based cryptography
• Profound knowledge in code-based cryptography
• Profound knowledge in isogeny-based cryptography
Skills:
• Software development in C, Java or Python
• Experience with implementation of cryptographic primitives
• Experience with development on Windows, Linux, Android and iOS
• Experience with Latex
• Experience with applied research
Closing date for applications: 31 October 2018
Contact: Jennifer Quaid
InfoSec Global
jennifer.quaid (at) infosecglobal.com
InfoSec Global, Zurich, Switzerland or Toronto, Canada
• Writing and publishing and public speaking
• Design and analysis of IT security systems
• Prototype, proof of concept development
• Consultancy in the field of secure systems
• Applied research in cryptography and security
• Patent and standards development
Education and Experience: You have a Master in Computer Science with 5 years of experience in Security Engineering or a PhD in Computer Science with focus on Security, and a profound knowledge in cryptography, network security, systems engineering, security design, cloud security and security protocols.
Skills: Software development in C, Java and Python, Experience with security in Windows, Linux, Android and iOS, Experience with cloud infrastructure, Experience with IoT environment, Experience with Latex, Experience with applied research
Closing date for applications: 31 October 2018
Contact: Jennifer Quaid
InfoSec Global
jennifer.quaid (at) infosecglobal.com
Gaithersburg, USA, 11 March - 12 March 2019
Submission deadline: 17 December 2018
Notification: 15 January 2019
Vipul Goyal, Ashutosh Kumar
We continue this line of research and construct NMSS for more general access structures. We give a generic compiler that converts any statistical (resp. computational) secret sharing scheme realizing any access structure into another statistical (resp. computational) secret sharing scheme that not only realizes the same access structure but also ensures statistical non-malleability against a computationally unbounded adversary who tampers each of the shares arbitrarily and independently. Instantiating with known schemes we get unconditional NMMS schemes that realize any access structures generated by polynomial size monotone span programs. Similarly, we also obtain conditional NMMS schemes realizing access structure in monotoneP (resp. monotoneNP) assuming one-way functions (resp. witness encryption).
Towards considering more general tampering models, we also propose a construction of n-out-of-n NMSS. Our construction is secure even if the adversary could divide the shares into any two (possibly overlapping) subsets and then arbitrarily tamper the shares in each subset. Our construction is based on a property of inner product and an observation that the inner-product based construction of Aggarwal, Dodis and Lovett (STOC'14) is in fact secure against a tampering class that is stronger than 2 split-states. We also show applications of our construction to the problem of non-malleable message transmission.
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
Eyal Ronen, Kenneth G. Paterson, Adi Shamir
Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
16 August 2018
KIIT University, Bhubaneswar, India, 7 February - 9 February 2019
Submission deadline: 15 September 2018
Notification: 25 October 2018
Svetlogorsk, Kaliningrad region, Russia, 4 June - 7 June 2019
Submission deadline: 18 February 2019
Notification: 8 April 2019
National University of Singapore
Closing date for applications: 30 June 2019
Contact: Prof. Abhik Roychoudhury
School of Computing
National University of Singapore
abhik (at) comp.nus.edu.sg
More information: https://www.comp.nus.edu.sg/~abhik
Flensburg University
* pairing-based
* lattice-based
* black-box (im)possibility results
and applications to Internet of Things and Blockchain. Research is conducted within the EU H2020 Functional Encryption Technology (FENTEC) project in conjunction with the academic partners Edinburg University, ENS Paris, Flensburg University, Helsinki University, KU Leuven and the industrial partners ATOS, Kudelski Group (former Nagravision), WALLIX and XLAB.
The position includes
* competitive salary
* travel budget (conference, project meetings, research visits)
* team of 1-2 PhDs
* academic freedom to create own research profile
* (optional) teaching opportunity
Please send your CV to The Chancelor, Mrs. Sabine Christiansen at personal.bewerbungen(at)hs-flensburg.de.
Closing date for applications: 1 September 2018
Contact: Prof. Dr. Sebastian Gajek, Head of the IT-Security and Cryptography group (ITSC), Web: https://www.itsc.inf.hs-flensburg.de, Email: sebastian.gajek(at)hs-flensburg.de
More information: https://hs-flensburg.de/node/3893
Simula UiB
About us: Simula UiB is a research organization located in Bergen, Norway. We currently employ 17 people researching cryptography and information theory and supervising master and Ph.D. students. Due to increased base funding from the Norwegian government, we are now looking to expand our activity and hire two senior researchers in permanent positions.
What we want: We are looking for someone who is an active researcher in cryptography, with an excellent publication record. The successful candidate is expected to attract and supervise students. We envision the ideal candidate to be someone who has 10–15 years of experience since obtaining his/her Ph.D. degree. Candidates with less experience should also apply.
What we offer:
Competitive salary and a fast hiring process.
Two Ph.D. positions and one postdoc position are associated with each researcher.
Funding for travel and hosting visitors.
A good working environment in modern offices located centrally in Bergen.
Closing date for applications:
Contact: Website: www.simula-uib.com
If you want to learn more about this opportunity please email Kjell Jørgen Hole (CEO) at hole (at) simula.no, Håvard Raddum (leader of the crypto section) at haavardr (at) simula.no or Øyvind Ytrehus (chief scientist) at oyvindy (at) simula.no.
University of South Florida
The required expertise includes:
- Master’s in Computer Engineering or Electrical Engineering
- Solid background in digital design, VLSI, computer arithmetic, and ASIC/FPGA implementations
- Solid HDL expertise
- Outstanding English (if English tests are taken) to be eligible for department funding
- Motivation to work beyond the expectations from an average Ph.D. student and publish in top tier venues
Please closely observe the admission requirement details before emailing,
We are looking for motivated, talented, and hardworking applicants who have background and are interested in working on different aspects of Cryptographic Engineering with emphasis on:
- Cryptographic hardware systems
- Side-channel attacks, particularly fault and power analysis attacks
Please send me your updated CV (including list of publications, language test marks, and references), transcripts for B.Sc. (and/or M.Sc.), and a statement of interest to mehran2 (at) usf.edu as soon as possible.
NOTE: At this time, I consider only the applicants who have already taken TOEFL/IELTS and GRE exams with excellent marks. The successful candidate will be asked to apply formally very soon to the department, so all the material has to be ready.
Mehran Mozaffari Kermani
Closing date for applications: 30 November 2018
More information: http://www.csee.usf.edu/~mehran2/