Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via
To receive your credentials via mail again, please click here.
You can also access the full news archive.
We extend known results by considering the Combined Digit Model, an attacker model that captures signal processing attacks such as averaging and noise addition.
For $q=2$ we give results for various attack parameter settings.
For $q \\geq 3$ we present the relevant equations without providing a solution.
We show how the channel capacity in the Restricted Digit Model
is obtained as a limiting case of the Combined Digit Model.
The IACR website has a new look. A team of cryptologists has recently started an effort to advance the online services of the IACR, and has formed a new online content team for this task. What you see today is the result of the first two months of steady improvements. We hope that you like it and that you find the new organization useful.
This is only a start, and we know that many things are not yet as integrated as we would wish. We are working on improving the site and you should visit http://www.iacr.org often to see further improvements.
Please send your feedback, praise, or bug reports to webbugs(at)iacr.org.
The online content core team:
Christian Cachin, Kevin McCurley, Nigel Smart, Christopher Wolf.
The online content extended team:
Shai Halevi, Hilarie Orman, Bart Preneel, abhi shelat.
A successful candidate will have extensive university-level teaching experience and didactic skills, experience in academic supervision of graduate students, as well as experience in research and a strong international publication track record.
The candidate will be able to teach courses in the area of theoretical computer science on Master level and advanced Bachelor level, in particular a course on discrete mathematics.
We are interested both in candidates who can contribute to existing research groups (cryptography, semantics) as well as in candidates who bring in new areas of research expertise.
Furthermore, the senior lecturer is expected to supervise Master and Ph.D. students.
For applying, please follow the instructions here: http://www.ut.ee/en/application-documents-and-notification-results and send you application to personal (at) ut.ee.
I encourage applicants who work on more applied aspects of cybersecurity in addition to those who work on cryptography. Students working in areas relevant to cybersecurity will also be considered.
If you are interested, please send me an email with a copy of your CV, a short research statement, and the name of at least one reference.