International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2013-05-28
05:21 [Pub][ePrint] MinimaLT: Minimal-latency Networking Through Better Security, by W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange

  Minimal Latency Tunneling (MinimaLT) is a new network protocol that provides ubiquitous encryption for maximal confidentiality, including protecting packet headers. MinimaLT provides server and user authentication, extensive Denial-of-Service protections, and IP mobility while approaching perfect forward secrecy. We describe the protocol, demonstrate its performance relative to TLS and unencrypted TCP/IP, and analyze its protections, including its resilience against DoS attacks [56]. By exploiting the properties of its cryptographic protections, MinimaLT is able to eliminate three-way handshakes and thus create connections faster than unencrypted TCP/IP.





2013-05-26
06:59 [Job][New] Professor / Associate Professor in Information Security, Queensland University of Technology, Brisbane, Australia

 

The Queensland University of Technology (QUT) in Brisbane, Australia, is seeking to appoint a Professor or Associate Professor to play a senior leadership role in integrating research and teaching in the Information Security Discipline. The successful applicant will have an outstanding research publication and external funding track record. Women, Indigenous Australians and Torres Strait Islander people are strongly encouraged to apply.

The Information Security discipline undertakes research and teaching in the areas of cryptography, network security and digital forensics. The discipline group continues the 25 year pedigree of information security research excellence at QUT, and has a strong track record of success in competitive research funding, high quality publications and international collaboration.





2013-05-24
03:02 [Job][New] Ph.D. scholarship in cryptographic protocols, Norwegian University of Science and Technology (NTNU), Trondheim, Norway

  A PhD research fellowship position within cryptographic protocols is available at the Department of Telematics (ITEM) at the Faculty of Information Technology, Mathematics and Electrical Engineering (IME), Norwegian University of Science and Technology (NTNU). The project will investigate the security of protocols for authenticated key exchange using reductionist security models. The focus will be on key exchange protocols currently in use in real world networks.



2013-05-21
21:02 [Job][New] Junior Professorship (W1), Carl von Ossietzky University Oldenburg

  The Institute for Mathematics at the Carl von Ossietzky University invites applications for a Junior Professorship in Explicit Methods in Number Theory and Algebra (W 1) starting as soon as possible. The initial appointment will be for a duration of three years. Provided that her or his performance is thereafter evaluated positively, employment may be extended for three more years.

Appointment requirements are governed by Paragraph 30 Section 2 of the Lower Saxony Education Act (Niedersächsisches Hochschulgesetz). The successful applicant will be required to conduct research and teach in the area named above.

The job advertisement is intended for outstanding researchers in the area of Algebra/Number Theory. Knowledge in the following areas is desired: Algebraic Number Theory/Geometry, Computeralgebra, or applications thereof, e.g. Cryptography or Coding Theory.

Interested candidates should submit the usual (CV, publication record, research statement, teaching statement) to the Carl von Ossietzky University Oldenburg, Prof. Dr. Astrid Fischer, Institute for Mathematics, 26111 Oldenburg, Germany. A copy of the application in pdf-format should be sent to traute.lampke (at) uni-oldenburg.de. Deadline for applications is 27-May-2013 (post-marked).



20:56 [Event][New] CryptoBG*2013: CryptoBG*2013 Summmer School - Cryptology and Cyber Resilience

  Submission: 10 June 2013
Notification: 30 June 2013
From July 14 to July 21
Location: Oryahovitsa, Bulgaria
More Information: http://www.cryptobg.org


20:55 [Event][New] TrustED 2013: Third International Workshop on Trustworthy Embedded Devices

  Submission: 22 July 2013
Notification: 20 August 2013
From November 4 to November 4
Location: Berlin, Germany
More Information: http://trusted.trust.cased.de/




2013-05-17
04:10 [Event][New] WESS 2013: 8th Workshop on Embedded Systems Security

  Submission: 1 July 2013
Notification: 12 August 2013
From October 3 to October 3
Location: Montreal, Canada
More Information: http://www.wess-workshop.org




2013-05-16
18:17 [Job][New] 2 Post-Doc, University of Luxembourg

  The University of Luxembourg seeks to hire two outstanding post-doctoral researchers at its Interdisciplinary Centre for Security, Reliability and Trust (SnT) (http://wwwen.uni.lu/snt). One of the positions is within the ApSIA http://wwwen.uni.lu/snt/research/apsia) research group led by Prof. Dr. P.Y. Ryan and the second within the SaToSS research group (http://satoss.uni.lu/) led by Prof. Dr. Sjouke Mauw.

The post-docs will be working on formalizing and applying formal reasoning to real-world security problems and trust issues. The research topics will include: security protocols, security modeling, formal methods for security, socio-technical aspects of security, risk management, privacy, verification, etc. The positions will be partially funded by the national research project STAST: Socio-Technical analysis of Security and Trust, which aims to develop strategies and tools to detect and prevent attacks involving human, physical and digital elements.



2013-05-15
16:44 [Job][New] PhD/MSc positions in Cryptography, Security, and Privacy, Koç University, Istanbul, Turkey

  If you want to secure the cloud through the use of provable cryptographic techniques, then you should definitely apply to the Cryptography, Security & Privacy Research Group at Koç University. We have multiple openings for both M.Sc. and Ph.D. level applications. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc. The application deadline is 16th of June.

Koç University has a beautiful campus in the middle of a forest, with a nice view of the Black Sea and the Bosporus, and is close to the ?stanbul city center.

For more information about our group and projects, visit

http://crypto.ku.edu.tr

For applying online, and questions about the application-process, visit

http://gsse.ku.edu.tr

For summer internship opportunities, visit

http://kusrp.ku.edu.tr

For questions, contact Asst. Prof. Alptekin Küpçü

http://home.ku.edu.tr/~akupcu





2013-05-14
17:31 [Job][New] Security Researcher , Intel Corporation, Guadalajara, Mexico

  Security Researcher - 709403

Job Description: Responsible for secure design, development and operation of Intel\\\'s hardware and software products and services. Responsibilities may include threat assessment, design of security components, vulnerability assessment. Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks. Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal process. Maintains substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literate and conferences. May participate in development or intellectual property. Require thorough knowledge of security practices, procedures and capabilities in order to perform non-repetitive, analytical work.

Qualifications required

You should possess a Master of Science degree in an Engineering discipline with at least two years of related experience. Additional qualifications include (you should possess many if not all of the following):

- Knowledge of security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles

- Demonstrated expertise with computer architecture

- Creation of test plans and test content for validating platform and system components

- Ability to work in a less structure start-up type environment

- Strong oral and written communication skills with demonstrated attention to detail and results orientation

- x86 and C programming skills

Good to have

- Knowledge of Intel\\\'s CPU and/or chipset architecture



17:21 [Event][New] FOSAD13: 13th School on Foundations of Security Analysis and Design (w. CryptoForma)

  Submission: 30 June 2013
From September 3 to September 8
Location: Bertinoro, Italy
More Information: http://www.sti.uniurb.it/events/fosad13/