International Association for Cryptologic Research

# IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2013-06-18
09:17 [Pub][ePrint]

The authors give the definition of a bit-pair shadow, and design the three algorithms of a public key cryptoscheme called JUNA which regards a bit-pair as an operation unit, and is based on the multivariate permutation problem (MPP) and the anomalous subset product problem (ASPP). Then, demonstrate the correctness of the decryption algorithm, deduce the probability that a plaintext solution is nonunique is nearly zero, and analyze the security of the cryptoscheme against extracting a private key from a public key, and recovering a plaintext from a ciphertext on the assumption that IFP, DLP, and SSP can be solved efficiently. Besides, give the conversion from the ASPP to the anomalous subset sum problem (ASSP) through a discrete logarithm. The facts show the bit-pair method increases the density of a related ASSP knapsack with D > 1, and decreases the length of modulus of the cryptoscheme with lg M = 384, 464, 544, or 640 corresponding to n = 80, 96, 112, or 128.

09:17 [Pub][ePrint]

For make the cryptography design eatable and popular,

we design the pickle HASH carefully. The pickle can deal large

data into HASH value with 1024bytes block quickly. There are

normal mode and operation mode of pickle from Keccak and

Shabal respectively. The nonlinear transformation is from 3fish of

Skein, which is only use up the MIX function. The pickle is speed

up because of no memory operation mode. The core function P is 8

times MIX without linear permutation and subkey involving in. So,

the full pickle is similar to the interlace code plus a little bit

nonlinear function. The nonlinear character is equal to the Skein

so that we consider it\'s secure. The output from filter function

strong the linear character of pickle.

09:17 [Pub][ePrint]

At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IPmasking for short) was claimed to be secure with respect to two different security models: the $\\lambda$-limited security model (Section 4 of [1]), and the dth-order security model (see definitions p.8 of [1]). In the former model, the security proof makes sense for a sharing dimension $n > 130$ which is acknowledged impractical by the authors. In the latter model, the scheme is claimed secure up to the order $d = n-1$. In this note, we contradict the dth-order security claim by exhibiting a 1st-order flaw in the masking algorithm for any chosen sharing dimension n.

00:17 [Forum]

Hi, I guess it\'s quite simple math: If the same paper does not get resubmitted to Crypto / Eurocrypt / Asiacrypt / TCC, we don\'t have to review it again and again 4 (!) times. If the saved time will be spent on better reviews is clearly a different ball-game... Best, Christopher From: 2013-17-06 22:07:18 (UTC)

2013-06-17
22:33 [Job][Update]

The Laboratory of Algorithmics, Cryptology and Security (LACS) of the University of Luxembourg is looking for a post-doctoral researcher in the area of lightweight cryptography. The successful candidate will contribute to a research project entitled \\\"Applied Cryptography for the Internet of Things (ACRYPT)\\\", which is funded by the Fonds National de la Recherche (FNR). Besides conducting high-quality research, the tasks associated with this position include the co-supervision of a Ph.D. student and the dissemination of research results. The ACRYPT project is led by Prof. Alex Biryukov and expected to start in summer 2013.

Candidates must hold a Ph.D. degree (or be in the final stages of a Ph.D. program) in cryptography or a closely related discipline. Applications from researchers with experience in embedded systems security, network security, privacy/anonymity, or mobile/wireless security will also be considered. Preference will be given to candidates with a strong publication record including papers in top-tier crypto/security conference proceedings or journals. Candidates with an interest to conduct leading-edge research in one of the following areas are particularly encouraged to apply:

Design and analysis of symmetric cryptographic primitives

Side-channel attacks (e.g. DPA) on symmetric cryptographic primitives and countermeasures

The position is available from July 2013 on basis of a fixed-term contract for a duration of three years, which includes a probation period of six months. LACS offers excellent working conditions in an attractive research environment and a highly competitive salary. Interested candidates are invited to submit their application by email to lacs.acrypt(at)gmail.com. The application material should contain a cover letter explaining the candidate\\\'s motivation and research interests, a detailed CV (including photo), a list of publications, copies of diploma certificates, and nam

22:32 [Job][Update]

The Department of Computer Science at Tallinn University of Technology is looking for a full Professor of Cyber Security.

This appointment is part of the strategic growth of the Department of Computer Science, supported by the Estonian IT Academy program. The department is seeking an energetic and dynamic candidate who will contribute to and complement the current research and teaching activities, and promote cooperation with national and international partners in academia, industry, government, and military. The candidate’s main responsibility in the areas of cyber security will be research activities, supervising Ph.D work, leading department’s cyber security research and study program, and teaching courses on postgraduate level.

The successful candidate will serve as a leader of research and teaching in the field of practical cyber security and digital forensics.

The position has currently been announced for the period Feb 2014 - Jan 2019. It can be extended. Ask the contact persons about details.

22:24 [Job][New]

The Department of Computer Science at Tallinn University of Technology is looking for a full Professor of Cyber Security.

This appointment is part of the strategic growth of the Department of Computer Science, supported by the Estonian IT Academy program. The department is seeking an energetic and dynamic candidate who will contribute to and complement the current research and teaching activities, and promote cooperation with national and international partners in academia, industry, government, and military. The candidate’s main responsibility in the areas of cyber security will be research activities, supervising Ph.D work, leading department’s cyber security research and study program, and teaching courses on postgraduate level.

The successful candidate will serve as a leader of research and teaching in the field of practical cyber security and digital forensics.

The position has currently been announced for the period Feb 2014 - Jan 2019. It can be extended. Ask the contact persons about details.