Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via
To receive your credentials via mail again, please click here.
You can also access the full news archive.
ICITS 2012 was held from August 15 to 17, 2012 in Montréal (Canada). The organizing committee included Adam D. Smith (Program Chair), Jürg Wullschleger (General Chair), Alain Tapp, Claude Crépeau and Olivier Coutu.
It is a conference about all aspects of information-theoretic security. Its aim is to bring together researchers from all over the world from the areas of cryptography, information theory and quantum information. The conference was created as a successor of the “IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security” on Awaji Island, Japan, and takes place every 18 month, alternating between Asia, Europe and North America. Previous ICITS conferences were held in Madrid (Spain), Calgary (Canada), Shizuoka (Japan) and Amsterdam (The Netherlands).
As in previous ICITS conferences, the plenary talks were given by the leading researchers in the field. This year, these talks were given by Serge Fehr (CWI Amsterdam), Patrick Hayden (McGill University), Negar Kiyavash (University of Illinois at Urbana-Champaign), Xin Li (University of Washington), Krzysztof Pietrzak (IST Austria) and Salil Vadhan (Harvard University).
The usual process for conferences in Computer Science is that all submitted papers first undergo a careful reviewing process, and all papers that are accepted are not only presented at the conference, but they also appear in the conference’s proceedings. Previous ICITS conferences also used this format, but it turned out not to be optimal for information theorists and physicists. For this years ICITS, the organizers therefore decided to make a special “workshop track,” in addition to the more standard “conference track,” where the speakers needed to submit only a one-page abstract which will appear in the proceedings. This new format with both a conference and a workshop track was a big success, both in quality and quantity, and having as additional track also increased the number of participants.
The ICITS 2013 will take place in Singapore, from November 28 to 30, 2013.
The Deutsche Telekom Chair of Mobile Business & Multilateral Security at the Institute for Business Informatics of Goethe University Frankfurt offers one position as Senior Researcher (Postdoc, m/f, E14 TV-G-U). To strengthen our team we are looking for a committed, creative and flexible postdoctoral researcher with expertise in computer science and interest in current developments in business informatics. We are looking for people with advanced knowledge and special skills in at least three of the following areas:
• Privacy-enhancing technologies and data protection
• Identity management
• Information and communication security
• Mobile communication and their areas of application (e.g. LBS)
• Cloud architecture and services
• Human computer interaction (HCI)
• Smartcard and trusted computing
• Experiences with larger software projects
• Project management
The position starts on 2013-09-01 or later and has a fixed-term of 2 years with an extension option. The employment will be full time according to E14 TV-G-U (upgrade to A13 possible).
Deadline for applications: 2013-07-31
Contact for applications: Prof. Dr. Kai Rannenberg, bewerbungen(at)m-chair.net
Documents recommended to be submitted: personal statement of purpose, current resume, official references, list of publications, official test scores
More information: http://www.m-chair.net/wps/wse/home/rannenberg/career/
The Centre for Telematics and Information Technology (CTIT) at the University of Twente invites applications for a 4-year PhD position in cryptographically enforced privacy in electronic healthcare starting immediately. The position is funded by the THeCS project (Trusted HealthCare Services) as part of the Dutch national program COMMIT (www.commit-nl.nl).
The PhD candidate will be working with Prof. Pieter Hartel and Andreas Peter from the Distributed and Embedded Security Group (DIES, dies.ewi.utwente.nl) and with Prof. Willem Jonker from the Database Group (www.utwente.nl/ewi/db) of the University of Twente. The candidate will be expected to do active and internationally visible research on modern topics of applied cryptography and cryptographic protocols with a focus on privacy in electronic healthcare. The PhD candidate will be appointed for a period of four years, at the end of which he/she must have completed a PhD thesis. During this period, the PhD student has the opportunity to broaden his/her knowledge by joining international exchange programs, to participate in national and international conferences and workshops, and to visit other research institutes and universities worldwide.
Successful candidates must hold an outstanding M.Sc. degree (or equivalent) from the university study of Information Security/Cryptology, Mathematics, Computer Science, or similar. Applications from students that are about to finish their master thesis will be accepted as well. The candidate is expected to have excellent skills in the English language.
The position will be closed as soon as a suitable candidate is found. Applications must include:
Research Assistant in Engineering Cryptographic Protocols for Cloud Computing
with the goal to further develop the group\\\'s expertise in the area of engineering of cryptographic protocols, in particular for cloud computing environments. The position is initially assigned for 6 months, in which existing techniques for secure computation should be compared with regard to usage in cloud computing. In case third party funds are required, we aim to extend the position for up to three years and support the researcher to enroll in the Ph.D. program at Technische Universität Darmstadt.
Applicants must have completed (or be close to completing) a Master or Diplom with excellent grades in IT Security, Computer Science, Mathematics, Electrical Engineering, or a closely related subject. Knowledge in applied cryptography, IT security and programming skills are required. Additional knowledge in parallel computing, compiler construction, programming languages, and/or software engineering is a plus. We expect applicants to be highly qualified, self-motivated, and to conduct excellent, independent research within the context of EC SPRIDE, and actively support them in publishing their work on leading international conferences and journals.
Review of applications will start on July 10th, 2013 and applications will be accepted until the position has been filled.