International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2011-09-09
05:33 [Event][New] CANS 2011: The 10th International Conference on Cryptology and Network Security

  Submission: 27 June 2011
Notification: 25 August 2011
From December 10 to December 12
Location: Sanya, China
More Information: http://www.infosec.sdu.edu.cn/cans2011/


04:50 [Job][New] PhD student , University Paris 7

  A job in industry plus a PhD at the University of Paris 7 are proposed in the area of chip security. The candidate will be based at the city of Aix en Provence (south of France) and will be hired as a full time employee in a local company while preparing hi PhD.

Knowledge of HDL, chip design and silicon technologies are desired. Knowledge of side channel and fault attacks is a plus but not a pre-requisite. The position involves travels to CHES and work with R&D institutes in Grenoble and Russia.





2011-09-08
16:12 [Job][New] PhD or Post-Doc Position, Center for Advanced Security Research Darmstadt, Germany

  The Cryptography and Computer Algebra Group (Prof. J. Buchmann, see https://www.cdc.informatik.tu-darmstadt.de/en/cdc/) at the Center for Advanced Security Research (CASED), TU Darmstadt, is offering a PhD or post-doc position for two years with the possibility of extension for another two years.

The candidate will be working in the area of lightweight cryptography for sensor networks including topics like lightweight crypto primitives, secure data aggregation, and key management. Ideally the candidate already has a background and track record in this field. Students joining us on this project will have the unique opportunity to work with and contribute to the BMBF Software-Cluster (http://www.software-cluster.org/en), a large network of distinguished partners from academia and industry.

The position should be filled by November 1st. The review process will start on September 20th.

Please send your CV, copies of your degree certificates, and the names and e-mail addresses of two references who can provide letters of recommendation to arupp (at) cdc.informatik.tu-darmstadt.de



2011-09-07
11:03 [Job][New] Lecturer in Cybersecurity, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK

  Applications are invited for a Lectureship in Cybersecurity to undertake research in the area of Secure Digital Systems within the UK\'s 30M Centre for Secure Information Technologies (CSIT), at the Institute of Electronics, Communications and Information Technology (www.ecit.qub.ac.uk). Candidates will also be required to undertake lecturing duties at undergraduate and post-graduate level and to actively engage in major research with industry and to contribute to CSIT\'s mission of coupling research with economic impact, knowledge transfer and commercialisation.

Applicants must have at least a 2:1 Honours Degree (or equivalent) in Electrical and Electronics Engineering, Computer Science, Mathematics or closely related discipline and a PhD, or expect, within 6 months, to obtain a PhD, in a relevant subject. A strong research track record (minimum 3 years), in a relevant field, as demonstrated by publications in major journals or conferences is essential. Applicants with research expertise in one or more of the following areas are strongly encouraged to apply: information and data security; network security; embedded security; digital forensics; software security.



11:02 [Job][Update] Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK

  Queen\'s University Belfast wishes to appoint a Professor to lead and develop research and teaching activities within the area of Secure Information Technology in the School of Electronics, Electrical Engineering and Computer Science. This is a senior appointment and the appointee will have leadership and management responsibilities in the area of Secure Digital Systems within the UK\'s 30M strategic Centre for Secure Information Technologies (CSIT), at the Institute of Electronics, Communications and Information Technology (www.ecit.qub.ac.uk).

Applicants with research expertise in one or more of the following areas are strongly encouraged to apply: information and data security; network security; embedded security; computer forensics; software security/assurance



11:01 [Job][New] Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen's University Belfast, UK

  Queen\'s University Belfast wishes to appoint a Professor to lead and develop research and teaching activities within the area of Secure Information Technology in the School of Electronics, Electrical Engineering and Computer Science. This is a senior appointment and the appointee will have leadership and management responsibilities in the area of Secure Digital Systems within the UK\'s �30M strategic Centre for Secure Information Technologies (CSIT), at the Institute of Electronics, Communications and Information Technology (www.ecit.qub.ac.uk).

Applicants with research expertise in one or more of the following areas are strongly encouraged to apply: information and data security; network security; embedded security; computer forensics; software security/assurance



07:09 [Event][New] Stream Ciphers: Special Issue on "Stream Ciphers" in the journal CCDS, Springer

  Submission: 31 December 2011
Notification: 20 March 2012
From December 31 to December 31
Location: Kolkata, India
More Information: http://www.isical.ac.in/~subho/ccdscfp.txt


05:15 [Job][New] Senior Lecturer/Associate Professor, Queensland University of Technology, Brisbane, Australia

 

The Computer Science Discipline within the Faculty of Science and Technology at Queensland University of Technology, Brisbane, Australia, is seeking an experienced academic with an established research reputation to make significant contributions to network security research activities and to teaching in data communications.

Appointee(s) will undertake their research in QUT\'s Information Security Institute, a multi-disciplinary institute bringing together information security researchers from computer science, mathematics, engineering, business, and law, with a leading national profile and strong international links.





2011-09-06
08:37 [Job][Update] Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire

  The team will deliver Access Management and Cryptographic Services for key services such as our Authorisations, Mobile Gateway and Clearing and Settlement services.

Key Activities

  • Delivery of Access Management services across the Production and Corporate estate in conjunction with Corporate IT.
  • Delivery and administration of recertification and compliance programmes that meet the departmental goals.
  • Delivery of Cryptographic Key Management services with ITS Technologies team for the business and production services. Typically these activities will include Key Management Ceremonies and cryptographic token management.
  • Participate in project engagement process and perform delegated Operational Acceptance process tasks to ensure that all projects delivered meet our Operational and Compliance requirements.
  • Develop the Access Management and Cryptographic service strategy to improve service controls, service delivery and cost.
  • Develop and maintain the IT Security Standards in relation to the assigned services to ensure that they meet the Corporate Key Control requirements.
  • Operate the Corporate Key Controls Exceptions process as non Compliance is established via the operation of the framework.
  • Participate in the regular Security Resource Board framework to establish project effort and resource allocation.
  • Demonstrable experience relating to service, change and problem management and governance, such as ITIL incident and change management, Prince, Patch Management, Data Centre Operations processes, PCI DSS, SAS70 and COBIT and COSO based controls.
  • Experience across a wide variety of technology disciplines and deep understanding of Networks, HSMs, Key Ceremonies, Cisco devices, Microsoft Windows, Solaris and AIX.
  • Good understanding of middleware and application server products.
  • Familiar with Security Industry standard methods, and security practices CIA, AAA etc



2011-09-05
10:53 [Job][New] Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire

  The team will deliver Access Management and Cryptographic Services for key services such as our Authorisations, Mobile Gateway and Clearing and Settlement services.

Key Activities

Delivery of Access Management services across the Production and Corporate estate in conjunction with Corporate IT.

Delivery and administration of recertification and compliance programmes that meet the departmental goals.

Delivery of Cryptographic Key Management services with ITS Technologies team for the business and production services. Typically these activities will include Key Management Ceremonies and cryptographic token management.

Participate in project engagement process and perform delegated Operational Acceptance process tasks to ensure that all projects delivered meet our Operational and Compliance requirements.

Develop the Access Management and Cryptographic service strategy to improve service controls, service delivery and cost.

Develop and maintain the IT Security Standards in relation to the assigned services to ensure that they meet the Corporate Key Control requirements.

Operate the Corporate Key Controls Exceptions process as non Compliance is established via the operation of the framework.

Participate in the regular Security Resource Board framework to establish project effort and resource allocation.

Demonstrable experience relating to service, change and problem management and governance, such as ITIL incident and change management, Prince, Patch Management, Data Centre Operations processes, PCI DSS, SAS70 and COBIT and COSO based controls.

Experience across a wide variety of technology disciplines and deep understanding of Networks, HSMs, Key Ceremonies, Cisco devices, Microsoft Windows, Solaris and AIX.

Good understanding of middleware and application server products.

Familiar with Security Industry standard methods, and security practices CIA, AAA etc

Pleas



2011-09-04
14:50 [PhD][Update] Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied

  Name: Jens Groth
Topic: Honest Verifier Zero-Knowledge Arguments Applied
Category:foundations