International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

04:51 [Job][New] 3 Security Experts in Network/SW and HW/Smartcards, LGAI Applus+, Barcelona, Spain

  LGAI Applus+ is a SW/HW security lab located in Barcelona, Spain. Our business is security consultancy and evaluation/certification processes like Common Criteria, EMVCo, etc.

The three open positions are:

  • 1 SENIOR HW-smartcards security expert in side channel attacks (DPA-like) and eventually also in perturbation attacks (DFA/laser like).
  • 1 JUNIOR & 1 SENIOR security analyst for SW-Devices as routers, firewalls, etc.

04:50 [Job][New] PhD Studentship, University of Cambridge


Applications are invited for one PhD studentship in the Security Group at the Computer Laboratory to work with Dr Steven Murdoch. Funding for this position is provided by Microsoft Research Cambridge and Research Councils UK through the Dorothy Hodgkin Postgraduate Awards scheme. As such, applicants must be nationals from India, China, Hong Kong, South Africa, Brazil, Russia or countries in the developing world as defined by the Development Assistance Committee of the OECD:

The successful candidate will undertake research in the field of anonymous communications and privacy enhancing technologies. This broad research area provides considerable scope for the PhD candidate to find his or her own research direction.

04:50 [Job][New] PhD Studentship in Mobile Payments, University of Cambridge

  We have been offered funding for a PhD student to work at the University of Cambridge Computer Laboratory on the security of mobile payments, starting in April 2012.

The objective is to explore how we can make mobile payment systems dependable despite the presence of malware. Research topics include the design of next-generation secure element hardware, trustworthy user interfaces, and mechanisms to detect and recover from compromise. Relevant skills include Android, payment protocols, human-computer interaction, hardware and software security, and cryptography.

05:58 [PhD][Update] Mark D. Ryan: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning

  Name: Mark D. Ryan
Topic: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning
Category:(no category)

05:57 [PhD][New] Ben Smyth: Formal verification of cryptographic protocols with automated reasoning

  Name: Ben Smyth
Topic: Formal verification of cryptographic protocols with automated reasoning
Category: cryptographic protocols


Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of numerous critical components has been neglected. As a consequence, attacks have resulted in financial loss, violations of personal privacy, and threats to democracy. This thesis aids the secure design of cryptographic protocols and facilitates the evaluation of existing schemes.


Developing a secure cryptographic protocol is game-like in nature, and a good designer will consider attacks against key components. Unlike games, however, an adversary is not governed by the rules and may deviate from expected behaviours. Secure cryptographic protocols are therefore notoriously difficult to define. Accordingly, cryptographic protocols must be scrutinised by experts using procedures that can evaluate security properties.


This thesis advances verification techniques for cryptographic protocols using formal methods with an emphasis on automation. The key contributions are threefold. Firstly, a definition of election verifiability for electronic voting protocols is presented; secondly, a definition of user-controlled anonymity for Direct Anonymous Attestation is delivered; and, finally, a procedure to automatically evaluate observational equivalence is introduced.


This work enables security properties of cryptographic protocols to be studied. In particular, we evaluate security in electronic voting protocols and Direct Anonymous Attestation schemes; discovering, and fixing, a vulnerability in the RSA-based Direct Anonymous Attestation protocol. Ultimately, this thesis will help avoid the current situation whereby numerous cryptographic protocols are deployed and found to be insecure.


05:57 [PhD][New] Mark D. Ryan

  Name: Mark D. Ryan

22:01 [Job][New] Postdoc, Ruhr University Bochum

  The Cryptography Research Group at Ruhr University Bochum, Germany, is seeking for a postdoctoral researcher in cryptography (with an initial contract for one year).

Candidates must hold a PhD in mathematics, computer science or related areas. Furthermore, they must have a demonstrated record of top-quality research in foundations of public-key cryptography. This is usually proved by publications in IACR conferences or workshops.

Please send your application per email (preferably as PDF) to Eike Kiltz (eike.kiltz at The application should include a full CV, a cover letter motivating you application, a short description of your two best research articles, and at least two candidates for reference letters. Review of applications will begin immediately and will continue until the position is filled, the starting date is flexible.

16:07 [Election] List of Candidates Available


Candidates for Election in 2011

  • Josh Benaloh
    During more than a decade of service on the IACR Board as an officer, director, and conference chair, I led the establishment of verifiable electronic IACR elections, the policy of anonymous submission to IACR conferences, and the reduction of conference registration costs. I seek the opportunity to continue my service.

  • Alexandra Boldyreva
    I have been active with IACR for over 10 years. During that time, I've identified areas which I believe could be improved. If elected as a director, I will focus on improving communication with members, expanding the reach of our publications by accommodating broader topics, and bringing new students to conferences.

  • Shai Halevi
    I am a crypto researcher since the mid 90s, and I am currently serving as IACR membership secretary. As a director of the IACR, I will work to support our transition to open-access publication model, and to enhance the services that the IACR offers to the cryptology research community.

  • Phong Nguyen
    I've been serving on program committees of IACR conferences since 2002 and I'll be PC co-chair of EUROCRYPT 2013 and 2014. I would like to promote scientific excellence and open-access publishing. Please vote for Phong Nguyen. Thank you.

  • Tom Shrimpton
    It has been a pleasure to serve the IACR membership as Secretary (2007-2009) and as General Chair of CRYPTO'10. Now, I would very much like to serve as a Director of the Board. Please vote for me!

  • Nigel Smart
    Having served as both a prior PC and upcoming GC I have experience on the aspects of two of the main tasks the board assigns. What attracted me to Crypto was the combination of theory and practice, and I will aim to promote this if elected.

10:33 [Job][New] PhD in Network Security and Computer Forensics, University of Bristol

  We are looking for a PhD student to work in the areas of Network Security and Computer Forensics. The position would suit students with a strong background in networking, operating systems and programming.

Candidates must have, or expect to obtain, an excellent first degree (or equivalent) in Computer Science or Electrical & Electronic Engineering. The nature of the project will require the candidate to develop a good appreciation for legal and law enforcement aspects of IT and Internet abuse. Therefore, applicants should also have a willingness to work in an interdisciplinary environment and acquire more skills (theoretical and practical) throughout the project duration.

This 3 year studentship will cover tuition fees at the home/EU rate and a basic tax-free stipend of at least 13,590 per year.

Applications can be made online from the 3rd October at the link below

Please read the Before you apply section of this page for admissions statements, entry requirements and frequently asked questions. When you apply you will be asked to select a PhD programme by department, please select the department which best matches your research interests. Please also state the research group you are interested in working with in the Research Details section of the application form.

The online system is currently closed for essential maintenance; if you would prefer to submit a paper application before the 3rd October, please email pg-admissions (at) for a PDF version of the form, stating the studentship to which you are applying.

11:48 [Job][New] Post-Doc, Computer Science and Technology Centre (CCTC) at Universidade do Minho, Braga, Portugal

  The Cryptography and Information Security group at CCTC/Universidade do Minho is seeking a highly-qualified, self-motivated researcher to participate in European and national research projects.

The successful candidate will be responsible for the scientific area associated with side-channel attack resilience in the design and implementation of cryptographic protocols. The candidate should have 2 years post-doctoral experience and a solid publication record in at least one of the following areas: 1) the efficient implementation of low-level cryptographic primitives and countermeasures against side-channel attacks; 2) the theoretical aspects of side-channel attack resilience (e.g. leakage resilient cryptography).

Salary: 24K EUR per Year

Duration: 1 Year (renewable)

14:22 [Job][New] Four Post-Doc Positions in Security and Privacy, Universitat Rovira i Virgili

  Four post-doc positions from a.s.a.p. up to December 2012 are offered at Universitat Rovira i Virgili, Tarragona, Catalonia. The university is located on the Mediterranean coast, 80 km. south from Barcelona.

These are pure research positions, without teaching duties, in the context of the ARES project ( Successful candidates are supposed to publish in security and privacy in a broad sense.

Depending on when the candidate got her/his Ph.D., we can offer junior or senior post-docs, an international work environment and plenty of travel money to present results at security and privacy conferences.