International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

15:25 [Job][New] 2 Ph.D. students, University of British Columbia, Vancouver, Canada

  There are two Ph.D. student positions available at the Laboratory for Education and Research in Secure Systems Engineering (LERSSE). Ph.D. students are accepted with full support in the form of research assistantships and positions are available for starting in September 2012. Application deadline is soon!

LERSSE is a world-class international multidisciplinary research group specializing in the following areas of computer security:

* Usable security (i.e., application of HCI methods to security)

* Web security

• Security and privacy of online social networks

* Distributed systems security

* Mobile device security

Besides usual training in computing, we are particularly interested in those applicants who have background or interest in applying methods of social science, cognitive science, psychology, and HCI to the domain of computer security.

LERSSE graduates commonly go on working for top hi-tech R&D and consulting companies in North and South America, Asia, Europe, and Middle East.

The University of British Columbia (UBC), established in 1908, is one of Canada’s leading research universities and is consistently highly ranked, including the most recent rank of 22nd in the world by Times Higher Education. UBC attracts 54,000 students from across Canada and 140 countries around the world.

Vancouver, Canada, is the great place to live, study, and work. It consistently ranks in the top 4 cities in the world. A survey by the Economist Intelligence Unit (EIU) has found that Vancouver is the world\'s best place to live.

For further details and application instructions, see

12:01 [Event][New] ProvSec 2012: The Sixth International Conference on Provable Security

  Submission: 20 April 2012
Notification: 20 June 2012
From September 26 to September 28
Location: Chengdu, China
More Information:

11:50 [Job][New] Two Post-Docs, University of Luxembourg

  The Cryptolux team of Laboratory of Algorithms, Security and Cryptology (LACS) at University of Luxembourg is looking for two postdocs in cryptography and IT security. Applicants with interest and proven track record in the following areas are particularly welcome to apply:
  • Symmetric Cryptography.
  • Algorithmic aspects of cryptography and security.
  • Side-channel attacks and countermeasures.
  • Privacy and Anonymity, Foundations of Hacking.

We offer dynamic, international research environment and competitive salary. Strong chess players, winners of math Olympiads have an advantage.

06:38 [PhD][New] Mehmet Sabir Kiraz: Secure and Fair Two-Party Computation

  Name: Mehmet Sabir Kiraz
Topic: Secure and Fair Two-Party Computation
Category: cryptographic protocols

Description: Consider several parties that do not trust each other, yet they wish to correctly compute\r\nsome common function of their local inputs while keeping these inputs private. This\r\nproblem is known as “Secure Multi-Party Computation”, and was introduced by Andrew\r\nYao in 1982. Secure multi-party computations have some real world examples like electronic\r\nauctions, electronic voting or Fingerprinting. In this thesis we consider the case where there\r\nare only two parties involved. This is known as “Secure Two-Party Computation”.\r\nIf there is a trusted third party called Carol, then the problem is pretty straightforward.\r\nThe participating parties could hand their inputs in Carol who can compute the common\r\nfunction correctly and could return the outputs to the corresponding parties. The goal is\r\nto achieve (almost) the same result when there is no trusted third party.\r\nCryptographic protocols are designed in order to solve these kinds of problems. These\r\nprotocols are analyzed within an appropriate model in which the behavior of parties is\r\nstructured. The basic level is called the Semi-Honest Model where parties are assumed to\r\nfollow the protocol specification, but later can derive additional information based on the\r\nmessages which have been received so far. A more realistic model is the so-called Malicious\r\nModel. The common approach is to First analyze a protocol in the semi-honest model and\r\nthen later extend it into the malicious model.\r\nAny cryptographic protocol for secure two-party computation must satisfy the following\r\nsecurity requirements: correctness, privacy and fairness. It must guarantee the correctness\r\nof the result while preserving the privacy of the parties’ inputs, even if one of the parties is\r\nmalicious and behaves arbitrarily throughout the protocol. It must also guarantee fairness.\r\nThis roughly means that whenever a party aborts the protocol prematurely, he or she should\r\nnot have any advanta[...]

06:37 [PhD][New] Berry Schoenmakers

  Name: Berry Schoenmakers

06:53 [Job][New] Research Scientist, National University of Singapore, Singapore


Temasek Laboratories at National University of Singapore, Singapore is looking for research scientist on Boolean functions especially on algebraic immunity.

Applicants should have a PhD degree in Mathematics/Computer Science or related discipline, have knowledge in Magma and programming proficiency in C/C++.

Review of applications will begin immediately.

For application information, please visit Interested candidates can contact Dr Tan Chik How tsltch (at)

05:50 [Event][New] SETA 2012: The 7th International Conference on Sequences and Their Applications

  Submission: 9 January 2012
Notification: 20 February 2012
From June 4 to June 8
Location: Waterloo, Canada
More Information:

12:28 [Event][New] SCN 2012: 8th Conference on Security and Cryptography for Networks

  Submission: 19 April 2012
Notification: 4 June 2012
From September 5 to September 7
Location: Amalfi, Italy
More Information:

12:15 [Event][Update] Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012

  Submission: 5 January 2012
Notification: 2 April 2012
From July 10 to July 12
Location: Marrakech, Morocco
More Information:

19:45 [Election] 15.2% participation within the first week

  For the ongoing election of 3 directors of the IACR, a total of 225 votes have been cast in the first week. This is equivalent to 15.2% of the 1484 eligible voters. The election is open until November 15,2011. For comparison: In 2010, a total of 30,5% of votes were cast in the whole election (6 weeks).

13:16 [Job][Update] MSc student, University of Warsaw


Description: Faculty of Mathematics, Informatics and Mechanics of the University of Warsaw is looking for an MSc students to work on the project \\\"Cryptographic Protocols Provably-Secure Against Physical Attacks\\\" ( The project is founded by the Foundation for Polish Science \\\"Welcome\\\" programme operated within the Innovative Economy Operational Programme 2007-2013. The ideal candidate should be familiar with the probability theory, computational complexity, algebra, and number theory. The knowledge of cryptography and information theory is a plus, but is not a prerequisite. The student can work both on the theoretical aspects of the project, and on the practical implementations.

Duration: 2 years, starting date: 1.11.2011 (or later)

Formal requirement: while participating in the project the student should be enrolled to the MSc-level studies at some Polish university.

Application deadline: 20.11.11.