International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2011-10-29
15:29 [PhD][New] Yves Mathieu

  Name: Yves Mathieu


15:26 [PhD][New] Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique

  Name: Laurent Sauvage
Topic: Cartographie électromagnétique pour la cryptanalyse physique
Category: implementation





2011-10-28
17:41 [Job][New] Ph.D. Student, Signal Processing in Communications Group, University of Vigo, Spain

 

The Signal Processing in Communications Group (GPSC, www.gts.tsc.uvigo.es/gpsc), affiliated with the Department of Signal Theory and Communications at University of Vigo, Spain, invites applications for a Ph.D. position in the field of Signal Processing in the Encrypted Domain.

The selected candidate will join GPSC to investigate fundamentals and algorithm design/evaluation for encrypted processing of data and signals.

The GPSC is a worldwide reference group in the fields of Multimedia Security and Signal Processing. This fact is supported by international publications (more that 70 journal papers and 170 conference communications, receiving more than 1600 cites), awards to the defended Ph. D. theses (3 Best Ph. D. Thesis Awards of the Spanish Official Institute of Telecommunications Engineers), research projects\' income (about 9 million euros), management of intellectual property (10 European and American patents pending), spin-off creation, establishment of research centres (e.g., Galician Research Centre in Advanced TelecommunicationsGradiant, ICT Research Center of the University of VigoAtlantTIC), its multicultural environment, or some of its members being Associate Editors of IEEE Transactions. Hence, the selected candidate will enjoy unique opportunities to participate in exciting research projects with both industry and academia.

Desirable background

  • Strong mathematical background (recommended B.Sc. or M.Sc. on Mathematics, or similar), with special stress on number theory, is strictly required
  • Good verbal and written skills in English are required.
  • Communication, computing and interpersonal skills are important
  • Capacity to work both independently and within a team



17:40 [Job][New] Technical Support Engineer - Encryption, Acumin

  3rd line Technical Support Engineer / Cryptography / Encryption/ PKI / Tier 1 Vendor / IT Security

Do you have experience of supporting any of the cryptography / encryption / PKI products from any known vendors and looking to progress to level 3 support?

This exciting Tier 1 Vendor role requires demonstrable experience in supporting any of the following technologies:

- PKI (Public Key Infrastructure)

- Cryptology / Cryptography

- Relational Databases and SQL Scripting

- LDAP (Active Directory)

In this role, you will get an in-depth knowledge of a leading technology in PKI / encryption space and have an opportunity to work in thriving environment supporting large enterprise customers across all industry sectors.



2011-10-27
20:38 [Conf] Report on InfoSecHiComNet 2011, October 19-22, Haldia, India

  The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking 2011 took place between October 19 to October 22, 2011, in India. The program was organised by Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall, while the local organisation was done by Debasis Giri. The general chairs of the conference were P.K. Saxena and P.D. Srivastava. The proceedings were published as part of the Lecture notes in Computer Science by Springer.
A large amount of submissions were recieved. In total there were, 112 submission. Of these, 14 were accepted to be included in the conference. There were six invited talks, given by Jorn-Marc Schmidt, Ingrid Verbauwhede, Benedikt Gierlich, Saibal Pal, Palash Sarkar, and Sanjay Burman. In addition three tutorials were presented, by Abhijit Das, C. Pandurangan and Michael Tunstall, each of duration of three hours. We expect that this conference will be repeated under the less general theme of "Cryptography and Cryptographic Engineering", which we hope will help encourage cryptography research in India. This conference is expected to complement CHES, since the number of submissions generally received by CHES demonstrates the popularity of research into topics related to cryptographic engineering. The intention is also to hold conferences that will not be in direct conflict with Indocrypt.




2011-10-25
19:31 [PhD][New] Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography

  Name: Nishanth Chandran
Topic: Theoretical Foundations of Position-Based Cryptography
Category: cryptographic protocols

Description: In this thesis, we initiate the study of cryptographic protocols where the identity, or other credentials and inputs, of a party are derived from its \\emph{geographic location}.\r\n\r\nWe start by considering the central task in this setting, i.e., securely verifying the position of a device. Despite much work in\r\nthis area, we show that in the Vanilla (or standard) model, this above task (i.e., of secure positioning) is impossible to achieve,\r\neven if we assume that the adversary is computationally bounded. In light of the above impossibility result, we then turn to\r\nDziembowski\'s Bounded Retrieval Model (a variant of Maurer\'s Bounded Storage Model) and formalize and construct information theoretically secure protocols for two fundamental tasks:\r\n\r\n\\begin{itemize}\r\n\\item[-]\r\nSecure Positioning; and\r\n\\item[-]\r\nPosition-Based Key Exchange.\r\n\\end{itemize}\r\n\r\nWe then show that these tasks are in fact {\\em universal\\/} in this setting -- we show how we can use them to realize Secure Multi-Party Computation.\r\n\r\nThe main contribution of this thesis is threefold: to place the problem of secure positioning on a sound theoretical footing; to\r\nprove a strong impossibility result that simultaneously shows the insecurity of previous attempts at the problem; and to present positive results showing that the bounded-retrieval framework is a fruitful one to study the foundations of position-based\r\ncryptography.\r\n\r\nThis thesis is based on joint works with Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky.[...]




2011-10-24
15:44 [Event][New] WMC2012: Third Workshop on Mathematical Cryptology

  Submission: 28 March 2012
Notification: 18 May 2012
From July 9 to July 11
Location: Castro Urdiales(Cantabria), Spain
More Information: http://wmc2012.unican.es


15:34 [Event][New] SCC2012: Third international conference on Symbolic Computation and Cryptography

  Submission: 28 March 2012
Notification: 18 May 2012
From July 11 to July 13
Location: Castro Urdiales(Cantabria), Spain
More Information: http://scc2012.unican.es


15:09 [Event][New] CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems

  From September 9 to September 12
Location: Leuven, Belgium
More Information: http://www.iacr.org/workshops/ches/ches2012/




2011-10-22
15:52 [Event][New] ACE-2012: Third International Conference on Advances in Computer Engineering - ACE 20

  From June 7 to June 8
Location: Sheffield, UK
More Information: http://ace.theides.org/2012/


15:50 [Job][New] Post-Doc, Ben-Gurion university, Beer-Sheva, Israel

  My group is investigating the use of reactive secure multi-party computation in the cloud, we are also investigating anonymous communication, cryptography for sensor networks, cryptography based on complexity, and more.