International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2011-11-08
06:07 [Event][New] CSIA - 2012: The Third International Conference on Communications Security & Information

  Submission: 30 November 2011
Notification: 30 January 2012
From May 25 to May 27
Location: Delhi, India
More Information: http://airccse.org/csia2012/csia2012.html




2011-11-07
16:34 [Event][New] CSP EU Forum: Cybersecurity and Privacy EU Forum 2012

  Submission: 9 December 2011
Notification: 19 December 2011
From April 24 to April 25
Location: Berlin, Germany
More Information: http://www.cspforum.eu/


10:56 [Conf] Report on SAC 2011, Ontario, Canada (ICW)

  The 18th International Conference on Selected Areas in Cryptography, August 11-12, 2011, Ryerson University Toronto, Ontario, Canada

SAC 2011 was held August 11-12, 2011 in the Department of Computer Science, Ryerson University, Toronto, Canada. There were 72 participants from 18 countries. Moreover, the conference had received 92 submissions out of which 23 were accepted. The reception took place the night before the conference started and the banquet dinner, which was held on the first night of the conference, was located in The Trillium Ballroom of the Atlantis Pavilions, a spectacular site on the waterfront of Lake Ontario.

A digital version of the pre-proceedings was provided to the attendees and was also available online on the website of the conference. Revised versions of the accepted papers, along with two invited papers, are going to appear in the proceedings of the conference published by Springer. Kristin Lauter from Microsoft Research and Alfred Menezes from University of Waterloo delivered two invited talks on the topics of `Cryptographic Techniques for Securing the Cloud' and `Another Look at Tightness', respectively.

The co-chairs were Ali Miri and Serge Vaudenay, and the publicity and publication chair was Atefeh Mashatan who wish to gratefully acknowledge the sponsors of SAC 2011, including the Faculty of Engineering, Architecture, and Science and the Department of Computer Science Ryerson University, Fields Institute, and Certicom, for their enthusiastic and generous support.





2011-11-04
12:47 [Job][New] Mathematicians , GCHQ, UK

  Salary: £25,446 - £39,482 (depending on experience) + benefits

Based in Cheltenham, Gloucestershire

Discover new solutions. Follow in the footsteps of one of our nation\'s greatest mathematicians.

One of Time Magazine\'s 100 Most Important People of the 20th Century, Alan Turing was a brilliant thinker most famous for his codebreaking in the Second World War. As we approach the centenary of his birth, it could be time for you to play a vital role in maintaining national security too.

Encryption is used in so many of the essential things we use in everyday life, that the threat is everywhere. So, as a GCHQ mathematician, you\'ll explore the increasingly complex problems of crypt to help keep our communications secure.

There aren\'t many places where your love of mathematics and problem solving will see you influencing Government, armed forces and law enforcement agency decisions. GCHQ is also one of the few places outside academia where you can practise advanced mathematical research across such a wide range of disciplines. Every day will bring a new challenge to stretch your intellectual ability. Your research will be supported by some of Europe\'s largest computers. And you\'ll share your knowledge with some of the nation’s top mathematical minds.

To apply, you should have, or expect to obtain by summer 2012, a 1st or 2nd class honours degree in mathematics, statistics, physics or other subject with significant mathematical content. Additional credit will be given for a Master\'s degree in a mathematical subject.



2011-11-03
18:29 [PhD][New] Mark Manulis: Provably Secure Group Key Exchange

  Name: Mark Manulis
Topic: Provably Secure Group Key Exchange
Category: cryptographic protocols

Description: The rapid and promising development of applications and communication systems designed for groups of participants like groupware, computer supported collaborative work systems, or digital conference systems implies exigence of mechanisms providing adequate security properties. These mechanisms can be designed based on the foundations of cryptography.

\r\n\r\nGroup key exchange protocols are multi-party cryptographic protocols those participants compute a shared secret key that can then be used in conjunction with other cryptographic constructions like encryption schemes and message authentication codes for the purpose of privacy, confidentiality and authentication.

\r\n\r\nSecurity confidence of modern cryptographic constructions can be increased via adequate security proofs. The paradigm of provable security gains in importance for all kinds of cryptographic constructions, including group key exchange protocols those security issues represent the scope of this dissertation.

\r\n\r\nWe give an analytical overview of the state-of-the-art research in this area and identify strengths and weaknesses of many previous approaches. We suggest a new approach in form of a security model those stronger definitions provide background for more confident security analyzes and proofs. Additionally, we present a number of generic solutions (compilers) that can be applied to independently designed group key exchange protocols in order to enhance security thereof with respect to various goals considered by our security model. Finally, we present a concrete group key exchange protocol that provably satisfies the apparently strongest currently available formally specified security requirements.[...]


14:30 [Event][New] PST 2012: 10th Annual Conference on Privacy, Security and Trust

  Submission: 18 March 2012
Notification: 7 May 2012
From July 16 to July 18
Location: Paris, France
More Information: http://www.unb.ca/pstnet/pst2012/


14:29 [Event][New] DBSEC 2012: 26th Annual WG 11.3 Conference on Data and Applications Security and Privac

  Submission: 13 February 2012
Notification: 8 April 2012
From July 11 to July 13
Location: Paris, France
More Information: http://conferences.telecom-bretagne.eu/dbsec2012/




2011-11-01
18:15 [Job][New] Mathematicians (graduate entry level), GCHQ, UK

  Salary: £25,446 + benefits

Based in Cheltenham, Gloucestershire

Discover new solutions. Follow in the footsteps of one of our nation’s greatest mathematicians.

One of Time Magazine’s 100 Most Important People of the 20th Century, Alan Turing was a brilliant thinker most famous for his codebreaking in the Second World War. As we approach the centenary of his birth, it could be time for you to play a vital role in maintaining national security too.

Encryption is used in so many of the essential things we use in everyday life, that the threat is everywhere. So, as a GCHQ mathematician, you’ll explore the increasingly complex problems of crypt to help keep our communications secure.

There aren’t many places where your love of mathematics and problem solving will see you influencing Government, armed forces and law enforcement agency decisions. GCHQ is also one of the few places outside academia where you can practise advanced mathematical research across such a wide range of disciplines. Every day will bring a new challenge to stretch your intellectual ability. Your research will be supported by some of Europe’s largest computers. And you’ll share your knowledge with some of the nation’s top mathematical minds.

To apply, you should have, or expect to obtain by summer 2012, a 1st or 2nd class honours degree in mathematics, statistics, physics or other subject with significant mathematical content. Additional credit will be given for a Master’s degree in a mathematical subject.



16:34 [Event][New] SHA3@ISI: Hash Workshop on SHA3 Finalists

  From December 9 to December 10
Location: Kolkata, India
More Information: http://www.isical.ac.in/~coec/workshop/hash2011.html




2011-10-29
15:29 [PhD][New] Yves Mathieu

  Name: Yves Mathieu


15:26 [PhD][New] Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique

  Name: Laurent Sauvage
Topic: Cartographie électromagnétique pour la cryptanalyse physique
Category: implementation