International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2011-12-09
08:42 [Conf][EC] Eurocrypt Stipends

  We have a limited number of stipends available for Eurocrypt 2012. See http://www.cs.bris.ac.uk/eurocrypt2012/stipends.html for details. If you would like to be considered for one of these stipends please contact the General Chair by Jan 31st 2012.



2011-12-08
06:22 [PhD][New] Florian Mendel: Analysis of Cryptographic Hash Functions

  Name: Florian Mendel
Topic: Analysis of Cryptographic Hash Functions
Category: secret-key cryptography

Description: This thesis is devoted to the analysis of cryptographic hash functions. In the last years significant progress has been made in the cryptanalysis of hash functions. As a consequence most of the hash functions used today have been broken or show weaknesses. The collision attacks on the widely used hash functions MD5 and SHA-1 have attracted a lot of attention in the cryptographic community. In view of these developments, this thesis focuses on the analysis of alternative hash functions such as GOST, RIPEMD-160, Tiger, and Whirlpool.[...]




2011-12-06
20:44 [Conf][FSE] Registration Now Open

  Online registration for FSE 2012 is now available at: https://secure.iacr.org/conferences/fse2012/register/ The late registration deadline is midnight, Sunday, February 19, 2012 (Mountain Standard Time). The main conference website for FSE 2012, which includes hotel reservation information, is here: http://fse2012.inria.fr/



2011-12-04
15:54 [Event][New] PAIRING 2012: 5th International Conference on Pairing-Based Cryptography

  Submission: 30 January 2012
Notification: 2 April 2012
From May 16 to May 18
Location: Cologne, Germany
More Information: http://www.pairing-conference.org/2012


07:01 [PhD][New] Karim Abdellatif: Hardware Architectures for Cryptography

  Name: Karim Abdellatif
Topic: Hardware Architectures for Cryptography
Category: implementation



07:01 [PhD][New] Habib Mehrez

  Name: Habib Mehrez
Category: implementation





2011-12-03
10:26 [Job][New] Software Security Engineer (All Levels), Qualcomm Incorporated

  A Software Security Engineer is responsible for assisting product development teams throughout the company in detecting and mitigating security vulnerabilities in software design and implementation. Specific responsibilities may include identifying and assessing software vulnerabilities using both manual methods and automated tools, mentoring software developers in adopting secure coding techniques and secure coding standards, assisting product development teams in establishing static analysis and security testing processes, promoting security mindset throughout software development from design to implementation to testing, evaluating new technologies/tools to detect, triage, and mitigate software security defects, identifying and addressing weakness in existing software development life cycle with a goal to improve overall software security.

Skills/Experience:

Applicants should possess at least two years of experience (work or academic) in the field of software security, like performing software security audits. Ability to engage with product teams independently with minimal supervision is a must. Applicants should have expertise in two or more of the following areas:

- Code review, analysis and vulnerability assessment (C, C++, ARM assembly,C#,Java)

- Security testing, e.g. fuzzing, instrumentation, monitoring

- Operating system security

- Mobile platform security

- Mitigation techniques

- Incident response

In-depth knowledge in the following specific areas will be considered a plus:

- Mobile operating system internals (Android, Windows Phone, iOS)

- Static analysis

- Firmware analysis and reverse engineering

- ARM architecture

Education:

Graduate degree in a security related field of Computer Science or Mathematics is a plus.

If interested, please apply directly to requisition G1889943

at www.qualcomm.com/careers

10:25 [Event][New] Inscrypt'2012: The 8th China International Conference on Information Security and Cryptolo

  Submission: 20 August 2012
Notification: 20 August 2012
From November 28 to December 1
Location: Beijing, China
More Information: http://www.inscrypt.cn/




2011-12-02
10:01 [Event][New] HOST'12: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

  Submission: 20 January 2012
Notification: 23 March 2012
From June 3 to June 4
Location: San Francisco, CA, USA
More Information: http://www.hostsymposium.org


07:45 [PhD][New] Christiane Peters: Curves, Codes, and Cryptography

  Name: Christiane Peters
Topic: Curves, Codes, and Cryptography
Category: public-key cryptography



05:17 [Event][Update] CSIA - 2012: The Third International Conference on Communications Security & Information

  Submission: 13 December 2011
Notification: 30 January 2012
From May 25 to May 27
Location: Delhi, India
More Information: http://airccse.org/csia2012/csia2012.html