International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

15:15 [Job][New] Security Engineer and Consultant for USA, ESCRYPT Inc., Ann Arbor, Michigan, USA


ESCRYPT is an ambitious company in the area of applied and industrial data security. Our clients include all global car makers as well as leading global players in the area of heavy machinery, automation, semiconductors and high-tech companies. ESCRYPT is a German company with offices in the US (Ann Arbor, Michigan) and Germany (Bochum, Munich, Wolfsburg).


Your role will be developing customized software for our client projects in the area of embedded data security, developing and maintaining our products, and/or providing consulting services to our customers. You should have a wide expertise in the area of data security, and a focus on embedded systems is helpful (e.g. smart cards, mobile security, etc.).


We seek top graduates in the fields of electrical engineering, computer science or applied mathematics, ideally with industry experience and special knowledge in one of the following fields:

- Cryptography, security, privacy

- Software development (C/C++ and Java)

- Embedded Systems

International experience and relevant internships will be appreciated. Candidates must be fluent in English for the American office, and fluent in German for the German offices.

We look for all-rounders willing to build the company and improve ESCRYPT every day. You should be able to work independently and you should be willing to take responsibility. In addition to technical work, we expect that you are able to market the company and our products and services, e.g., by meeting potential clients.

We take your career seriously and offer the possibility to grow in a highly qualified, internationally experienced team. Your work environment will be characterized by an open atmosphere, flat hierarchy and performance-related salary.

Did we manage to make you curious? Then send us your application to jobs (at)

14:26 [PhD][New] Filipe Beato: Privacy Preserving Information Sharing in Online communities

  Name: Filipe Beato
Topic: Privacy Preserving Information Sharing in Online communities
Category: cryptographic protocols

10:35 [Job][New] Post-Doc in Information Security, University of Twente

  The Research Group of Distributed and Embedded Security of the University of Twente is seeking a talented candidate with research interests in information security for a PostDoc position.

The candidate is expected to contribute to the information security research agenda of the DIES group and to extend our work with new ideas in the areas of data security, network security, and cybercrime prevention.

The candidate is expected to contribute to the information security research agenda of the DIES group and to extend our work with new ideas in the areas of data security, network security, and cybercrime prevention.

10:35 [Job][New] Post-Doc in Security of Industrial Control Systems, University of Twente

  The candidate is expected to joint and extent the ICS and SCADA-related research agenda of the DIES research group and contribute to our research in areas like host-based intrusion detection in ICS, automated device fingerprinting of ICS/SCADA devices, and security testing tools and methodologies for ICS/SCADA. He is also to contribute to the EU FP7 project CRISALIS, which aims at providing new means to secure critical infrastructure environments from targeted attacks, carried out by resourceful and motivated individuals.

06:28 [Job][New] Post-Doctoral or Research Professor Positions , Seoul National University, Korea

  CHRI Post-Doctoral or Research Professor Positions

Creative Research Initiatives on Cryptographic Hard Problems (Director, Prof. Jung Hee Cheon), the Department of Mathematical Sciences, Seoul National University, is soliciting applications to fill the position of a Post-doc or a Research Professor in cryptology and applied cryptology area.

We are seeking candidates who have finished their Doctorate or Ph. D in Mathematical Sciences or related fields. Our team is working regularly with other research groups in industry and academia. We are actively supporting publication and presentation of research at the top international conferences.

The position is not bound to a specific project, but we expect contributions in mathematical cryptology, pairing-based cryptology, lattice-based cryptology and their applications to cloud computing.

Applications must include:

- Professional CV with full list of publications

- Two or more references (can be submitted after the initial screening)

Duration and Commencement of Fellowship:

- Fellowships are awarded for a period of 12 months or more (CHRI is a 9-year project.)

- Each fellowship usually begins on March 1, 2012, but could start right away if the applicant wants

CHRI provides Fellowship recipients with the following allowances and expenses:

- A annual salary in the range 30,000,000-45,000,000 Korean Won

- Support relocation expenses up to 4,000,000 Korean Won (including economy class airplane ticket)

- Full medical insurance coverage

- Might be available to campus housing for research professor position


Please submit your application form by Jan. 30, 2012 to the e-mail, changee0415 (at)

(Application will be reviewed immediately.)

06:27 [Job][New] Two fully funded PhD student positions in Information Security, University off Twente

  PhD position 1: Private matching and social relationship management for decentralized healthcare services.

PhD position 2: Privacy preserving data mining in electronic health records.

05:21 [Job][New] Tenure-Track position in Information Security , University of Twente, The Netherlands

  The Distributed and Embedded Security Group of the University of Twente is seeking a talented new group leader with research interests in information security for a tenure-track appointment.

Both senior and junior researchers are welcome to apply.

10:20 [PhD][New] Souradyuti Paul: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition

  Name: Souradyuti Paul
Topic: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition
Category: secret-key cryptography

Description: In modern cryptography, stream ciphers are most useful in applications where information needs to be encrypted/decrypted at high speed (e.g. high resolution streaming video data) or when low footprint (gates/memory) encryption is required. In the literature, there exist plenty of stream ciphers whose internal states are based on arrays and that they use modular additions to generate output streams. The abundance of array-based stream ciphers with modular additions can be attributed to the fact that, when implemented in software skillfully, they are able to produce outputs at a very high speed. The main contribution of this thesis is a unified analysis of stream ciphers based on arrays and modular addition. During the process, we detect cryptographic weaknesses in the designs of 9 widely known stream ciphers or pseudorandom bit generators (PRBGs).\r\n
\r\nAt first, we show some theoretical results on solving an important class of equations known as \\emph{differential equations of addition} (DEA) that combine modular additions over two different algebraic groups such as GF(2) and GF($2^{32}$). The results include, \\bite \\item proof of the fact that the satisfiability of an arbitrary set of DEA is in the complexity class \\pP,\\item deriving all the solutions of an arbitrary set of DEA. \\eite Next, we apply these results to attack a practical stream cipher named Helix (designed by Ferguson \\emph{et al.}) with both chosen plaintexts and adaptive chosen plaintexts.\r\n
\r\nIn the second phase, the thesis closely scrutinizes a number of array-based stream ciphers (or PRBGs) in order to estimate their resistance against distinguishing attacks. We eventually discover, counter-intuitively, that the correlations between the array-indices and their associated array-elements, which apparently seem to be useful from the point of view of implementation purposes, can be exploited to mount distinguishing attacks on such type of ciphers if adequate precautions are not tak[...]

19:01 [Event][New] ICDIPC2012: 2nd Inter. Conference on Digital Information Processing and Communications

  Submission: 30 April 2012
Notification: 20 May 2012
From July 10 to July 12
Location: Klaipeda, Lithuania
More Information:

10:24 [Job][New] Ph.D. student scholarships, Center for Advanced Security Research Darmstadt (CASED), Germany

  The Center for Advanced Security Research Darmstadt (CASED) at the Technische Universität Darmstadt has openings for its PhD scholarship program in the areas of IT Security starting immediately.

CASED is an IT Security research center at Technische Universität Darmstadt in cooperation with the Fraunhofer Institute for Secure Information Technology (SIT) and the University of Applied Sciences Darmstadt (h_da). CASED constitutes a research infrastructure for forefront IT Security research.

CASED offers an attractive, international, English speaking environment in one of the most interesting metropolitan areas in Germany surrounded by beautiful countryside. The Frankfurt Airport is just 30 km away. CASED students and scientists come from all over the world. PhD students will become members of the CASED graduate school, which supports them during their entire PhD research, for instance through professional courses for transferable skills such as trainings in delivering scientific presentations or writing scientific papers.

CASED hosts a 3 year doctoral program for outstanding students holding a Master\'s degree (or German Diploma or equivalent) in Computer Science, Mathematics, Physics, Electrical Engineering, Economics, Industrial Engineering, Information Systems, and Law or related disciplines. After successful completion of their degree, doctoral candidates will be awarded their degree from the Technische Universität Darmstadt.

This prestigious program offers scholarships to exceptional students who have the potential to make outstanding contributions to science. The research group of Prof. Stefan Katzenbeisser is particularly looking for candidates with a background in applied cryptography, privacy and cloud computing.

Interested candidates can apply online at

10:24 [Job][New] Full professor in Computer Security, KTH Royal Institute of Technology

  Full Professor in Computer Security at KTH

KTH Royal Institute of Technology seeks a full professor in Computer Science

As part of an effort to expand its range of activities in the computer security area, the Department of Theoretical Computer Science with the School of Computer Science and Communication at KTH, Stockholm, Sweden, is looking to recruit a full professor in computer security.

Subject description 

Computer security concerns methods and techniques for the construction of secure computer systems. Relevant security properties include confidentiality, integrity, and availability at system, component, and data levels. The subject also includes modeling, analysis, and testing of existing computer systems from the point of view of security.

Eligibility requirements

A professor must possess documented scientific and didactic skills in the subject, and must have documented experience from independently managing, executing and developing education and research at an internationally high level.

Assessment criteria 

Extensive competence and skills are required in computer security and within one or more adjoining area(s) such as operating systems, machine architecture, parallel, distributed, and networked systems, formal methods, and programming languages. An important objective is to build up new activity in experimental computer security within undergraduate teaching as well as research. Research competence and/or industrial experience in practical aspects of computer security such as vulnerability testing is therefore given a high priority. Documented experience and ability to finance and lead larger research projects, as well as to develop national and international collaborations is of great importance, as is the ability to contribute to and develop university education at all levels, including supervision