International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2012-01-13
17:43 [Job][New] Postdoc Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany

  The Information Security and Cryptography (IS&C) group in the Computer Science Department of Saarland University is currently offering several Postdoc positions. The IS&C group is part of the newly established Center for IT-Security, Privacy and Accountability (CISPA). CISPA actively supports collaborations with other research centers worldwide, and offers young researchers an ideal working environment in every respect.

The IS&C group conducts research in various aspects of IT-security, privacy, and cryptography. Topics of particular interest include, but are not limited to:

  • design and formal verification of security protocols, programs, and architectures,
  • cryptography,
  • network and operating systems security,
  • web security,
  • privacy enhancing technologies in a broad sense, privacy in data acquisition, processing, and publishing,
  • reliability, accountability and trust,
  • security and privacy in decentralized systems,
  • as well cross-cutting disciplines such as usability and social aspects in this research field.
  • Positions are being offered for two years, with the possibility of renewal for another year. Postdoc applicants are required to hold a doctoral degree in computer science or a closely related area, or have it completed at the time of taking up the position. We expect successful applicants to have a strong background in one or more of the aforementioned research topics, and to maintain an outstanding academic track record. The working and teaching language is English.

    Please send your application to Michael Backes via e-mail. Applications should contain a CV, copies of transcripts, certificates as well as a research statement and two references. Applications will be accepted until the positions have been filled.

    17:43 [Job][New] PhD Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany

      The Information Security and Cryptography (IS&C) group in the Computer Science Department of Saarland University is currently offering several PhD positions. The IS&C group is part of the newly established Center for IT-Security, Privacy and Accountability (CISPA). CISPA actively supports collaborations with other research centers worldwide, and offers young researchers an ideal working environment in every respect.

    The IS&C group conducts research in various aspects of IT-security, privacy, and cryptography. Topics of particular interest include, but are not limited to:

  • design and formal verification of security protocols, programs, and architectures,
  • cryptography,
  • network and operating systems security,
  • web security,
  • privacy enhancing technologies in a broad sense, privacy in data acquisition, processing, and publishing,
  • reliability, accountability and trust,
  • security and privacy in decentralized systems,
  • as well cross-cutting disciplines such as usability and social aspects in this research field.
  • Applicants are required to have completed (or be close to completing) a Bachelor, Master, or Diplom with outstanding grades in Computer Science or a closely related area. Basic knowledge in IT-security is required. Additional knowledge in related disciplines such as verification, program analysis, complexity theory, distributed and embedded system, and software engineering is welcome. We stress that PhD applications immediately after the Bachelor degree are possible and welcome, as part of the Saarbruecken Graduate CS School. The working and teaching language is English.

    Please send your application to Michael Backes via e-mail. Applications should contain a CV as well as copies of transcripts and certificates. Applications will be accepted until the positions have been filled.

    09:23 [Event][New] SecIoT 2012: 2012 Workshop on the Security of the Internet of Things

      Submission: 25 April 2012
    From July 30 to July 30
    Location: Munich, Germany
    More Information: http://www.nics.uma.es/seciot12/


    08:26 [Event][New] MNCApps: International Conference on Advances in Mobile Network, Communication

      Submission: 5 February 2012
    From August 1 to August 2
    Location: Bangalore, India
    More Information: http://www.mncapps.com/2012/




    2012-01-12
    09:55 [Job][New] Doctoral Researcher in Cybersecurity (Resilient Critical Infrastructures), Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt

      CASED, the Center for Advanced Security Research Darmstadt, offers several position as

    Doctoral Researcher in Cybersecurity (Resilient Critical Infrastructures)

    at a CASED lab under the authority of Technische Universität Darmstadt with funding from AGT Germany. The group reports to Prof. Mühlhäuser. Relevant research topics in Cybersecurity range from adversary detection to network resilience, including mitigation and healing. As to application domains, an emphasis is put on critical infrastructures with Internet backbone, such as Smart Cities, SmartGrids, Smart Transport, and large-scale in-dustrial sites.

    Experience in IT security, preferably with a focus on Cybersecurity, as well as profound knowledge in computer science are mandatory. Interested candidates should have excellent command of English and preferably some command of German.

    09:55 [Job][New] Post-Doc in Privacy & Trust (group leader, coordinator) , Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt

      The position is funded by Technische Universität Darmstadt and reports to Prof. Mühlhäuser. You will lead a group of PhD researchers working in the area of Privacy and Trust, co-manage the respective projects and help assuring continued funding. Leveraging the pool of talented young researchers in the group, you will further your scientific career in Privacy and Trust research. Initially, you will put an emphasis on coordinating a joint application for a doctoral ‘Research Training Group’ (funds for a pool of PhD positions plus qualification frame-work) in Privacy and Trust, authored by more than half a dozen CASED professors. Following the successful application, you will assume a leading role there. As a lower profile activity, you will coordinate activities in the CASED research area Secure Services where privacy&trust is one of several research fields.

    Experience in IT security, preferably with a focus in privacy or trust, as well as profound knowledge in computer science are mandatory. Experience in writing applications for funds and in supervising students is most helpful.

    Interested candidates should have excellent command of English and at least basic command of German. Initial term is two years.



    06:37 [Event][New] WCEBW2012: The World Congress on E-commerce and Business on the Web

      Submission: 10 June 2012
    Notification: 10 July 2012
    From August 27 to August 29
    Location: London, United Kingdom
    More Information: http://www.sdiwc.net/mt1


    06:33 [Job][New] Assistant/Associate Professor in Cryptography, Technical University of Denmark

      The Technical University of Denmark (DTU) solicits applications for the above position created to support the further development of the Department of Mathematics (MAT).

    One of the areas of special strategic emphasis for MAT is symmetric-key cryptography.





    2012-01-11
    17:23 [Event][Update] SAC 2012: The Conference on Selected Areas in Cryptography

      Submission: 10 May 2012
    Notification: 10 July 2012
    From August 16 to August 17
    Location: Windsor, Canada
    More Information: http://uwindsor.ca/sac2012


    17:23 [Event][New] SAC 2012: The Conference on Selected Areas in Cryptography

      Submission: 10 May 2012
    Notification: 10 July 2012
    From August 16 to August 17
    Location: Windsor, Canada
    More Information: http://uwindsor.ca/sac2012


    08:57 [PhD][Update] Peter Schwabe: High-Speed Cryptography and Cryptanalysis

      Name: Peter Schwabe
    Topic: High-Speed Cryptography and Cryptanalysis
    Category:implementation

    Description:

    Modern digital communication relies heavily on cryptographic protection to ensure data integrity and privacy. In order to deploy state-of-the art cryptographic primitives and protocols in real-world scenarios, one needs to highly optimize software for both speed and security. This requires careful choices of high-level cryptographic parameters, low-level optimization of software on the assembly level for a given microarchitecture and considerations of the subtle interactions between high-level and low-level optimizations. This thesis considers three examples of cryptographic primitives and describes software implementations of these primitives that set new speed records.

    The Advanced Encryption Standard (AES) is one of the most widely used symmetric cryptographic primitives. The traditional implementation approach for AES is based on table lookups. While software based on this approach still achieves best performance for a variety of 32-bit and 64-bit architectures, it is usually vulnerable to cache-timing attacks. Another implementation approach for AES is the bitslic- ing technique. Not only is software based on this approach inherently protected against cache-timing attacks, on some microarchitectures it even achieves better performance.

    Elliptic-curve cryptography is the current state of the art of asymmetric cryptography. For elliptic-curve Diffie-Hellman key exchange, Bernstein proposed the Curve25519 function. Several speed-record-setting implementations of this function have been developed for a variety of architectures. Optimizing Curve25519 software for the Synergistic Processor Units of the Cell Broadband Engine is a particularly interesting challenge because the small integer multipliers of this architecture do not seem to make it the best-suited platform for public-key cryptography.

    Another use of elliptic curves in cryptography is in the construction of cryptographic pairings. In order to make pairings fas[...]