International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2012-03-14
13:48 [Conf][EC] Conference Android App is now available

  An Android Conference App is now available. It is basically something to play with, and hopefully will allow you to vote for your favourite Rump Session talk during the Rump Session. It is only a bit of fun, we have tested it on a few phones but it might not work on all devices.

08:53 [PhD][New] Pierrick Gaudry

  Name: Pierrick Gaudry


08:53 [PhD][New] Gaetan Bisson: Endomorphism Rings in Cryptography

  Name: Gaetan Bisson
Topic: Endomorphism Rings in Cryptography
Category: foundations

Description:

\r\nModern communications heavily rely on cryptography to ensure data integrity and privacy. Over the past two decades, very efficient, secure, and featureful cryptographic schemes have been built on top of abelian varieties defined over finite fields. This thesis contributes to several computational aspects of ordinary abelian varieties related to their endomorphism ring structure.\r\n

\r\nThis structure plays a crucial role in the construction of abelian varieties with desirable properties. For instance, pairings have recently enabled many advanced cryptographic primitives; generating abelian varieties endowed with efficient pairings requires selecting suitable endomorphism rings, and we show that more such rings can be used than expected.\r\n

\r\nWe also address the inverse problem, that of computing the endomorphism ring of a prescribed abelian variety, which has several applications of its own. Prior state-of-the-art methods could only solve this problem in exponential time, and we design several algorithms of subexponential complexity for solving it in the ordinary case.\r\n

\r\nFor elliptic curves, our algorithms are very effective and we demonstrate their practicality by solving large problems that were previously intractable. Additionally, we rigorously bound the complexity of our main algorithm assuming solely the extended Riemann hypothesis. As an alternative to one of our subroutines, we also consider a generalization of the subset sum problem in finite groups, and show how it can be solved using little memory.\r\n

\r\nFinally, we generalize our method to higher-dimensional abelian varieties, for which we rely on further heuristic assumptions. Practically speaking, we develop a library enabling the computation of isogenies between abelian varieties; using this important building block in our main algorithm, we apply our generalized method to compute several illustrative and record examples.[...]




2012-03-13
17:20 [Event][New] FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography

  Submission: 10 May 2012
Notification: 18 June 2012
From September 9 to September 9
Location: Leuven, Belgium
More Information: http://www.fdtc-workshop.eu


09:23 [Event][New] Workshop on the Theory and Practice of Multiparty Computation

  From June 4 to June 8
Location: Aarhus, Denmark
More Information: http://cfem.au.dk/events/theory-and-practice-of-multiparty-computation/


07:16 [Job][New] Research Scientists (System Security), A*STAR, Data Storage Institute, Singapore

  Research Scientist positions are available in the Storage Security Research group. We are seeking highly motivated applicants to be involved in research and development of large scale storage security solutions including access control policies, data security and privacy. Research topics include but not necessary limited to file system security, memory encryption, and privacy preserving security controls. Candidates are expected to have thorough understanding of the state-of-the-art research in this field, and with breadth of knowledge of the current issues and recent technology advancements.

Requirements

  • A demonstrated potential to excel in collaborative research spanning multiple research areas
  • Strong understanding of operating systems design and implementation
  • Demonstrated skills of C/C++, and programming under Linux
  • Experience in developing prototypes in a research environment
  • Highly self-motivated and willing to learn new technology
  • PhD in Computer Science or Computer Engineering
Application Instructions

Applications including a cover letter and CV can be sent through email to Mi_Mi_AUNG@dsi.a-star.edu.sg

OR

apply online at

http://sg.dimension.jobsdb.com/career/Default.asp?PID=3&AC=ContactSG&EC=CONSG&GC=G1&JobID=26881&LID=1&SP=1&GID=118&SGB164881533384323

About Us: The Institute maintains a strong research program with significant funding from the major federal research agencies and private industry. The Institute has a diverse full-time Researcher of 200+, with approximately 100 undergraduates and post graduate students.



2012-03-12
15:00 [Event][New] SPACE'12: Int. Conference on Security, Privacy and Applied Cryptography Engineering

  Submission: 8 June 2012
Notification: 3 August 2012
From November 2 to November 3
Location: Chennai, India
More Information: http://space.cse.iitm.ac.in/


13:34 [Job][New] Qua­li­fi­ca­ti­ons Fel­lows (DFG - Research Training Group), Horst Görtz Institute for IT-Security

  The Horst Görtz In­sti­tu­te (HGI) at Ruhr-Uni­ver­si­ty Bo­chum is one of Eu­ro­pe’s lea­ding re­se­arch cen­ters in IT se­cu­ri­ty. The DFG, or Ger­man Re­se­arch Fo­un­da­ti­on, awar­ded more than 4 mil­li­on euro to the HGI for the es­ta­blish­ment of the in­ter­di­sci­pli­na­ry re­se­arch trai­ning group “New Chal­len­ges for Cryp­to­gra­phy in Ubi­qui­tous Com­pu­ting”. We are look­ing for can­di­da­tes with out­stan­ding ba­che­lor`s de­gree in the fields of elec­tri­cal en­gi­nee­ring, com­pu­ter sci­ence, ma­the­ma­tics or re­la­ted areas (begin of doc­to­ral stu­dies post-B.?Sc.).

The re­se­arch trai­ning group will study pro­blems which are fun­da­men­tal for se­cu­ring the In­ter­net of Things. A cen­tral goal of the doc­to­ral trai­ning is an in­ter­di­sci­pli­na­ry and struc­tu­red edu­ca­ti­on at the hig­hest sci­en­ti­fic level. Es­ta­blis­hing net­works to in­ter­na­tio­nal­ly top ran­king re­se­arch groups is part of the trai­ning.

The Ruhr-Uni­ver­si­ty Bo­chum sup­ports women‘s ca­re­er de­ve­lop­ment. Ap­p­li­ca­ti­ons from women are thus ex­pli­cit­ly wel­co­me. In those areas in which women are un­der­re­pre­sen­ted they will be con­s­i­de­red pre­fe­ren­ti­al­ly ac­cor­ding to the re­gu­la­ti­ons of the „Lan­des­gleich­stel­lungs­ge­setz” if their abi­li­ties, ap­ti­tu­de and pro­fes­sio­nal per­for­mance are equal with those of the fel­low ap­p­li­cants un­less re­a­sons con­cerning the per­son of a fel­low ap­p­li­cant are pre­do­mi­nant.

In case of equal qua­li­fi­ca­ti­on, ap­p­li­ca­ti­ons of se­ver­ely disa­b­led per­sons or per­sons that are re­gar­ded as being on a par with se­ver­ely disa­b­led per­sons ac­cor­ding to § 2 Abs. 3 SGB IX will be con­s­i­de­red pre­fe­r

13:10 [Job][New] Ph.D. (DFG-Research Training Group), Horst Görtz Institute for IT-Security

  The Horst Görtz In­sti­tu­te (HGI) at Ruhr Uni­ver­si­ty Bo­chum is one of Eu­ro­pe’s lea­ding re­se­arch cen­ters in IT se­cu­ri­ty. The DFG, or Ger­man Re­se­arch Fo­un­da­ti­on, awar­ded more than €4 mil­li­on to the HGI for the es­ta­blish­ment of the in­ter­di­sci­pli­na­ry re­se­arch trai­ning group “New Chal­len­ges for Cryp­to­gra­phy in Ubi­qui­tous Com­pu­ting”. We are look­ing for can­di­da­tes with out­stan­ding mas­ter’s (or Di­plom) de­gree in the fields of elec­tri­cal en­gi­nee­ring, com­pu­ter sci­ence, ma­the­ma­tics or re­la­ted areas.

The re­se­arch trai­ning group will study pro­blems which are fun­da­men­tal for se­cu­ring the In­ter­net of Things. A cen­tral goal of the doc­to­ral trai­ning is an in­ter­di­sci­pli­na­ry and struc­tu­red edu­ca­ti­on at the hig­hest sci­en­ti­fic level. Es­ta­blis­hing net­works to top in­ter­na­tio­nal­ly re­se­arch groups is part of the trai­ning.

The Ruhr-Uni­ver­si­ty Bo­chum sup­ports women‘s ca­re­er de­ve­lop­ment. Ap­p­li­ca­ti­ons from women are thus ex­pli­cit­ly wel­co­me. In those areas in which women are un­der­re­pre­sen­ted they will be con­s­i­de­red pre­fe­ren­ti­al­ly ac­cor­ding to the re­gu­la­ti­ons of the „Lan­des­gleich­stel­lungs­ge­setz” if their abi­li­ties, ap­ti­tu­de and pro­fes­sio­nal per­for­mance are equal with those of the fel­low ap­p­li­cants un­less re­a­sons con­cerning the per­son of a fel­low ap­p­li­cant are pre­do­mi­nant.

In case of equal qua­li­fi­ca­ti­on, ap­p­li­ca­ti­ons of se­ver­ely disa­b­led per­sons or per­sons that are re­gar­ded as being on a par with se­ver­ely disa­b­led per­sons ac­cor­ding to § 2 Abs. 3 SGB IX will be con­s­i­de­red pre­fe­ren­ti­al­ly.

12:52 [Job][New] Post Doc (DFG - Research Training Group), Horst Görtz Institute for IT-Security

  The Horst Görtz In­sti­tu­te at Ruhr-Uni­ver­si­ty Bo­chum is one of Eu­ro­pe’s lea­ding re­se­arch cen­ters in IT se­cu­ri­ty. The DFG, or Ger­man Re­se­arch Fo­un­da­ti­on, awar­ded more than €4 mil­li­on to the HGI for the es­ta­blish­ment of the in­ter­di­sci­pli­na­ry re­se­arch trai­ning group “New Chal­len­ges for Cryp­to­gra­phy in Ubi­qui­tous Com­pu­ting”. We are look­ing for can­di­da­tes with out­stan­ding mas­ter’s (or Di­plom) de­gree in the fields of elec­tri­cal en­gi­nee­ring, com­pu­ter sci­ence, ma­the­ma­tics or re­la­ted areas.

The re­se­arch trai­ning group will study pro­blems which are fun­da­men­tal for se­cu­ring the In­ter­net of Things. A cen­tral goal of the doc­to­ral trai­ning is an in­ter­di­sci­pli­na­ry and struc­tu­red edu­ca­ti­on at the hig­hest sci­en­ti­fic level. Es­ta­blis­hing net­works to top in­ter­na­tio­nal­ly re­se­arch groups is part of the trai­ning.

The Ruhr-Uni­ver­si­ty Bo­chum sup­ports women‘s ca­re­er de­ve­lop­ment. Ap­p­li­ca­ti­ons from women are thus ex­pli­cit­ly wel­co­me. In those areas in which women are un­der­re­pre­sen­ted they will be con­s­i­de­red pre­fe­ren­ti­al­ly ac­cor­ding to the re­gu­la­ti­ons of the „Lan­des­gleich­stel­lungs­ge­setz” if their abi­li­ties, ap­ti­tu­de and pro­fes­sio­nal per­for­mance are equal with those of the fel­low ap­p­li­cants un­less re­a­sons con­cerning the per­son of a fel­low ap­p­li­cant are pre­do­mi­nant.

In case of equal qua­li­fi­ca­ti­on, ap­p­li­ca­ti­ons of se­ver­ely disa­b­led per­sons or per­sons that are re­gar­ded as being on a par with se­ver­ely disa­b­led per­sons ac­cor­ding to § 2 Abs. 3 SGB IX will be con­s­i­de­red pre­fe­ren­ti­al­ly.



05:57 [Event][New] ACSA-SUMMER 2012: FTRA Int. Symp. on Advances in Cryptography, Security and Applications

  Submission: 20 March 2012
Notification: 10 April 2012
From June 26 to June 28
Location: Vancouver, Canada
More Information: http://www.ftrai.org/acsas2012/