International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2012-03-17
12:24 [Event][New] MoCrySEn 2012: 1st International Workshop on Modern Cryptography and Security Engineering

  Submission: 31 March 2012
Notification: 1 May 2012
From August 20 to August 24
Location: Prague, Czech Republic
More Information: http://www.ares-conference.eu/conf/index.php?option=com_content&view=article&id=65&Itemid=120




2012-03-16
11:14 [Job][New] Senior Cryptographer, Advanced Micro Devices (AMD) in Markham, Canada (Toronto Area)

  AMD is a semiconductor design innovator leading the next era of vivid digital experiences with its groundbreaking Fusion Accelerated Processing Units (APUs) which power a wide range of computing devices. AMD’s server computing products are focused on driving industry-leading cloud computing and virtualization environments. AMD’s superior graphics technologies are found in a variety of solutions ranging from game consoles, PCs to supercomputers.

If you have a passion for excellence and a drive to achieve, you belong at AMD. Our employees work hard, have fun, and thrive on success. We meet the challenges of an evolving marketplace by staying true to our corporate values, including an unwavering respect for individuals and a focus on retaining superior employees.

AMD is currently seeking a Senior Cryptographer for a mission-critical technical leadership position.

The Protection Team within the Multimedia Drivers Department provides ownership of the environment used to enable Premium Video Content Playback and Platform Security. The team delivers components to support various standards in Content Protection and System Security.

EDUCATION REQUIRMENTS:

- University Degree in Computer Science, Engineering, Mathematics, Physics, etc.

- Optional: Post Graduate Degree in Computer Science, Engineering, Mathematics, Physics, etc.

KEY RESPONSIBILITIES:

The ideal candidate will fill a leadership role while providing ownership for specific components and projects. Pre-existing familiarity with applied cryptography and security protocols will be essential to ongoing assignments:

- Design and implement security solutions

- Assist in resolution of customer, quality and certification issues

- Actively participate in design reviews and discussions

REQUIRED SKILLS AND EXPEREINCE:

- Familiarity with system security and cryptographic algorithms (like AES,

11:14 [Job][New] Research Scientists in Cryptography, Temasek Laboraories, National University of Singapore, Singapore

  Temasek Laboratories at National University of Singapore, Singapore is seeking highly motivated professionals interested in conducting research in the area of cryptography.

Applicants are expect to have a PhD degree in Mathematics/Computer Science/Engineering and a strong background and experience in one or two of the following areas : stream ciphers, pseudorandom number generator, public-key cryptography.

Preferred candidates are expected to be proficient in C/C++ language, a team worker and able to conduct independent research.

Review of applications will start immediately and continue until positions are filled.

For application information, please visit http://www.temasek-lab.nus.edu.sg/career/career.php. Interested candidates can contact Dr Tan Chik How tsltch (at) nus.edu.sg.





2012-03-15
18:54 [Event][New] ICICS 2012: The 14th International Conference on Information and Communications Securit

  Submission: 25 May 2012
Notification: 20 July 2012
From October 29 to October 31
Location: Hong Kong, Hong Kong
More Information: http://www.cs.hku.hk/icics2012




2012-03-14
15:44 [Job][New] PhD Position in Public-Key Cryptography, Interdisciplinary Centre for Security, Reliability and Trust (SnT)

  The research group APSIA in SnT is searching for a strong Ph.D. candidate to work on designing new cryptographic tools related to identity-based cryptography, attribute-based cryptography, private matching, and searchable encryption.

The candidate needs to have obtained a masters degree in Computer Science or Applied Mathematics with outstanding grades. Knowledge on provable security and public-key cryptography is an advantage.

The PhD thesis needs to be written in English and will be awarded by the University of Luxembourg.

Please apply via the link provided below.



13:48 [Conf][EC] Conference Android App is now available

  An Android Conference App is now available. It is basically something to play with, and hopefully will allow you to vote for your favourite Rump Session talk during the Rump Session. It is only a bit of fun, we have tested it on a few phones but it might not work on all devices.

08:53 [PhD][New] Pierrick Gaudry

  Name: Pierrick Gaudry


08:53 [PhD][New] Gaetan Bisson: Endomorphism Rings in Cryptography

  Name: Gaetan Bisson
Topic: Endomorphism Rings in Cryptography
Category: foundations

Description:

\r\nModern communications heavily rely on cryptography to ensure data integrity and privacy. Over the past two decades, very efficient, secure, and featureful cryptographic schemes have been built on top of abelian varieties defined over finite fields. This thesis contributes to several computational aspects of ordinary abelian varieties related to their endomorphism ring structure.\r\n

\r\nThis structure plays a crucial role in the construction of abelian varieties with desirable properties. For instance, pairings have recently enabled many advanced cryptographic primitives; generating abelian varieties endowed with efficient pairings requires selecting suitable endomorphism rings, and we show that more such rings can be used than expected.\r\n

\r\nWe also address the inverse problem, that of computing the endomorphism ring of a prescribed abelian variety, which has several applications of its own. Prior state-of-the-art methods could only solve this problem in exponential time, and we design several algorithms of subexponential complexity for solving it in the ordinary case.\r\n

\r\nFor elliptic curves, our algorithms are very effective and we demonstrate their practicality by solving large problems that were previously intractable. Additionally, we rigorously bound the complexity of our main algorithm assuming solely the extended Riemann hypothesis. As an alternative to one of our subroutines, we also consider a generalization of the subset sum problem in finite groups, and show how it can be solved using little memory.\r\n

\r\nFinally, we generalize our method to higher-dimensional abelian varieties, for which we rely on further heuristic assumptions. Practically speaking, we develop a library enabling the computation of isogenies between abelian varieties; using this important building block in our main algorithm, we apply our generalized method to compute several illustrative and record examples.[...]




2012-03-13
17:20 [Event][New] FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography

  Submission: 10 May 2012
Notification: 18 June 2012
From September 9 to September 9
Location: Leuven, Belgium
More Information: http://www.fdtc-workshop.eu


09:23 [Event][New] Workshop on the Theory and Practice of Multiparty Computation

  From June 4 to June 8
Location: Aarhus, Denmark
More Information: http://cfem.au.dk/events/theory-and-practice-of-multiparty-computation/


07:16 [Job][New] Research Scientists (System Security), A*STAR, Data Storage Institute, Singapore

  Research Scientist positions are available in the Storage Security Research group. We are seeking highly motivated applicants to be involved in research and development of large scale storage security solutions including access control policies, data security and privacy. Research topics include but not necessary limited to file system security, memory encryption, and privacy preserving security controls. Candidates are expected to have thorough understanding of the state-of-the-art research in this field, and with breadth of knowledge of the current issues and recent technology advancements.

Requirements

  • A demonstrated potential to excel in collaborative research spanning multiple research areas
  • Strong understanding of operating systems design and implementation
  • Demonstrated skills of C/C++, and programming under Linux
  • Experience in developing prototypes in a research environment
  • Highly self-motivated and willing to learn new technology
  • PhD in Computer Science or Computer Engineering
Application Instructions

Applications including a cover letter and CV can be sent through email to Mi_Mi_AUNG@dsi.a-star.edu.sg

OR

apply online at

http://sg.dimension.jobsdb.com/career/Default.asp?PID=3&AC=ContactSG&EC=CONSG&GC=G1&JobID=26881&LID=1&SP=1&GID=118&SGB164881533384323

About Us: The Institute maintains a strong research program with significant funding from the major federal research agencies and private industry. The Institute has a diverse full-time Researcher of 200+, with approximately 100 undergraduates and post graduate students.