International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

21:26 [Job][New] Post-Doc, Aalto University, Department of Information and Computer Science, Espoo, Finland

  New extensions of linear and differential cryptanalysis methods for symmetric key ciphers will be investigated with special attention to distribution based distinguishers. The general goal would be to develop new and more accurate design criteria for symmetric key ciphers and their key scheduling algorithms. The specific research goals will be adjusted according to the interests of the Post-Doc.

The start of the position is negotiable. Also late applications can be taken into consideration.

21:49 [Job][New] Postdoc in Game Theoretic Privacy-Preservation applied to Data Mining, Loughborough University, UK

  Funded by the UK EPSRC and Ministry of Defence (MOD) Defence Science & Technology Laboratory (DSTL), this project focuses on the problem setting where coalition parties, each owning a large set of data, desire to discover new knowledge when they collaborate to jointly process all the datasets; while ensuring that each individual dataset is not revealed to the other parties. This is expected to involve homomorphic encryption and multi-party computation.

Applicants with a PhD in cryptography, privacy preservation, game theory, data mining or optimization are encouraged to apply.

21:48 [PhD][Update] Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques

  Name: Phan Duong Hieu
Topic: Sécurité et efficacité de schémas cryptographiques
Category:public-key cryptography

Description: Provable security is nowadays one of the major lines of research in Cryptography. It aims at providing security proofs of cryptographic schemes in a complexity–theoretical sense: if one can break the scheme, one can solve the underlying problem. Provable security is strongly related to three main trends in the development of Cryptology: formalization of security notions, design of cryptographic systems, and development of new cryptographic features.
In this thesis, we first deal with notions of security in both asymmetric and symmetric encryption. We study more in detail the relation between different attack models in asymmetric encryption. We also establish the relation between the notion of (super) pseudo–random permutation and that of semantic security in symmetric encryption.
Secondly, we propose new efficient constructions for asymmetric encryption in the random oracle model (new paddings for encryption, and universal paddings for both encryption and signature). Furthermore, we introduce a new class of public–key encryption schemes: chosen ciphertext secure schemes without redundancy. Up to now, redundancy used to be required for proofs of security in public–key encryption schemes.
Finally, we consider the traitor tracing problem in broadcast encryption and we introduce a new feature: public traceability. We construct a basic scheme with such feature, and then generalize it to achieve almost optimal transmission rates.[...]

21:25 [Event][Update] CMS'2012: Communications and Multimedia Security

  Submission: 1 April 2012
Notification: 6 May 2012
From September 3 to September 5
Location: Canterbury, UK
More Information:

07:46 [Event][New] ISC '12: Information Security Conference

  Submission: 26 April 2012
Notification: 15 June 2012
From September 19 to September 21
Location: Passau, Germany
More Information:

12:24 [Event][New] MoCrySEn 2012: 1st International Workshop on Modern Cryptography and Security Engineering

  Submission: 31 March 2012
Notification: 1 May 2012
From August 20 to August 24
Location: Prague, Czech Republic
More Information:

11:14 [Job][New] Senior Cryptographer, Advanced Micro Devices (AMD) in Markham, Canada (Toronto Area)

  AMD is a semiconductor design innovator leading the next era of vivid digital experiences with its groundbreaking Fusion Accelerated Processing Units (APUs) which power a wide range of computing devices. AMD’s server computing products are focused on driving industry-leading cloud computing and virtualization environments. AMD’s superior graphics technologies are found in a variety of solutions ranging from game consoles, PCs to supercomputers.

If you have a passion for excellence and a drive to achieve, you belong at AMD. Our employees work hard, have fun, and thrive on success. We meet the challenges of an evolving marketplace by staying true to our corporate values, including an unwavering respect for individuals and a focus on retaining superior employees.

AMD is currently seeking a Senior Cryptographer for a mission-critical technical leadership position.

The Protection Team within the Multimedia Drivers Department provides ownership of the environment used to enable Premium Video Content Playback and Platform Security. The team delivers components to support various standards in Content Protection and System Security.


- University Degree in Computer Science, Engineering, Mathematics, Physics, etc.

- Optional: Post Graduate Degree in Computer Science, Engineering, Mathematics, Physics, etc.


The ideal candidate will fill a leadership role while providing ownership for specific components and projects. Pre-existing familiarity with applied cryptography and security protocols will be essential to ongoing assignments:

- Design and implement security solutions

- Assist in resolution of customer, quality and certification issues

- Actively participate in design reviews and discussions


- Familiarity with system security and cryptographic algorithms (like AES,

11:14 [Job][New] Research Scientists in Cryptography, Temasek Laboraories, National University of Singapore, Singapore

  Temasek Laboratories at National University of Singapore, Singapore is seeking highly motivated professionals interested in conducting research in the area of cryptography.

Applicants are expect to have a PhD degree in Mathematics/Computer Science/Engineering and a strong background and experience in one or two of the following areas : stream ciphers, pseudorandom number generator, public-key cryptography.

Preferred candidates are expected to be proficient in C/C++ language, a team worker and able to conduct independent research.

Review of applications will start immediately and continue until positions are filled.

For application information, please visit Interested candidates can contact Dr Tan Chik How tsltch (at)

18:54 [Event][New] ICICS 2012: The 14th International Conference on Information and Communications Securit

  Submission: 25 May 2012
Notification: 20 July 2012
From October 29 to October 31
Location: Hong Kong, Hong Kong
More Information:

15:44 [Job][New] PhD Position in Public-Key Cryptography, Interdisciplinary Centre for Security, Reliability and Trust (SnT)

  The research group APSIA in SnT is searching for a strong Ph.D. candidate to work on designing new cryptographic tools related to identity-based cryptography, attribute-based cryptography, private matching, and searchable encryption.

The candidate needs to have obtained a masters degree in Computer Science or Applied Mathematics with outstanding grades. Knowledge on provable security and public-key cryptography is an advantage.

The PhD thesis needs to be written in English and will be awarded by the University of Luxembourg.

Please apply via the link provided below.

13:48 [Conf][EC] Conference Android App is now available

  An Android Conference App is now available. It is basically something to play with, and hopefully will allow you to vote for your favourite Rump Session talk during the Rump Session. It is only a bit of fun, we have tested it on a few phones but it might not work on all devices.