IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
22 January 2021
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
Nikolaj I. Schwartzbach
Rémi Géraud-Stewart, David Naccache
GSN's protocol relies upon elementary number-theoretic properties and can be implemented efficiently using very few operations. This contrasts with state-of-the-art zero-knowledge protocols for RSA modulus proper generation assessment.
This paper proposes an alternative process applicable in settings where $\mathcal P$ co-generates a modulus $n=p_1q_1p_2q_2$ with a certification authority $\mathcal V$. If $\mathcal P$ honestly cooperates with $\mathcal V$, then $\mathcal V$ will only learn the sub-products $n_1=p_1q_1$ and $n_2=p_2q_2$.
A heuristic argument conjectures that at least two of the factors of $n$ are beyond $\mathcal P$'s control. This makes $n$ appropriate for cryptographic use provided that \emph{at least one party} (of $\mathcal P$ and $\mathcal V$) is honest. This heuristic argument calls for further cryptanalysis.
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
Kamil Otal
Mahdi Sedaghat, Bart Preneel
Michał Wroński
Servio Paguada, Lejla Batina, Igor Armendariz
Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
In this paper, we propose to use reinforcement learning to tune the convolutional neural network hyperparameters. In our framework, we investigate the Q-Learning paradigm and develop two reward functions that use side-channel metrics. We mount an investigation on three commonly used datasets and two leakage models where the results show that reinforcement learning can find convolutional neural networks exhibiting top performance while having small numbers of trainable parameters. We note that our approach is automated and can be easily adapted to different datasets. Finally, several of our newly developed architectures outperform the current state-of-the-art results.
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede
20 January 2021
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute - Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
As a Vulnerability Researcher you will be in charge of:
Must have:
Nice to have:
Closing date for applications:
Contact:
Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae
More information: https://tii.ae/
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute - Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
As a Lead Hardware Security Researcher you will be in charge of:
Must have:
Closing date for applications:
Contact:
Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae
More information: https://tii.ae/
University of Canterbury, School of Mathematics and Statistics, Christchurch, New Zealand
Closing date for applications:
Contact: Prof. Felipe Voloch
More information: http://www.math.canterbury.ac.nz/~f.voloch/prospective.html
SPRING Lab, EPFL
We have a postdoc opening in the area of privacy engineering to be hosted at the SPRING Lab @EPFL headed by Carmela Troncoso, working on the design, evaluation, and deployment of privacy-preserving systems.
The postdoc will be collaborating on lab projects oriented to creating new privacy-preserving primitives and integrating them into end-to-end systems. The systems we develop at the lab aim to enable users to enjoy technological advances while minimizing the risks of abuse of the data in the system and the system’s impact on society. Our system design projects are typically in collaboration with a stakeholder with high stakes in protecting their users, such as NGOs, governments, or educational institutions. More information about our research: https://www.epfl.ch/labs/spring/
The position is to be filled as soon as possible
We are also looking for motivated PhD students to build privacy-preserving systems. If you are interested in this position please refer to our doctoral school: https://www.epfl.ch/education/phd/edic-computer-and-communication-sciences/
Next application deadline: April 15 2021
Closing date for applications:
Contact: To apply please follow the instructions here: https://recruiting.epfl.ch/Vacancies/1612/Description/2
For any question please contact Carmela Troncoso
More information: https://recruiting.epfl.ch/Vacancies/1612/Description/2
19 January 2021
Queen’s University Belfast
Closing date for applications:
Contact: You must clearly demonstrate how you meet the criteria when you submit your application. For further information please contact Resourcing Team, Queen's University Belfast, BT7 1NN. Telephone (028) 9097 3044 or email resourcing@qub.ac.uk.
More information: https://hrwebapp.qub.ac.uk/tlive_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=867106E9Ng&WVID=6273090Lgx&LANG=USA
University of Lyon, Saint-Etienne, France
Closing date for applications:
Contact: To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two persons who can provide reference letters (e-mail). Contact: Prof. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr
More information: https://laboratoirehubertcurien.univ-st-etienne.fr/en/teams/secure-embedded-systems-hardware-architectures.html.
Huawei International, Singapore
Qualifications:
Closing date for applications:
Contact: Dr. Cheng-Kang Chu (chu.cheng.kang@huawei.com)
More information: https://www.dropbox.com/s/7theyk6o0gl8254/Security-Researcher.pdf?dl=0