Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
in presence of tamper-proof hardware tokens. We present a very efficient
protocol for password-based authenticated key exchange based on the weak model of one-time memory tokens, recently introduced by Goldwasser et al. (Crypto~2008). Our protocol only requires four moves, very basic operations, and the sender to send $\\ell$ tokens in the first step for passwords of length $\\ell$. At the same time we achieve information-theoretic security in Canetti\'s universal composition framework (FOCS~2001) against adaptive adversaries (assuming reliable erasure), even if the tokens are not guaranteed to be transferred in an authenticated way, i.e., even if the adversary can read or substitute transmitted tokens (as opposed to many previous efforts).
The University of Luxembourg has two open Ph.D. positions at its
Interdisciplinary Centre for Security, Reliability and Trust (SnT)
(http://wwwen.uni.lu/snt). We are seeking Ph.D. candidates to
participate in the activities of the SaToSS
(http://satoss.uni.lu/) and of the ApSIA (http://apsia.gforge.uni.lu/)
The main objective of the Ph.D. project is to develop a formal
framework supporting modeling and analysis of socio-technical
components of information systems. We aim to develop strategies and
tools to detect and prevent attacks involving human, physical and
digital elements. One of the goals is to extend current methodology
for security protocol analysis, by taking human behavior and
properties of physical objects into account. This goal includes a
necessity of defining appropriate adversary models and identifying the
security properties relevant in a socio-technical context.
* MSc in Computer Science or Mathematics
* A proven interest in security
* Strong background in formal methods or logics
* Good written and oral English skills
Start date: As soon as possible
vacancy for a full-time assistant professorship (Universitair Docent
UD in Dutch).
Research in the group covers a range of topics including correctess
and security of software, smartcards and RFID, design and analysis of
security protocols, applied crypto, privacy and anonimity, quantum
logic and computing. Members of the group are also active in the
broader societal issues surrounding security & privacy, and regulary
carry out commercial contract research to apply and inspire high
quality academic research.
The group runs a joint Master programme in Computer Security in
collaboration with the universities of Twente and Eindhoven, named the
Kerckhoffs Institute (www.kerckhoffs-institute.org). In Nijmegen the
Institute for Computing and Information Sciences runs Bachelor and
Master courses in Computer Science (Informatica) and Information
For this position we are looking for the best candidate in the broader
field of security, who can be a good addition to the group and has
good synergy with ongoing research in the group, who is a team player,
and who can teach computer security to a broad range of students.
Abstract We take a closer look at several enhancements of the notion of trapdoor permutations. Specifically, we consider the notions of enhanced trapdoor permutation (Goldreich, Foundation of Cryptography: Basic Applications, 2004) and doubly enhanced trapdoor permutation (Goldreich, Computational Complexity: A Conceptual Perspective, 2011) as well as intermediate notions (Rothblum, A Taxonomy of Enhanced Trapdoor Permutations, 2010). These enhancements arose in the study of Oblivious Transfer and NIZK, but they address natural concerns that may arise also in other applications of trapdoor permutations. We clarify why these enhancements are needed in such applications, and show that they actually suffice for these needs.