Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The FutureID project builds a comprehensive, flexible privacy-aware and ubiquitously usable identity management infrastructure for Europe, which integrates existing eID technology and trust infrastructures, emerging federated identity management services and modern credential technologies to provide a user-centric system for the trustworthy and accountable management of identity claims.
Our research covers security aspects on different system abstraction layers and tackles the design and development of security architectures, trustworthy infrastructure, cryptographic protocols and security of mobile platforms (particularly smartphones).
The candidates should hold a Master Degree in Computer Science or Electrical Engineering and bring well-founded knowledge and experience in one or more of the following areas:
- Operating system security, in particular for mobile systems (e.g. Android)
- Trusted computing beyond TCG
- Software and embedded systems security
- Cryptographic protocols
You application should include your current curriculum vitae, MSc certificates and grades, a letter of motivation stating your interest in the position and your research interests and at least two letters of recommendation. Please direct your application to our team assistant Mrs. Heike Bartenschlager: office (at) icri-sc.tu- darmstad
The security Lab at SICS was established in 2009. Since then it has grown from 1 to 8 people. The research is directed toward secure systems design in close co-operation with above leading Swedish companies in the IT and telecommunications businesses as well as Swedish universities such as Royal Institute of Technology in Stockholm. The group has developed an own hypervisor providing secure execution in ARM based embedded systems that currently undergo formal verification. Furthermore, the group is performing lots of research on usage of Trusted Computing technologies to secure future cloud infrastructures. The secure systems group at SICS consists for the moment of 4 senior researchers (PhD), 2 PhD students and addition 2 junior researchers with MSc degrees in computer science.
modern CMOS technologies has led to the creation of a novel
class of security attacks on cryptographic systems. The latter
exploits the correlation between leakage current and the input
patterns to infer the secret key; it is called leakage power analysis
(LPA). The use power-balanced (m-of-n) logic is a promising
solution that provides an answer to this problem, such circuits
are designed to consume constant amount of power regardless of
data being processed. This work evaluates the security of
cryptographic circuits designed with this technology against the
newly developed LPA. Two forms of LPA are investigated, one is
based on differential power analysis (LDPA) and the other based
on Hamming weight analysis (LHPA). Simulations performed at
90nm CMOS technology reveal that (m-of-n) circuits are totally
resilient to LHPA and have a higher security level against LDPA
than standard logic circuits.
infrastructure of TLS, and on various other attacks. We try to give a short \"Lessons Learned\" at the end of each paragraph.
In this paper, we investigate this open problem and propose an efficient verifiable SQL query scheme for outsourced dynamic databases. Different from the previous state-of-the-art schemes, we reduce the complexity of storage overhead from O(mn) to O(n) and move most computation tasks from client side to cloud server side. Compared with the recently proposed scheme that also achieves O(n) storage overhead, we not only cut the communication complexity for verification from O(n) to O(log^n), but also release the client from O(n) exponentiation operations to O(1). In addition, our proposed scheme improves the previous ones by allowing more aggregate queries including variance query, weighted exponentiation sum query of any degrees, etc. Thorough analysis shows the efficiency and scalability of our proposed scheme. The security of our scheme is proved based on Strong Diffie-Hellman Assumption, Bilinear Strong Diffie-Hellman Assumption and Computational Diffie-Hellman Assumption.