International Association for Cryptologic Research

# IACR News Central

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2013-06-18
09:17 [Pub][ePrint]

At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IPmasking for short) was claimed to be secure with respect to two different security models: the $\\lambda$-limited security model (Section 4 of [1]), and the dth-order security model (see definitions p.8 of [1]). In the former model, the security proof makes sense for a sharing dimension $n > 130$ which is acknowledged impractical by the authors. In the latter model, the scheme is claimed secure up to the order $d = n-1$. In this note, we contradict the dth-order security claim by exhibiting a 1st-order flaw in the masking algorithm for any chosen sharing dimension n.

00:17 [Forum]

Hi, I guess it\'s quite simple math: If the same paper does not get resubmitted to Crypto / Eurocrypt / Asiacrypt / TCC, we don\'t have to review it again and again 4 (!) times. If the saved time will be spent on better reviews is clearly a different ball-game... Best, Christopher From: 2013-17-06 22:07:18 (UTC)

2013-06-17
22:33 [Job][Update]

The Laboratory of Algorithmics, Cryptology and Security (LACS) of the University of Luxembourg is looking for a post-doctoral researcher in the area of lightweight cryptography. The successful candidate will contribute to a research project entitled \\\"Applied Cryptography for the Internet of Things (ACRYPT)\\\", which is funded by the Fonds National de la Recherche (FNR). Besides conducting high-quality research, the tasks associated with this position include the co-supervision of a Ph.D. student and the dissemination of research results. The ACRYPT project is led by Prof. Alex Biryukov and expected to start in summer 2013.

Candidates must hold a Ph.D. degree (or be in the final stages of a Ph.D. program) in cryptography or a closely related discipline. Applications from researchers with experience in embedded systems security, network security, privacy/anonymity, or mobile/wireless security will also be considered. Preference will be given to candidates with a strong publication record including papers in top-tier crypto/security conference proceedings or journals. Candidates with an interest to conduct leading-edge research in one of the following areas are particularly encouraged to apply:

Design and analysis of symmetric cryptographic primitives

Side-channel attacks (e.g. DPA) on symmetric cryptographic primitives and countermeasures

The position is available from July 2013 on basis of a fixed-term contract for a duration of three years, which includes a probation period of six months. LACS offers excellent working conditions in an attractive research environment and a highly competitive salary. Interested candidates are invited to submit their application by email to lacs.acrypt(at)gmail.com. The application material should contain a cover letter explaining the candidate\\\'s motivation and research interests, a detailed CV (including photo), a list of publications, copies of diploma certificates, and nam

22:32 [Job][Update]

The Department of Computer Science at Tallinn University of Technology is looking for a full Professor of Cyber Security.

This appointment is part of the strategic growth of the Department of Computer Science, supported by the Estonian IT Academy program. The department is seeking an energetic and dynamic candidate who will contribute to and complement the current research and teaching activities, and promote cooperation with national and international partners in academia, industry, government, and military. The candidate’s main responsibility in the areas of cyber security will be research activities, supervising Ph.D work, leading department’s cyber security research and study program, and teaching courses on postgraduate level.

The successful candidate will serve as a leader of research and teaching in the field of practical cyber security and digital forensics.

The position has currently been announced for the period Feb 2014 - Jan 2019. It can be extended. Ask the contact persons about details.

22:24 [Job][New]

The Department of Computer Science at Tallinn University of Technology is looking for a full Professor of Cyber Security.

This appointment is part of the strategic growth of the Department of Computer Science, supported by the Estonian IT Academy program. The department is seeking an energetic and dynamic candidate who will contribute to and complement the current research and teaching activities, and promote cooperation with national and international partners in academia, industry, government, and military. The candidate’s main responsibility in the areas of cyber security will be research activities, supervising Ph.D work, leading department’s cyber security research and study program, and teaching courses on postgraduate level.

The successful candidate will serve as a leader of research and teaching in the field of practical cyber security and digital forensics.

The position has currently been announced for the period Feb 2014 - Jan 2019. It can be extended. Ask the contact persons about details.

21:19 [Pub][JoC]