Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
One of the key roles of the the IACR is the review and dissemination of scientific publications. In the past three years, there has been an intensive discussion of publication options, in which several alternatives have been reviewed thoroughly.
At the end of 2012, the IACR has signed a new publication contract with Springer for a 4-year period (2013-2017); IACR continues to publish the proceedings of our flagship conferences and workshops in Springer's Lecture Notes in Computer Science series. This new contract makes substantial progress towards broader access to our publications and reduces the cost of publications. However, the IACR Board believes that the area of scientific publications will undergo further changes in the next years, in particular towards open access. In addition, the expansion of our field (more than 1200 submissions and more than 250 publications per year) has resulted in a steadily increasing reviewing load. Some other scientific communities have updated their publication models with a shift towards journal publications.
The IACR Board understands that any change to our publication model has major implications on our members and on the cryptographic community at large. We also have learned that changing this model would be complex and time consuming: in order to be ready for a new publication model in 2018, a new strategy would need to be in place by mid 2015.
In view of this, the IACR Board has decided to start an open discussion on the future of IACR publications. In order to focus this discussion, Nigel Smart has drafted a radical proposal, that would involve moving towards a journal publication model. This proposal has been outlined at the rump session of Eurocrypt'13 and has been further refined based on comments received. The reason for working with a detailed document is that this seems the best way to make sure that all issues are identified and detailed solutions are proposed and compared.
It should be fully understood that this document is a strawman proposal: it does not reflect the view of the IACR Board; the document has also not been discussed with the steering committees of the workshops. Its only intention is to start an open discussion. In particular, the Board welcomes detailed comments and alternative proposals for the future of IACR publications.
We are looking forward to hearing from the community.
IACR-International Association for Cryptologic Research
- Deep understanding of theory and implementation of Security protocols and applied cryptography
- Demonstrated expertise with computer architecture
- A strong programming background and experience with functional programming languages is preferred
- Experience in developing prototypes in a research environment
- A demonstrated potential to excel in collaborative research
- PhD in computer science or computer engineering
In July of 2012, the Department of Computing Security at RIT was established to address critical security challenges that cut across computing disciplines. The department engages in a wide range of research and teaching activities, including: big data analytics, cryptology and covert communications, digital forensics, mobile devices, networks, privacy, security measurement, security pedagogy, sensors, software, and systems security. Through these activities, the department seeks to advance the discipline and to meet the rapidly growing need for computing security professionals.
The successful candidate will be ready to assume the leadership and administrative responsibilities of the department. A key role will be to lead the department in shaping and expanding its research and scholarship profile. Applicants are required to have a Ph.D. or equivalent in a related field and experience commensurate with that of a full professor. Applicants must have demonstrated research excellence in computing security, a track record of external funding, and a strong commitment to undergraduate and graduate education.
Candidates should visit http://careers.rit.edu and search 575BR for specific information about the position and the application process. Refer to http://www.rit.edu/gccis for information about RIT and the B. Thomas Golisano College of Computing and Information Sciences.
RIT is an equal opportunity employer that promotes and values diversity, pluralism, and inclusion. For more information or inquiries, please visit http://www.rit.edu/diversity/titleix.html.
Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron, Lepoint and Tibouchi (CRYPTO 2013). We show that the construction is secure when the conjunction is drawn from a distribution, under mild assumptions on the distribution. Security follows from multilinear entropic variants of the Diffie-Hellman assumption. We conjecture that our construction is secure for any conjunction, regardless of the distribution from which it is drawn. We offer supporting evidence for this conjecture, proving that our obfuscator is secure for any conjunction against generic adversaries.