Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
Applicants are expected to have a PhD degree in Mathematics/Computer Science/Engineering and experience in analysis/design of symmetric ciphers.
Preferred candidates are expected to be proficient in C/C++ language, a team worker and able to conduct independent research.
Review of applications will start immediately and continue until position is filled.
Interested candidates can contact Dr Tan Chik How tsltch (at) nus.edu.sg.
Closing Date for applications : 10 July 2014
Modern automotive vehicles have several wireless interfaces, are interconnected with various devices and with the internet. This connectivity adds great functionality but it also introduces a number of security and privacy threats.
This PhD studentship will be focused on improving the security of the next generation electronic vehicle architecture. Develop optimized implementations of cryptographic primitives and protocols for time critical automotive applications.
• wireless and network security,
• secure software,
• cyber supply chain security,
• cybersecurity policy,
• multimedia forensics.
Applicants should have a well-established record of research. Duties of these positions include mainly research and teaching at graduate level. The salaries for these positions are internationally competitive and commensurate with candidates’ qualifications and academic ranks. “Information Security and Cryptography” department is a newly opening division at ITU and the prospective candidates for these positions are supposed to assume duties as early as September, 2015.
Istanbul Technical University, located at the heart of Istanbul, is one of the most prominent research universities of Turkey. Admission to ITU is highly competitive and the student body is from top scorers of the nationwide university entrance exam. With its well-qualified departments and institutions, ITU provides an excellent research environment for engineers and scientists. As a state university, ITU provides a free of charge health and dental insurance for its faculty members and their families.
About the application procedure:
To apply please send your application package including a cover letter, CV, research plan, and the names of 3 or 4 references to:
hiring (at) be.itu.edu.tr
CM-values of these functions are algebraic numbers, and when computed to high enough precision, LLL can recognize their minimal polynomials. Motivated by fast cryptography on Kummer surfaces, we investigate a variant of the CM method for computing cryptographically strong Rosenhain models of curves (as well as their associated Kummer surfaces) and use it to generate several example curves at different security levels that are suitable for use in cryptography.
A technical contribution of independent interest is a construction of a poly-logarithmic depth PRF from LPN that is secure if at most a predetermined number $\\ell$ of queries are asked; if more queries are asked, the same PRF is still secure, but now under a stronger assumption closely related to LPN. The basic idea of the construction also applies to other problems with a similar structure, such as subset-sum.
FNR can cipher small domain data formats like IPv4, Port numbers, MAC Addresses, IPv6 address, any random short strings and numbers while preserving their input length.
In addition to the classic Feistel networks, Naor and Reingold propose usage of pair-wise independent permutation (PWIP) functions in first and last rounds of LR constructions to provide additional randomness and security. But their PWIP functions are based on Galois Fields. Representing GF(2n) for different input lengths would be
complicated for implementation. For this reason, the PWIP functions we propose are based on random N X N Invertible matrices.
In this paper we propose the specification of FNR mode of encryption. Its properties, limitations, features etc.
We provide possible example applications of this block cipher for preserving formats of input types like IPv4 addresses, Credit card numbers. We provide reference implementation\'s experimental results and performance numbers in different setups. FNR should be used only when deterministic encryption is needed. It does not provide semantic security.
FNR denotes Flexible Naor and Reingold