Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
based on a hash function, called COFFE. This research has been
motivated by the challenge to fit secure cryptography into constrained
devices -- some of these devices have to use a hash function, anyway,
and the challenge is to avoid the usage of an additional block cipher
to provide authenticated encryption. COFFE satisfies the common
security requirements regarding authenticated encryption, i.e., IND-CPA-
and INT-CTXT-security. Beyond that, it provides the following
additional security features: resistance against side-channel attacks
and INT-CTXT security in the nonce-misuse scenario. It also support
failure-friendly authentication under reasonable assumptions.
increased the demand for end-to-end secure communications. However, key management remains a major barrier to adoption. Current
systems are often either vulnerable to a malicious or coerced key directory or they make unrealistic assumptions about user behavior,
for example, that users will verify key fingerprints out of band.
We present CONIKS, a system that provides automated key management for end users capable of seamless integration into existing secure messaging applications. In CONIKS, key servers maintain consistent directories of username-to-public key bindings that
allow participants to detect any equivocation or unexpected key
changes by malicious key servers. CONIKS also preserves user\'s
privacy by ensuring that adversaries cannot harvest large numbers
of usernames from the directories. Our prototype chat application
extends the Off-the-Record Messaging plug-in for Pidgin. A single
commodity server can support up to 10 million users and clients
need only download less than 100 kB per day of additional data.
The Department of Theoretical Computer Science (the TCS group) at the School of Computer Science and Communication (CSC) invites applications for a full-time tenure-track assistant professor in Computer Science with specialization in Computer Security, starting in the second half of 2015.
The TCS group has a strong academic record and good external funding from EU and national sources. There is active research in foundational topics such as complexity theory, logic, and formal methods, as well as more applied ones such as computer security, cryptography, programming languages, databases, natural languages, and computer science education. Within computer security, research topics include software security and secure execution platforms, network security and privacy preserving computation, and cryptography, in particular in the foundations of electronic voting.
For more information about KTH, the CSC school, and the TCS group visit www.kth.se, www.csc.kth.se, www.csc.kth.se/tcs.
For full information about the position, requirements, and the application procedure visit
Candidates should have a degree in electronics, computer science or applied mathematics, with strong interest in algorithms and signal processing. Prior experience in side channel analysis and embedded software or hardware design is an asset.
We offer a competitive salary and an international cutting-edge research program in an attractive working environment. WPI is one of the highest-ranked technical colleges in the US. Located in the greater Boston area, it maintains close interaction with many of the nearby universities and companies.
In the framework of a research project in machine learning and computer security and in collaboration with the Machine Learning Group of the Université Libre de Bruxelles and the Machine Learning Group of the Université Catholique de Louvain, the successful applicant will work on the use of machine learning techniques in the design of secure architectures.