Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The polynomial evaluation argument can be used as a building block to construct zero-knowledge membership and non-membership arguments with communication that is logarithmic in the size of the blacklist. Non-membership proofs can be used to design anonymous blacklisting schemes allowing online services to block misbehaving users without learning the identity of the user. They also allow the blocking of single users of anonymization networks without blocking the whole
by Guo et al. in CRYPTO 2011 for low-resource ubiquitous computing
devices such as RFID tags, wireless sensor nodes and smart cards. In
this paper, we analyze Side-Channel Attack (SCA) resistance of FPGA
(Field-Programmable Gate Array) implementations of the PHOTON, when
it is used with a secret key to generate a Message Authentication Code (MAC). First, we describe three architectures of the MAC-PHOTON based on the concepts of iterative, folding and unrolling, and we provide their performance results on the Xilinx Virtex-5 FPGAs. Second, we analysed security of the MAC-PHOTON against side-channel attack using a SASEBOGII development board.
In this work we show that this general technique - regardless of the underlying dual-rail logic - is incapable to properly prevent side-channel leakages. Besides theoretical investigations on this issue we present practical evaluations on a Spartan-6 FPGA to demonstrate the flaws in such an approach. In detail, we consider an AES-128 encryption module realized by three dual-rail precharge logic styles as a case study and show that none of those schemes can provide the desired level of protection.
Salaries are globally competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Review process starts immediately and will continue until all positions are filled.
The PhD position is funded by the the DFG Research Training Group UbiCrypt, which is part of the Horst-Goertz-Institute. The Horst-Görtz-Institut is a leading university-based institution for interdisciplinary research in the field of IT security and cryptography and offers an attractive research environment.
Applicants are required to have completed (or be close to completing) a Bachelor, Master, or Diplom with outstanding grades in Computer Science, Mathematics, or closely related areas. Additional knowledge in related disciplines such as, e.g., complexity theory or IT security is welcome. The working and teaching language is English.
Please send your application to Sebastian Faust via e-mail. Applications should contain a CV, a short letter of motivation, copies of transcripts and certificates, and (if possible) names of references. Review of applications will start immediately until the position has been filled.