Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
In this work, we remedy the situation by giving a rigorous theoretical and practical confirmation that the log-unit lattice is indeed efficiently decodable, in cyclotomics of prime-power index. The proof consists of two main technical contributions: the first is a geometrical analysis, using tools from analytic number theory, of the canonical generators of the group of cyclotomic units. The second shows that for a wide class of typical distributions of the short generator, a standard lattice-decoding algorithm can recover it, given any generator.
Applicants of all ranks specializing in computer science, and particularly in information security systems, and game development and entertainment are encouraged to apply.
Successful candidates must have academic qualifications at doctoral level from an internationally recognized educational and research institution, excellent English communication skills (all instruction at IU is in English), and a proven research track record.
Innopolis University offers a competitive salary and an attractive benefits package including paid vacation, housing allowance (based on the rank and family size), relocation allowance, home leave travel (twice per year), paid health care coverage, educational allowance for dependent children, and Russian language classes allowance.
The start-up package will include funding for two PhD students and additional discretionary funds for research.
For more information about the position and how to apply, please go to http://university.innopolis.ru/en/join-us/information-security
The IACR has selected 6 new members to be recognized as Fellows of the IACR. The 2015 Fellows are (in alphabetical order):
In 2004, the IACR established the IACR Fellows Program to recognize outstanding IACR members for technical and professional contributions that:
More information about the Fellows program, including the list of all Fellows, can be found at http://iacr.org/fellows/.
Contact: Xin.Huang (at) xjtlu.edu.cn
2. Wireless localization
Contact: Dawei.Liu (at) xjtlu.edu.cn
The two PhD fundings start from 2015-09, please send your applications as soon as possible.
The candidate should have a first class or upper second class honours degree, or a master’s degree, in Computer Science, Electrical Engineering, or Security.
The student will be awarded a PhD degree from the University of Liverpool (UK) upon successful completion of the program.
The award covers tuition fees for three years (currently equivalent to RMB 80,000 per annum) and provides a monthly stipend of 3500 RMB as a contribution to living expenses.
How to Apply:
Interested applicants are advised to email the following documents to
Doctoralstudies (at) xjtlu.edu.cn (please put the project title and primary supervisor’s name in the subject line).
• Two reference letters
• Personal statement outlining your interest in the position
• IELTS score of above 6.5 or equivalent is required
• Verified school transcripts in both Chinese and English (for international students, only the English version is required)
• Verified certificates of education qualifications in both Chinese and English (for international students, only the English version is required)
You will work on a new project on Fully Homomorphic Encryption (FHE). The goal is to improve existing FHE schemes, and possibly design and implement new ones.
You should have a PhD in cryptography. Experience with FHE is a plus but not a necessity.
We offer a personal work space at the University, a highly competitive salary, and a dynamic and multicultural environment.
To apply: http://emea3.mrted.ly/n139
Please send your application online until May 15th, 2015. Applications will be considered on receipt therefore applying before the deadline is encouraged
Conduct both fundamental as well as applied research that advances the state-of-the-art and deliver innovation. Candidate should have the ability to conduct (and desirably lead) research projects in the area of System-, Cloud-, or Networking- Security, in collaboration with other Bell Labs researchers (on site and overseas) as well as development engineers.
Research areas of interest include (but are not limited to):
- Network security;
- Security of Cloud and large-scale distributed systems;
- Security aspects of Programmable software-defined networks, Network controllers;
- Security of Systems at large.
Education: PhD in Computer Science or Electric Engineering related to security
Skills and Experience:
Proven research ability in the area of Networking-, System- or Cloud- Security. Experience with software development, system architecture, test-beds, simulations, or deployment and integration is strongly desired.