Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
Based in SOMA in SF and led by CEO Derek Collison, Apcera has substantial backing from Ericsson, the global technology, cloud and mobile giant headquartered in Sweden. Join us and help build the world\'s first Hybrid Cloud OS.
As a Security Architect at Apcera, you will oversee the security protocols in use inside and outside the Continuum platform, inform choices for security technologies and policies and review code for secure practices and patterns. You will lead efforts to infiltrate Apcera’s security controls, you will work within the Go community, the open source cryptographic community and with security leaders in the industry to improve and harden the Continuum platform.
Bachelor’s degree in Computer Science or equivalent experience with security technologies
Minimum of 7 years software development experience in a combination of any of the following languages: GO, C, C++, Java, C#, Python or Ruby
Minimum of 5 years’ experience working with Linux operating system development
Minimum 2 years in security engineering, crypto, policy, auth or related technologies
Understanding of the basic underpinnings of cryptographic technologies, authentication, authorization and distributed trust
Understanding about how Kerberos authentication works
Experience with techniques for escalating privilege
Knowledge about how basic cryptographic technologies relate to the design of OpenPGP and X.509 PKIX
In-depth knowledge of security
The Department of Mathematics and Applied Mathematics at the University of Cape Town is a large and dynamic establishment with over thirty faculty members. We seek to make one new appointment in Mathematics or Applied Mathematics at the level of Lecturer. Applications in all areas of Mathematics and Applied Mathematics will be considered.
Requirements include: A PhD in the mathematical sciences. (Scientific publications, postdoc, teaching experience and student supervision are all advantageous.)
Responsibilities include: Teaching and developing undergraduate as well as postgraduate courses in mathematics (within and beyond the science faculty). Developing and pursuing an active research program, which includes student supervision. Course convening, departmental and faculty administrative duties.
The annual remuneration package for 2015, including benefits: R528 275.
To apply, please e-mail the below documents in a single pdf file to Ms Edith Graham at recruitment04 (at) uct.ac.za:
- UCT Application Form (download at http://web.uct.ac.za/depts/sapweb/forms/hr201.doc)
- Full Curriculum Vitae (CV)
- A clearly articulated statement describing their teaching experience and philosophy (applies to both positions), and a research statement (applies to standard academic position)
Please ensure the title and reference number are indicated in the subject line.
An application which does not comply with the above requirements will be regarded as incomplete.
You can also write to Dr Christine Swart at christine.swart (at) uct.ac.za for more information on the department.
Telephone: +27 21 650 5405
Reference number: E15074
Closing date: 05 June 2015
The zeroizing attack is to recover a basis of an ideal generated by a secret element g in Z[X]/(X^n+1) from the zero testing parameter and several encodings in public.
It can solve the DLIN and subgroup decision problems, but not the GDDH problem on the GGH scheme for the suggested dimension n due to the hardness of the smallest basis problem and the shortest vector problem on the ideal lattice. In this paper, we propose an algorithm to find a short vector in the ideal lattice (g) by applying a lattice reduction to a sublattice obtained from the Hermit Normal Form of (g). This attack utilizes that the determinant of the lattice (g) is not large.
We further show that if (g) has a large residual degree, one can find a short element of (g) in polynomial time of n.
In order to resist the proposed attacks, it is required that n= Omega tilde(kappa^2 lambda^3) and the positive generator of (g) intersection with Z is large enough.
Role: to contribute to the research goals of the group, as outlined above. Expertise outside those listed above, but complementary will also be considered.
The MACS team are looking for excellent postdoctoral fellows in the following areas:
Preference will be given to candidates with expertise and interest in multiple areas. Fellows will work closely with multiple PIs on the MACS team and will be affiliated with all four host universities.
Candidates should send their CV, research statement, and list of references to macs-postdoc (at) cs.bu.edu