International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2015-07-13
18:02 [Event][New] Special issue on Recent Advances in Physical-Layer Security

  Submission: 15 October 2015
Notification: 15 January 2016
From June 1 to October 15
More Information: http://www.journals.elsevier.com/computer-networks/call-for-papers/special-issue-on-recent-advances-in-physical-lay


18:02 [Event][New] Lightweight and Energy-Efficient Security Solutions for Mobile Computing De

  Submission: 14 September 2015
Notification: 14 November 2015
From June 1 to September 14
More Information: http://digital-library.theiet.org/files/IET_IFS_SI_CFP.pdf




2015-07-08
15:16 [Event][New] CrossFyre: Intern. Workshop on Crypto, Robustness, and Provably Secure Schemes

  Submission: 4 September 2016
From November 2 to November 3
Location: Nijmegen, The Netherlands
More Information: http://crossfyre15.cs.ru.nl/index.html


15:13 [Job][New] EU Coordinator and Researcher in Cryptography and Computer Security, Simula Research Laboratory, Norway

  Simula Research Laboratory in Norway seeks a researcher in cryptography or computer security for an initial two-year contract with possibility for further employment. The successful candidate will also be responsible for leading the process of applying for EU-grants under H2020. Previous involvement in EU projects and experience in building and maintaining consortia will count as a big plus.

15:13 [Job][New] Two PostDoc Positions in Software Security, TU Darmstadt

  The chair Modeling and Analysis of Information Systems (MAIS) of Prof. Dr.-Ing. Heiko Mantel in the Department of Computer Science at TU Darmstadt, Germany, is offering two PostDoc positions:

- Concurrent Program Security (detailed position announcement at http://www.mais.informatik.tu-darmstadt.de/assets/misc/2015-PostDoc-IFS-Concurrent.pdf)

- Information-Flow Security by Design (detailed position announcement at http://www.mais.informatik.tu-darmstadt.de/assets/misc/2015-PostDoc-IFS-SecurityEngineering.pdf)

The detailed announcements contain information about the position descriptions, benefits, qualifications, and the application procedure.

The positions are available from September 1st 2015, but a later start is also possible. We will consider applications until the positions are filled.

Questions about the positions can be sent to recruiting (at) mais.informatik.tu-darmstadt.de. For more information about the chair MAIS, please visit http://www.mais.informatik.tu-darmstadt.de.



15:12 [Job][New] Research Scientist / Senior Researcher, NEC Laboratories Europe, Heidelberg, Germany

  This position in the Laboratories’ Security Group involves research in the areas of Cloud Security, Device Security, SDN Security and Software Security. Our work ranges from foundational research and IPR creation to prototype development for transfer to NEC products and services.

Applicants are sought with an in-depth understanding in at least two of the following areas:

  • Security technologies and protocols, including applied cryptography and privacy enhancing technologies
  • Distributed systems and protocols, especially secure management of distributed resources e.g. IoT devices, software, services and data
  • Operating system internals and software development including experience with programming languages, such as Java, Scala or C/C++

We are looking for individuals with excellent research skills and a passion to create new technologies. We expect that the applicant holds a master’s or doctorate degree with several years of professional experience in research and development in the security area, and has an excellent publication track record. The applicant should also have a very good background in Computer Science.

15:12 [Job][New] PhD Position in Side-Channel Analysis and Secure Implementation, Worcester Polytechnic Institute, USA

  I am looking for highly motivated and qualified candidates to fill two PhD positions for research in applied cryptography and side channel analysis. Topics include:

  • Side channel analysis and countermeasures

  • Cache-based Cross-VM attacks; analysis and countermeasures

  • Secure and efficient cryptographic implementations

Candidates should have a degree in electronics, computer science or applied mathematics with strong interest in algorithms and signal processing. Prior experience in side channel analysis and embedded software or hardware design is an asset.

We offer a competitive salary and an international cutting-edge research program in an attractive working environment. WPI is a highly-ranked research university in the Boston area, and offers the opportunity to collaborate with world-class faculty and students in a collegial environment. We maintain close connections with surrounding universities and private companies.



2015-07-06
17:43 [News] IACR Response to Australia's Defence Trade Controls Act

 

Dear IACR members,

The Australian government has recently enacted its Defence Trade Controls Act (DTCA) which places export controls on cryptographic technologies. As it contains no exemption for ordinary research & teaching, the act apparently criminalizes the scholarly activities of our Australian colleagues.

The IACR has drafted a petition in response to this legislation (https://www.iacr.org/petitions/australia-dtca/). If you are an IACR member, we encourage you to add your signature. With enough support, we hope to contribute to an improvement to the situation in Australia.

As this is the first petition hosted by the IACR, we welcome your feedback. Please send comments to petitions@iacr.org.



00:17 [Forum] [2015 Reports] Re: 2015/650 It looks like not secure by movax

  Hello Roman Oliynykov and others, I have double checked my concerns, and I have to confess that you are right, and I was wrong. Indeed, the linear transformation is not per-word, as it seemed to me from the brief look, but per-column. However, how did you create your S-boxes? From: 2015-05-07 21:41:08 (UTC)



2015-07-05
18:17 [Pub][ePrint] Secure Multi-Party Shuffling, by Mahnush Movahedi and Jared Saia and Mahdi Zamani

  In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting.

Known techniques for solving this problem suffer from poor scalability, load-balancing issues, trusted party assumptions, and/or weak security guarantees.

In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced. In particular, we require each party to send only a polylogarithmic number of bits and perform a polylogarithmic number of operations while incurring only a logarithmic round complexity. We show security under universal composability against up to about n/3 fully-malicious parties. We also provide simulation results showing that our protocol improves significantly over previous work. For example, for one million parties, when compared to the state of the art, our protocol reduces the communication and computation costs by at least three orders of magnitude and slightly decreases the number of communication rounds.