International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

16:19 [Job][New] Post-Doc Position in Information Security (Quantum Key Distribution), ID Quantique, Geneva, Switzerland

  ID Quantique, based in Geneva Switzerland, is an innovative and fast-growing company active in the field of high-speed network encryption and quantum key distribution. Within the framework of an FP7 research project, ID Quantique is opening a Postdoc Position in Information Security.

Quantum Key Distribution is a technology that exploits the laws of quantum physics to guarantee the security of communications across optical networks. ID Quantique played a prominent role in the development of this technology and was the first vendor to bring a product to market. It is now carrying out an EU funded research project to conduct a rigorous and in-depth analysis of the security of Quantum Key Distribution technology in view of achieving standardized information assurance.

ID Quantique is seeking to hire a Postdoc who will carry out research on methods for the design and analysis of security of quantum key distribution systems.

16:19 [Job][New] Post-Doc, Tel Aviv Universaity, Israel

  The Cryptography Group at Tel Aviv University, Israel, is looking for a postdoctoral researcher in the foundations of cryptography. This will be a 1-year position, with the possibility of extending it to a second year.

Candidates must hold a PhD in computer science, electrical engineering or related areas, and must have a demonstrated record of top-quality research in theoretical cryptography or related areas.

If you are interested, please send an email with a copy of your CV, a short research statement, and the name of at least two candidates for reference letters. Review of applications will begin immediately and will continue until the position is filled, the starting date is flexible.

17:59 [Conf][EC] 194 submissions at Eurocrypt

  Eurocrypt 2012 had a total of 194 submissions. Notification is is scheduled for 7 December 2011. Eurocrypt will be held in Cambridge, UK.

20:31 [Event][New] DICTAP 2012: 2nd Digital Information & Communication Technology & its Applicatiions Conf

  Submission: 10 February 2012
Notification: 1 March 2012
From May 16 to May 18
Location: Bangkok, Thailand
More Information:

15:53 [Event][New] Third SHA-3 Candidate Conference

  Submission: 4 November 2011
Notification: 20 January 2012
From March 22 to March 23
Location: Washington, DC, USA
More Information:

17:46 [Election]


04:51 [Job][New] 3 Security Experts in Network/SW and HW/Smartcards, LGAI Applus+, Barcelona, Spain

  LGAI Applus+ is a SW/HW security lab located in Barcelona, Spain. Our business is security consultancy and evaluation/certification processes like Common Criteria, EMVCo, etc.

The three open positions are:

  • 1 SENIOR HW-smartcards security expert in side channel attacks (DPA-like) and eventually also in perturbation attacks (DFA/laser like).
  • 1 JUNIOR & 1 SENIOR security analyst for SW-Devices as routers, firewalls, etc.

04:50 [Job][New] PhD Studentship, University of Cambridge


Applications are invited for one PhD studentship in the Security Group at the Computer Laboratory to work with Dr Steven Murdoch. Funding for this position is provided by Microsoft Research Cambridge and Research Councils UK through the Dorothy Hodgkin Postgraduate Awards scheme. As such, applicants must be nationals from India, China, Hong Kong, South Africa, Brazil, Russia or countries in the developing world as defined by the Development Assistance Committee of the OECD:

The successful candidate will undertake research in the field of anonymous communications and privacy enhancing technologies. This broad research area provides considerable scope for the PhD candidate to find his or her own research direction.

04:50 [Job][New] PhD Studentship in Mobile Payments, University of Cambridge

  We have been offered funding for a PhD student to work at the University of Cambridge Computer Laboratory on the security of mobile payments, starting in April 2012.

The objective is to explore how we can make mobile payment systems dependable despite the presence of malware. Research topics include the design of next-generation secure element hardware, trustworthy user interfaces, and mechanisms to detect and recover from compromise. Relevant skills include Android, payment protocols, human-computer interaction, hardware and software security, and cryptography.

05:58 [PhD][Update] Mark D. Ryan: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning

  Name: Mark D. Ryan
Topic: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning
Category:(no category)

05:57 [PhD][New] Ben Smyth: Formal verification of cryptographic protocols with automated reasoning

  Name: Ben Smyth
Topic: Formal verification of cryptographic protocols with automated reasoning
Category: cryptographic protocols


Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of numerous critical components has been neglected. As a consequence, attacks have resulted in financial loss, violations of personal privacy, and threats to democracy. This thesis aids the secure design of cryptographic protocols and facilitates the evaluation of existing schemes.


Developing a secure cryptographic protocol is game-like in nature, and a good designer will consider attacks against key components. Unlike games, however, an adversary is not governed by the rules and may deviate from expected behaviours. Secure cryptographic protocols are therefore notoriously difficult to define. Accordingly, cryptographic protocols must be scrutinised by experts using procedures that can evaluate security properties.


This thesis advances verification techniques for cryptographic protocols using formal methods with an emphasis on automation. The key contributions are threefold. Firstly, a definition of election verifiability for electronic voting protocols is presented; secondly, a definition of user-controlled anonymity for Direct Anonymous Attestation is delivered; and, finally, a procedure to automatically evaluate observational equivalence is introduced.


This work enables security properties of cryptographic protocols to be studied. In particular, we evaluate security in electronic voting protocols and Direct Anonymous Attestation schemes; discovering, and fixing, a vulnerability in the RSA-based Direct Anonymous Attestation protocol. Ultimately, this thesis will help avoid the current situation whereby numerous cryptographic protocols are deployed and found to be insecure.