International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

17:40 [Job][New] Technical Support Engineer - Encryption, Acumin

  3rd line Technical Support Engineer / Cryptography / Encryption/ PKI / Tier 1 Vendor / IT Security

Do you have experience of supporting any of the cryptography / encryption / PKI products from any known vendors and looking to progress to level 3 support?

This exciting Tier 1 Vendor role requires demonstrable experience in supporting any of the following technologies:

- PKI (Public Key Infrastructure)

- Cryptology / Cryptography

- Relational Databases and SQL Scripting

- LDAP (Active Directory)

In this role, you will get an in-depth knowledge of a leading technology in PKI / encryption space and have an opportunity to work in thriving environment supporting large enterprise customers across all industry sectors.

20:38 [Conf] Report on InfoSecHiComNet 2011, October 19-22, Haldia, India

  The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking 2011 took place between October 19 to October 22, 2011, in India. The program was organised by Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall, while the local organisation was done by Debasis Giri. The general chairs of the conference were P.K. Saxena and P.D. Srivastava. The proceedings were published as part of the Lecture notes in Computer Science by Springer.
A large amount of submissions were recieved. In total there were, 112 submission. Of these, 14 were accepted to be included in the conference. There were six invited talks, given by Jorn-Marc Schmidt, Ingrid Verbauwhede, Benedikt Gierlich, Saibal Pal, Palash Sarkar, and Sanjay Burman. In addition three tutorials were presented, by Abhijit Das, C. Pandurangan and Michael Tunstall, each of duration of three hours. We expect that this conference will be repeated under the less general theme of "Cryptography and Cryptographic Engineering", which we hope will help encourage cryptography research in India. This conference is expected to complement CHES, since the number of submissions generally received by CHES demonstrates the popularity of research into topics related to cryptographic engineering. The intention is also to hold conferences that will not be in direct conflict with Indocrypt.

19:31 [PhD][New] Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography

  Name: Nishanth Chandran
Topic: Theoretical Foundations of Position-Based Cryptography
Category: cryptographic protocols

Description: In this thesis, we initiate the study of cryptographic protocols where the identity, or other credentials and inputs, of a party are derived from its \\emph{geographic location}.\r\n\r\nWe start by considering the central task in this setting, i.e., securely verifying the position of a device. Despite much work in\r\nthis area, we show that in the Vanilla (or standard) model, this above task (i.e., of secure positioning) is impossible to achieve,\r\neven if we assume that the adversary is computationally bounded. In light of the above impossibility result, we then turn to\r\nDziembowski\'s Bounded Retrieval Model (a variant of Maurer\'s Bounded Storage Model) and formalize and construct information theoretically secure protocols for two fundamental tasks:\r\n\r\n\\begin{itemize}\r\n\\item[-]\r\nSecure Positioning; and\r\n\\item[-]\r\nPosition-Based Key Exchange.\r\n\\end{itemize}\r\n\r\nWe then show that these tasks are in fact {\\em universal\\/} in this setting -- we show how we can use them to realize Secure Multi-Party Computation.\r\n\r\nThe main contribution of this thesis is threefold: to place the problem of secure positioning on a sound theoretical footing; to\r\nprove a strong impossibility result that simultaneously shows the insecurity of previous attempts at the problem; and to present positive results showing that the bounded-retrieval framework is a fruitful one to study the foundations of position-based\r\ncryptography.\r\n\r\nThis thesis is based on joint works with Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky.[...]

15:44 [Event][New] WMC2012: Third Workshop on Mathematical Cryptology

  Submission: 28 March 2012
Notification: 18 May 2012
From July 9 to July 11
Location: Castro Urdiales(Cantabria), Spain
More Information:

15:34 [Event][New] SCC2012: Third international conference on Symbolic Computation and Cryptography

  Submission: 28 March 2012
Notification: 18 May 2012
From July 11 to July 13
Location: Castro Urdiales(Cantabria), Spain
More Information:

15:09 [Event][New] CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems

  From September 9 to September 12
Location: Leuven, Belgium
More Information:

15:52 [Event][New] ACE-2012: Third International Conference on Advances in Computer Engineering - ACE 20

  From June 7 to June 8
Location: Sheffield, UK
More Information:

15:50 [Job][New] Post-Doc, Ben-Gurion university, Beer-Sheva, Israel

  My group is investigating the use of reactive secure multi-party computation in the cloud, we are also investigating anonymous communication, cryptography for sensor networks, cryptography based on complexity, and more.

08:00 [Conf][FSE] FSE 2012 deadline: November 17, 11:59 AM UTC

  The submission server is open

08:25 [Job][New] Post-Doc, University of British Columbia, Vancouver, Canada

  We have an immediate vacancy for a postdoctoral fellow at Laboratory for Education and Research in Secure Systems Engineering (LERSSE). The postdoctoral fellow will work closely with several PhD and Masters students as they conduct research in usable privacy and security.

The successful candidate will have substantial prior training in human computer interaction (HCI) and should have experience with usability evaluations, comparative evaluations, field research, and qualitative data analysis. Knowledge of the technical aspects of security systems is an asset; however, the priorities will be on skills necessary to perform both qualitative and quantitative research. While programming skills are not central to the position, some familiarity with software development and project management is needed.

We are looking specifically for a self-starter who is able to organize the research and lead the student researchers. Therefore, excellent communication and interpersonal skills are critical. Experience with collaborative research projects is beneficial. The successful candidate is expected to publish in international conferences and journals with the team of researchers on the project. This position is ideal for someone looking for a stepping stone to a faculty position as there are many aspects that are the same as a junior faculty position.

The University of British Columbia (UBC), established in 1908, is one of Canada’s leading research universities and is consistently highly ranked, including the most recent rank of 22nd in the world by Times Higher Education. UBC attracts 54,000 students from across Canada and 140 countries around the world.

Vancouver, Canada, is the great place to live, study, and work. It consistently ranks in the top 4 cities in the world. A survey by the Economist Intelligence Unit (EIU) has found that Vancouver is the world\'s best place to live.

20:20 [Event][Update] Crypto 2012

  From August 19 to August 23
Location: Santa Barbara, USA