International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

14:30 [Event][New] PST 2012: 10th Annual Conference on Privacy, Security and Trust

  Submission: 18 March 2012
Notification: 7 May 2012
From July 16 to July 18
Location: Paris, France
More Information:

14:29 [Event][New] DBSEC 2012: 26th Annual WG 11.3 Conference on Data and Applications Security and Privac

  Submission: 13 February 2012
Notification: 8 April 2012
From July 11 to July 13
Location: Paris, France
More Information:

18:15 [Job][New] Mathematicians (graduate entry level), GCHQ, UK

  Salary: £25,446 + benefits

Based in Cheltenham, Gloucestershire

Discover new solutions. Follow in the footsteps of one of our nation’s greatest mathematicians.

One of Time Magazine’s 100 Most Important People of the 20th Century, Alan Turing was a brilliant thinker most famous for his codebreaking in the Second World War. As we approach the centenary of his birth, it could be time for you to play a vital role in maintaining national security too.

Encryption is used in so many of the essential things we use in everyday life, that the threat is everywhere. So, as a GCHQ mathematician, you’ll explore the increasingly complex problems of crypt to help keep our communications secure.

There aren’t many places where your love of mathematics and problem solving will see you influencing Government, armed forces and law enforcement agency decisions. GCHQ is also one of the few places outside academia where you can practise advanced mathematical research across such a wide range of disciplines. Every day will bring a new challenge to stretch your intellectual ability. Your research will be supported by some of Europe’s largest computers. And you’ll share your knowledge with some of the nation’s top mathematical minds.

To apply, you should have, or expect to obtain by summer 2012, a 1st or 2nd class honours degree in mathematics, statistics, physics or other subject with significant mathematical content. Additional credit will be given for a Master’s degree in a mathematical subject.

16:34 [Event][New] SHA3@ISI: Hash Workshop on SHA3 Finalists

  From December 9 to December 10
Location: Kolkata, India
More Information:

15:29 [PhD][New] Yves Mathieu

  Name: Yves Mathieu

15:26 [PhD][New] Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique

  Name: Laurent Sauvage
Topic: Cartographie électromagnétique pour la cryptanalyse physique
Category: implementation

17:41 [Job][New] Ph.D. Student, Signal Processing in Communications Group, University of Vigo, Spain


The Signal Processing in Communications Group (GPSC,, affiliated with the Department of Signal Theory and Communications at University of Vigo, Spain, invites applications for a Ph.D. position in the field of Signal Processing in the Encrypted Domain.

The selected candidate will join GPSC to investigate fundamentals and algorithm design/evaluation for encrypted processing of data and signals.

The GPSC is a worldwide reference group in the fields of Multimedia Security and Signal Processing. This fact is supported by international publications (more that 70 journal papers and 170 conference communications, receiving more than 1600 cites), awards to the defended Ph. D. theses (3 Best Ph. D. Thesis Awards of the Spanish Official Institute of Telecommunications Engineers), research projects\' income (about 9 million euros), management of intellectual property (10 European and American patents pending), spin-off creation, establishment of research centres (e.g., Galician Research Centre in Advanced Telecommunications—Gradiant—, ICT Research Center of the University of Vigo—AtlantTIC—), its multicultural environment, or some of its members being Associate Editors of IEEE Transactions. Hence, the selected candidate will enjoy unique opportunities to participate in exciting research projects with both industry and academia.

Desirable background

  • Strong mathematical background (recommended B.Sc. or M.Sc. on Mathematics, or similar), with special stress on number theory, is strictly required
  • Good verbal and written skills in English are required.
  • Communication, computing and interpersonal skills are important
  • Capacity to work both independently and within a team

17:40 [Job][New] Technical Support Engineer - Encryption, Acumin

  3rd line Technical Support Engineer / Cryptography / Encryption/ PKI / Tier 1 Vendor / IT Security

Do you have experience of supporting any of the cryptography / encryption / PKI products from any known vendors and looking to progress to level 3 support?

This exciting Tier 1 Vendor role requires demonstrable experience in supporting any of the following technologies:

- PKI (Public Key Infrastructure)

- Cryptology / Cryptography

- Relational Databases and SQL Scripting

- LDAP (Active Directory)

In this role, you will get an in-depth knowledge of a leading technology in PKI / encryption space and have an opportunity to work in thriving environment supporting large enterprise customers across all industry sectors.

20:38 [Conf] Report on InfoSecHiComNet 2011, October 19-22, Haldia, India

  The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking 2011 took place between October 19 to October 22, 2011, in India. The program was organised by Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall, while the local organisation was done by Debasis Giri. The general chairs of the conference were P.K. Saxena and P.D. Srivastava. The proceedings were published as part of the Lecture notes in Computer Science by Springer.
A large amount of submissions were recieved. In total there were, 112 submission. Of these, 14 were accepted to be included in the conference. There were six invited talks, given by Jorn-Marc Schmidt, Ingrid Verbauwhede, Benedikt Gierlich, Saibal Pal, Palash Sarkar, and Sanjay Burman. In addition three tutorials were presented, by Abhijit Das, C. Pandurangan and Michael Tunstall, each of duration of three hours. We expect that this conference will be repeated under the less general theme of "Cryptography and Cryptographic Engineering", which we hope will help encourage cryptography research in India. This conference is expected to complement CHES, since the number of submissions generally received by CHES demonstrates the popularity of research into topics related to cryptographic engineering. The intention is also to hold conferences that will not be in direct conflict with Indocrypt.

19:31 [PhD][New] Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography

  Name: Nishanth Chandran
Topic: Theoretical Foundations of Position-Based Cryptography
Category: cryptographic protocols

Description: In this thesis, we initiate the study of cryptographic protocols where the identity, or other credentials and inputs, of a party are derived from its \\emph{geographic location}.\r\n\r\nWe start by considering the central task in this setting, i.e., securely verifying the position of a device. Despite much work in\r\nthis area, we show that in the Vanilla (or standard) model, this above task (i.e., of secure positioning) is impossible to achieve,\r\neven if we assume that the adversary is computationally bounded. In light of the above impossibility result, we then turn to\r\nDziembowski\'s Bounded Retrieval Model (a variant of Maurer\'s Bounded Storage Model) and formalize and construct information theoretically secure protocols for two fundamental tasks:\r\n\r\n\\begin{itemize}\r\n\\item[-]\r\nSecure Positioning; and\r\n\\item[-]\r\nPosition-Based Key Exchange.\r\n\\end{itemize}\r\n\r\nWe then show that these tasks are in fact {\\em universal\\/} in this setting -- we show how we can use them to realize Secure Multi-Party Computation.\r\n\r\nThe main contribution of this thesis is threefold: to place the problem of secure positioning on a sound theoretical footing; to\r\nprove a strong impossibility result that simultaneously shows the insecurity of previous attempts at the problem; and to present positive results showing that the bounded-retrieval framework is a fruitful one to study the foundations of position-based\r\ncryptography.\r\n\r\nThis thesis is based on joint works with Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky.[...]

15:44 [Event][New] WMC2012: Third Workshop on Mathematical Cryptology

  Submission: 28 March 2012
Notification: 18 May 2012
From July 9 to July 11
Location: Castro Urdiales(Cantabria), Spain
More Information: