International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

07:01 [PhD][New] Habib Mehrez

  Name: Habib Mehrez
Category: implementation

10:26 [Job][New] Software Security Engineer (All Levels), Qualcomm Incorporated

  A Software Security Engineer is responsible for assisting product development teams throughout the company in detecting and mitigating security vulnerabilities in software design and implementation. Specific responsibilities may include identifying and assessing software vulnerabilities using both manual methods and automated tools, mentoring software developers in adopting secure coding techniques and secure coding standards, assisting product development teams in establishing static analysis and security testing processes, promoting security mindset throughout software development from design to implementation to testing, evaluating new technologies/tools to detect, triage, and mitigate software security defects, identifying and addressing weakness in existing software development life cycle with a goal to improve overall software security.


Applicants should possess at least two years of experience (work or academic) in the field of software security, like performing software security audits. Ability to engage with product teams independently with minimal supervision is a must. Applicants should have expertise in two or more of the following areas:

- Code review, analysis and vulnerability assessment (C, C++, ARM assembly,C#,Java)

- Security testing, e.g. fuzzing, instrumentation, monitoring

- Operating system security

- Mobile platform security

- Mitigation techniques

- Incident response

In-depth knowledge in the following specific areas will be considered a plus:

- Mobile operating system internals (Android, Windows Phone, iOS)

- Static analysis

- Firmware analysis and reverse engineering

- ARM architecture


Graduate degree in a security related field of Computer Science or Mathematics is a plus.

If interested, please apply directly to requisition G1889943


10:25 [Event][New] Inscrypt'2012: The 8th China International Conference on Information Security and Cryptolo

  Submission: 20 August 2012
Notification: 20 August 2012
From November 28 to December 1
Location: Beijing, China
More Information:

10:01 [Event][New]


07:45 [PhD][New] Christiane Peters: Curves, Codes, and Cryptography

  Name: Christiane Peters
Topic: Curves, Codes, and Cryptography
Category: public-key cryptography

05:17 [Event][Update] CSIA - 2012: The Third International Conference on Communications Security & Information

  Submission: 13 December 2011
Notification: 30 January 2012
From May 25 to May 27
Location: Delhi, India
More Information:

23:33 [Event][Update] TRUST 2012: 5th International Conference on Trust and Trustworthy Computing

  Submission: 22 February 2012
Notification: 25 March 2012
From June 13 to June 15
Location: Vienna, Austria
More Information:

23:32 [Event][New] RFIDSec'12: The 8th workshop of RFID security and privacy

  Submission: 23 March 2012
Notification: 21 May 2012
From July 1 to July 3
Location: Nijmegen, The Netherlands
More Information:

23:30 [Job][New] PhD student, Norwegian Information Security Laboratory, GUC

  Large-Scale Online Learning for Intrusion Detection and Proactive Forensics

** Main objective of the research is to overcome limitations of existing intrusion-detection systems (IDS), which are presently mainly based on expert knowl­edge or contemporary online learning. For IDSs, the continuous learning of new and changing attack patterns, and the use of relevant attributes or fea­tures that represent abnormal behaviour in network-traffic data is of greatest importance in order to detect hostile activities in dynamic network environ­ments. Online-learning systems with an embedded online-feature selection have a great potential to assist in understanding the nature of network in­trusions as well as to assist in establishing the ability to process massive amounts of data in large-scale networks. Specific objectives of the proposed research are two-fold:

- To develop new computational-intelligent methods for online-learning in malware and intrusion-detection systems that can deal with the challenges of massive data, obfuscation, adversarial activities, chang­ing environments and the lack of a real-labeled reference data and training dataset, and

- To develop new embedded-online-feature-selection methods without prior knowledge or limited number of features (open-system system approach)

** Specific background and skills in one or more of the following areas is highly desirable:

- Excellent MSc degree in computer science/engineering, mathematics or statistics

- Experience in numerical analysis, algorithms and complexity analysis

- Knowledge in machine learning and pattern recognition

- Programming ability in one or more of the following languages: Matlab, Python, Java,C, C++, or C#

- Fluent in English: oral and written communication skills

- Ability to communicate technical concepts clearly and effectively

- Scientific publications in re

15:08 [Event][New] SECOTS 2012: Intl. Symposium on Security in Collaboration Technologies and Systems

  Submission: 30 December 2011
From May 21 to May 25
Location: Denver, USA
More Information:

15:06 [Job][New] Ph.D. Students and Post-Doc, University of Luxembourg


* 2 Ph.D. Students in Computer Security

* 1 Ph.D. Student in Socio-Technical Aspects of Security

Duration: 3 years (extension up to 4 years in total is possible).


For more information see URLs:


* 1 Post-Doc in Socio-Technical Aspects of Security

Duration 2 years (extension up to 5 years is possible).


For more information and for application see URL:


All the positions are related to the CORE-FNR project \\\"Socio-Technical Analysis of Security and Trust\\\" (STAST). STAST will be highly interdisciplinary. It teams up the Interdisciplinary Centre for Reliability, Security and Trust (SnT), the Applied Security and Information Assurance (APSIA), led by Prof. P. Y. A. Ryan who is also the principal investigator of the project, and Security and Trust of Software Systems (SaToSS), led by Prof. S. Mauw, and the Educational Measurement and Applied Cognitive Science (EMACS), ref. Dr. V. Koenig.