International Association for Cryptologic Research

# IACR News Central

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2011-12-15
05:49 [Job][New]

The IMDEA Software Institute (Madrid, Spain) has several openings at

the Ph.D. and post-doctoral levels. The positions are attached to the

computer-aided security proofs project, which develops language-based

methods and tools for the verification of cryptographic systems. We seek

applicants with a strong background in at least one of the following fields:

* cryptography

* language-based security

* program analysis and program verification

* automated and interactive proofs

Successful applicants are expected to contribute to the development of

the CertiCrypt toolset, and must have an interest to carry research at

the intersection between programming languages, formal verification,

and cryptography.

Post-doctoral positions are for one year, with the possibility of

renewal for up to four years. Ph.D. positions are for four years,

subject to satisfactory progress. Starting date is negotiable.

Application materials are available at the URL:

https://www.imdea.org/internationalcall/Default.aspx?IdInstitute=17

Cryptographic Proofs in the research lines.

consideration. However, applications will continue to be accepted

until the positions are filled.

2011-12-14
21:02 [Job][New]

Information Security group at the University of Calgary has opening for two postdoctoral/research fellow positions in the area of cryptology and information security. The positions are for a period of two years and in the case of research fellow, extendable to three years.

Information Security is an emerging priority of the Faculty of Science and there is interest in a broad range of theoretical and applied topics. This includes information theoretic and computational security, cloud security and wireless security. More Information about information security research at the University of Calgary can be found at our website (please find the URL below).

Candidates are expected to hold a PhD or have it completed at the time of taking up the position. Applications should include a full CV, an account of research preferences and plan, and the name of three references.

Applications and queries related to the position should be sent to contacts (at) ispia.ca

Applications will be reviewed as they are received.

15:15 [Job][New]

COMPANY

ESCRYPT is an ambitious company in the area of applied and industrial data security. Our clients include all global car makers as well as leading global players in the area of heavy machinery, automation, semiconductors and high-tech companies. ESCRYPT is a German company with offices in the US (Ann Arbor, Michigan) and Germany (Bochum, Munich, Wolfsburg).

JOB DESCRIPTION

Your role will be developing customized software for our client projects in the area of embedded data security, developing and maintaining our products, and/or providing consulting services to our customers. You should have a wide expertise in the area of data security, and a focus on embedded systems is helpful (e.g. smart cards, mobile security, etc.).

REQUIREMENTS

We seek top graduates in the fields of electrical engineering, computer science or applied mathematics, ideally with industry experience and special knowledge in one of the following fields:

- Cryptography, security, privacy

- Software development (C/C++ and Java)

- Embedded Systems

International experience and relevant internships will be appreciated. Candidates must be fluent in English for the American office, and fluent in German for the German offices.

We look for all-rounders willing to build the company and improve ESCRYPT every day. You should be able to work independently and you should be willing to take responsibility. In addition to technical work, we expect that you are able to market the company and our products and services, e.g., by meeting potential clients.

We take your career seriously and offer the possibility to grow in a highly qualified, internationally experienced team. Your work environment will be characterized by an open atmosphere, flat hierarchy and performance-related salary.

Did we manage to make you curious? Then send us your application to jobs (at)

14:26 [PhD][New]

Name: Filipe Beato
Topic: Privacy Preserving Information Sharing in Online communities
Category: cryptographic protocols

10:35 [Job][New]

The Research Group of Distributed and Embedded Security of the University of Twente is seeking a talented candidate with research interests in information security for a PostDoc position.

The candidate is expected to contribute to the information security research agenda of the DIES group and to extend our work with new ideas in the areas of data security, network security, and cybercrime prevention.

The candidate is expected to contribute to the information security research agenda of the DIES group and to extend our work with new ideas in the areas of data security, network security, and cybercrime prevention.

10:35 [Job][New]

The candidate is expected to joint and extent the ICS and SCADA-related research agenda of the DIES research group and contribute to our research in areas like host-based intrusion detection in ICS, automated device fingerprinting of ICS/SCADA devices, and security testing tools and methodologies for ICS/SCADA. He is also to contribute to the EU FP7 project CRISALIS, which aims at providing new means to secure critical infrastructure environments from targeted attacks, carried out by resourceful and motivated individuals.

06:28 [Job][New]

CHRI Post-Doctoral or Research Professor Positions

Creative Research Initiatives on Cryptographic Hard Problems (Director, Prof. Jung Hee Cheon), the Department of Mathematical Sciences, Seoul National University, is soliciting applications to fill the position of a Post-doc or a Research Professor in cryptology and applied cryptology area.

We are seeking candidates who have finished their Doctorate or Ph. D in Mathematical Sciences or related fields. Our team is working regularly with other research groups in industry and academia. We are actively supporting publication and presentation of research at the top international conferences.

The position is not bound to a specific project, but we expect contributions in mathematical cryptology, pairing-based cryptology, lattice-based cryptology and their applications to cloud computing.

Applications must include:

- Professional CV with full list of publications

- Two or more references (can be submitted after the initial screening)

Duration and Commencement of Fellowship:

- Fellowships are awarded for a period of 12 months or more (CHRI is a 9-year project.)

- Each fellowship usually begins on March 1, 2012, but could start right away if the applicant wants

CHRI provides Fellowship recipients with the following allowances and expenses:

- A annual salary in the range 30,000,000-45,000,000 Korean Won

- Support relocation expenses up to 4,000,000 Korean Won (including economy class airplane ticket)

- Full medical insurance coverage

- Might be available to campus housing for research professor position

Dates:

Please submit your application form by Jan. 30, 2012 to the e-mail, changee0415 (at) gmail.com.

(Application will be reviewed immediately.)

06:27 [Job][New]

PhD position 1: Private matching and social relationship management for decentralized healthcare services.

PhD position 2: Privacy preserving data mining in electronic health records.

2011-12-12
05:21 [Job][New]

The Distributed and Embedded Security Group of the University of Twente is seeking a talented new group leader with research interests in information security for a tenure-track appointment.

Both senior and junior researchers are welcome to apply.

2011-12-11
10:20 [PhD][New]

Topic: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition
Category: secret-key cryptography

Description: In modern cryptography, stream ciphers are most useful in applications where information needs to be encrypted/decrypted at high speed (e.g. high resolution streaming video data) or when low footprint (gates/memory) encryption is required. In the literature, there exist plenty of stream ciphers whose internal states are based on arrays and that they use modular additions to generate output streams. The abundance of array-based stream ciphers with modular additions can be attributed to the fact that, when implemented in software skillfully, they are able to produce outputs at a very high speed. The main contribution of this thesis is a unified analysis of stream ciphers based on arrays and modular addition. During the process, we detect cryptographic weaknesses in the designs of 9 widely known stream ciphers or pseudorandom bit generators (PRBGs).\r\n
\r\nAt first, we show some theoretical results on solving an important class of equations known as \\emph{differential equations of addition} (DEA) that combine modular additions over two different algebraic groups such as GF(2) and GF($2^{32}$). The results include, \\bite \\item proof of the fact that the satisfiability of an arbitrary set of DEA is in the complexity class \\pP,\\item deriving all the solutions of an arbitrary set of DEA. \\eite Next, we apply these results to attack a practical stream cipher named Helix (designed by Ferguson \\emph{et al.}) with both chosen plaintexts and adaptive chosen plaintexts.\r\n
\r\nIn the second phase, the thesis closely scrutinizes a number of array-based stream ciphers (or PRBGs) in order to estimate their resistance against distinguishing attacks. We eventually discover, counter-intuitively, that the correlations between the array-indices and their associated array-elements, which apparently seem to be useful from the point of view of implementation purposes, can be exploited to mount distinguishing attacks on such type of ciphers if adequate precautions are not tak[...]

2011-12-10
19:01 [Event][New]

Submission: 30 April 2012