Post-Doc in Privacy & Trust (group leader, coordinator) , Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt
The position is funded by Technische Universität Darmstadt and reports to Prof. Mühlhäuser. You will lead a group of PhD researchers working in the area of Privacy and Trust, co-manage the respective projects and help assuring continued funding. Leveraging the pool of talented young researchers in the group, you will further your scientific career in Privacy and Trust research. Initially, you will put an emphasis on coordinating a joint application for a doctoral ‘Research Training Group’ (funds for a pool of PhD positions plus qualification frame-work) in Privacy and Trust, authored by more than half a dozen CASED professors. Following the successful application, you will assume a leading role there. As a lower profile activity, you will coordinate activities in the CASED research area Secure Services where privacy&trust is one of several research fields.
Experience in IT security, preferably with a focus in privacy or trust, as well as profound knowledge in computer science are mandatory. Experience in writing applications for funds and in supervising students is most helpful.
Interested candidates should have excellent command of English and at least basic command of German. Initial term is two years.
Assistant/Associate Professor in Cryptography, Technical University of Denmark
The Technical University of Denmark (DTU) solicits applications for the above position created to support the further development of the Department of Mathematics (MAT).
One of the areas of special strategic emphasis for MAT is symmetric-key cryptography.
Peter Schwabe: High-Speed Cryptography and Cryptanalysis
Name: Peter Schwabe
Topic: High-Speed Cryptography and Cryptanalysis
Modern digital communication relies heavily on cryptographic protection to ensure
data integrity and privacy. In order to deploy state-of-the art cryptographic primitives and protocols in real-world scenarios, one needs to highly optimize software for both speed and security. This requires careful choices of high-level cryptographic
parameters, low-level optimization of software on the assembly level for a given microarchitecture and considerations of the subtle interactions between high-level and low-level optimizations. This thesis considers three examples of cryptographic primitives and describes software implementations of these primitives that set new speed records.
The Advanced Encryption Standard (AES) is one of the most widely used symmetric cryptographic primitives. The traditional implementation approach for AES
is based on table lookups. While software based on this approach still achieves best performance for a variety of 32-bit and 64-bit architectures, it is usually vulnerable to cache-timing attacks. Another implementation approach for AES is the bitslic-
ing technique. Not only is software based on this approach inherently protected against cache-timing attacks, on some microarchitectures it even achieves better performance.
Elliptic-curve cryptography is the current state of the art of asymmetric cryptography. For elliptic-curve Diffie-Hellman key exchange, Bernstein proposed the Curve25519 function. Several speed-record-setting implementations of this function
have been developed for a variety of architectures. Optimizing Curve25519 software for the Synergistic Processor Units of the Cell Broadband Engine is a particularly interesting challenge because the small integer multipliers of this architecture do not
seem to make it the best-suited platform for public-key cryptography.
Another use of elliptic curves in cryptography is in the construction of cryptographic pairings. In order to make pairings fas[...]
Ph.D. Students, Post-Docs, Intel-TU Darmstadt Security Institute, Germany
Starting from January 2012, the new Intel-TU Darmstadt Security Institute will conduct security research for mobile and embedded systems. The Security Institute will be jointly operated by Intel Labs and TU Darmstadt/Center for Advanced Security Research Darmstadt (CASED), Germany. In order to kick off operations, we are currently looking for scientific personnel.
Applicants should hold Diploma, Master or PhD Degree in Computer Science or Electrical Engineering and bring well-founded knowledge and experience in IT-Security. More specifically, we are looking for candidates that have expertise in one or more of the following areas:
- Mobile operating system security (e.g., Android, iOS)
- Embedded system security, in particular knowledge in embedded processors such as ARM and Intel Atom
- Lightweight Cryptography with focus on emerging technologies such as RFID and NFC
- Hardware security (e.g., Physically Unclonable Functions)
- Design, development, analysis of System-on-Chip (SoC) IP blocks and associated tools
How to Apply
Your application should include your current curriculum vitae, MSc/Diploma certificates and grades, a letter of motivation stating your interest in the position and your research interests and at least two letters of recommendation.