IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
22 April 2021
LTCI, Télécom Paris, Institut polytechnique de Paris, France
Billions of connected devices are in use nowadays, including smartphones, media tablets, laptop and desktop computers, automotive electronic control units, smart sensors, smart cards, etc. To guarantee the confidentiality, the integrity and the authenticity of their sensitive data, various security mechanisms have been specified, and some of them mathematically proved to be secure, particularly against linear cryptanalysis and differential cryptanalysis. However, implementing them on a digital circuit without introducing vulnerability still remains a challenge.
The most exploited vulnerabilities are implementation bugs, as well as side channels, which leak information such as the execution time of a sensitive operation. The two vulnerability classes can also be combined: for instance, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753) simultaneously exploit a hardware bug and a measure of the data cache access time.
Since 2016, artificial intelligence, and more precisely deep learning using neural networks, has been used to evaluate the resistance level of countermeasures against side-channel attack. Thus, an AES implementation protected by secret sharing based on Boolean masking has been shown insecure, as well as desynchronization, two countermeasures yet known to be very effective. Regarding public key cryptography, some vulnerabilities have also been identified in RSA implementations protected by blinding of the message, of the secret exponent and/or of the modulo.
Artificial intelligence is therefore a valuable aid in identifying vulnerabilities, the use of which has to be extended, to algorithms other than AES and RSA, but above all to other countermeasures such as register randomization, internal state randomization, modular operation re-randomization, etc. This is the first objective of the thesis. Additionally, although already very effective, it seems possible to further improve analyzes by neural networks, by using several intermediate values, and/or several side channels (time, electromagnetic radiation, etc.). This is the second objective of the thesis.
Closing date for applications:
Contact: Laurent Sauvage
More information: https://www.adum.fr/as/ed/voirproposition.pl?langue=&site=TelecomPT&matricule_prop=36276
The Hong Kong University of Science and Technology
Applicants’ profile
- MSc or BSc degree in Computer Science or related field.
- Excellent programming skills, preferably in C++.
- Very good understanding of CS fundamentals: algorithm analysis, data structures, etc.
- Good understanding of basic cryptographic primitives: hashing, encryption, commitments, etc.
- Strong enthusiasm about research.
Work environment
HKUST offers guaranteed funding for the PhD duration with competitive stipends. Our CSE department was ranked 17th in the world in 2020 by THE World University Rankings. Our graduates typically produce research output of the highest quality and consistently staff world-class institutions. The lab offers a creative work environment that is ideal for excellent research.
Closing date for applications:
Contact: Dimitrios Papadopoulos
Northwestern University
- Secure multi-party computation
- Zero-knowledge proof
- Post-quantum security
- Differential privacy
- Other related/non-related topics of mutual interests
Apply: please send your CV (and other material if available) to the PoC.
Closing date for applications:
Contact: Xiao Wang (wangxiao1254@gmail.com)
15 April 2021
Subspace Labs | SFBA & Remote
Responsibilities
- Become a leading contributor and core maintainer of the Subspace Network
- Implement a series of novel consensus, execution, and scalability proposals
- Maintain the highest standards of distributed open-source software development including modular design, comprehensive testing, proper documentation, and responsive support.
- Experience with current blockchain technologies and landscape
- Theoretical background in distributed systems, such as consensus algorithms, as well as cryptographic fundamentals
- Strong knowledge of a modern systems programming language, such as Rust, C++, or Go and willing to learn Rust.
- Experience working with large open-source codebases
- Familiarity with the Rust language and its ecosystem
- Familiarity with Substrate and the Polkadot ecosystem
- Experience implementing blockchain consensus protocols
- A passion for decentralized, peer-to-peer systems and Web3 technologies
- A remote work environment with a high degree of autonomy and agency
- You will play a critical role in implementing a new layer one blockchain
- Salary and options befitting an early hire at a venture-backed startup
Closing date for applications:
Contact: Jeremiah Wagstaff
More information: https://jobs.lever.co/subspacelabs/7f6a654b-60a8-4740-aa19-36b9f7a9e624?lever-origin=applied&lever-source%5B%5D=IACR%20Jobs
LTCI, Télécom Paris, Institut polytechnique de Paris, France
Guaranteeing the confidentiality of sensitive information held or communicated by an object involves the use of various security mechanisms, such as authentication or encryption. These mechanisms rely on cryptographic algorithms that are secure from a mathematical point of view, but whose physical implementation may contain vulnerabilities that can be exploited by a malicious person. For instance, reducing the supply voltage or increasing the clock frequency of an integrated circuit beyond the limits for which it has been designed is a mean to introduce faults into its operations. It is then possible at low cost to recover all or part of the data memory, to bypass checks of passwords or access rights.
These attacks, called fault injection attack (FIA), are carried out in practice using a laser beam or a near-field probe radiating a pulsed electromagnetic field. Numerous FIA countermeasures have been proposed, mainly based on redundancy, and considering one injection faulting only one single sensitive variable. However, we have recently shown that a single injection could fault several successive assembler instructions, and consequently several variables, and it is also known that several injections, also faulting several variables, can be carried out.
This questions redundancy as a protection strategy, with software counter-measures, or even hardware counter-measures such as memory with error correcting code, or dual-core processor in lockstep mode. The first objective of the thesis is evaluating the resistance of this kind of protection, first in a practical way, then using preferably static simulations, or dynamic ones. The second objective is evaluating, and if necessary improving, resilience-based countermeasures, in particular infective countermeasures.
Closing date for applications:
Contact: Laurent Sauvage
More information: https://www.adum.fr/as/ed/voirproposition.pl?langue=&site=TelecomPT&matricule_prop=36459
IMDEA Software Institute
Applications are invited for one PhD student position at the IMDEA Software Institute (Madrid, Spain). Selected candidates will work with Marco Guarnieri (https://mguarnieri.github.io, marco dot guarnieri at imdea dot org) on the testing (specifically fuzzing) and verification of hardware-level defenses against microarchitectural attacks. The specific topic of the research will be determined based on the common interests of the candidate and the supervisor.
Who should apply?
Ideal candidates have earned (or are in their last year of) a Master's degree in Computer Science, Computer Engineering, or Mathematics, with experience and interest in at least one of the following areas:
- Computer security
- Testing (and fuzzing in particular)
- Computer architectures
- Program analysis and verification
- Formal methods
- Logics
Working at IMDEA Software
The IMDEA Software Institute is ranked among the best European research institutes in the areas of Programming Languages and Computer Security. Located in the Montegancedo Science and Technology Park, it perfectly combines the sunny and vibrant city of Madrid with cutting edge research and inspiring working environment. The institute provides an internationally competitive stipend, access to an excellent public health care system, unemployment benefits, retirement benefits, and support for research related travel. The working language at the institute is English. Knowledge of Spanish is not required.
Dates
The duration of the position is intended to be for the duration of the doctoral studies. The ideal starting period is summer/fall 2021. Deadline for applications is April 30th, 2021. Review of applications will begin immediately, and continue until the positions are filled.
How to apply?
See http://software.imdea.org/open_positions/2021-04-phd-uarchsec-testing.html
Closing date for applications:
Contact: Marco Guarnieri (marco dot guarnieri at imdea dot org)
More information: http://software.imdea.org/open_positions/2021-04-phd-uarchsec-testing.html
IMDEA Software Institute
Applications are invited for one PhD student position at the IMDEA Software Institute (Madrid, Spain). Selected candidates will work with Marco Guarnieri (https://mguarnieri.github.io) on the design, verification, and implementation of compiler-level countermeasures against microarchitectural and side-channel attacks. The specific topic of the research will be determined based on the common interests of the candidate and the supervisor.
Who should apply?
Ideal candidates have earned (or are in their last year of) a Master's degree in Computer Science, Computer Engineering, or Mathematics, with experience and interest in at least one of the following areas:
- Computer security
- Programming languages and compilers
- Program analysis and verification
- Formal methods
- Logics
Working at IMDEA Software
The IMDEA Software Institute is ranked among the best European research institutes in the areas of Programming Languages and Computer Security. Located in the Montegancedo Science and Technology Park, it perfectly combines the sunny and vibrant city of Madrid with cutting edge research and inspiring working environment. The institute provides an internationally competitive stipend, access to an excellent public health care system, unemployment benefits, retirement benefits, and support for research related travel. The working language at the institute is English. Knowledge of Spanish is not required.
Dates
The duration of the position is intended to be for the duration of the doctoral studies. The ideal starting period is summer/fall 2021. Deadline for applications is April 30th, 2021. Review of applications will begin immediately, and continue until the positions are filled.
How to apply?
See https://software.imdea.org/open_positions/2021-04-phd-uarchsec-compilers.html
Closing date for applications:
Contact: Marco Guarnieri (marco dot guarnieri at Imdea dot org)
05 April 2021
National University of Singapore
Closing date for applications:
Contact: Arash Pashrashid (pashrashid.arash@u.nus.edu)
University of St. Gallen, Switzerland
Research area: Research areas include but are not limited to:
- Verifiable computation
- Secure Multi Party Computation
- Privacy-preserving authentication
- Cryptographic primitives
- A MsC degree in Computer Science, Applied Mathematics or a relevant field;
- Strong mathematical and algorithmic CS background;
- Excellent programming skills;
- Excellent written and verbal communication skills in English
Starting date: By mutual agreement
Apply online: https://jobs.unisg.ch/offene-stellen/phd-position-in-applied-cryptography-and-information-security-m-w-d/09f75f22-649c-48a6-9aa4-659bbd686a84
Closing date for applications:
Contact: Katerina Mitrokotsa
More information: https://jobs.unisg.ch/offene-stellen/phd-position-in-applied-cryptography-and-information-security-m-w-d/09f75f22-649c-48a6-9aa4-659bbd686a84
Friedrich-Alexander-University Erlangen-Nürnberg (FAU)
- privacy-enhancing-technologies
- cryptocurrencies
- password-based cryptography
- proof systems
Work Environment: The Applied Cryptography Lab is part of FAU, which is one of the largest universities in Germany. With its five faculties, FAU offers a scope of subjects ranging from the Humanities to Law and Economics as well as Sciences, Medicine, and Engineering. FAU’s mission statement “Advance through Networks” reflects the close collaboration between the single disciplines. FAU has been ranked the third year in a row the most innovative University in Germany.
Requirements: Candidates for this position should hold a Ph.D. degree in Computer Science or a related discipline (mathematics, ...). The ideal candidate shows strong enthusiasm about research, publishes at leading venues in cryptography or IT security, and has excellent teamworking abilities.
Program details and contact for application/questions: Funding is available for at least 36 months; the salary range is between 32.671 - 78.136 EUR year, depending on your background and experience. Prospective applicants should apply with a cover letter, a research statement, and an academic CV that includes the contact information for two references. Please send a single PDF file and include [PostDoc] in the subject. Applications will be accepted until the position is filled.
Closing date for applications:
Contact: Dominique Schroeder
More information: https://www.chaac.tf.fau.eu
Friedrich-Alexander-University Erlangen-Nürnberg
- privacy-enhancing-technologies
- cryptocurrencies
- password-based cryptography
- proof systems
Work Environment: The Applied Cryptography Lab is part of FAU, which is one of the largest universities in Germany. With its five faculties, FAU offers a scope of subjects ranging from the Humanities to Law and Economics as well as Sciences, Medicine, and Engineering. FAU’s mission statement “Advance through Networks” reflects the close collaboration between the single disciplines. FAU has been ranked the third year in a row the most innovative University in Germany.
Requirements: Candidates for this position should have a master or comparable degree in Computer Science or a related discipline (mathematics, ...). Knowledge of one or several of the areas cryptography, IT security, complexity theory, privacy,... is desired. The ideal candidate shows strong enthusiasm about research and has excellent teamworking abilities.
Program details and contact for application/questions: The project start date is as soon as possible. Funding is available for at least 36 months; an extension is possible. Prospective applicants should apply with a cover letter, a list of attended (Master) courses, and an academic CV. Please send a single PDF file and include [PhD] in the subject. Applications will be accepted until the position is filled.
Closing date for applications:
Contact: Dominique Schröder
More information: https://www.chaac.tf.fau.eu
02 April 2021
Wickr
You not only create and deliver, you have the opportunity to see your hard work in use by everyday users. Opportunities like this do not come around often and take the right person to deliver results. While Wickr is expanding exponentially, we are keeping our start-up feel, mentality and fun environment. You still have time to join as a groundbreaking team member for an organization that holds over 91 patents on crypto protocols.
Responsibilities:
> Work with our cryptographers to create prototypes of cutting edge cryptographic and security features such as advanced encryption, signature, and key agreement schemes.
> Work with our core engineering team to convert prototypes of new network protocols and security features into production ready implementations that can be used by Wickr applications.
> Help develop a new cross platform Wickr protocol library in Rust.
> Write benchmarks and optimize code to help our team take full advantage of new features.
> Write code that is modular and well-covered by automated unit and integration tests.
> Help write and test FFI wrappers for our Rust libraries in Java, Swift, and C++.
POSITION REQUIREMENTS
> Bachelor’s degree or equivalent in Computer Science, Engineering or related field.
> 4+ years of experience developing software libraries in a low-level language such as C and C++.
> Minimum of 2 years’ experience writing Rust code in a production environment.
> Experience working in an agile software development environment.
> Experience contributing to open source libraries is a plus.
> Experience working with Java, Swift, or NodeJS is a plus.
> Interest in cryptography and secure coding practices is a plus.
> Be a self-starter who is willing to take ownership of your work.
> Excellent communicator in both verbal
Closing date for applications:
Contact: Please enter your application into the careers page and our Technical Recruiter will contact you, if qualified. You can also find him on LinkedIn https://www.linkedin.com/in/mike-schultz-1509a22/
More information: https://wickr.com/careers/
Mohammed VI Polytechnic University
Closing date for applications:
Contact: For more information an application , please visit: https://www.abg.asso.fr/fr/recruteurOffres/show/id_offre/97229
Fujitsu Laboratories of America, Sunnyvale, CA
We are looking for someone who will accelerate our security research around our business interests in the area and establish our presence in systems security academic venues. We offer competitive salary, benefits package, and flexible work schedule. This is a full-time permanent position based on Sunnyvale, CA. Candidates should have (or should soon have) a PhD degree in computer security or a closely related field. Preference will be given to candidates with strong publication records in top tier crypto/security conferences. Interested candidates are encouraged to apply by sending their CV to Arnab Roy by email.
Closing date for applications:
Contact: Arnab Roy
CSEM, Neuchâtel / EPFL, School of Computer and Communication Sciences, Lausanne, Switzerland
CSEM is a private, non-profit research, technology and innovation center. Our division of Integrated and Wireless Systems, in collaboration with the HexHive lab, EPFL, is looking for a PhD Candidate in Embedded security.
We have a multidisciplinary competence in the area of embedded, low-power embedded systems, spanning the full stack from HW, through firmware, to communication technologies, embedded intelligence, and security.
This offers an exciting opportunity for a candidate interested in HW design, cryptography, and security to address research questions that are relevant to practical applications in the domain of low-power embedded systems and Internet of Things (IoT), thanks to the immediate feedback and guidance from CSEM's researchers and engineers.
- Side channel-resistant implementations of cryptographic HW accelerators, with an emphasis on minimization of overhead and trade-offs between overhead and security level.
- HW-accelerated implementations of post-quantum cryptography for constrained platforms. Investigation of alternative cryptographic primitives to PQC key encapsulation and signature schemes with lower implementation overheads, suited for IoT.
- Identification, design, and implementation of HW (cyber)security features for constrained embedded platforms for practically relevant security profiles, with an emphasis on design minimalism.
- Research on tools automatizing the design of side-channel- secure processor instructions and/or HW accelerators.
- A Masters (or equivalent) degree in Electrical Engineering, Electronics or Computer Science
- Good background in applied cryptography and security
- Solid background in HW design and resource trade-offs
- Solid background with programming in C
- Familiarity with embedded development is an advantage
- Fluency in English is required, proficiency in French is an advantage
Closing date for applications:
Contact:
For more information please contact Damian Vizar damian[dot]vizar [at]csem[dot]ch
You need to apply to the EPFL, IC faculty's doctoral school by April 15th: https://www.epfl.ch/education/phd/edic-computer-and-communication-sciences/edic-computer-and-communication-sciences/edic-how-to-apply/Loria; Nancy, France
The highly motivated candidate should have a master degree (or equivalent) in Computer Science or Mathematics and at least basic knowledge in symmetric key cryptology.
The application deadline is May 10th 2021 and the candidates must apply via http://doctorat.univ-lorraine.fr/fr/les-ecoles-doctorales/iaem/offres-de-these/design-et-cryptanalyses-de-nouveaux-schemas-de. Further details on the project and on the requirements are also available on this page.
Closing date for applications:
Contact: Marine Minier (marine dot minier at loria dot fr) and Virginie Lallemand (virginie dot lallemand at loria dot fr)
More information: http://doctorat.univ-lorraine.fr/fr/les-ecoles-doctorales/iaem/offres-de-these/design-et-cryptanalyses-de-nouveaux-schemas-de
Nanyang Technological University, Singapore
Closing date for applications:
Contact: Asst Prof Jian Guo
More information: http://scripts.ntu.edu.sg
University of Twente, The Netherlands
The Services and Cybersecurity (SCS) chair at the University of Twente (The Netherlands) invites applications for a 4-years Ph.D. position on the topic of ‘modeling IoT device behavior for threat detection and response’.
More information:
https://www.utwente.nl/en/organisation/careers/!/2021-308/phd-position-on-modeling-iot-device-behavior-for-threat-detection-and-response
Deadline for applications: 23 April 2021, 23:59 CET
Closing date for applications:
Contact: Dr. Andrea Continella (a.continella@utwente.nl)
More information: https://www.utwente.nl/en/organisation/careers/!/2021-308/phd-position-on-modeling-iot-device-behavior-for-threat-detection-and-response
Society of Electronic Transactions and security, Chennai
a Research & Development project in the area of Quantum Key distribution for a project titled “: Metro Area Quantum Access Network (MAQAN)”.
Short description of the project:
Metro Area Quantum Access Network (MAQAN) ensures secure
key exchange between point-multipoint using Quantum mechanisms. In this project, SETS focus would be on developing
an efficient post-processing module required for field-deployable QKD systems. The post-processing module includes interfacing with quantum components, sifting, error parameter estimation, clock synchronization, authentication, privacy amplification, error correction, error verification, along with Quantum-safe Post Quantum Crypto primitives.
Project Associate - III
i. PhD in Engineering/ Science (Physics/Electronics)
ii. First Class M. Tech /M. E (Microelectronics and Photonics/Laser and Electro optics/Applied Electronics/VLSI Design/Electronic & Instrumentation/ Communication System/ Computer Science/ Cyber-Security).
i. MTech/ ME with minimum two years’ experience (or)
ii. PhD in Science with minimum one year experience (or)
iii. PhD in Engineering
Candidates with experience in Quantum Key Distribution, Integration of Optoelectronic Hardware with FPGA, Post Quantum Cryptography, Quantum Network testbed creation and System Design & Development using FPGAs. Hands-on exposure of FPGA boards and Xilinx Vivado tools using Verilog/VHDL/HLS.
Remuneration: Consolidated salary would be in the range of Rs. 50,000 to 60,000 per month.
Project Associate - II
Same as above but relaxation in terms of work experience (1 year work experience with masters or direct PhD) with skills in verilog and coding.
Remuneration: Consolidated salary would be in the range of Rs. 40,000 to 50,000 per month.
Closing date for applications:
Contact:
Name: Mr Dillibabu
Email :
hr_qkd2_2021@setsindia.net , dillibabu@setsindia.net
More information: https://www.setsindia.in/careers
Ethereum Foundation (remote)
About the Role: The candidate is expected to research cryptographic protocols that will be useful in blockchain applications or more generally. They will additionally dedicate some fraction of their time to projects that more directly benefit Ethereum. There is a lot of flexibility to work on topics they find interesting and also to collaborate with other teams for example in academia. We have a culture of open source and no patents will be put on any work they produce. The role is remote. The position is permanent however the details of the contract will depend on the location and personal circumstances of the candidate.
Requirements: The successful candidate will have a PhD in either cryptography, consensus, or a closely related field. They will have a strong track record of publishing in top tier conferences and a clear vision of how they wish to continue their research for the benefit of blockchain and other communities. They will be comfortable working both independently and as part of a larger team. The candidate should be able to prototype their protocols/algorithms in a programming language of their choice or else be open to learning.
The focus of this position is on lattice-based cryptography. The candidate should have good experience in one of the following areas and be familiar with others:
Interested candidates that have more diverse skills but do not fit the above requirements should also consider applying as there may be other roles within the foundation.
If you have contributed to any open source projects then please additionally discuss this in a short document or provide links to your contributions.
Closing date for applications:
Contact: Please email cryptography@ethereum.org with a CV and a short document (either 1 or 2 pages) detailing how you have personally contributed to the most interesting of your publications.