IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 July 2018
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
15 July 2018
Jia-Si Weng, Jian Weng, Ming Li, Yue Zhang, Weiqi Luo
Ben Fisch
Lastly, we reflect on a notable application of PoReps---its unique suitability as a Nakamoto consensus mechanism that replaces proof-of-work with PoReps on real data, simultaneously incentivizing and subsidizing the cost of file storage.
TU Darmstadt
Current topics of interest include (but are not limited to):
- Secure cryptographic implementations
- Leakage/tamper resilient cryptography
- Blockchains and cryptocurrencies
- Distributed cryptography
The application must include a curriculum vitae, a short research statement, and names of 2 contacts that can provide reference about the applicant and her/his work. The candidate shall be able to show solid expertise in cryptography/IT Security illustrated in form of publications at major crypto/security venues such as CRYPTO, EUROCRYPT, ASIACRYPT, TCC, PKC, CHES, FC, ACM CCS, IEEE S&P, USENIX Security, NDSS etc.
The position can be partially funded by the Ethereum Foundation and hence offers an internationally competitive salary including social benefits, and the opportunity for close collaboration with one of the leading cryptocurrencies.
TU Darmstadt offers excellent working environment in the heart of the Rhein-Main area, and has a strong institute for research on IT security with more than 300 researchers working on all aspects of cybersecurity.
Review of applications starts immediately until the position is filled.
Closing date for applications: 1 September 2018
Contact: Prof. Sebastian Faust, Contact: sebastian.faust(at)cs(dot)tu-darmstadt(dot)de
Kanazawa University, Japan
For example, IoT security, AI security, cybersecurity, privacy protection, software protection, blockchain, usable security, cryptography, implementation of cryptographic techniques, quantum security, and so on.
In order to actively improve our considerably low percentage of women researchers, applicants are limited to female researchers.
An appointee is expected on duty on December 1st, 2018 or at an early possible time after that.
Closing date for applications: 12 September 2018
Contact: Masahiro Mambo
More information: http://www.t.kanazawa-u.ac.jp/collegeschool/20_se/en/position/20180912_is_tt_en.pdf
13 July 2018
François Gérard
Thorben Moos, Amir Moradi, Bastian Richter
Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
Joey Green, Arnab Roy, Elisabeth Oswald
We define a novel metric to capture the importance of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and we explicitly define and examine different ways of combining information from multiple side channel traces. With these new considerations we systematically investigate a number of graphical models that "naturally" follow from an implementation of AES. Our results are unexpected: neither a larger graph (i.e. more side channel information) nor more connectedness necessarily lead to significantly better attacks. In fact our results demonstrate that in practice the (on balance) best choice is to utilise an acyclic graph in an independent graph combination setting, which gives us provable convergence to the correct key distribution. We provide evidence using both extensive simulations and a final confirmatory analysis on real trace data.
Ward Beullens, Bart Preneel, Alan Szepieniec
Cyril Bouvier, Laurent Imbert
Takanori Isobe, Kazuhiko Minematsu
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
Paolo Santini, Edoardo Persichetti, Marco Baldi
12 July 2018
Toronto, Canada, 15 October 2018
Submission deadline: 16 July 2018
Notification: 13 August 2018
Information Assurance Platform (IAP)
This position is available full time or part time, on a work remotely basis (telecommuting).
The successful applicant is requested to support the written documentation of the project. The project aims to establish an open standard for the use of the platform (the IAP standard). Where applicable, cryptographic terms, algorithms, diagrams and other items will be required to be written to the current standards of the industry and to the standards of peer review.
The position will be responsible for the project documentation as it pertains to cryptography; to rewrite existing documentation in an expert manner, and to ensure that additional information is correct, useful, up to date and appropriate. Therefore, the position will be required to understand the goals and designs of the project intimately. Full support in gaining this understanding will be provided.
The cryptography in question is focused on computational integrity and privacy research, including zero knowledge proofs and succinct non interactive arguments of knowledge.
The position is not expected to create, invent, redesign or develop cryptography or cryptographic systems. Rather, to understand current research, explain, interpret and ultimately document the relevant cryptography as it pertains (or does nor pertain) to the design of systems of the platform.
All applicants are welcome.
Closing date for applications: 31 December 2018
Contact: Please contact team [at] iap.network. All information held in strictest confidence.
More information: https://iap.network
IBM Global Security Services
Position is located in the United States. Must be willing to travel 75% annually, including international travel.
Marketing and Sales:
•Work with global solutions teams and across local geographies to provide content and drive deals to successful closing
•Provide demonstration of IBM credentials in the core domain of Data Security, especially cryptography
•Work closely with the global and local solution design teams to develop client presentations and Statements Of Work (SOWs)
•Provide a focal point for geographies to help understand capabilities, offerings, client references
•Become a recognized thought leader in the core domain, utilizing conferences, white papers, client presentations to build awareness of IBM credentials
•Be accountable for driving signings in the geographies
Delivery:
•Work with global and local teams to help organize project approaches and teams for client delivery
•Participate in project delivery to varying degrees depending on project complexity and geography needs
•Help resolve project issues as they arise
•Establish demonstrated client relationships in key accounts to help progress the Security Services portfolio
Practice:
•Provide global practice leadership by facilitating a community of like-minded practitioners to share and exchange ideas for practice growth and improvement
•Contribute content and advice to the offering development process
•Help shape the emerging model of the Global Security Practice
People:
•Help establish capability and skills models for the core domain• Become a role model for global practitioners in the core domain
Closing date for applications:
Contact: Harry Dougherty
Senior Recruiter - Talent Acquisition
IBM Security Services
https://www.linkedin.com/in/harrydougherty1/
More information: https://www.linkedin.com/jobs/view/associate-partner-cryptography-encryption-at-ibm-742561074/