IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
06 May 2019
University of Warwick
Job PostingThe research topic falls under the general theme of security and cryptography. We are very flexible with the specific topic. Our previous research has been largely driven by tackling real-world security problems. Some of our research outputs have been adopted by the industry at a large scale and have had a significant societal impact. We expect the student to pursue a research topic that really matters in the real world and that matches their interest and background.
The Computer Science Department at Warwick is a leading department in the UK. In the 2014 Research Evaluation Framework (REF) which all UK universities participated in, Warwick computer science was ranked the 1st in terms of research output, 2nd in terms of impact and 2nd overall. It is also highly regarded for its research culture, informal environment, excellent students, and beautiful campus.
Ideally, candidates should have an excellent degree in computer science, engineering or related disciplines, solid mathematical background, excellent programming skills and a desire to tackle real-world problems.
For informal inquiries about this studentship, please contact Professor Feng Hao, feng.hao (at) warwick.ac.uk, enclosing a CV and a short description of your relevant background and interests within the research subject. Formal application of this PhD scholarship needs to be made online at the Warwick CS department website: https://warwick.ac.uk/fac/sci/dcs/admissions/postgraduateresearch/
Closing date for applications: 31 May 2019
Contact: feng.hao (at) warwick.ac.uk
More information: https://www.jobs.ac.uk/job/BRS537/phd-studentship-in-security
Fetch.AI
Job PostingWe are a dynamic, fast-growing international team of experts and forward-thinking technology enthusiasts working on the convergence of blockchain, AI and multi-agent systems. We are building technology for both today and tomorrow - a collective super-intelligence on top of decentralized economic internet built with a highly scalable next-generation distributed ledger technology. Combined with machine learning, this delivers the predictions and infrastructure to power the future economy.
Do you like challenges and want to work on cutting edge state-of-the-art technology that will define how we will interact? Come and join us.
Job description
The role involves the design and implementation of cryptography techniques to build, maintain and enrich the functionalities of Fetch’s decentralised smart-ledger technology. Interested candidates will be provided with multiple opportunities to work at the intersection of Artificial Intelligence/Machine Learning and cryptography/security.
We are working at the cutting edge of cryptography, artificial intelligence, distributed computation and economics, and are therefore looking for people with a desire to create novel solutions for complex problems.
Responsibilities
You will be responsible for the timely delivery of varied projects within the Cryptography Team and wider Fetch.AI Teams
Skills and experience
A good mathematical background is essential
Software engineering skills in Python or C/C++, Linux, Git
A BSc/MSc in Cyber Security/Computer Science/Mathematics or a related field with previous exposure to programming with cryptography
Demonstrable skills in one or more of the following: systems security/protocol design/distributed computing
Proven track record of independently and successfully driving projects
Closing date for applications: 30 May 2019
Contact: David Wood
david.wood (at) fetch.ai
More information: https://careers.fetch.ai/jobs/cryptography-engineer/
05 May 2019
Santa Barbara, USA, 18 August 2019
Event CalendarSubmission deadline: 1 June 2019
Notification: 1 July 2019
04 May 2019
Bucharest, Romania, 14 November - 15 November 2019
Event CalendarSubmission deadline: 17 September 2019
Notification: 23 October 2019
Darmstadt, Germany, 9 September - 13 September 2019
Event Calendar03 May 2019
Sabyasachi Karati, Reihaneh Safavi-Naini
ePrint ReportEvgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
ePrint ReportAvik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
ePrint ReportLoïc Masure, Cécile Dumas, Emmanuel Prouff
ePrint ReportJan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
ePrint ReportThijs Veugen
ePrint ReportBenjamin Dowling, Paul Rösler, Jörg Schwenk
ePrint ReportNoise uses only a limited number of cryptographic primitives which makes it an ideal candidate for reduction-based security proofs. Due to its patterns' characteristics as channel establishment protocols, and the usage of established keys within the handshake, the authenticated and confidential channel establishment (ACCE) model (Jager et al. CRYPTO 2012) seems perfectly fit for an analysis of Noise. However, the ACCE model strictly divides protocols into two non-overlapping phases: the pre-accept phase (i.e., the channel establishment) and post-accept phase (i.e., the channel). Using the example of Noise, we show that this separation originates from the historic background of the TLS 1.2 proof, rather than it depicting the natural core of a channel establishment protocol. Similarly to TLS 1.3, Noise allows the transmission of encrypted messages as soon as a key is established (for instance, before any authentication between parties has taken place).
By proposing a generalization of the original ACCE model, we catch security properties of these earlier messages precisely. As our generalized model is aimed to capture security of multiple different channel establishment protocols, we then add flexibility to the security definition, comparable to the multi-stage key exchange model (Fischlin and Günther CCS 2014). We furthermore provide a broad discussion on the relations among and dimensions of the considered security properties as this plays a crucial role when defining security flexibly. Based on this, we observe that each message sent during the channel establishment can add new security properties, while inheriting those established in previous stages.
We give full security proofs for eight of the 15 basic Noise patterns to illustrate the flexibility and validity of this approach.
02 May 2019
Nazarbayev University, Kazakhstan
Job PostingSuccessful candidates should hold a PhD in mathematics, statistics or in a related field and have excellent English-language communication skills and experience with Western higher education. Applicants for associate professor positions should have considerable experience in supervising students at the graduate level, possess strong teaching skills and experience, and a demonstrated rank-appropriate research accomplishment and service. Applicants for assistant professor level should demonstrate a potential for excellence in teaching, research, and service.
Position responsibilities include: teaching undergraduate and graduate level of courses (2-2 teaching load), supervision of graduate students, curricular and program development, ongoing engagement in professional and research activities, general program guidance and leadership, and other activities related to the intellectual and cultural environment of the university.
Nazarbayev University offers an attractive benefits package, including:
competitive compensation;
free housing based on family size and rank;
relocation allowance;
no-cost medical insurance, with global coverage;
educational allowance for children
air tickets to home country, twice per year
Closing date for applications: 31 May 2019
Contact: Applicants should send a detailed CV, teaching and research statements, and list of publications to sst.cv (at) nu.edu.kz
More information: http://sst.nu.edu.kz
Norwegian University of Science and Technology (NTNU), Trondheim, Norway
Job Posting- Tight security,
- Structure-preserving cryptography, and
- Lattice-based cryptography.
Candidates should be able to show their strong expertise in cryptography in form of publications at major crypto or security conferences. The position is for 2 years and the department may offer a twelve months extension for teaching. Knowledge of the Norwegian language is not mandatory for this position. The working language in the group is English. All students and people in the city (Trondheim) speak very good English.
More information is given in the following link and one can only apply this position through the same link: https://www.jobbnorge.no/en/available-jobs/job/169418/postdoctoral-fellowships-in-public-key-cryptography.
If you would like to have further information or any questions, please feel free to contact Jiaxin Pan.
Closing date for applications: 16 May 2019
Contact: Jiaxin Pan (jiaxin.pan at ntnu.no)
Norwegian University of Science and Technology (NTNU), Trondheim, Norway
Job PostingThe successful candidate in public-key cryptography will work with Jiaxin Pan who will start an Associate Professor position at the Department of Mathematical Sciences in fall 2019. Currently, topics of interest include (but not limited to):
- Tight security,
- Structure-preserving cryptography, and
- Lattice-based cryptography.
The successful candidate in cryptographic voting systems will work with Professor Kristian Gjøsteen at the Department of Mathematical Sciences. Topics of interest include (but not limited to):
- User confidence in cryptographic voting systems,
- Security proofs for such systems, and
- Long-term security, including post-quantum security.
The applicants should have a master’s degree in mathematics, or a master’s degree in computer science, communications technology or related areas, with a strong mathematical component. A background including experience with cryptography or computational complexity is desirable. Candidates completing their master degree in 2019 are encouraged to apply.
Norway needs candidates that can be security cleared. The PhD work itself does not require a security clearance, but candidates that can be security cleared may be preferred.
The positions are for 3 years. The Department may offer a twelve month extension as a teaching assistant. The candidates for the position must be fluent in English, both oral and written.
More information is given in the following links and one can only apply these positions through the corresponding links:
* https://www.jobbnorge.no/en/available-jobs/job/169454/doctoral-fellowship-in-public-key-cryptography
* https://www.jobbnorge.no/en/available-jobs/job/169452/phd-fellowship-in-cryptographic-voting
Closing date for applications: 16 May 2019
Contact: Jiaxin Pan (jiaxin.pan at ntnu.no) or Kristian Gjøsteen (kristian.gjosteen at ntnu.no)
Ulm University, Institute of Distributed Systems, Germany
Job PostingUlm University is a young research university with a focus on natural sciences, medicine and technology. Located in an economically strong region, the University with its more than 10,000 students offers a dynamic work environment with attractive networking and development prospects. The Institute of Distributed Systems is a leading research group in areas like automotive security and privacy engineering.
Closing date for applications: 30 June 2019
Contact: Interested candidates should send their application to vs-jobs (at) uni-ulm.de.
More information: https://www.uni-ulm.de/in/vs/
DarkMatter Group - Abu Dhabi
Job Posting- Analyze, evaluate and target any weaknesses security systems which range from single crypto-primitives to entire protocols, from classical ciphers to the newest lightweight or post-quantum schemes.
- Develop mathematical and statistical models to analyze and solve security data problems.
- Be involved in the analysis of developed cryptosystems within DarkMatter products.
- Collaborate with skillful software, hardware, and telecommunication engineers.
- Work closely with the secure communications team and other teams in the organization.
- Work with latest software and test your code on state-of-the-art High-Performance Devices.
- Conduct research in theoretical and practical cryptanalysis.
- Attend personalized in-house trainings with top cryptographers and international conferences and workshops.
*To bring your dream to life, you’ll need:
- PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics, Computer Science or any relevant Engineering degree.
- Extensive experience in theoretical and practical cryptanalysis
Valuable publications in the field of cryptanalysis
- Extensive experience in performing side-channel attacks.
- Deep understanding of various hardware security vulnerabilities and threats.
Closing date for applications: 29 July 2019
Contact: Mehdi Messaoudi
Talent Acquisition Specialist
mehdi.messaoudi (at) darkmatter.ae
More information: https://boards.greenhouse.io/darkmatter/jobs/1090184
DarkMatter Group - Abu Dhabi
Job Posting- Design, implement and deploy quantum-safe cryptographic algorithms covering both but not limited to: key exchange algorithms and digital signature schemes.
- Conduct research and development in lattice-based, code-based or hash-based cryptosystems.
- Perform security assessments of either crypto-primitives or cryptosystems at the theoretical and implementation level.
- Work closely with the secure communications team and other teams in the organization to design end-to-end secure communication protocols using state-of-the art and customized cryptographic algorithms and primitives.
- Be involved in the integration of developed cryptosystems within DarkMatter products.
To bring your dream to life, you’ll need:
- PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics or Computer Science.
- Extensive experience developing in various programming languages.
Closing date for applications: 29 August 2019
Contact: Mehdi Messaoudi
Talent Acquisition Specialist
mehdi.messaoudi (at) darkmatter.ae
More information: https://boards.greenhouse.io/darkmatter/jobs/1030431
Cosmian, Paris, France
Job PostingOur ambition is to solve the Private Data paradox: how to provide data intelligence to a rapidly rising data economy without compromising privacy.
Job Description
Your main responsibility will be to lead our cryptographic research and development. Cosmian implements the latest research in fully-homomorphic encryption, functional encryption and secure MPC, to provide better protection of privacy.
Your daily mission will include
- managing the collaborations with the academic and research worlds, working with some of the best world cryptographers including the crypto team from École Normale Supérieure Paris,
- understand how their latest research can be leveraged,
- design new implementation algorithms with Cosmian Rust/C++ developers,
- lead certification and/or patenting where appropriate,
- and more generally get our work known and recognized by a larger cryptography community.
The job is full-time and located in Paris, France. Remote work may be envisaged with specific requirements. The package includes stock options.
Required skills/qualifications
You must have a strong background in maths and in cryptography (Master and/or PhD) and must demonstrate
the ability to communicate complex ideas to a less maths-savvy audience.
A working command of French is not mandatory.
Closing date for applications: 1 October 2019
Contact: Bruno GRIEDER, bruno.grieder (at) cosmian.com, +33 6 33 27 46 85
or
Raphaël AUPHAN, raphael.auphan (at) cosmian.com
More information: https://cosmian.com/chief_scientist/
Pompeu Fabra University and Nokia Bell Labs
Job PostingWe are looking for highly motivated young researchers with a Master degree (or equivalent) in Computer Science, Engineering, Mathematics, Economics or related disciplines, willing to study and do research at the leading edge of blockchain technologies.
PhD students will be appointed for 36 months. All the fellowships provide a highly competitive remuneration package, complemented by mobility and family allowances (for eligible candidates).
The evaluation committee will assess candidates on a continuous basis until the positions are filled. First evaluation will be at the end of May , and afterwards regularly at the end of every month until all candidates are selected. Once evaluated will be contacted, and if pre-selected interviews will be arranged either via telco or by inviting you to one of the partners. Selected ESRs will be published on the website.
Closing date for applications:
Contact: bandit (at) upf.edu
More information: https://www.upf.edu/web/bandit