IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 December 2019
Morteza Adeli, Nasour Bagheri
Yongge Wang
Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Moni Naor, Lior Rotem, Gil Segev
Equipped with our immediate key delivery property, we formalize strong notions of security for out-of-band authenticated group key exchange, and demonstrate that the existing protocols either do not satisfy our notions of security or are impractical (these include, in particular, the protocols deployed by Telegram, Signal and WhatsApp). Then, based on the existence of any passively-secure key-exchange protocol (e.g., the Diffie-Hellman protocol), we construct an out-of-band authenticated group key-exchange protocol satisfying our notions of security. Our protocol is inspired by techniques that have been developed in the context of fair string sampling in order to minimize the effect of adversarial aborts, and offers the optimal tradeoff between the length of its out-of-band value and its security.
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
Yanyan Liu, Yiru Sun
Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
Karlsruhe Institute of Technology (KIT)
The "Intelligent System Security" research group at Karlsruhe Institute of Technology (KIT) is seeking to fill the position of
Two PhD Students/ Research Assistants (f/m/d)
in the field of Computer Security and Artificial Intelligence
Both positions are fully funded with the German salary level TV-L 13 (100%) and should be filled at the soonest possible date. In the beginning, the positions are limited to two years, but they offer the possibility of funding the entire duration of the PhD.
Research
Our research group works on the application of machine learning for computer security. In particular, we develop methods in the area of application security and system security, for instance, approaches for attack detection or vulnerability discovery in software and embedded devices. Also, the robustness, security, and interpretability of machine learning methods are central to our research.
Your Profile
We are looking for talented candidates that fulfill the following criteria and intend to pursue a PhD in computer science:
- Diploma or Master's degree in computer science or any related field
- Very good knowledge of computer security and/or machine learning
- Enthusiasm for conducting research on computer security
Field of Work
Possible research topics include, but are not limited to:
- The analysis of attacks and malware using machine learning
- Assisted discovery of vulnerabilities
- Fuzz Testing (Fuzzing) using machine learning
- Attacks against learning-based systems
- Explainability of machine learning in computer security
Application
Please send your application including a cover letter, your CV, and certificates/references to applications@intellisec.org. Make sure to point out why you are a good fit for us and research in computer security.
Application Deadline
12. January 2020
Closing date for applications:
Contact: Christian Wressnegger, https://intellisec.org/chris
More information: https://intellisec.de/jobs/phd-2020-en.html
Technical University of Denmark
Closing date for applications:
Contact: Further information may be obtained Head of the Cyber Security Section Christian Damsgaard Jensen, mail: cdje@dtu.dk or Professor of Cryptology Lars Ramkilde Knudsen, mail: lrkn@dtu.dk.
More information: https://www.dtu.dk/english/about/job-and-career/vacant-positions/job?id=7b31b1b3-fb26-41cc-9852-59134bb47a9d
16 December 2019
Security & Privacy Group ( Academic Centre of Excellence in Cyber Security) University of Birmingham
We expect the candidates to have skills in digital circuit design (ASIC or FPGA), hardware/software implementation of algorithms, programming etc.
The Post-Doc and PhD will be working with Dr. Sujoy Sinha Roy and will be based at the Security and Privacy group of the University of Birmingham's School of Computer Science. The National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise the research group as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR).
If you are interested in the Post-Doc or PhD position, please contact Dr. Sujoy Sinha Roy with a CV. For more information, please visit https://www.cs.bham.ac.uk/~sinharos/
Closing date for applications:
Contact: Dr. Sujoy Sinha Roy (s.sinharoy@cs.bham.ac.uk)
More information: https://www.cs.bham.ac.uk/~sinharos/
Linköping University, Sweden
Closing date for applications:
Contact: Prof Jeff.Yan@liu.se
Barcelona, Espanya, 20 April - 22 April 2020
Bin Wang, Xiaozhuo Gu, Yingshan Yang
D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
A weak source $\mathbf{X}$ of the form $\mathbf{X}_1,...,\mathbf{X}_N$, where each $\mathbf{X}_i$ is on $n$ bits, is an $(N,K,n,k)$-source of locality $d$ if the following hold:
(1) Somewhere good sources: at least $K$ of the $\mathbf{X}_i$'s are independent, and each contains min-entropy at least $k$. We call these $\mathbf{X}_i$'s good sources, and their locations are unknown. (2) Bounded dependence: each remaining (bad) source can depend arbitrarily on at most $d$ good sources.
We focus on constructing extractors with negligible error, in the regime where most of the entropy is contained within a few sources instead of across many (i.e., $k$ is at least polynomial in $K$). In this setting, even for the case of $0$-locality, very little is known prior to our work. For $d \geq 1$, essentially no previous results are known. We present various new extractors for adversarial sources in a wide range of parameters, and some of our constructions work for locality $d = K^{\Omega(1)}$. As an application, we also give improved extractors for small-space sources.
The class of adversarial sources generalizes several previously studied classes of sources, and our explicit extractor constructions exploit tools from recent advances in extractor machinery, such as two-source non-malleable extractors and low-error condensers. Thus, our constructions can be viewed as a new application of non-malleable extractors. In addition, our constructions combine the tools from extractor theory in a novel way through various sorts of explicit extremal hypergraphs. These connections leverage recent progress in combinatorics, such as improved bounds on cap sets and explicit constructions of Ramsey graphs, and may be of independent interest.
David Butler, David Aspinall, Adria Gascon
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
14 December 2019
University of Kent, Canterbury
KirCCS is calling for applications for three batches of PhD studentships (2+3+20). Five of these studentships for KirCCS academics will be funded by the University of Kent. There are up to 20 more studentships for all academics of the University of Kent, to be funded jointly by the China Scholarship Council (CSC) and the University of Kent.
The 5 University of Kent funded studentships provide full funding for 3 years with an annual stipend at the EPSRC rate (£15,009 p.a. for 2019-20), and a waiver of the home student fees (£4,327 p.a. for 2019-20), totaling £19,336 p.a. (based on 2019-20 figures). The full funding is for "home" students only (eligibility and detailed fees regulations in the UK can be found at https://www.ukcisa.org.uk/Information--Advice/Fees-and-Money/England-fee-status). Candidates who do not meet the "home student" criteria are still eligible to apply, but will need to bring additional funding to cover the difference between the overseas fees (£19,000 p.a. for 2019-20) and the home fees.
The 20 CSC funded studentships provide full funding for (Chinese) applicants who are eligible for PhD studentships from the China Scholarship Council (CSC) only. The full funding for CSC funded (Chinese) students include a stipend of £1,200 per month (£14,400 p.a. for 2019-20) provided by CSC and a waiver of full overseas fees (£19,000 p.a. for 2019-20) by the University of Kent, totaling £33,400 p.a. (based on 2019-20 figures). The CSC will also cover a return flight ticket from China to the UK, medical insurance, and one-off UK visa costs.
All successful candidates are expected to start in September 2020.
Closing date for applications:
Contact: For academic queries (like identifying research topics or supervisors) please contact Prof Shujun Li (s.j.li@kent.ac.uk). For queries on the admission procedure, please contact Dr Laura Bocchi, L.Bocchi@kent.ac.uk).
More information: https://cyber.kent.ac.uk/calls.html#PhDs