IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
20 January 2020
Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
ePrint ReportYasuhiko Ikematsu, Shuhei Nakamura
ePrint Report17 January 2020
University of California, Berkeley
Job PostingClosing date for applications:
Contact: tcs-postdoc-inquiries@lists.eecs.berkeley.edu
More information: http://theory.cs.berkeley.edu/postdoc.html
Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
ePrint ReportPascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
ePrint ReportPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
ePrint ReportWe design, implement, and evaluate Delphi, a secure prediction system that allows two parties to execute neural network inference without revealing either party's data. Delphi approaches the problem by simultaneously co-designing cryptography and machine learning. We first design a hybrid cryptographic protocol that improves upon the communication and computation costs over prior work. Second, we develop a planner that automatically generates neural network architecture configurations that navigate the performance-accuracy trade-offs of our hybrid protocol. Together, these techniques allow us to achieve a 22x improvement in online prediction latency compared to the state-of-the-art prior work.
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
ePrint ReportChangshe Ma, Yiping Gu, Hongfei Li
ePrint ReportTianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
ePrint ReportOrhun Kara, Muhammed F. Esgin
ePrint ReportHaibat Khan, Benjamin Dowling, Keith M. Martin
ePrint ReportAlexander Chepurnoy, Amitabh Saxena
ePrint ReportIn this work, we propose a concrete example of such a mechanism which is using collateralized smart contracts. Our approach allows miners to bypass non-outsourceable Proof-of-Work schemes if the underlying blockchain platform supports smart contracts in a sufficiently advanced language. In particular, the language should allow access to the PoW solution.
At a high level, our approach requires the miner to lock collateral covering the reward amount and protected by a smart contract that acts as an escrow. The smart contract has logic that allows the pool to collect the collateral as soon as the miner collects any block reward. We propose two variants of the approach depending on when the collateral is bound to the block solution. Using this, we show how to bypass previously proposed non-outsourceable Proof-of-Work schemes (with the notable exception for strong non-outsourceable schemes) and show how to build mining pools for such schemes.
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
ePrint Report16 January 2020
CYBERCRYPT: Copenhagen, Zurich or Munich
Job PostingWe are an international company with branches in Copenhagen, Zurich and Munich. We are looking to strengthen our team of in-house cryptographic experts in either of our locations.
The right person will work on internal and external high-end projects in the area of cryptology. This will involve cutting-edge cryptographic design, cryptanalysis, software development, contributions to product development, customer trainings, security evaluations, etc.
A PhD degree in symmetric-key cryptology (block ciphers, stream ciphers, MACs or hash functions) or a closely related area is a requirement. Proficiency in the efficient software implementations of cryptographic algorithms for such platforms as modern Intel or ARM CPUs is a plus. Postdoctoral research experience in symmetric-key cryptology as well as teaching experience is also an advantage.
We expect that our new Senior Cryptographer can generate value for the company and for our customers. An important part of your job is to take technical responsibility for projects and to be a great team player who is a pleasure to work with. You take the initiative, provide high quality and always deliver on time.
We offer a highly attractive compensation, a permanent contract, a dynamic international working environment, a conference travel package, relocation benefits, an employee success participation plan, as well as significant time and budget to conduct cryptologic research.
Applications will be reviewed on the ongoing basis. Planned target date for employment is 1 April 2020 or sooner.
Please send your CV incl. the list of publications and a motivational letter to jobs@cyber-crypt.com. You can also use this email address if you have any questions about the position.
Closing date for applications:
Contact: Dr. Andrey Bogdanov
More information: https://www.cyber-crypt.com/company/#team
15 January 2020
Queen's University Belfast, Center for Secure Information Techonlogies; Belfast, UK
Job PostingClosing date for applications:
Contact: Dr. Jinguang Han (j.han@qub.ac.uk)
More information: https://www.qub.ac.uk/courses/postgraduate-research/phd-opportunities/post-quantum-anonymous-credential.html
CNRS, IRISA, Rennes, France
Job PostingResearch topic While malware detection and mitigation research are now trending, a lot of challenges and unsolved problems still remain. Recently, sophisticated malware designers invented techniques to circumvent software detection techniques. A new direction consists in using unintentionally emitted hardware side-channel information. The big advantage of this information is the non-detection by malware designers. Still, those approaches have to be established in real-world scenarios and efficient analysis techniques developed and implemented. We are currently building up a realistic IoT malware side-channel analysis platform which gives us first interesting new insights.
Joining our team you will
- infect IoT devices with malware samples,
- be responsible for the maintenance of the side-channel workbench,
- derive and develop efficient implementations of analysis algorithms,
- drive top-quality research and publish in A*/A-class security and malware conferences.
Prerequisites We are looking for team players who are motivated and able to drive top-quality research. The area of research lies between several fields and we expect at least competences in one of them:
- embedded devices/side-channel analysis, and/or
- statistics, machine learning, deep learning, and/or
- malware analysis.
Additionally, an ideal candidate should have:
- Research engineer: MS degree in a related field, with 1-3 years of work experience,
- PostDoc: Ph.D. in a related field
- good programming skills,
- good level in written and spoken English,
- motivation to save the world.
Closing date for applications:
Contact: Annelie Heuser (annelie.heuser@irisa.fr) with a CV, cover letter, and references.
Arpita Patra, Ajith Suresh
ePrint ReportAn extensive benchmarking of BLAZE for the aforementioned ML algorithms over a 64-bit ring in both WAN and LAN settings shows massive improvements over ABY3. Concretely, we observe improvements up to $\mathbf{333\times}$ for Linear Regression, $\mathbf{146 \times}$ for Logistic Regression and $\mathbf{301\times}$ for Neural Networks over WAN. Similarly, we show improvements up to $\mathbf{2610\times}$ for Linear Regression, $\mathbf{820\times}$ for Logistic Regression and $\mathbf{303\times}$ for Neural Networks over LAN.