IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
27 April 2020
TU Darmstadt, Germany
Current topics of interest include (but are not limited to):
- Secure cryptographic implementations
- Leakage/tamper resilient cryptography
- Blockchains and cryptocurrencies
- Distributed cryptography
The position offers an internationally competitive salary including social benefits. TU Darmstadt offers excellent working environment in the heart of the Rhein-Main area, and has a strong institute for research on IT security with more than 300 researchers working on all aspects of cybersecurity.
Review of applications starts immediately until the position is filled.
Closing date for applications:
Contact: Sebastian Faust, sebastian@cs.tu-darmstadt.de
24 April 2020
Dates: 11-15 May 2020
The website for Eurocrypt 2020 has been revised with information about the upcoming virtual conference on May 11-15. Registration is now open, and further details will appear in the days to come.
This will be the first virtual conference by IACR, and the only cost for attendees will be the IACR membership fee if you haven't already paid it yet this year.
Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
Kari Kostiainen, Aritra Dhar, Srdjan Capkun
Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
Compared to conventional auditor-based approaches, DAPOL provides a privacy preserving mechanism for users to validate their vote or amount inclusion in the reported total of liabilities/obligations and complements the traditional validation performed by the auditors by adding extra privacy and fairness guarantees. The recommended approach combines previously known cryptographic techniques to provide a layered solution with predefined levels of privacy in the form of gadgets. The backbone of this proposal is based on the enhanced Maxwell Merkle-tree construction and is extended using zero knowledge proofs, sparse trees, balance splitting tricks, efficient padding, verifiable random functions, deterministic key derivation functions and the range proof techniques from Provisions and ZeroLedge solvency protocols, respectively.
Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
Pantea Kiaei, Patrick Schaumont
Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leo Reyzin
We present a scalable solution for implementing this functionality on a public proof-of-stake blockchain, in the presence of a mobile adversary controlling a small minority of the stake, using proactive secret sharing techniques. The main challenge is that, on the one hand, scalability requires that we use small committees to represent the entire stake, but, on the other hand, a mobile adversary may be able to corrupt the entire committee if it is small. For this reason, prior proactive secret sharing solutions are either non-scalable or insecure in our setting.
We solve this issue using "player replaceability", where the committee is anonymous until after it performs its actions, as in the Algorand blockchain. (Algorand uses player replaceability to defend against DDoS attacks.) Our main technical contribution is a system that allows sharing and re-sharing of secrets among the members of small dynamic committees, without knowing who they are until after they perform their actions. Our solution handles a fully mobile adversary corrupting less than 25\% of the stake at any time, and is scalable in terms of both the number of parties on the blockchain and the number of time intervals.
Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
Ido Shahaf, Or Ordentlich, Gil Segev
Jean-Sébastien Coron, Agnese Gini
Marloes Venema, Greg Alpár
Debdeep Mukhopadhyay
22 April 2020
XLIM, University of Limoges (France)
This Ph.D. thesis is offered as part of the ANR-funded 4-year research project MobiS5. The goal of MobiS5 is to provide a cryptographic toolbox for the emerging 5G technologies. More information can be found at: https://mobis5.limos.fr/index.html.
This 3-year Ph.D. thesis will focus on the two following aspects of 5G security:
- 5G Core Network security
- Delegation in the context of 5G networks
Closing date for applications:
Contact: Cristina Onete (maria-cristina.onete@unilim.fr) or Olivier Blazy
More information: https://mobis5.limos.fr/jobs.html
21 April 2020
CentraleSupélec - INSA, Institute of Electronics & Telecommunications of Rennes (IETR), France
This PhD will study the impact that close-by digital-analog-RF domains in mixed-signal reconfigurable platforms may have on new system vulnerabilities. The thesis will focus on studying data leakage mechanisms in RFSoCs to analyze and understand potential new threats linked to their reconfigurable and mixed-signal nature as a first step to find adequate countermeasures.
The candidate must hold a Master degree in Computer/Electrical Engineering, Embedded Systems, Microelectronics, or Computer Science and demonstrate strong background in several of the following topics: Digital design with HDLs; Reconfigurable computing, FPGAs; Hardware security; Embedded systems architectures; Microelectronics/VLSI Design. Knowledge on cryptographic algorithms implementations, C/C++/Python programming and Linux/Git as development environment are highly valuable.
You will receive a 3 year PhD contract and social security coverage, subsidized meals, partial reimbursement of public transport costs, support with accommodation at the campus and access to vocational training and social, cultural and sports events and activities. Send your CV, Bachelor/Master transcripts, a motivational text and reference letter before May 10, 2020.
Closing date for applications:
Contact: Ruben Salvador: ruben (dot) salvador (at) centralesupelec (dot) fr
CEA-LETI, Grenoble, France
Closing date for applications:
Contact: Vincent Dimper
University of Auckland, New Zealand
Due to the potential threat of quantum computers, the research community is re-evaluating the security of a number of protocols and systems in widespread use. At the very least it is necessary to replace some common cryptographic building blocks with post-quantum alternatives. However, in some settings, the resulting systems may not be practical. It is therefore appropriate to reconsider, from the ground up, these protocols and systems. This PhD project will initiate a study of such protocols and systems. The project will leverage the NIST post-quantum standardization process to form a clear picture of the current state of post-quantum crypto. The project will develop new lightweight solutions for certain applications such as the internet of things (IoT).
The project will be supervised by Professor Steven Galbraith, together with other members of the Cyber Security Foundry at the University of Auckland.
Required skills and experience: Bachelor with honours, or Masters degree, in either Engineering, Computer Science or Mathematics. Good mathematical knowledge and understanding of rigorous mathematical thinking. Good knowledge of cryptography and information security. Programming skills. Good communication skills, both written and spoken.
- Duration: 3 years
- Value: International Student Fees + stipend of NZ$ 27,900 per year.
- Application deadline: 20/5/2020
- Email your CV to Keshala De Silva, with the subject line "Application for PhD Studentship on Applications of post-quantum cryptography".
- If you have written a master thesis or similar, then please email a pdf of it.
- https://www.auckland.ac.nz/en/study/study-options/find-a-study-option/mathematics/doctoral.html
- https://www.auckland.ac.nz/en/study/applications-and-admissions/apply-now.html
Closing date for applications:
Contact: Steven Galbraith
Cryptanalysis Taskforce @ Nanyang Technological University, Singapore
(Yes ! We are still hiring despite COVID-19)
The Cryptanalysis Taskforce at Nanyang Technological University in Singapore led by Prof. Jian Guo is seeking for candidates to fill 3 postdoctoral research fellow positions on symmetric-key cryptography, including but not limited to the following sub-areas:- tool aided cryptanalysis, such as MILP, CP, STP, and SAT
- machine learning aided cryptanalysis and designs
- privacy-preserving friendly symmetric-key designs
- quantum cryptanalysis
- cryptanalysis against SHA-3 and AES
Closing date for applications:
Contact: Asst Prof. Jian Guo, guojian@ntu.edu.sg
More information: http://team.crypto.sg
20 April 2020
NIO; San Jose, California
Responsibilities
- Design and build security products for connected and autonomous vehicles.
- Research security problems and solutions related to vehicles and transportation
- Design in-vehicle security mechanisms, such as secure vehicle network communication, on-car IDS/IPS, and firewall
Qualifications
- Excellent in security fundamentals, such as network security, applied cryptography, server security, and end-point security
- In-depth knowledge of Linux kernel and OS, and network protocols (TCP/IP, HTTP, MQTT, etc.)
- Worked with Secure Boot on Arm or Aurix processors
Preferred Qualifications
- Experience with Linux kernel hardening
- Knowledge of CAN and vehicle system architecture
- Knowledge of security of various wireless technologies (such as BLE and NFC)
Closing date for applications:
Contact:
Marisela Peifer: Sr Manager, People Ops & Talent
Marisela.Peifer@nio.io
More information: https://jobs.lever.co/nio/8f29bd44-663b-4de2-b6e2-9e596495d5b9