IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 July 2020
Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
ePrint ReportHuanyu Wang, Elena Dubrova
ePrint ReportHongrui Cui, Yu Yu
ePrint ReportPierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
ePrint ReportKolkata, India, 17 December - 21 December 2020
Event CalendarSubmission deadline: 24 July 2020
Notification: 25 September 2020
Secure-IC Pte Ltd
Job Posting- Ensuring the various phases of specifications for applications embedding cryptography
- C and C++ programming and testing
- Integration and validation on target embedded microprocessor. (knowledge of ARM processors is preferable)
- Developing non-regression tests along with benchmarking tests
- Bringing innovative ideas to improve our products, the quality of deliveries and development processes
- Delivery of customers projects (consulting and training)
- Embedded software development engineer with 5 years minimum experience in an equivalent position
- First experience in the field of automotive: CAN bus, automotive Ethernet
- Master’s degree (or higher) in Computer Science, Mathematics or similar field
- Proficiency in C/C++ language and assembly skills
- Knowledge of ARM processors, development for security and safety
- Proficiency in English
- Knowledge of cryptography
- Excellent communication skills
- Ability to work in a team
- Outstanding analytical and problem-solving skills
Closing date for applications:
Contact: Sylvain Guilley
TU Darmstadt, Germany
Job PostingThe Cryptography and Privacy Engineering Group (ENCRYPTO) @Department of Computer Science @Technical University of Darmstadt offers a full position for a Doctoral Researcher (Research Assistant/PhD Student) in Cryptography & Privacy Engineering, available immediately and for up to 3 years with the possibility of extension.
Our mission is to demonstrate that privacy can be efficiently protected in real-world applications via cryptographic protocols.TU Darmstadt is a top research university for IT security, cryptography and computer science in Europe. The position is based in the City of Science Darmstadt, which is very international, livable and well-connected in the Rhine-Main area around Frankfurt. Initially, no knowledge of German is necessary and TU Darmstadt offers corresponding support.
Job descriptionAs doctoral researcher @ENCRYPTO, you conduct research, build prototype implementations, and publish and present the results at top venues. You will also participate in teaching and supervise thesis students and student assistants. The position is co-funded by the ERC Starting Grant “Privacy-preserving Services on the Internet” (PSOTI), where we build privacy-preserving services on the Internet, which includes designing protocols for privately processing data among untrusted service providers using secure multi-party computation and implementing a scalable framework.
Your profile- Completed Master's degree (or equivalent) at a top university with excellent grades in IT security, computer science, applied mathematics, electrical engineering, or a similar area.
- Extensive knowledge in applied cryptography/IT security and excellent software development skills.
- Additional knowledge in cryptographic protocols (ideally secure computation) is a plus.
- You are self-motivated, reliable, creative, can work independently, and want to do excellent research on challenging scientific problems with practical relevance.
- The working language at ENCRYPTO is English, so you must be able to discuss/write/present scientific results in English, whereas German is not required.
Closing date for applications:
Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
More information: https://encrypto.de/PHD-STUDENT
Ulm University, Germany
Job PostingThe ideal candidate for the PostDoc position has a Ph.D. degree in computer science, or a closely related discipline, from an internationally-renowned university, a strong background in system security with focus on vehicular security and privacy, documented by high-quality publications, and a strong motivation to become part of our team.
For Ph.D.-level researchers, we require a M.Sc. degree in computer science, or a closely related discipline, from an internationally-renowned university with a visible focus in system security.
Proficient knowledge of written and spoken English is required for both positions. Conversational German skills are a substantial advantage.
We are one of the leading research groups in vehicular security and privacy. Our group and university offer a unique environment for automotive-related research with excellent facilities and highly competitive salary. Automotive technologies are a priority area at Ulm University, and many research groups are active in fields like vehicle-driver interaction and automated driving. Being situated in Southern Germany between Stuttgart and Munich, we are located in the right heart of German car industry in one of the strongest economic regions in Europe. We have strong ties with companies like Daimler, Audi, BMW, and Bosch and many of those companies have research or development labs at our campus.
For more information visit:
https://www.uni-ulm.de/in/vs/inst/offene-stellen/postdoc-and-phd-level-researchers-vehicular-security-privacy/
Closing date for applications:
Contact: Prof. Dr. Frank Kargl (vs-jobs@uni-ulm.de)
More information: https://www.uni-ulm.de/in/vs/inst/offene-stellen/postdoc-and-phd-level-researchers-vehicular-security-privacy/
Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
ePrint ReportIn this work, we investigate this problem of misleading conclusions from the entropy behavior, and we define two new concepts, simple and generalized guessing entropy. We demonstrate that the first one needs only a limited amount of attack traces but can lead to wrong interpretations about leakage detection. The second concept requires a large (sometimes unavailable) amount of attack traces, but it represents the optimal way of calculating guessing entropy. To quantify the profiled model's learnability, we first define a leakage distribution metric to estimate the underlying leakage model. This metric, together with the generalized guessing entropy results for all key candidates, can estimate the leakage learning or detection when a necessary amount of attack traces are available in the attack phase. By doing so, we provide a tight estimation of profiled side-channel analysis model learnability. We confirm our observations with a number of experimental results.
Halifax, Canada, 21 October - 23 October 2020
Event CalendarSubmission deadline: 11 August 2020
Notification: 17 September 2020
University of Luxembourg
Job PostingThe Applied Crypto Group of the University of Luxembourg has multiple post-doc positions, funded by the H2020 ERC programme.
Possible topics of interests are:- fully homomorphic encryption and multilinear maps
- public-key cryptanalysis
- side channel attacks and countermeasures
- white-box cryptography
- blockchain applications
Candidates must have a Ph.D. degree in cryptography or related field. The duration of the positions is 2.5 years. The post-docs will be members of the Security and Trust (SnT) research center from the University of Luxembourg (>200 researchers in all aspects of IT security). We offer a competitive salary (about 60,000 euro/year).
Deadline for application: September 15th, 2020.
Closing date for applications:
Contact: Jean-Sebastien Coron: jean-sebastien.coron@uni.lu
More information: http://www.crypto-uni.lu/vacancies.html
16 July 2020
Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
ePrint ReportIn contrast to previous works, we provide a detailed security analysis of the resulting signature scheme under classical and quantum attacks that justifies our selection of parameters. On the way, we fill a gap in the security analysis of XMSS as described in RFC 8391 proving that the modified message hashing in the RFC does indeed mitigate multi-target attacks. This was not shown before and might be of independent interest.
Jan Richter-Brockmann, Tim Güneysu
ePrint ReportIn this work we investigate different strategies to efficiently implement the BIKE algorithm on FPGAs. To this extend, we improve already existing polynomial multipliers, propose efficient strategies to realize polynomial inversions, and implement the Black-Gray-Flip decoder for the first time. Additionally, our implementation is designed to be scalable and generic with the BIKE specific parameters. All together, the fastest designs achieve latencies of 2.69 ms for the key generation, 0.1 ms for the encapsulation, and 104.04 ms for the decapsulation considering the first security level.
Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
ePrint ReportTo demonstrate that our attacks are practical, we first show that SPA can be used to recover RSA private exponents using FI attacks. Subsequently, we show the generic nature of our attacks by performing DPA on AES after applying FI attacks to several different targets (with AVR, 32-bit ARM and RISC-V CPUs), using different software on each target, and do so with a low-cost (i.e., less than $50) power fault injection setup. We call this technique Fault Correlation Analysis (FCA), since we perform CPA on fault probability traces. To show that this technique is not limited to software, we also present FCA results against the hardware AES engine supported by one of our targets. Our results show that even without access to the ciphertext (e.g., where an FI redundancy countermeasure is in place, or where ciphertext is simply not exposed to an attacker in any circumstance) and in the presence of jitter, FCA attacks can successfully recover keys on each of these targets.