IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
21 December 2020
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
ePrint ReportTung Chou
ePrint ReportAlessandro Baccarini, Marina Blanton, Chen Yuan
ePrint ReportChanghui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
ePrint ReportLoïc Ferreira
ePrint Report20 December 2020
Daejeon, South Korea, 20 May - 22 May 2021
Event CalendarSubmission deadline: 3 March 2021
-
Event CalendarSubmission deadline: 8 March 2021
Tokyo Institute of Technology, School of Computing, Tokyo, Japan
Job PostingClosing date for applications:
Contact: Keisuke Tanaka, Professor, Chair of Department of Mathematical and Computing Science, School of Computing (Email: keisuke@is.titech.ac.jp)
More information: https://jrecin.jst.go.jp/seek/SeekJorDetail?id=D120120992&ln_jor=1
Tokyo Institute of Technology, School of Computing, Tokyo, Japan
Job PostingClosing date for applications:
Contact: Keisuke Tanaka, Professor, Chair of Department of Mathematical and Computing Science, School of Computing (Email: keisuke@is.titech.ac.jp)
More information: https://jrecin.jst.go.jp/seek/SeekJorDetail?id=D120120988&ln_jor=1
POLE LEONARD DE VINCI, Paris La Défense
Job PostingClosing date for applications:
Contact: APPLICATION PROCEDURE: Please provide your CV and a cover letter describing your research activities. Qualified candidates need to send their application package by email to recrutement@devinci.fr. Contacts: - Cyril Grunspan (cyril.grunspan@devinci.fr) - Jean Rohmer (jean.rohmer@devinci.fr)
More information: https://www.devinci.fr/
CentraleSupélec, IETR Lab; Rennes, France
Job PostingThe IETR Lab in Rennes (FR) is looking for a motivated master student on the last year of their degree for a 5-6 month internship, which can serve as the mandatory internship to finish your degree.
CentraleSupélec is a top Engineering school in France with a established tradition of excellence in Cybersecurity. It is a great place for an internship at the IETR CNRS-affiliated laboratory in Rennes, a world-class research and innovation pole in cybersecurity.
Topic
To protect critical infrastructures and sensitive data managed by CPS running Machine Learning algorithms, we need robust implementations able to resist attacks. To this end, we are studying the vulnerabilities that physical SCA attacks pose to DNN/CNN accelerators in FPGAs. In this internship you will: (1) review the literature on power attacks to ML implementations and (2) build an experimental set-up to reverse engineer DNN accelerators using (power/EM) side-channel leakage from heterogeneous devices like Zynq SoC/MPSoC.
Profile
Master student in Computer/Electrical Eng, Electronics or Computer Science with strong background in one or various of the following topics
- HW security, SCA attacks
- HDL/HLS design for FPGAs (pref. Vivado), experience with actual implementations, use of lab. instruments as oscilloscopes
- DNN/CNN implementation in FPGAs
- Familiarity with C/C++/Python programming, Linux/Git as dev. environment
French is not required.
There might be options to continue working towards a PhD after the internship.
Information
- Location: CentraleSupélec, IETR Lab, Rennes (FR)
- Starting date: flexible, anytime from Feb/March
- Duration: 5-6 months
- Stipend: according to regulations, 550-600€/month
Deadline: mid January (interviews running now)
To apply: https://www.ietr.fr/spip.php?article2150
Contact for more info. regarding COVID-19 situation.
Closing date for applications:
Contact: Rubén Salvador: ruben.salvador@centralesupelec.org
More information: https://www.ietr.fr/spip.php?article2150
University of Notre Dame, Notre Dame, IN, USA
Job PostingClosing date for applications:
Contact: Taeho Jung
More information: https://sites.nd.edu/taeho-jung/
Oregon State University; Corvallis, OR, USA
Job PostingClosing date for applications:
Contact: Mike Rosulek <rosulekm at eecs.oregonstate.edu>
More information: https://jobs.oregonstate.edu/postings/96561
Chalmers University of Technology, Sweden
Job Posting- Verifiable computation
- Secure Multi Party Computation
- Privacy-preserving authentication
- Cryptographic primitives
- A PhD degree in Cryptography;
- Strong publication record;
- Strong mathematical and algorithmic CS background;
- Excellent programming skills;
- Excellent written and verbal communication skills in English
Closing date for applications:
Contact: Katerina Mitrokotsa
More information: https://www.chalmers.se/en/about-chalmers/Working-at-Chalmers/Vacancies/Pages/default.aspx?rmpage=job&rmjob=9112
Chalmers University of Technology, Sweden
Job PostingYour Profile:
- A PhD degree in Cryptography with connections to Machine learning;
- Publications
- Strong mathematical and algorithmic CS background;
- Excellent programming skills;
- Excellent written and verbal communication skills in English
Closing date for applications:
Contact: Katerina Mitrokotsa
More information: https://www.chalmers.se/en/about-chalmers/Working-at-Chalmers/Vacancies/Pages/default.aspx?rmpage=job&rmjob=9089
17 December 2020
Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
ePrint ReportAttacks can take advantage of this shutdown threshold, and attackers can even cleverly utilise financial derivatives of cryptocurrencies (whose gain is primarily affected by the change of coin price) to increase their potential gains. As the coin price may drop when successful attacks (such as double spending attacks) on the associated cryptocurrency are discovered, the financial derivatives may be leveraged by a rational adversary to gain extra profit from the launched attacks.
Lira Wang
ePrint ReportYang Tan
ePrint ReportOlivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
ePrint ReportWe introduce a new cryptographic primitive called Encryption schemes with Password-protected Assisted Decryption (EPAD schemes), in which a users decryption key is shared between a user device (or token) on which no assumption is made, and an online server. The user shares a human-memorizable password with the server. To decrypt a ciphertext, the user launches, from a public computer, a distributed protocol with the device and the server, authenticating herself to the server with her password (unknown to the device); in such a way that her secret key is never reconstructed during the interaction. We propose a strong security model which guarantees that (1) for an efficient adversary to infer any information about a users plaintexts, it must know her password and have corrupted her device (secrecy is guaranteed if only one of the two conditions is fulfilled), (2) the device and the server are unable to infer any information about the ciphertexts they help to decrypt (even though they could together reconstruct the secret key), and (3) the user is able to verify that device and server both performed the expected computations. These EPAD schemes are in the password-only model, meaning that the user is not required to remember a trusted public key, and her password remains safe even if she is led to interact with a wrong server and a malicious device.
We then give a practical pairing-based EPAD scheme. Our construction is provably secure under standard computational assumptions, using non-interactive proof systems which can be efficiently instantiated in the standard security model, i.e., without relying on the random oracle heuristic.