International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

Here you can see all recent updates to the IACR webpage. These updates are also available:

email icon
via email
RSS symbol icon
via RSS feed

14 January 2021

Technology Innovation Institute (TII) - Abu Dhabi, UAE
Job Posting Job Posting

Cryptography Research Centre


In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.

As a Cryptanalyst - Public Key Cryptography, you will:

  • Analyze, evaluate and target any weaknesses security systems which range from single asymmetric crypto-primitives to entire protocols, from classical to post-quantum schemes.
  • Conduct research, with particular focus on how to use automated tools such as algebraic and constraint solvers and machine learning to perform theoretical and practical cryptanalysis of asymmetric schemes.
  • Develop mathematical and statistical models to analyze and solve security data problems.
  • Collaborate with skillful software, hardware, and telecommunication engineers.
  • Work with latest software and test your code on state-of-the-art High-Performance Devices.
  • Attend personalized in-house trainings with top cryptographers and international conferences and workshops.
  • Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers

    - Your personal dream could be the world's reality -

    To bring your dream to life, you'll need some of the followings:

  • PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics, Computer Science or any relevant Engineering degree.
  • Extensive experience in theoretical and practical cryptanalysis
  • Valuable publications in the field of cryptanalysis
  • Extensive knowledge of side-channel attacks.
  • Deep understanding of various hardware security vulnerabilities and threats.
  • Extensive experience developing in various programming languages.
  • A passion for solving complex puzzles

    Duration: Permanent position

    Closing date for applications:

    Contact:

    Mehdi Messaoudi
    Talent Acquisition Manager
    mehdi.messaoudi@tii.ae

    More information: https://tii.ae/

  • Expand
    Academia Sinica, Taipei, Taiwan
    Job Posting Job Posting
    Multiple Post-Docs in Post-Quantum Cryptography

    Academia Sinica, at the very edge of Taipei, is the national research institute of Taiwan.

    Here we have an active group of cryptography researchers, including Dr. Bo-Yin Yang, Dr. Kai-Min Chung, and Dr. Tung Chou, covering wide research topics in cryptography and actively collaborating with researchers from related research areas such as program verification.

    We are looking for Post-Docs in PQC (Post-Quantum Cryptography). Here PQC is broadly defined. Starting date is early 2021, for terms of 1 year, renewable.

    Potential PQC research topics include cryptanalysis, implementation, and theory. Bo-Yin is in particular interested in people who have hands on experience with the design, implementation and/or analysis of cryptosystems submitted to NIST\'s post-quantum standardization project, and Kai-Min is looking for people interested in theoretical aspects of Post-Quantum Cryptography, such as security in the QROM model and novel (post-)quantum primitives and protocols. We are also particularly interested in people with diverse background to facilitate collaboration among our group members.

    Requires background in mathematics, computer science and cryptography. We desire a research track record in some aspects of post-quantum cryptography, but are especially looking for researchers with a broad research spectrum going from mathematical aspects to the practical side such as implementation aspects.

    We offer about 2200 USD (~2000 EUR) per month (commensurate with what a starting assistant professor makes locally) in salary and include a 5000 USD per year personal academic travel budget.

    Closing date for applications:

    Contact:

    Bo-Yin Yang by at crypto dot tw
    Kai-Min Chung at kmchung at iis dot sinica dot edu dot tw

    Expand
    Queen’s University Belfast, UK
    Job Posting Job Posting
    Applications are invited for a 2 year Post-Doctoral Research Fellow position to conduct research into the design and implementation of practical, robust and physically secure post-quantum cryptographic architectures. The research will contribute to projects being undertaken on hybrid quantum/post-quantum cryptographic solutions. This research is part of the £24M Quantum Communications Hub project.

    Closing date for applications:

    Contact: For full job details and criteria please see the Candidate Information link on our website by clicking ‘apply’. For further information please contact Resourcing Team, Queen's University Belfast, BT7 1NN. Telephone (028) 9097 3044 or email resourcing@qub.ac.uk .

    More information: https://hrwebapp.qub.ac.uk/tlive_webrecruitment/wrd/run/ETREC107GF.open?VACANCY_ID=652082E9Ng&WVID=6273090Lgx&LANG=USA

    Expand
    Karlsruhe Institute of Technology (KIT)
    Job Posting Job Posting

    The position is fully funded with the German salary level TV-L 13 (100%) and should be filled at the soonest possible date. In the beginning, the position is limited to 18 months, but we offer the possibility of funding the entire duration of the PhD.

    Application up to: January 17th 2021
    https://intellisec.de/jobs/phd-2021b-en.html

    Research

    The "Intelligent System Security" research group works on the application of machine learning in the area of computer security. We develop learning-based methods for attack detection on different levels or the discovery of vulnerabilities in software and embedded devices. Another central and very important subject of our research is the robustness and security of machine learning methods themselves. Here, we are particularly looking for reinforcement.

    Your Profile

    You have a Diploma or Master's degree in computer science or any related field. You also require very good knowledge in machine learning and ideally computer security. Above all, however, you need to show enthusiasm for conducting research on cutting-edge topics in machine learning and computer security.

    Field of Work

    Possible research topics include, but are not limited to:

    • Secure and robust learning methods
    • Attacks against learning-based systems
    • Robust learning on limited hardware (e.g., embedded systems, IoT)
    • Explainability of machine learning in computer security
    Application

    Details on the application process can be found at https://intellisec.de/jobs/phd-2021b-en.html

    We strive for a diverse research team and ask people from all nations to join us. Moreover, qualified women are strongly encouraged to apply. Disabled persons with equivalent aptitude will be favored.

    Closing date for applications:

    Contact: Christian Wressnegger (https://intellisec.de/jobs/)

    More information: https://intellisec.de/jobs/phd-2021b-en.html

    Expand
    The Information Security Group, Royal Holloway University of London
    Job Posting Job Posting
    Applications are invited for the post of Reader/Senior Lecturer in the Information Security Group
    Applications are invited from researchers whose interests are related to, or complement, current strengths of the ISG. We are particularly interested in applicants with outstanding research achievements and/or potential in the area of Systems and Software Security; and who are able to teach and help manage, computer, network and software security subjects at undergraduate and postgraduate level.
    Applicants should have a Ph.D. in a relevant subject or equivalent, be a self-motivated researcher, and have a strong publication record. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security.
    In return we offer a highly competitive rewards and benefits package including:
    Generous annual leave entitlement Training and Development opportunities Pension Scheme with generous employer contribution Various schemes including Cycle to Work, Season Ticket Loans and help with the cost of Eyesight testing. Free parking
    The post is based in Egham, Surrey where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.
    To view further details of this post and to apply please visit https://jobs.royalholloway.ac.uk. For queries on the application process the Human Resources Department can be contacted by email at: recruitment@rhul.ac.uk
    Please quote the reference: 1220-277 Closing Date: Midnight, 28 February 2021 Interview Date: March 2021 (date TBC)

    Closing date for applications:

    Contact: Informal enquiries to Keith Mayes keith.mayes@rhul.ac.uk

    More information: https://jobs.royalholloway.ac.uk.

    Expand
    Yale University, Electrical Engineering
    Job Posting Job Posting
    We have an opening for a post-doctoral researcher for our projects on hardware implementation of cryptographic algorithms, focusing on post-quantum crypto. Expected start date in spring or summer 2021.

    Closing date for applications:

    Contact: Prof. Jakub Szefer

    More information: https://caslab.csl.yale.edu/jobs/

    Expand
    Karlsruhe Institute of Technology (KIT)
    Job Posting Job Posting

    The position is fully funded with the German salary level TV-L 13/14 (100%), should be filled at the soonest possible date, and is limited to two years. Extending the contract beyond the initial duration is possible.

    Application up to: January 17th 2021
    https://intellisec.de/jobs/postdoc-2021-en.html

    Research

    The "Intelligent System Security" research group works on the application of machine learning in the area of computer security. In particular, we develop methods in the area of application security and system security, as for instance, attack detection or vulnerability discovery in software and embedded devices. Also, the robustness, security, and interpretability of machine learning methods are central to our research.

    Your Profile

    You have an exceptional doctorate degree, do nationally and internationally visible research (via respective publications), and strive for distinguishing yourself in a leading role. Next to research in IT-Security (e.g., network security, web security, vulnerability discovery, malware analysis, ...) you are required to have an interest in learning-based systems. Above all, however, you need to show enthusiasm for conducting research on cutting-edge topics in IT-Security and be willing to collaborate within the "Competence Center for Applied Security Technology" (KASTEL).

    Field of Work

    Area of responsibility:

    • Coordination of research efforts in the "Competence Center for Applied Security Technology" (KASTEL)
    • Independent research in the field of IT-Security germane/complementary to the research profile of the "Intelligent System Security" research group.
    Application

    Details on the application process can be found at https://intellisec.de/jobs/postdoc-2021-en.html

    We strive for a diverse research team and ask people from all nations to join us. Moreover, qualified women are strongly encouraged to apply. Disabled persons with equivalent aptitude will be favored.

    Closing date for applications:

    Contact: Christian Wressnegger (https://intellisec.de/jobs/)

    More information: https://intellisec.de/jobs/postdoc-2021-en.html

    Expand
    Karlsruhe Institute of Technology
    Job Posting Job Posting

    The position is fully funded with the German salary level TV-L 13 (100%) and should be filled at the soonest possible date. In the beginning, the position is limited to 18 months, but we offer the possibility of funding the entire duration of the PhD.

    Application up to: January 17th 2021
    https://intellisec.de/jobs/phd-2021a-en.html

    Research

    The "Intelligent System Security" research group works on the application of machine learning in the area of computer security. In particular, we develop methods in the area of application security and system security, as for instance, attack detection or vulnerability discovery in software and embedded devices. Also, the robustness, security, and interpretability of machine learning methods are central to our research.

    Your Profile

    You have a Diploma or Master's degree in computer science or any related field. You also require very good knowledge in computer security and/or machine learning. Above all, however, you need to show enthusiasm for conducting research on cutting-edge topics in machine learning and computer security.

    Field of Work

    Possible research topics include, but are not limited to:

    • The analysis of attacks and malware using machine learning
    • Assisted discovery of vulnerabilities
    • Fuzz Testing (Fuzzing) using machine learning
    • Attacks against learning-based systems
    • Explainability of machine learning in computer security
    Application

    Details on the application process can be found at https://intellisec.de/jobs/phd-2021a-en.html

    We strive for a diverse research team and ask people from all nations to join us. Moreover, qualified women are strongly encouraged to apply. Disabled persons with equivalent aptitude will be favored.

    Closing date for applications:

    Contact: Christian Wressnegger (https://intellisec.de/jobs/)

    More information: https://intellisec.de/jobs/phd-2021a-en.html

    Expand
    University of Surrey, UK
    Job Posting Job Posting

    University of Surrey, Guildford, United Kingdom This PhD position is funded for EU and UK students, and the application deadline is on the 24th of January 2021. Overseas applicants are welcome to apply but will have to cover the difference in Overseas Tuition Fees.

    The aim of the PhD is to design and analyse electronic-voting systems that can be deployed in real-life, by looking at combinations between desirable e-voting guarantees (e.g. privacy, receipt-freeness, collusion resistance, verifiability, accountability, etc) and techniques of executing protocols on untrusted platforms. A secondary aim is to certify the security of these systems using formal-analysis tools. The position is under the supervision of Dr. Catalin Dragan and Prof. Steve Schneider.

    This position is fully funded, with a stipend of 16 000 GBP per year, and successful applicants are expected to start in April 2021.

    Closing date for applications:

    Contact: Catalin Dragan c.dragan@surrey.ac.uk

    More information: https://www.surrey.ac.uk/fees-and-funding/studentships/phd-studentships-computer-science

    Expand
    Manta network
    Job Posting Job Posting
    We are hiring protocol and backend engineers to help us to build privacy preserving payment and decentralized exchange on Polkadot. The engineer will be working with world class cryptographers to bring privacy preserving solutions to blockchains using zero-knowledge proof.

    Below are good to have skills:
    • System level programming using Rust or C/C++
    • Familiar with low level system internals and network stack
    • Basic knowledge of Cryptographic primitives, such as public key encryption
    • Knowledge on distributed system and consensus algorithms
    • Familiar with database and storage system
    Location
    • Boston
    • remote
    For more information, please contact: Shumo@manta.network

    Closing date for applications:

    Contact: Shumo Chu

    More information: https://manta.network/

    Expand
    Algorand
    Job Posting Job Posting

    Founded by cryptography pioneer Silvio Micali, Algorand fulfills the promise of blockchain through a first-of-its-kind transaction platform that solves the “blockchain trilemma” by offering true decentralization, scalability, and security.

    We are looking for a Postdoctoral Cryptography Researcher. This is an opportunity for someone who is excited by new technologies to influence the design and implementation of advanced cryptographic systems and protocols.The Researcher will design cryptographic protocols and partner with the team to develop prototypes. Researchers are also internal subject matter experts, providing guidance to our extended staff, and are also responsible for publishing meaningful research.

    Overseen by Chris Peikert, this opportunity is for one (1) year with the possibility for extension.

    Core Responsibilities

    • Theoretical Focus: Design advanced cryptographic systems and protocols
    • Applied Focus: Prototype/build and optimize cryptographic systems and protocols
    • Partner with the larger organization on implementations
    • Publish meaningful research, both individually and with staff members
    • Be part of an inclusive environment that fosters collaboration and creativity both internally and externally

    Requirements

    • PhD in Cryptography, Computer Science, or related field
    • Experience in the following: cryptographic primitives, protocols, and proof systems; post-quantum cryptography preferred
    • Publication in top cryptography or security venues
    • Open source library contribution or cutting edge implementation experience for applied-focused applicants
    • Appreciation for considerations beyond cryptography, such as networking, systems, and performance
    • Good written communication and ability to communicate technical information with wide variety of audiences
    • Experience in participating in the implementation of complex systems designs preferred
    • Enthusiasm for working in a highly collaborative, fast-paced, and dynamic environment

    Postdocs receive competitive salary and benefits, as well as a WFH technology package (computer and home

    Closing date for applications:

    Contact: Regina OBrien

    More information: https://jobapply.page.link/TNVg

    Expand
    University of Warsaw
    Job Posting Job Posting
    The Faculty of Mathematics, Informatics and Mechanics at University of Warsaw (MIM UW) invites applications for positions of an assistant professor (“adiunkt” in Polish) in Computer Science, starting on 1st October 2021 (or 1st Feb 2022).

    MIM UW is one of the strongest computer science faculties in Europe. It is known for talented students (e.g., two wins and 14 times in top ten at the ACM International Collegiate Programming Contest) and strong research teams, especially in algorithms, logic and automata and computational biology. There is also a growing number of successful smaller groups in areas like cryptography, game theory, distributed systems, machine learning and others. There are five ERC grants in computer science running at MIM UW at the moment.

    In the current call, the position is offered in two variants (follow the links for details):

    1. a standard position
    2. a position with reduced teaching load (120hrs/year) and increased salary

    Deadline for applications: 12th February, 2021.

    More details, including application procedure can be found under the following links:

    1. https://www.mimuw.edu.pl/sites/default/files/konkursy/wmim_1210_ek_03_2021_en.pdf
    2. https://www.mimuw.edu.pl/sites/default/files/konkursy/wmim_1210_ek_01_2021_en.pdf

    Closing date for applications:

    Contact: Prof. Łukasz Kowalik (kowalik@mimuw.edu.pl)

    More information: https://www.mimuw.edu.pl/sites/default/files/konkursy/wmim_1210_ek_03_2021_en.pdf

    Expand

    12 January 2021

    Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
    ePrint Report ePrint Report
    Metadata from voice calls, such as the knowledge of who is communicating with whom, contains rich information about people’s lives. Indeed, it is a prime target for powerful adversaries such as nation states. Existing systems that hide voice call metadata either require trusted intermediaries in the network or scale to only tens of users. This paper describes the design, implementation, and evaluation of Aloha, the first system for voice communication that hides metadata over fully untrusted infrastructure and scales to tens of thousands of users. At a high level, Aloha follows a template in which callers and callees deposit and retrieve messages from private mailboxes hosted at an untrusted server. However, Aloha improves message latency in this architecture, which is a key performance metric for voice calls. First, it enables a caller to push a message to a callee in two hops, using a new way of assigning mailboxes to users that resembles how a post office assigns PO boxes to its customers. Second, it innovates on the underlying cryptographic machinery and constructs a new private information retrieval (PIR) scheme, QuickPIR, that reduces the time to process oblivious access requests for mailboxes. An evaluation of Aloha on a cluster of eighty machines on AWS demonstrates that it can serve 32K users with a 99-th percentile message latency of 726 ms—a 7× improvement over prior work in the same threat model.
    Expand
    Madhurima Mukhopadhyay, Palash Sarkar
    ePrint Report ePrint Report
    In this paper, we show how to apply Montgomery multiplication to the tag tracing variant of the Pollard's rho algorithm applied to prime order fields. This combines the advantages of tag tracing with those of Montgomery multiplication. In particular, compared to the previous version of tag tracing, the use of Montgomery multiplication entirely eliminates costly modular reductions and replaces these with much more efficient divisions by a suitable power of two.
    Expand
    Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
    ePrint Report ePrint Report
    The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty—or adversarially corrupted—random oracles, so that they can be confidently applied for such cryptographic purposes.

    We prove that a simple construction can transform a “subverted” random oracle—which disagrees with the original one at a small fraction of inputs—into an object that is indifferentiable from a random function, even if the adversary is made aware of all randomness used in the transformation. Our results permit future designers of cryptographic primitives in typical kleptographic settings (i.e., those permitting adversaries that subvert or replace basic cryptographic algorithms) to use random oracles as a trusted black box.
    Expand
    Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
    ePrint Report ePrint Report
    The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to solve (elliptic curve) discrete logarithm and integer factorization problems in polynomial time. This would jeopardize IT security as we know it. In this work, we investigate two quantum-safe, hash-based signature schemes published by the Internet Engineering Task Force and submitted to the National Institute of Standards and Technology for use in secure boot. We evaluate various parameter sets for the use-case in question and we prove that post-quantum signatures with less than one second signing and less than 10ms verification would not have material impact (less than1‰) on secure boot. We evaluate the hierarchical design of these signatures in hardware-based and virtual secure boot. In addition, we develop Hardware Description Language code and show that the code footprint is just a few kilobytes in size which would fit easily in almost all modern FPGAs. We also analyze and evaluate potential challenges for integration in existing technologies and we discuss considerations for vendors embarking on a journey of image signing with hash-based signatures.
    Expand
    Any Muanalifah, Serge˘ı Sergeev
    ePrint Report ePrint Report
    Tropical linear algebra has been recently put forward by Grigoriev and Shpilrain ~\cite{grigoriev2014tropical,grigoriev2018tropical} as a promising platform for the implementation of protocols of Diffie-Hellman and Stickel type. Based on the CSR expansion of tropical matrix powers, we suggest a simple algorithm for the following tropical discrete logarithm problem: ``Given that $A=V\otimes F^{\otimes t}$ for a unique $t$ and matrices $A$, $V$, $F$ of appropriate dimensions, find this $t$.'' We then use this algorithm to suggest a simple attack on a protocol based on the tropical semidirect product. The algorithm and the attack are guaranteed to work in some important special cases and are shown to be efficient in our numerical experiments.
    Expand
    Jung Hee Cheon, Yongha Son, Donggeon Yhee
    ePrint Report ePrint Report
    We give secure parameter suggestions to use sparse secret vectors in LWE based encryption schemes. This should replace existing security parameters, because homomorphic encryption(HE) schemes use quite different variables from the existing parameters. In particular HE schemes using sparse secrets should be supported by experimental analysis, here we summarize existing attacks to be considered and security levels for each attacks. Based on the analysis and experiments, we compute optimal scaling factors for CKKS.
    Expand
    Luke Champine
    ePrint Report ePrint Report
    We describe the binary numeral tree—a type of binary tree uniquely suited to processing unbounded streams of data—and present a number of algorithms for efficiently constructing and verifying Merkle proofs within such trees. Specifically, we present existence proofs for single leaves, for a contiguous range of leaves, and for multiple disjoint ranges. We also introduce Merkle "diff" proofs, which assert that an arbitrary modification was correctly applied to an existing tree. Each algorithm, operating on a tree with $n$ leaves and $k$ disjoint proof ranges, requires $\mathcal{O}(\log_2(n))$ space and $\mathcal{O}(n)$ time, and yields proofs of size $\mathcal{O}(k\log_2 (n))$. Furthermore, each algorithm operates in streaming fashion, requiring only a single in-order pass over the leaf data.
    Expand
    Aein Rezaei Shahmirzadi, Dusan Bozilov, Amir Moradi
    ePrint Report ePrint Report
    Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks. Constructing SCA-protected AES, as the most widely deployed block cipher, has been naturally the focus of several research projects, with a direct application in industry. The majority of SCA-secure AES implementations introduced to the community opted for low area and latency overheads considering Application-Specific Integrated Circuit (ASIC) platforms. Albeit a few, those which particularly targeted Field Programmable Gate Arrays (FPGAs) as the implementation platform yield either a low throughput or a not-highly secure design. In this work, we fill this gap by introducing first-order glitch-extended probing secure masked AES implementations highly optimized for FPGAs, which support both encryption and decryption. Compared to the state of the art, our designs efficiently map the critical non-linear parts of the masked S-box into the built-in Block RAMs (BRAMs). The most performant variant of our constructions accomplishes five first-order secure AES encryptions/decryptions simultaneously in 50 clock cycles. Compared to the equivalent state-of-the-art designs, this leads to at least 70% reduction in utilization of FPGA resources (slices) at the cost of occupying BRAMs. Last but not least, we provide a wide range of such secure and efficient implementations supporting a large set of applications, ranging from low-area to high-throughput.
    Expand