IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
22 January 2021
Amazon Web Services
Job PostingWe are seeking a candidates who are innovative, look for new ideas everywhere, and are not limited by “not invented here”. They should think big, and have bold ideas for new ways to serve customers.
BASIC QUALIFICATIONS
- PhD in Computer Science or a closely related field
- Expert knowledge of cryptography and, in particular, cryptographic-computing techniques (homomorphic encryption, secure multiparty computation, etc.)
- Practical knowledge in one or more common development languages (C/C++, Java, Go, Rust, Python, etc.)
- Good written and verbal communication skills.
PREFERRED QUALIFICATIONS
- Basic knowledge of machine learning
- 5+ years of industry experience
Amazon is committed to a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. For individuals with disabilities who would like to request an accommodation, please visit https://www.amazon.jobs/en/disability/us.
Closing date for applications:
Contact: Bill Horne
More information: https://amazon.jobs/en/internal/jobs/1397391/applied-cryptographer
Facebook Inc., Menlo Park, CA | Seattle, WA | San Francisco, CA | Remote, US
Job PostingOur Statistics and Privacy team focuses on establishing step-change improvements to advance our long-term business growth. The team's expertise spans many domains including statistics, machine learning and cryptography. We develop methodologies, design and prototype solutions, and partner with our engineering colleagues to launch these solutions such that millions of advertisers can benefit. Examples include internal and external experimentation platforms, ads delivery optimization for efficient causal outcomes, and the application of privacy enhancing technologies across our ads product stack.
We are looking for research interns to join our teams to drive forward new prototypes and methodologies. Interns will pursue novel applied research associated with privacy preserving machine learning, cryptography and internet technology, or causal inference and experimentation platforms. This work is critical to our long-term product development, and we expect interns to provide both scientific expertise and creative solutions to accelerate their project area.
ResponsibilitiesMinimum Qualifications
Closing date for applications:
Contact: Apply Online or reach out to Benjamin Case (bmcase {at} fb DOT com) or Sanjay Saravanan
More information: https://www.facebook.com/careers/v2/jobs/270789727484557/
Graz University of Technology, Graz, Austria
Job PostingIn order to complement our team, we are looking for a fulltime post-doctoral researcher:
Responsibilities:
The post-doctoral researcher will be working on the hardware acceleration of homomorphic encryption within the “Cyroptografic Engineering” group within the “Secure Systems” area at IAIK.
Required Qualifications:
How to apply:
Applications, curriculum vitae and other documents should preferably be uploaded here https://free.formcloud.de/formcycle/form/provide/7780/. Please select 7050/postdoc_2021 as a reference number.
The position is full time - 40 h per week and the employment duration is set for 18 months. Prefered starting date early 2021. The application deadline is February 15th 2021.
Closing date for applications:
Contact: Sujoy Sinha Roy – sujoy.sinharoy@iaik.tugraz.at
Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
ePrint ReportKalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
ePrint ReportNikolaj I. Schwartzbach
ePrint ReportRémi Géraud-Stewart, David Naccache
ePrint ReportGSN's protocol relies upon elementary number-theoretic properties and can be implemented efficiently using very few operations. This contrasts with state-of-the-art zero-knowledge protocols for RSA modulus proper generation assessment.
This paper proposes an alternative process applicable in settings where $\mathcal P$ co-generates a modulus $n=p_1q_1p_2q_2$ with a certification authority $\mathcal V$. If $\mathcal P$ honestly cooperates with $\mathcal V$, then $\mathcal V$ will only learn the sub-products $n_1=p_1q_1$ and $n_2=p_2q_2$.
A heuristic argument conjectures that at least two of the factors of $n$ are beyond $\mathcal P$'s control. This makes $n$ appropriate for cryptographic use provided that \emph{at least one party} (of $\mathcal P$ and $\mathcal V$) is honest. This heuristic argument calls for further cryptanalysis.
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
ePrint ReportKamil Otal
ePrint ReportMahdi Sedaghat, Bart Preneel
ePrint ReportMichał Wroński
ePrint ReportServio Paguada, Lejla Batina, Igor Armendariz
ePrint ReportJorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
ePrint ReportIn this paper, we propose to use reinforcement learning to tune the convolutional neural network hyperparameters. In our framework, we investigate the Q-Learning paradigm and develop two reward functions that use side-channel metrics. We mount an investigation on three commonly used datasets and two leakage models where the results show that reinforcement learning can find convolutional neural networks exhibiting top performance while having small numbers of trainable parameters. We note that our approach is automated and can be easily adapted to different datasets. Finally, several of our newly developed architectures outperform the current state-of-the-art results.
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
ePrint ReportAmanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
ePrint ReportCarsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
ePrint ReportMichiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede
ePrint Report20 January 2021
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Job PostingTechnology Innovation Institute - Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
As a Vulnerability Researcher you will be in charge of:
Must have:
Nice to have:
Closing date for applications:
Contact:
Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae
More information: https://tii.ae/
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Job PostingTechnology Innovation Institute - Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
As a Lead Hardware Security Researcher you will be in charge of:
Must have:
Closing date for applications:
Contact:
Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae
More information: https://tii.ae/
University of Canterbury, School of Mathematics and Statistics, Christchurch, New Zealand
Job PostingClosing date for applications:
Contact: Prof. Felipe Voloch
More information: http://www.math.canterbury.ac.nz/~f.voloch/prospective.html