IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
14 December 2022
SnT, University of Luxembourg
- applied or symmetric cryptography
- cryptofinance, cryptoeconomics, blockchains
- anonymity and privacy on the Internet
- Conduct, publish and present research results at conferences
- Provide guidance to the two Ph.D. students of the project
- Attract funding in cooperation with academic and industrial partners
- A Ph.D. degree in Computer Science, Applied Mathematics or a related field
- Competitive research record in applied cryptography or information security (at least one paper in top 10 IT security/crypto conferences)
- Strong mathematical and algorithmic CS background, economics/finance - a plus
- Good skills in programming and scripting languages
- Fluent written/verbal communication skills in English
Application Applications, written in English, should be submitted online and should include:
- A brief cover letter explaining the candidate's motivation and research interests
- Curriculum Vitae (including photo, education/research/work, publications, interests, contributions to open-source projects, participation in research competitions, olympiads, CTFs, etc.)
- Contact information of 3 referees
Closing date for applications:
Contact: Prof. Alex Biryukov (e-mail: first name dot family name (at) uni.lu)
More information: https://www.cryptolux.org/index.php/Vacancies
Queen's University Belfast
The successful candidate must have, and your application should clearly demonstrate you have:
Duration: This is a fixed term contact for 30 months, or available until 30/09/2025, whichever is sooner. Fixed term contract posts are available for the stated period in the first instance but in particular circumstances may be renewed or made permanent subject to availability of funding.
Application Deadline: 9 Jan 2023
Application details: https://www.jobs.ac.uk/job/CVV449/research-fellow-in-hardware-security
Closing date for applications:
Contact: Dr. Chongyan Gu (c.gu@qub.ac.uk)
More information: https://www.jobs.ac.uk/job/CVV449/research-fellow-in-hardware-security
University of Central Florida
Closing date for applications:
Contact: Questions regarding this search may be directed to Dr. Yan Solihin (yan.solihin@ucf.edu) or Dr. Paul Gazzillo (paul.gazzillo@ucf.edu).
Helsinki Institute for Information Technology, Helsinki, Finland
The Helsinki Institute for Information Technology (HIIT) invites applications for Postdoctoral Fellows and Research Fellows. HIIT offers a HIIT Postdoctoral Fellow position up to three years. For more senior candidates, HIIT offers a HIIT Research Fellow position up to five years. The length of the contract as well as the starting and ending dates are negotiable.
All excellent researchers in any area of ICT can be considered, but priority is given to candidates who support one (or more) of the HIIT strategic focus areas:
- Artificial Intelligence
- Computational Health
- Cybersecurity
- Data Science
- Foundations of Computing
The deadline for applications is January 8th, 2023 at 11:59 PM (23:59 UTC+02:00). By applying to this call, organized by Helsinki Institute for Information Technology HIIT, you use one application to apply to positions for both of our hosting institutions, Aalto University and the University of Helsinki. Aalto University and the University of Helsinki are the two leading universities in Finland in computer science and information technology. Both are located in the Helsinki Metropolitan area, and the employing university will be determined by the supervising professor. Aalto University and the University of Helsinki are both committed to fostering an inclusive environment with people from diverse backgrounds, and researchers from underrepresented groups are particularly encouraged to apply.
Closing date for applications:
Contact:
For any question regarding the electronic application system, please contact Maaria Ilanko (firstname.lastname@aalto.fi)
For questions regarding these positions, please contact the HIIT coordinator at coordinator@hiit.fi
More information: https://www.hiit.fi/hiit-postdoctoral-and-research-fellow-positions/
Fortanix
Fortanix is hiring a Sr. Software Engineer, Cryptography. Join a passionate team that will highly appreciate your contributions.
You will- Implement and maintain production-ready cryptography code in Rust and C/C++, including post-quantum algorithms and secure cryptography APIs.
- Analyze state-of-the-art attacks and implement side-channel mitigations.
- Participate in peer code review, educate.
- Help deploy, monitor, and tune the performance of our software.
- Analyze existing internal and partner security designs.
Requirements: A Master's degree or PhD in Cryptography or a related field, or equivalent training or work experience. Uncompromising integrity, outstanding attention to detail, programming experience.
We can offer: competitive salary, relocation support, 25 holidays and travel expense remuneration.
Closing date for applications:
Contact: francisco.vialprado@fortanix.com
University of Amsterdam
What are you going to do?
- Carry out original research in the field of implementation and applications of privacy preserving technologies for data analytics in healthcare
- Be active in the fundamental and/or applied research area, publishing in high level international journals and presenting at leading conferences
- Take part in ongoing educational activities, such as assisting in a course and guiding student thesis projects, at the BSc or MSc level
- Collaborate with other groups, institutes and/or companies by contributing expertise to joint research projects
- Contribute to activities and deliverables of the SECURED Horizon Europe Project
- An MSc degree in Computer Science, Computer Engineering, or Electrical Engineering (or a related discipline)
- Strong analytical and technical skills; Good problem-solving skills
- An interdisciplinary mindset and an open and proactive personality in interacting with researchers from different disciplines
- A strong scientific interest in security and privacy, in particular in at least one of the following two fields:
- efficient implementation of cryptographic and privacy preserving primitives, both in hardware and in software
- application, orchestration, and improvement of privacy-preserving techniques to achieve given data protection objectives
- The willingness to work in a highly international research team;
- Fluency in oral and written English and good presentation skills
- Ability to assess practical implementation of privacy preserving techniques
https://vacatures.uva.nl/UvA/job/Two-PhD-Positions-on-Efficient-Privacy-preserving-Techniques-for-Data-Analysis-and-Machine/760571702/
Closing date for applications:
Contact: Francesco Regazzoni
More information: https://tinyurl.com/4s4kzwn6
Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
Michael Walter
In this short note, we show that the claims made in the two aforementioned works with regards to the leakage through the timing side channel are false. We demonstrate that the active attack, a standard attack against IND-CPA secure LWE-based encryption, can be mounted just as efficiently without the "side channel information".
13 December 2022
Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
We introduce Glimpse, a novel on-demand cross-chain synchronization primitive, which is both efficient in terms of on-chain costs and computational overhead, and expressive in terms of applications it supports. The key idea of Glimpse is to synchronize transactions on-demand, i.e., only those relevant to realize the cross-chain application of interest. We present a concrete instantiation which is compatible with blockchains featuring a limited scripting language (e.g., Bitcoin-based chains like Liquid), and, yet, can be used as a building block for the design of DeFi applications such as lending, pegs, wrapping/unwrapping of tokens, Proof-of-Burn, and verification of multiple oracle attestations. We formally define and prove Glimpse security in the Universal Composability (UC) framework and conduct an economical security analysis to identify the secure parameter space in the rational setting. Finally, we evaluate the cost of Glimpse for Bitcoin-like chains, showing that verifying a simple transaction has at most 700 bytes of on-chain overhead, resulting in a one-time fee of 3$, only twice as much as a basic Bitcoin transaction.
Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai
Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
Trevor Miller
Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
Freja Elbro, Christian Majenz
Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
Elena Dubrova, Kalle Ngo, Joel Gärtner
10 December 2022
Ruben Gonzalez, Thom Wiggers
KEMTLS is a proposal for an alternative TLS handshake protocol that avoids authentication through signatures in the TLS handshake. Instead, it authenticates the peers through long-term KEM keys held in the certificates. The KEMs considered for standardization are more efficient in terms of computation and/or bandwidth than the post-quantum signature schemes.
In this work, we compare KEMTLS to TLS 1.3 in an embedded setting. To gain meaningful results, we present implementations of KEMTLS and TLS 1.3 on a Cortex-M4-based platform. These implementations are based on the popular WolfSSL embedded TLS library and hence share a majority of their code. In our experiments, we consider both protocols with the remaining NIST finalist signature schemes and KEMs, except for Classic McEliece which has too large public keys. Both protocols are benchmarked and compared in terms of run-time, memory usage, traffic volume and code size. The benchmarks are performed in network settings relevant to the Internet of Things, namely low-latency broadband, LTE-M and Narrowband IoT. Our results show that KEMTLS can reduce handshake time by up to 38%, can lower peak memory consumption and can save traffic volume compared to TLS 1.3.