IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 May 2016
The yearly FSE event will consist of presentations of the articles accepted to the journal IACR Transactions on Symmetric Cryptology, as well as invited talks and social activities. This new model has been established as a way to improve reviewing and publication quality while retaining the highly successful community event FSE.
For this first conference FSE 2017 on the new model, authors can submit papers to the IACR Transactions on Symmetric Cryptology three times, every three months on a predictable schedule (the following years will include four rounds). Authors are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may be provided with "minor revision" decisions, in which case the paper is conditionally accepted and an assigned shepherd will verify if the changes are applied, or "major revision" decisions, in which case authors are invited to revise and resubmit their article to one of the following two submission deadlines, otherwise the paper will be treated as a new submission. We endeavor to assign the same reviewers to revised versions.
Papers accepted for publication before the end of January 2017 will be presented at that year’s conference. Note that it is mandatory that accepted papers at the IACR Transactions on Symmetric Cryptology journal are presented at the corresponding FSE event.
The next deadlines are:
- First round: June 1, 2016
- Second round: September 1, 2016
- Third round: November 23, 2016
17 May 2016
School of Computing and Information Technology, University of Wollongong, Australia
UOW is a leading Australian university with a history of outstanding achievements in teaching and learning, research and community engagement. It is fundamentally committed to providing our diverse body of students with an engaging world class and internationally oriented learning experience. The University has also established a strong research profile and an outstanding record of achievement in research performance and intensity over the last decade.
The successful candidate will have a national reputation in cryptography or information security research field, innovative teaching experience, an established research profile and demonstrable commitment to positive change. You may be required to teach outside of standard business hours and offshore delivery.
To apply you must address the selection criteria which is located within the position description.
For further enquiries, please contact Head of School, Professor Willy Susilo on +61-2-4221-5535 or wsusilo (at) uow.edu.au
Closing date for applications: 5 June 2016
Contact: Professor Willy Susilo
More information: http://uow.employment.com.au/dspJobView.cfm?jobID=2141
Hong Kong Applied Science and Technology Research Institute Company Limited
•Conduct assessment on network infrastructure, web and mobile security.
•Assisting in IT security enforcement and enhancement.
•Design secure application testing approaches, integrate quality assurance testings with security functionalities.
•Candidate with strong programming background will also be involved in security tool/signature development.
•Design and implement preventive security controls, application code review and analysis, code scanning and testing tools, web application scanning and penetration tests.
•Manage vendor and service provider on security tools and technologies project engagement and delivery.
Requirements:
•Bachelor’s degree or above in Computer Science, Electrical Engineering or other relevant disciplines with a minimum of 5 years of experience in security assessment. Candidates with less experience will also be considered for the Engineer level.
•Experience in financial industry is preferred but not mandatory.
•Demonstrate wide working knowledge of application security.
•Experience in application development life cycle, application testing and code scanning, with exposure in penetration test, finding exploits, vulnerabilities, unauthorized access, or other malicious activities in computer systems.
•Proficient in English, spoken and written.
•High integrity and professional work practice.
•Appreciation of people and cultures of different countries.
Closing date for applications: 30 May 2016
Contact: charlenechoo (at) astri.org
More information: http://www.astri.org/careers/work-at-astri/jobs/senior-engineerengineer-cyber-security-assessment-multiple-openings-8/
Hong Kong Applied Science and Technology Research Institute Company Limited
•Develop cryptographic and encryption technologies.
•Develop mobile security solutions.
•Develop and implement cyber-threat intelligence and defense technologies.
•Perform security review and assessment on information security and e-commerce systems.
•Conduct R&D in various areas which include but not limited to software, network, distributed system, database, and mobile security.
•Conduct R&D in various areas which include but not limited to software, network, distributed system, database, and mobile security.
Requirements:
•Bachelor’s degree or above in Computer Science, Electrical Engineering or other relevant disciplines.
•More senior candidates with Master or PhD degree, or with minimum five years’ of experience in software development, i.e. design, implementation, test and documentation will be considered as Senior Engineer.
•Familiar with software development or testing, programming languages on C/C++/ObjC/Java/Javascript.
•Certificates or formal training in information security or with experience in security assessment is a plus, but not a necessity.
•Good knowledge of OS security and virtualization security, and implementation experience on the cloud an advantage.
•A team player with good analytical and communications skills.
•Good command of written and spoken English.
Closing date for applications: 30 May 2016
Contact: charlenech00 (at) astri.org
More information: http://www.astri.org/careers/work-at-astri/jobs/senior-engineerssoftware-engineers-information-security-multiple-opening
Thomas Unterluggauer, Stefan Mangard
Loubna Ghammam, Emmanuel Fouotsa
Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
In this paper, we provide a FHE-based PDQ protocol achieving better security, protecting query types as well as constants in query statements for conjunctive, disjunctive, and threshold queries with equality comparison. Our contributions are three-fold: First, we present a new security definition that reflects our enhanced security model which additionally protects query types in query statements. Second, we provide a new design for PDQ protocols using FHE schemes. To do this, we come up with a method to homomorphically evaluate our encrypted target queries on the encrypted database. Thereafter, we apply it to construct a protocol and show its security under our enhanced security definition in the semi-honest model. Finally, we provide proof-of-concept implementation results of our PDQ protocol. According to our rudimentary experiments, it takes 40 seconds to perform a query on 2352 elements consisting of 11 attributes of 40-bit using Brakerski-Gentry-Vaikuntanathan's leveled FHE with SIMD techniques for 80-bit security, yielding an amortized rate of just 0.12 seconds per element.
Andrew Egbert, Brad Chun, Thomas Otte
Maciej A. Czyzewski
Shay Gueron, Fabian Schlieker
14 May 2016
Vienna, Austria, 28 October 2016
Submission deadline: 25 July 2016
Notification: 1 September 2016
phoenix, USA, 22 September - 24 September 2016
Submission deadline: 22 August 2016
Notification: 22 September 2016
13 May 2016
New York, USA, 2 November - 4 November 2016
Submission deadline: 10 June 2016
Notification: 22 June 2016
Heraklion, Greece, 26 September - 30 September 2016
Submission deadline: 23 June 2016
Notification: 29 July 2016
CableLabs - Louisville, CO
In addition to a resume or CV, the researcher must submit a research proposal inspired by a list of topics as described below. CableLabs will select the candidate based on the most compelling proposal supported by a resume or CV that demonstrates reason to believe the research can be completed.
The selected researcher will be provided an orientation and experts will be made available to help understand how their research applies to the cable industry. A mentor will support the researcher, but work must be conducted independently. All research must be original.
The key deliverable for this project is a final report and presentation at the completion of research in August. If suitable, we may have the researcher present this work at CableLab’s Summer Conference.
The work must be performed in Louisville, CO at CableLabs. A modest relocation allowance will be provided.
Closing date for applications: 15 June 2016
Contact: Please apply at the link provided
More information: https://www.smartrecruiters.com/CableLabs/92180353-software-cryptographic-researcher
Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
Subhabrata Samajder, Palash Sarkar
Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
In this paper, we present Beaver, a decentralized anonymous marketplace that is resistant against Sybil attacks on vendor reputation, while preserving the anonymity of its customers. Beaver allows its participants to enjoy free open enrollment, and provides every user with the same global view of the reputation of other users through public ledger based consensus. Our use of various cryptographic primitives allow Beaver to offer high levels of usability and practicality, along with strong anonymity guarantees.