IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
15 November 2016
Alex van Poppelen
14 November 2016
Ruhr University Bochum
The position is initially for 2 years, and you will be working in a vibrant group at the Horst-Görtz Institute at Ruhr-University Bochum. Founded in 2001, the Horst-Görtz Institute at Ruhr-University Bochum is a leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst-Görtz Institute has 15 professors and over 80 PhD students.
The application should include a curriculum vitae, a short research statement, and names of 3 persons that can provide reference about the applicant and her/his work. Review of applications starts immediately until the position is filled.
Closing date for applications: 15 January 2017
Contact: Sebastian Faust, sebastian.faust (at) rub.de
11 November 2016
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
10 November 2016
New York University Abu Dhabi
One focus area is Cyber Security. We are looking for excellent researchers with a strong experience building and deploying large-scale security solutions in the real world with a focus on systems security, network security, privacy, cryptography, and formal methods.
Appointments can begin as soon as September 1, 2017, but candidates may elect to start as late as September 1, 2018. Review of applications will begin December 15, 2016.
Closing date for applications: 15 December 2016
Contact: nyuad.science (at) nyu.edu
More information: https://apply.interfolio.com/38844
Paris, France, 29 April 2017
Submission deadline: 13 December 2016
Notification: 13 January 2017
DarkMatter LLC, US & UAE
You will be developing software in an environment where governments have made strategic commitments to widespread Blockchain implementation across government services, smart-city and other critical infrastructure and the wider economy.
You will help design and implement distributed software systems, including decentralized protocols such as consensus.
You’ll have the opportunity to work across DarkMatter peer groups that include some of the world’s best cryptographers, cryptanalysts and other experts. There’s no room for individuals happy to simply follow orders, as you use clean coding practices to test, refactor, and iteratively and incrementally develop constantly improved software.
With many of our customers committed to putting all the resources necessary into developing and deploying the latest, most advanced Blockchain, cryptographic and other cyber security technologies, at DarkMatter you’ll have a chance to test your abilities, build your skills, and expand your horizons by designing for ‘impossible’, next-generation projects.
Technical Skills
- Minimum 5 years of experience working on large software projects (preferably including open-source projects)
- Experience with programming languages such as C, C++ or Go, and with RDBMS or NoSQL databases
- Proven expertise in implementing Blockchain frameworks and business applications, as well as cryptographic protocols and crypto libraries
- Knowledge of symmetric and asymmetric cryptographic principles, hierarchical key management and identity management schemes, FinTech
- Deep understanding of Hyperledger, Ethereum or other Blockchain community technical issues
Closing date for applications: 31 March 2017
Contact: If you are interested to work with us on exciting projects then please click on the link below -
https://darkmatter.ae/en/careers/?p=job%2FoZMf4fwO#vacancies
09 November 2016
Santa Barbara, USA, 18 August - 22 August 2019
Cyber Security Practice - United Arab Emirates
The organisation is currently experiencing rapid growth and has been successful in recruiting the world’s elite Cyber experts.
They are seeking applications for high calibre candidates to head their Cryptanalysis lab.
Successful candidates will be PhD qualified with experience in leading and developing teams coupled with experience in training/teaching others.
Please note this is a permanent opportunity which requires the successful candidate to be based in the United Arab Emirates. Assistance with relocation will be provided.
On offer is an attractive tax free expatriate package (with family benefits), the opportunity to learn from some of the most highly qualified, well renowned Cyber figures in the business and genuine career opportunities.
To apply for this role please forward a copy of your CV in English to hilary (at) talentboutique.ae.
Closing date for applications: 29 January 2017
Contact: Hilary Watson
University of Waterloo, Canada
The University of Waterloo is home to the Centre for Applied Cryptographic Research (CACR) and the Institute for Quantum Computing (IQC).
Closing date for applications: 1 December 2016
More information: https://uwaterloo.ca/combinatorics-and-optimization/career-opportunities
08 November 2016
Tel-Aviv, Israel, 12 February - 16 February 2017
Bucharest, Romania, 8 June - 9 June 2017
Submission deadline: 17 March 2017
Notification: 21 April 2017
Temasek Laboratories, Nanyang Technological University
Applicants are expected to have a PhD degree in Mathematics/Computer Science/Engineering and a strong background in cryptography.
Salaries are competitive and are determined according to the successful applicant accomplishments, experience and qualifications. Interested candidates should send their detailed CVs, cover letter and references to Thomas Peyrin (thomas.peyrin (at) ntu.edu.sg).
Review of applications will start immediately until position is filled.
Closing date for applications: 1 March 2017
Contact: Prof. Thomas Peyrin, thomas.peyrin (at) ntu.edu.sg
07 November 2016
Michal Kulis, Pawel Lorek, Filip Zagorski
We also revisit the well known paper of Mironov~\cite{Mironov2002} which analyses a card shuffle which models KSA of RC4. Mironov states that expected time till reaching uniform distribution is $2n H_n - n$ while we prove that $n H_n+ n$ steps are enough (by finding a new strong stationary time for the shuffle).
Nevertheless, both cases require $O(n \log^2 n)$ bits of randomness while one can replace the shuffle used in RC4 (and in Spritz) with a better shuffle which is optimal and needs only $O(n \log n)$ bits.
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
In this paper we provide the first (to our knowledge) formal analysis of Bitcoins target (re)calculation function in the cryptographic setting, i.e., against all possible adversaries aiming to subvert the protocols properties. We extend the q-bounded synchronous model of the Bitcoin backbone protocol [Eurocrypt 2015], which posed the basic properties of Bitcoins underlying blockchain data structure and shows how a robust public transaction ledger can be built on top of them, to environments that may introduce or suspend parties in each round. We provide a set of necessary conditions with respect to the way the population evolves under which the Bitcoin backbone with chains of variable difficulty provides a robust transaction ledger in the presence of an actively malicious adversary controlling a fraction of the miners strictly below 50% in each instant of the execution. Our work introduces new analysis techniques and tools to the area of blockchain systems that may prove useful in analyzing other blockchain protocols.
Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten
To make such an attack possible, we had to find a way to remotely yank already installed lamps from their current networks, and to perform over-the-air firmware updates. We overcame the first problem by discovering and exploiting a major bug in the implementation of the Touchlink part of the ZigBee Light Link protocol, which is supposed to stop such attempts with a proximity test. To solve the second problem, we developed a new version of a side channel attack to extract the global AES-CCM key (for each device type) that Philips uses to encrypt and authenticate new firmware. We used only readily available equipment costing a few hundred dollars, and managed to find this key without seeing any actual updates. This demonstrates once again how difficult it is to get security right even for a large company that uses standard cryptographic techniques to protect a major product.
Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
06 November 2016
Brandon Broadnax, Nico D{\"o}ttling, Gunnar Hartung, J{\"o}rn M{\"u}ller-Quade, Matthias Nagel
Our notion is fully compatible with the UC framework, i.e., protocols proven secure in the UC framework remain secure in our framework. Furthermore, our notion lies strictly between SPS and Angel-based security, while being closed under protocol composition.
Shielding away super-polynomial resources allows us to apply new proof techniques where we can replace super-polynomial entities by indistinguishable polynomially bounded entities. This allows us to construct secure protocols in the plain model using weaker primitives than in previous composable frameworks involving simulators with super-poly resources. In particular, we only use non-adaptive-CCA-secure commitments as a building block in our constructions. As a feasibility result, we present a constant-round general MPC protocol in the plain model based on standard assumptions that is secure in our framework.