IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
28 November 2018
Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
Furthermore, by applying this new technique to Litecoin and its child cryptocur rencies, we are able to provide the first extensive view and lower bound on the stale block and fork rate in the Litecoin network. Finally, we outline that a recovery of other important metrics and blockchain characteristics through merged mining may also be possible.
Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
Ashwin Jha, Mridul Nandi
Jean-Sebastien Coron, Hilder V. L. Pereira
As an application, we describe the first concrete implementation of non-interactive Diffie-Hellman key exchange secure against existing attacks. Key exchange was originally the most straightforward application of multilinear maps; however it was quickly broken for the three known families of multilinear maps (GGH13, CLT13 and GGH15). Here we describe the first implementation of key exchange based on CLT13 that is resistant against the Cheon et al. attack. For N=4 users and a medium (62 bits) level of security, our implementation requires 8 GB of public parameters, and a few minutes for the derivation of a shared key. Without Kilian's randomization of encodings our construction would be completely unpractical, as it would require more than 100 TB of public parameters.
Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi
P. Arun Babu, Jithin Jose Thomas
Dingfeng Ye, Danping Shi, Peng Wang
Massimo Bartoletti, Roberto Zunino
27 November 2018
CWI Amsterdam
Requirements:
You should hold a Master degree (or expect to obtain it soon) in mathematics or computer science (or a comparable subject) with excellent grades, and you should have successfully demonstrated your research abilities, e.g. by completion of an (undergraduate) research project with outstanding results. Furthermore, preferably, you:
- have some background in cryptography;
- enjoy mathematics;
- possess good academic writing and presentation skills;
- are fluent in spoken and written English.
Application:
Your application should include the following information:
- a curriculum vitae;
- a letter of motivation (at most 1 page) explaining why you are interested in this position;
- a list of all university courses taken, including a transcript of grades;
- a report from an undergraduate research project you have done;
- the name and contact details (including email address) of two to three referees who can provide details about your profile (one of whom should be the main supervisor of your Master thesis).
The applications will be reviewed upon receipt and until the position is filled.
Closing date for applications: 1 February 2019
Contact: Please send your application to Ronald Cramer (CWI & Leiden U) and Serge Fehr (CWI & Leiden U), using ``Application CWI PhD Position`` as subject. Email: {cramer,fehr} (at) cwi.nl
University Clermont Auvergne, LIMOS, Clermont-Ferrand, France
Your Profile:
A PhD in Computer Science, Applied Mathematics, Cryptography or related field.
Competitive research record in symmetric cryptography or in constraint programming.
Commitment, team working and a critical mind.
Fluent written and verbal communication skills in English are essential
Closing date for applications: 1 September 2019
Contact: email your cover letter, your CV, your PhD, reports of the reviewers of your PhD, a selection of your best papers related to the post-doc offer, some recommandation
letters, contact information for 3 referees and any information that might help us to choose you.
More information: http://sancy.univ-bpclermont.fr/~lafourcade/post-doc-LIMOS.pdf
Rambus Security Division, Rotterdam, the Netherlands
Rambus is seeking for a dynamic, highly motivated, experienced Senior Security Engineer. The ideal candidate will be team oriented, and have a strong knowledge of the HW security including side-channel analysis and fault analysis. In addition, She/he possesses an in-depth knowledge of front end digital design process and related design flows.
Responsibilities
- Design and implement secure cryptographic hardware IP blocks as part of cryptography research’s security IP portfolio.
- Implement fault and side-channel analysis countermeasures and verify resistance to state-of-the-art attack techniques
- Invent, patent and publish new techniques in the fields of DPA countermeasures, fault resistance and efficient hardware designs
- Supports FAEs, customers, and Rambus sales and marketing team in Europe and Asia and work closely with our offices in Sunnyvale, San Francisco, and Bangalore
- Collaborates with different teams to support all technical aspects of the sales cycle
- Represent Rambus CRD at international workshops, conferences and trade shows.
- Author technical collateral and whitepapers on CRD’s cryptographic hardware technologies
Closing date for applications:
More information: https://careers.rambus.com/jobs/smts-ii-security-engineering-rotterdam-netherlands
Department of Computing, The Hong Kong Polytechnic University
Candidates for research fellow/associate should have completed (or close to completing) a PhD degree in computer science, mathematics or a related discipline. Research assistants/project interns are expected to have an honours degree or an equivalent qualification.
Research Fellow/Associates are expected to have solid experience in Public Key Cryptography and Provable Security. Research assistants and project interns should have respectable academic record and an interest in the above area. Specific topic of interest:
- Lattice-Based Anonymous Credentials
- Empirical Analysis on Strength of Ideal Lattice
- Ring Signatures & Linkable Ring Signatures
- Different kinds of zero-knowledge proof/argument systems
- Transaction Privacy in Public and Consortium Blockchain
These positions have flexible starting dates. The initial appointment will be for 12 months, with a strong possibility for further appointment.
Closing date for applications: 31 March 2019
Contact: Dr. Man Ho Au (csallen (at) comp.polyu.edu.hk)
More information: http://www.comp.polyu.edu.hk/~csallen
24 November 2018
Fukuoka, Japan, 5 August - 8 August 2019
Submission deadline: 20 March 2019
Notification: 25 April 2019
Miami, USA, 15 May - 17 May 2019
Submission deadline: 25 January 2019
Notification: 1 March 2019
23 November 2018
Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
We present two new low-storage algorithms for the discrete logarithm problem in an interval of size $N$. The first algorithm is based on the Pollard kangaroo method, but uses 4 kangaroos instead of the usual two. We explain why this algorithm has heuristic average case expected running time of $(1.715 + o(1)) \sqrt{N}$ group operations. The second algorithm is based on the Gaudry-Schost algorithm and the ideas of our first algorithm. We explain why this algorithm has heuristic average case expected running time of $(1.661 + o(1)) \sqrt{N}$ group operations. We give experimental results that show that the methods do work close to that predicted by the theoretical analysis.
This is a revised version since the published paper that contains a corrected proof of Theorem 6 (the statement of Theorem 6 is unchanged). We thank Ravi Montenegro for pointing out the errors.
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
The central part of our work is a construction for oblivious affine function evaluation (OAFE), which can be seen as a generalization of the oblivious transfer primitive: Parametrized by a finite field F and a dimension k, the OAFE primitive allows a designated sender to choose an affine function f:F->F^k, such that hidden from the sender a designated receiver can learn f(x) for exactly one input x in F of his choice. All our abovementioned results build upon this primitive and it may also be of particular interest for the construction of garbled arithmetic circuits.
22 November 2018
Mathematics Department, University of Auckland, New Zealand
Two years duration
The aim of this role is to conduct research at an international level on post-quantum cryptography and related mathematics. The successful applicant will be working in collaboration with Professor Steven Galbraith, his students, and other collaborators. The ability to work as part of a team and independently is essential. PhD in Mathematics or a related discipline (eg Computer Science) desired.
The Mathematics department at the University of Auckland was ranked 45th worldwide in the 2018 QS World University Rankings. Professor Galbraith\'s research group contains approx 6 post-grad students working in mathematical crypto.
The minimum salary for a research fellow at the University of Auckland in 2019 is NZD 81963.00.
Closing date for applications: 15 January 2019
Contact: Steven Galbraith
Professor of Pure Mathematics
s.galbraith (at) auckland.ac.nz
More information: https://opportunities.auckland.ac.nz/jobid/20285/1/1
Quantum Software Consortium, Netherlands
QSC is a project of University of Amsterdam, Leiden University, Delft University of Technology, Centrum Wiskunde & Informatica (CWI) and Vrije Universiteit Amsterdam, funded by NWO.
We are inviting applications for our program of prestigious 3 year Ada Lovelace postdoctoral Fellowships, which has the explicit aim of hiring talented female researchers.
The consortium is organized around three themes of algorithmic development: for quantum computers, for quantum networks, and for quantum(-safe) cryptography. A fourth hardware theme, the demonstrator, provides a distributed quantum computing network linking the three sites of the consortium and The Hague, to test designs arising from the three software themes. World class hardware for demonstrating quantum algorithms is furthermore available via QuTech, Leiden, and Amsterdam outside this proposal.
The subject matter of a candidate’s proposed research is free, as long as it contributes to the scientific program of the QSC. The first call for Ada Lovelace Fellowships will be open until January 31th 2019. Candidates can be proposed in the following two ways:
(1) proposal by one of the QSC Senior Researchers.
(2) application by the candidate, accompanied by a supporting letter by a QSC Senior Researcher.
In both cases, the proposal should include CV and list of publications, description of proposed research, description of embedding in the QSC (preferred location, collaborators), up to three names of scientists who can be contacted for reference letters
You can submit your application to the QSC office. Email: office (at) quantumsc.nl. Deadline for applications is January 31st 2019. In the current round up to two fellowships can be granted.
Closing date for applications: 31 January 2019
Contact: Ronald Cramer (cramer (at) cwi.nl, cramer (at) math.leidenuniv.nl)
More information: http://quantumsc.nl/Research/Overview/