IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
24 April 2020
Jean-Sébastien Coron, Agnese Gini
ePrint ReportMarloes Venema, Greg Alpár
ePrint ReportDebdeep Mukhopadhyay
ePrint Report22 April 2020
XLIM, University of Limoges (France)
Job PostingThis Ph.D. thesis is offered as part of the ANR-funded 4-year research project MobiS5. The goal of MobiS5 is to provide a cryptographic toolbox for the emerging 5G technologies. More information can be found at: https://mobis5.limos.fr/index.html.
This 3-year Ph.D. thesis will focus on the two following aspects of 5G security:
- 5G Core Network security
- Delegation in the context of 5G networks
Closing date for applications:
Contact: Cristina Onete (maria-cristina.onete@unilim.fr) or Olivier Blazy
More information: https://mobis5.limos.fr/jobs.html
21 April 2020
CentraleSupélec - INSA, Institute of Electronics & Telecommunications of Rennes (IETR), France
Job PostingThis PhD will study the impact that close-by digital-analog-RF domains in mixed-signal reconfigurable platforms may have on new system vulnerabilities. The thesis will focus on studying data leakage mechanisms in RFSoCs to analyze and understand potential new threats linked to their reconfigurable and mixed-signal nature as a first step to find adequate countermeasures.
The candidate must hold a Master degree in Computer/Electrical Engineering, Embedded Systems, Microelectronics, or Computer Science and demonstrate strong background in several of the following topics: Digital design with HDLs; Reconfigurable computing, FPGAs; Hardware security; Embedded systems architectures; Microelectronics/VLSI Design. Knowledge on cryptographic algorithms implementations, C/C++/Python programming and Linux/Git as development environment are highly valuable.
You will receive a 3 year PhD contract and social security coverage, subsidized meals, partial reimbursement of public transport costs, support with accommodation at the campus and access to vocational training and social, cultural and sports events and activities. Send your CV, Bachelor/Master transcripts, a motivational text and reference letter before May 10, 2020.
Closing date for applications:
Contact: Ruben Salvador: ruben (dot) salvador (at) centralesupelec (dot) fr
CEA-LETI, Grenoble, France
Job PostingClosing date for applications:
Contact: Vincent Dimper
University of Auckland, New Zealand
Job PostingDue to the potential threat of quantum computers, the research community is re-evaluating the security of a number of protocols and systems in widespread use. At the very least it is necessary to replace some common cryptographic building blocks with post-quantum alternatives. However, in some settings, the resulting systems may not be practical. It is therefore appropriate to reconsider, from the ground up, these protocols and systems. This PhD project will initiate a study of such protocols and systems. The project will leverage the NIST post-quantum standardization process to form a clear picture of the current state of post-quantum crypto. The project will develop new lightweight solutions for certain applications such as the internet of things (IoT).
The project will be supervised by Professor Steven Galbraith, together with other members of the Cyber Security Foundry at the University of Auckland.
Required skills and experience: Bachelor with honours, or Masters degree, in either Engineering, Computer Science or Mathematics. Good mathematical knowledge and understanding of rigorous mathematical thinking. Good knowledge of cryptography and information security. Programming skills. Good communication skills, both written and spoken.
- Duration: 3 years
- Value: International Student Fees + stipend of NZ$ 27,900 per year.
- Application deadline: 20/5/2020
- Email your CV to Keshala De Silva, with the subject line "Application for PhD Studentship on Applications of post-quantum cryptography".
- If you have written a master thesis or similar, then please email a pdf of it.
- https://www.auckland.ac.nz/en/study/study-options/find-a-study-option/mathematics/doctoral.html
- https://www.auckland.ac.nz/en/study/applications-and-admissions/apply-now.html
Closing date for applications:
Contact: Steven Galbraith
Cryptanalysis Taskforce @ Nanyang Technological University, Singapore
Job Posting(Yes ! We are still hiring despite COVID-19)
The Cryptanalysis Taskforce at Nanyang Technological University in Singapore led by Prof. Jian Guo is seeking for candidates to fill 3 postdoctoral research fellow positions on symmetric-key cryptography, including but not limited to the following sub-areas:- tool aided cryptanalysis, such as MILP, CP, STP, and SAT
- machine learning aided cryptanalysis and designs
- privacy-preserving friendly symmetric-key designs
- quantum cryptanalysis
- cryptanalysis against SHA-3 and AES
Closing date for applications:
Contact: Asst Prof. Jian Guo, guojian@ntu.edu.sg
More information: http://team.crypto.sg
20 April 2020
NIO; San Jose, California
Job PostingResponsibilities
- Design and build security products for connected and autonomous vehicles.
- Research security problems and solutions related to vehicles and transportation
- Design in-vehicle security mechanisms, such as secure vehicle network communication, on-car IDS/IPS, and firewall
Qualifications
- Excellent in security fundamentals, such as network security, applied cryptography, server security, and end-point security
- In-depth knowledge of Linux kernel and OS, and network protocols (TCP/IP, HTTP, MQTT, etc.)
- Worked with Secure Boot on Arm or Aurix processors
Preferred Qualifications
- Experience with Linux kernel hardening
- Knowledge of CAN and vehicle system architecture
- Knowledge of security of various wireless technologies (such as BLE and NFC)
Closing date for applications:
Contact:
Marisela Peifer: Sr Manager, People Ops & Talent
Marisela.Peifer@nio.io
More information: https://jobs.lever.co/nio/8f29bd44-663b-4de2-b6e2-9e596495d5b9
3 July 2020
Event CalendarSubmission deadline: 3 July 2020
Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
ePrint ReportWe present a lower bound for Byzantine Broadcast that relates the latencies of optimistic and synchronous commits when the designated sender is honest and while the optimistic commit can tolerate some faults. We then present two matching upper bounds for tolerating f faults out of n = 2f +1 parties. Our first upper bound result achieves optimal optimistic and synchronous commit latencies when the designated sender is honest and the optimistic commit can tolerate some faults. Our second upper bound result achieves optimal optimistic and synchronous commit latencies when the designated sender is honest but the optimistic commit does not tolerate any faults. The presence of matching lower and upper bound results make both of the results tight for n = 2f + 1. Our upper bound results are presented in a state machine replication setting with a steady state leader who is replaced with a view-change protocol when they do not make progress. For this setting, we also present an optimistically responsive protocol where the view-change protocol is optimistically responsive too.
Ahmad Almorabea
ePrint ReportZhichun Lu, Runchao Han, Jiangshan Yu
ePrint ReportDaniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
ePrint ReportIn this work, we identify a large class of extremely weak keys and provide an algorithm to recover them. For example, we demonstrate how to recover 1 in $2^{47.72}$ of LEDAcrypt's keys using only $2^{18.72}$ guesses at the 256-bit security level. This is a major, practical break of LEDAcrypt.
Further, we demonstrate a continuum of progressively less weak keys (from extremely weak keys up to all keys) that can be recovered in substantially less work than previously known. This demonstrates that the imperfection of LEDAcrypt is fundamental to the system's design.