IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
10 November 2020
Elisa Gorla, Daniela Mueller, Christophe Petit
ePrint ReportM. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
ePrint ReportAkiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
ePrint ReportGraz University of Technology, Graz, Austria
Job Posting- Formal Methods and Security
- Privacy Technologies
- Systems Security
- Usable Security & Privacy
The professorship will be part of the Institute of Applied Information Processing and Communications, which is an internationally visible research environment with more than 60 researchers in information security. The institute collaborates closely with research groups and industry partners around the globe. It is a central part of the recently established Cybersecurity Campus Graz, which unites basic research, education, technology transfer, and industry partners in cybersecurity all under one roof.
The new professor will build an internationally visible group, and will be an engaged teacher in the Computer Science programs at the Bachelor’s, Master’s, and PhD level. At Graz University of Technology, undergraduate courses are taught in German or English and graduate courses are taught in English. For further question, please contact Stefan Mangard / stefan.mangard@iaik.tugraz.at
The application should be sent to the Dean of the Department of Computer Science and Biomedical Engineering at applications.csbme@tugraz.at until 26.11.2020 referencing to 7050/20/035
Closing date for applications:
Contact: Prof. Stefan Mangard - stefan.mangard@iaik.tugraz.at
More information: https://www.tugraz.at/fakultaeten/csbme/news/jobs-grants-calls/tenure-track-professor-in-security-and-privacy/
09 November 2020
Grenada, Grenada, 5 March 2021
Event CalendarSubmission deadline: 10 January 2021
Notification: 10 January 2021
Paris, France, 4 November - 6 November 2020
Event CalendarUniversity of Bristol
Job PostingWithin the Department of Computer Science at the University of Bristol, the Cryptography research group fosters an internationally leading and inter-disciplinary programme of research; current and previous work spans the full range theoretical and practical aspects relating to cryptography, applied cryptography, and cryptographic engineering.
This post represents an exciting opportunity to join the group as part of the SCARV [1] project, which in turn forms part of the NCSC-supported [2] Research Institute in Hardware Security & Embedded Systems (RISE). You will work at the intersection of computer architecture and cryptography, in collaboration with industrial (i.e., Cerberus Security Labs. and Thales) and academic partners, to deliver more efficient, more secure platforms based on RISC-V. Given the project goals, a strong background in micro-processor design and implementation, and/or implementation (e.g., side-channel) attacks on cryptography is therefore desirable.
[1] https://gow.epsrc.ac.uk/NGBOViewGrant.aspx?GrantRef=EP/R012288/1, http://github.com/scarv
[2] https://www.ncsc.gov.uk/information/research-institutes
Closing date for applications:
Contact: Dr. Daniel Page (csdsp@bristol.ac.uk): ref. job ID ACAD104784
More information: https://www.bristol.ac.uk/jobs/find/details/?jobId=200210
University of Bristol
Job PostingWithin the Department of Computer Science at the University of Bristol, the Cryptography research group fosters an internationally leading and inter-disciplinary programme of research; current and previous work spans the full range theoretical and practical aspects relating to cryptography, applied cryptography, and cryptographic engineering.
This post represents an exciting opportunity to join the group as part of the SIPP [1] project: as part of the EPSRC center-to-center programme, SIPP is a collaborative effort between the 5 UK-based core project partners within the NCSC-supported [2] Research Institute in Hardware Security & Embedded Systems (RISE) and partners in Singapore. Within SIPP, the University of Bristol leads a work package of activity at the intersection of cryptographic and energy efficient engineering. For example, the work package will explore how energy efficiency constraints can be satisfied by (secure) cryptographic designs and implementations, and, on the other hand, how energy efficient technologies can impact on security in a positive or negative way. Given this remit, a strong background in micro-processor design and implementation, and/or analysis and design of energy efficient technologies, and/or implementation (e.g., side-channel) attacks on cryptography is therefore desirable.
[1] https://gow.epsrc.ukri.org/NGBOViewGrant.aspx?GrantRef=EP/S030867/1
[2] https://www.ncsc.gov.uk/information/research-institutes
Closing date for applications:
Contact: Dr. Daniel Page (csdsp@bristol.ac.uk): ref. job ID ACAD104782
More information: https://www.bristol.ac.uk/jobs/find/details/?jobId=200210
06 November 2020
Max Planck Institutes in Computer Science, Germany
Job PostingThe Max Planck Institutes for Informatics (Saarbruecken), Software Systems (Saarbruecken and Kaiserslautern), and Security and Privacy (Bochum), invite applications for tenure-track faculty in all areas of computer science. We expect to fill several positions.
A doctoral degree in computer science or related areas and an outstanding research record are required. Successful candidates are expected to build a team and pursue a highly visible research agenda, both independently and in collaboration with other groups.
The institutes are part of a network of over 80 Max Planck Institutes, Germany’s premier basic-research organisations. MPIs have an established record of world-class, foundational research in the sciences, technology, and the humanities. The institutes offer a unique environment that combines the best aspects of a university department and a research laboratory: Faculty enjoy full academic freedom, lead a team of doctoral students and post-docs, and have the opportunity to teach university courses; at the same time, they enjoy ongoing institutional funding in addition to third-party funds, a technical infrastructure unrivaled for an academic institution, as well as internationally competitive compensation.
We maintain an international and diverse work environment and seek applications from outstanding researchers worldwide. The working language is English; knowledge of the German language is not required for a successful career at the institutes.
Qualified candidates should apply on our application website (apply.cis.mpg.de). To receive full consideration, applications should be received by December 15th, 2020.
The Max Planck Society wishes to increase the number of women in those areas where they are underrepresented. Women are therefore explicitly encouraged to apply. The Max Planck Society is also committed to increasing the number of employees with severe disabilities in its workforce. Applications from persons with severe disabilities are expressly desired.
Closing date for applications:
Contact: Catalin Hritcu
More information: https://www.cis.mpg.de/tenure-track-openings-at-max-planck-institutes-in-computer-science
University of Rochester, Rochester, NY
Job PostingCandidates must have (or be about to receive) a doctorate in computer science or a related discipline. Applications should be submitted online (at https://www.rochester.edu/faculty-recruiting/login) no later than January 1, 2021, for full consideration; submissions beyond this date risk being overlooked due to limited interview slots.
Closing date for applications:
Contact: Muthu Venkitasubramaniam
More information: https://www.rochester.edu/faculty-recruiting/positions/show/10942
02 November 2020
Temasek Labs, Nanyang Technological University, Singapore
Job PostingPhysical Analysis and Cryptographic Engineering (PACE) is research group under Temasek Laboratories, NTU, Singapore. As a group of dynamic researchers, the main focus of PACE is to explore advanced aspects of embedded security.
PACE group is seeking applications for a motivated researcher in the area of embedded and mobile security. The successful candidate will work with experienced researchers to explore new security vulnerabilities in commercial products like smartphones and IoT, with a focus on secure boot.
We are looking for a candidate who meets the following requirements:
- Have already completed, or be close to completing a PhD degree in mathematics, computer science, electrical engineering, or related disciplines, with strong track record in research and development (publications in international journals and conferences). Master degree with relevant research experience can be considered.
- Experienced in security evaluation and have understanding of crypto- graphic algorithms (symmetric and asymmetric). Coding background in C/Java/Assembly/Python/VHDL for analysis is required.
- Has experience in working with embedded/IoT devices or android devices for vulnerability assessment.
- Has previous lab experience in developing prototypes, FPGA design, manipulating oscilloscopes, writing device drivers and communication interfaces, which are used in analysis of implemented designs.
- Knowledge of side-channel or fault attacks is a plus.
- Fluent in written and spoken English
- Creative, curious, self-motivated and a team player with good analyti- cal and problem-solving skills.
You will be joining a dynamic group performing research on embedded security, specific to physical attacks. This position is available from December 2020. The initial contract will be one year. There are strong possibilities for extensions upon successful performance. TL offers competitive salary package plus other benefits.
Closing date for applications:
Contact:
Dr. Shivam Bhasin
Programme Manager
sbhasin (at) ntu.edu.sg
Palaiseau, France, 3 November - 4 November 2020
Event CalendarParis, France, 6 September - 10 December 2021
Event CalendarUniversity of Warsaw
Job PostingWe offer:
- very interesting research problems (ranging from theory of cryptography to more applied topics),
- membership in an active and vibrant research team with several international collaborators,
- budget for conference travel and research visits,
- attractive salary: approximately 6,500 PLN per month (gross), and
- an employment contract.
Other details:
- Starting date: January 2021
- Duration: 2 years
The successful candidates will have to enroll in the PhD program at the University of Warsaw (Poland).
Application deadline: Dec 2nd, 2020.
To apply please follow this link: https://www.crypto.edu.pl/research-assistants.
Closing date for applications:
Contact: Stefan Dziembowski
More information: https://www.crypto.edu.pl/research-assistants
Mohammed VI Polytechnic University (UM6P), Benguerir. Morroco
Job PostingLocated at the heart of the future Green City of Benguerir, Mohammed VI Polytechnic University (UM6P), a higher education institution with an international standard, is established to serve Morocco and the African continent. Its vision is honed around research and innovation at the service of education and development. This unique nascent university, with its state-of-the-art campus and infrastructure, has woven a sound academic and research network, and its recruitment process is seeking high quality academics and professionals in order to boost its quality-oriented research environment in the metropolitan area of Marrakech.
The School of Computer and Communication Sciences at Mohammed VI Polytechnic University (UM6P), Benguerir, Morocco is currently looking for motivated and talented Postdoctoral researchers in the area of applied cryptography, and Information security. The successful candidates will primarily be working on the following topics (but not limited to):
- Blockchains and Cryptocurrencies
- Secure Multi Party Computation
The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues. We offer competitive salary (the net salary per month is 2000 USD), a budget for conference travel and research visit, and membership in a young and vibrant team with several international contacts (for more see: https://www.um6p.ma/en).
Submit your application via email including
- full CV,
- sample publications,
- a detailed research proposal,
- and 2-3 reference letters sent directly by the referees.
Closing date for applications:
Contact: Assoc. Prof. Mustapha Hedabou (mustapha.hedabou@um6p.ma) https://career2.successfactors.eu/sfcareer/jobreqcareer?jobId=1339&company=ump
More information: https://career2.successfactors.eu/sfcareer/jobreqcareer?jobId=1339&company=ump
Quebec City, Canada, 6 December - 10 December 2021
Event CalendarSubmission deadline: 1 December 2020
Notification: 28 February 2021
Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
ePrint ReportChan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
ePrint ReportTwo-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
ePrint ReportTo complement the above, we study unconditional explicit constructions of computational two-source non-malleable extractors for samplable sources in the CRS model with significantly better parameters than their information-theoretic counterparts by exploiting stronger hardness assumptions. Under a quasipolynomial hardness assumption, we achieve security against bounded distinguishers, while assuming the existence of nearly optimal collision-resistant hash functions allows us to achieve security against unbounded distinguishers.
Finally, we introduce the setting of privacy amplification resilient against memory-tampering active adversaries. Here, we aim to design privacy amplification protocols that are resilient against an active adversary that can additionally choose one honest party at will and arbitrarily corrupt its memory (i.e., its shared secret and randomness tape) before the execution of the protocol. We show how to design such protocols using two-source non-malleable extractors.
Daniel J. Bernstein
ePrint ReportAs concrete examples, this paper shows two manipulated comparisons of size-security tradeoffs of lattice-based encryption proposals submitted to the NIST Post-Quantum Cryptography Standardization Project. One of these manipulated comparisons appears to match public claims made by NIST, while the other does not, and the underlying facts do not. This raises the question of whether NIST has been subjected to this attack.
This paper also considers a weak defense and a strong defense that can be applied by standards-development organizations and by other people comparing cryptographic algorithms. The weak defense does not protect the integrity of comparisons, although it does force this type of attack to begin early. The strong defense stops this attack.