IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 November 2015
Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
Each of the five proposed schemes has the smallest share size having the mentioned properties among the existing schemes in the respective fields.
Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
Antonio de la Piedra
Zhenzhen Bao, Wentao Zhang, Peng Luo, Dongdai Lin
17 November 2015
Jeju Island, Republic of Korea, February 15 - February 17
Notification: 10 December 2015
From February 15 to February 17
Location: Jeju Island, Republic of Korea
More Information: http://www.platcon.org/workshops/fsp-16
University of Westminster, London, UK
We are looking for an excellent, motivated, self-driven PhD student to work in the area of privacy in cloud computing. The position is for three years and the main aim of the PhD project is to design and develop privacy-preserving protocols for cloud environments.
The successful candidate is expected to perform research on the aforementioned areas based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known security related conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications as well as research experience in the following areas are specifically encouraged to apply: cloud computing, security and privacy in cloud environments, trusted computing, applied cryptography, privacy in participatory sensing applications, and privacy in eHealth, secure e-Voting schemes and reputation systems.
Candidates should fulfill the following requirements:
- A Master degree in Computer Science or mathematics;
- Knowledge of Cryptographic Protocols;
- Cloud Computing Architecture;
- Good Academic Writing and Presentation Skills;
- Good Social and Organizational Skills;
Publications in security and privacy will be regarded as an additional merit.
The Cybersecurity group at the University of Westminster intends to increase the number of women in those areas where they are underrepresented. Therefore women are explicitly encouraged to apply.
To apply please send by e-mail the following documents:
- Curriculum vitae
- Motivation letter
- Research statement
14 November 2015
Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout.
curves, hyperelliptic curves, pairing ... etc we have to go through
arithmetic optimization then hardware optimization. Regarding restricted
environments\' compromises, we should strike a balance between efficiency
and memory resources. For this reason, we studied the mathematical aspect
of pairing computation and gave new development of the methods
that compute the hard part of the final exponentiation in [1]. They prove
that these new methods save an important number of temporary variables
and they are certainly faster than the existing one. In this paper, we will
also present a new way of computing Miller loop, more precisely in the
doubling algorithm, so we will use this result and the arithmetic optimization
presented in [1], then we will apply hardware optimization to find a
satisfactory design which give the best compromise between area occupation
and execution time. Our hardware implementation, on a Virtex-6
FPGA(XC6VHX250T), used only 9476 Slices, which is less resources used
compared with state-of-the-art hardware implementations, so we can say
that our
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
We present a novel cryptanalysis of this scheme. For parameter sizes corresponding to claimed 128-bit security, our implementation recovers the shared key using less than 8 CPU hours, and less than 64MB of memory.
Sihem Mesnager
regular graphs. Based on a generic construction of linear codes from mappings and by employing weakly regular bent functions, we provide new class of linear $p$-ary codes with three weights given with its weight distribution. The class of codes presented in this paper is different from those known in the literature. Also, it contains some optimal codes meeting certain bound on linear codes
Hugo Labrande
Peter Y A Ryan andPeter B Roenne, Vincenzo Iovino
vote is accurately included in the tally. While this may be technically valid, from a public acceptance standpoint is
may be problematic: many voters may not really understand the purpose of the encrypted ballot and the various checks that they
can perform. In this paper we take a different approach and
revisit an old idea: to provide each voter with a private tracking number. Votes are posted on a bulletin board in
the clear along with their associated
tracking number.
This is appealing in that it provides voters with a very simple, intuitive way to verify their
vote, in the clear.
However, there are obvious drawbacks: we must ensure that no two voters are assigned the same tracker and we need to keep the trackers private.
In this paper, we propose a scheme that addresses both of these problems: we ensure that voters get unique
trackers and we close
off the coercer\'s window of opportunity by ensuring that the voters only learn their tracking numbers after
votes have been posted. The resulting
scheme provides receipt-freeness, and indeed a good level of coercion-resistance while also providesinga more immediately understandable form of
verifiability. The cryptographyis under the bonnet as far as the voter is concerned.
The basic scheme still has a problem in some contexts: if the coercer is himself a voter there is a chance
that the coerced voter might light on the coercer\'s tracker, or the coercer simply claims that it is his.
We argue that in many contexts this may be an acceptable threat when weighed against the more transparent verification
provided by the scheme. Nonetheless, we
describe some elaborations of the basic scheme to mitigate such threats.
13 November 2015
Cairo, Egypt, May 9 - May 11
Notification: 25 February 2016
From May 9 to May 11
Location: Cairo, Egypt
More Information: http://infos2016.fci.cu.edu.eg/INFOS2016/
Yaroslavl, Russia, June 6 - June 8
Notification: 25 April 2015
From June 6 to June 8
Location: Yaroslavl, Russia
More Information: http://www.ctcrypt.ru/
The Australian National University
The School is seeking applications from ambitious researchers for two or more positions at academic level B or C. These \"tenure track\" positions will be offered under the College\'s Ongoing Position Program (OPP), with an initial appointment of five years and a commitment to convert to continuing subject only to performance. During this period, and particularly at level B, the teaching workload will initially be reduced in order for the appointee to establish their research career.
Exceptional candidates in all areas related to computer science will be considered. However, candidates whose appointment would strengthen the School in the areas of software engineering, cyber security, or at the interface between computer science and biomedical science or social science, are particularly encouraged to apply. In addition, the School puts a strong emphasis on enhancing diversity in our staff and students, and is particularly keen for candidates in under-represented demographic groups to apply.
12 November 2015
NTNU, Trondheim and University of Bergen, Norway
All of the researchers will work on a project entitled “Cryptographic Tools for Cloud Security” funded by the Norwegian Research Council. The project is a collaboration between the Departments of Telematics and Mathematical Sciences at NTNU, Trondheim, and the Department of Informatics at the University of Bergen. The overall aim of the project is to develop new cryptographic algorithms and protocols suitable for securing cloud computing against pervasive adversaries.
Further information, and instructions for how to apply are available at:
NTNU positions: http://www.jobbnorge.no/en/available-jobs/job/118739/
Bergen position: http://www.jobbnorge.no/en/available-jobs/job/119264/
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
Nanyang Technological University, Singapore
The candidate will perform the research of hardware design/analysis within cryptosystems in FPGA and ASIC, specific to side-channel attacks. This position is available from February 2015. The initial contract will be one year. There are possibilities for extensions upon successful performance.
- Candidates should have already completed, or be close to completing a PhD degree in mathematics, computer science, electrical engineering, or related disciplines, with strong background in design/analysis of side-channel attack relevant hardware security in FPGA/ASIC environment.
- The candidate should have track record in R&D (publications in international journals and conferences.)
- Creative, curious, self-motivated and a team player with good analytical skills.
- The candidate needs to speak fluent in written and spoken English
- The competent candidate is expected to be experienced in FPGA/ASIC developments, crypto-core implementation and optimization with coding background in VHDL/Verilog/System Verilog and FPGA EDA tools is required. The candidate should be acquainted with high-level tools/languages like MATLAB, Python, TCL or Perl for automation and analysis.
- The candidate should have previous lab experience in developing prototypes, manipulating oscilloscopes, writing device drivers and communication interfaces which are used in analysis of implemented designs.
- Previous experience either in cryptographic development for critical application (automotive/aerospace/medical) or signal processing is a plus.
11 November 2015
Chalmers University of Technology, Sweden
The PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography. Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.
The position is fully funded for five years. The call for expressions of interest will remain open until a suitable candidate is appointed.
NTNU, Trondheim
The postdoctoral fellow will carry out research and experimental work in the field of cryptographic protocol technology applied to wireless and mobile communication systems. The candidate will participate in the development of instrumentation and research projects in our new wireless security lab.
The candidate will collaborate in research projects with the professors affiliated with the NTNU Applied Cryptology Research Lab, and will be able to supervise Master thesis students specializing in wireless security.
We seek a highly motivated and qualified individual with a strong publication record, holding a Ph.D. degree in communication networks or related fields by the time of appointment. Key requirements include:
- Documented research activity and publications in information and communication security, in particular with a focus on cryptographic technology
- In depth knowledge of wireless and mobile communication systems
- Expressed and documented interests and ability to perform experimental studies
- At least a Masters level of computer engineering skills in software or hardware
- Excellent communication skills in English (written and spoken)