IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 June 2016
Ran Canetti, Oxana Poburinnaya
ePrint Report- Only a global (i.e., non-programmable) reference string is needed;
- The communication complexity depends only on the size of RAM description of the evaluated function (and not on its circuit size). The work of each party depends on RAM complexity of the function;
- Even not well-formed randomized functionalities can be evaluated securely;
- Only polynomially-secure indistinguishability obfuscation for circuits and injective one way functions are assumed.
Second, we modify the GP protocol to have only RAM complexity even in the case of Byzantine corruptions. For this we construct the first statistically-sound non-interactive Zero-Knowledge scheme with RAM complexity.
Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
ePrint ReportMid Sweden University
Job PostingApplication: Please submit your application electronically, including proven curriculum vitae to registrator (at) miun.se or by regular mail to Registrar, Mid Sweden University, 851 70 Sundsvall, Sweden. Mark your application with ref no MIUN 2016/1185. Applications must be received by Mid Sweden University by 2016-06-30.
Closing date for applications: 30 June 2016
More information: http://www.miun.se/en/university/jobs/postdoctoral-fellow-in-computer-science2
15 June 2016
Boaz Barak, Mohammad Mahmoody
ePrint ReportOur bound is optimal up to a constant factor since Merkle proposed a key agreement protocol in 1974 that can be easily implemented with $n$ queries to a random oracle and cannot be broken by any adversary who asks $o(n^2)$ queries.
14 June 2016
Kevin Lewi, David J. Wu
ePrint ReportIn this work, we consider a related primitive called order-revealing encryption (ORE), which is a generalization of OPE that allows for stronger security. We begin by constructing a new ORE scheme for small message spaces which achieves the best-possible notion of security for ORE. Next, we introduce a domain-extension technique and apply it to our small-message-space ORE. While our domain-extension technique does incur a loss in security, the resulting ORE scheme we obtain is more secure than all existing (stateless and non-interactive) OPE and ORE schemes which are practical. All of our constructions rely only on symmetric primitives. As part of our analysis, we also give a tight lower bound for OPE and show that no efficient OPE scheme can satisfy best-possible security if the message space contains just three messages. Thus, achieving strong notions of security for even small message spaces requires moving beyond OPE.
Finally, we examine the properties of our new ORE scheme and show how to use it to construct an efficient range query protocol that is robust against the inference attacks of Naveed et al. We also give a full implementation of our new ORE scheme, and show that not only is our scheme more secure than existing OPE schemes, it is also faster: encrypting a 32-bit integer requires just 55 microseconds, which is more than 65 times faster than existing OPE schemes.
Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
ePrint ReportAloni Cohen, Saleet Klein
ePrint ReportJake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
ePrint ReportWe use algorithmic and implementation techniques to implement a time- and memory-efficient key \emph{enumeration} algorithm, and in tandem identify how to optimise throughput when bulk-verifying quantities of candidate AES-128 keys. We then explore how to best distribute the workload so that it can be deployed across a significant number of CPU cores and executed in parallel, giving an adversary the capability to enumerate a very large number of candidate keys.
We introduce the tool \textsc{labynkyr}, developed in C++11, that can be deployed across any number of CPUs and workstations to enumerate keys in parallel. We conclude by demonstrating the effectiveness of our tool by successfully enumerating $2^{48}$ AES-128 keys in approximately 30 hours using a modest number of CPU cores, at an expected cost of only 700 USD using a popular cloud provider.
Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
ePrint ReportMehrad Jaberi, Hamid Mala
ePrint ReportFatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
ePrint ReportKarlsruhe, Germany, 7 August - 12 August 2016
Event Calendar13 June 2016
Nagoya, Japan, 28 September - 30 September 2016
Event CalendarNagoya, Japan, 25 September - 27 September 2016
Event CalendarSubmission deadline: 2 September 2016
13 June - 1 August 2016
Event CalendarSubmission deadline: 1 August 2016
12 June 2016
Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey
Job Posting- For more information about our group and projects, visit
https://crypto.ku.edu.tr
- For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit
https://gsse.ku.edu.tr/en/admissions/application-process/
Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.
For Ph.D. applicants from China and Hong Kong, we have the prestigious Fung scholarship:
https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong
- For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü directly, including full CV, sample publications, a research proposal, and 3 reference letters sent directly by the referees.
http://home.ku.edu.tr/~akupcu
Late applications will be accepted, though early applications will be given precedence. Ph.D. / M.Sc. application deadline is June 12, 2016. Post-doctoral researcher application deadline is end of summer.
Closing date for applications: 31 August 2016
Contact: gsse (at) ku.edu.tr
More information: https://gradapp.ku.edu.tr/login.php
10 June 2016
Singapore University of Technology and Design
Job PostingOne research assistant position to work on the system implementation of D2D communication Security.
Qualification and skills:
- Candidates should have a B.S. or M.E. degree
- Android and Java programming
- Networking programming, i.e., device-to-device (D2D) or peer-to-peer (P2P) protocols
- Strong programming experience
- Device or service discovery protocols programming is preferable
- Background on Wireless Security and Cryptography is prefereable
The initial appointment will be for 1 year but it can be extended depending on the availability of funding and the candidate\'s performance. These positions come with attractive salary and benefits.
How to apply:
Interested candidates kindly send their CV to Dr. Jemin Lee (email: jmnlee (at) ieee.org). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.
About iTrust@SUTD
iTrust is a multidisciplinary research centre located at the Singapore University of Technology and Design (SUTD), established collaboratively by SUTD and the Ministry of Defence, Singapore (MINDEF). iTrust researchers focus on the development of advanced tools and methodologies to ensure security and safety of current and future Cyber Physical Systems, Enterprise security and Internet of Things. The Singapore University of Technology and Design (SUTD) is established in collaboration with Massachusetts Institute of Technology (MIT) to advance knowledge and nurture technically grounded leaders and innovators to serve social needs.
Closing date for applications: 31 August 2016
iTrust@SUTD
Job PostingOne research assistant position to work on the system implementation smart-grid, and fog computing security.
Qualification and skills:
? Candidates should have a B.S/B-Tech or M.S/ M.Tech or M.E degree
? Android and Java programming
? Matlab programming
? Sound knowledge in Networking (especially in wireless communication)
? Strong programming experience
? Background on some networking simulators (like NS2).
? Background on Wireless Security and Cryptography is preferable
The initial appointment will be for 1 year but it can be extended depending on the availability of funding and the candidate\'s performance. These positions come with attractive salary and benefits.
How to apply:
Interested candidates kindly send their CV to Dr. Prosanta Gope (gope_prosanta (at) sutd.edu.sg) or Dr. Jemin Lee (email: jmnlee (at) ieee.org). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.
Closing date for applications: 31 July 2016
University of Glasgow, Republic Polytechnic Singapore
Job PostingWe are looking for a capable and responsible individual to work on a R&D project in cyber security.
The successful candidate will be placed on a two-year contract and will play an active role in designing and developing a security solution that provides protection at the communication layer against tampering of energy usage in the smart metering infrastructure. The candidate will also work closely with our collaborators in developing the security libraries for end-to-end communication security.
Requirements:
• Relevant qualifications Computer Science, Engineering or Applied Mathematics, with strong interest in applied cryptography, secure efficient cryptographic implementations. Fresh graduates are welcome to apply.
• Knowledge in hashing, discrete logarithm and elliptic curve cryptography is a plus.
• Experience in networking, embedded system development and integration.
• Ability to conduct high-quality research with excellent analytical, technical and problem solving skills.
• Possess good oral, technical writing, presentation skills along with a high degree of self-motivation and ability to work effectively in a team environment.
Closing date for applications: 25 September 2016
Contact: david_leong (at) rp.edu.sg.
More information: http://www.rp.edu.sg/careers.aspx
Cairns, Australia , 26 October - 28 October 2016
Event CalendarSubmission deadline: 1 July 2016
Notification: 1 August 2016