IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
16 December 2016
University of Bergen, Norway
Job PostingOne of the research groups at the department is the Reliable Communication Group with main research directions of Boolean functions, coding, cryptography, information security, quantum information theory.
http://www.uib.no/en/rg/selmer
Candidates with strong background in above mentioned areas are particularly welcome to apply.
For further information and for application to positions:
https://www.jobbnorge.no/en/available-jobs/job/131983/research-fellow-phd-candidates-in-informatics-computer-science-3-positions
Closing date for applications: 1 March 2017
Contact: Professor Petter E. Bjørstad, Head of Department, e-mail: Petter.Bjorstad (at) uib.no
More information: https://www.jobbnorge.no/en/available-jobs/job/131983/research-fellow-phd-candidates-in-informatics-computer-science-3-p
University College London (UCL)
Job Postingat University College London (UCL)
on Genomic Privacy
Application Deadline: 31 January 2017
Starting Date: 1 April 2017 or sooner
Apply at: https://www.prism.ucl.ac.uk/#!/?project=196
We are happy to announce the availability of a fully-funded PhD position, sponsored by a Google Research Award, on genomic privacy. Please find more details at https://www.prism.ucl.ac.uk/#!/?project=196
Closing date for applications: 31 January 2017
Contact: Emiliano De Cristofaro, me (at) emilianodc.com
More information: https://www.prism.ucl.ac.uk/#!/?project=196
14 December 2016
Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
ePrint ReportBased on timely real-world examples, this paper motivates the need for a new privacy tool, called Private Set Intersection with Projection (PSI-P). In it, Server has (at least) a two-attribute table and Client has a set of values. At the end of the protocol, based on all matches between Client's set and values in one (search) attribute of Servers database, Client should learn the set of elements corresponding to the second attribute, and nothing else. In particular the intersection of Client's set and the set of values in the search attribute must remain hidden.
We construct several efficient (linear complexity) protocols that approximate privacy required by PSI-P and suffice in many practical scenarios. We also provide a new construction for PSI-P with full privacy, albeit slightly less efficient. Its key building block is a new primitive called Existential Private Set Intersection (PSI-X) which yields a binary flag indicating whether the intersection of two private sets is empty or non-empty.
Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
ePrint ReportShiyi ZHANG, Yongjuan WANG, Guangpu GAO
ePrint ReportKartik Nayak, Jonathan Katz
ePrint ReportXiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
ePrint ReportRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
ePrint ReportTakeshi Koshiba, Katsuyuki Takashima
ePrint ReportHoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
ePrint Report13 December 2016
Xi'an, China, 23 October - 25 October 2017
Event CalendarSubmission deadline: 15 June 2017
University of Connecticut
Job PostingAs an Affirmative Action/Equal Employment Opportunity employer, UConn encourages applications from women, veterans, people with disabilities and members of traditionally underrepresented populations.
Closing date for applications: 22 August 2017
More information: https://academicjobsonline.org/ajo/jobs/8559
University of Connecticut
Job Posting
Closing date for applications: 31 May 2017
More information: https://academicjobsonline.org/ajo/jobs/6635
University of Amsterdam / CWI / QuSoft
Job PostingStaff members at ILLC as well as the next-door research center for quantum software QuSoft (Jop Briet, Harry Buhrman, Serge Fehr, Stacey Jeffery, Ronald de Wolf, Christian Schaffner) do research on a variety of topics in quantum information processing including quantum cryptography, quantum algorithms, cryptographic protocols and complexity theory.
The aim of the project is to develop new quantum-cryptographic protocols (beyond the task of key distribution) and explore their limitations. Examples of active research are position-based quantum cryptography and quantum homomorphic encryption. Another aspect is to investigate the security of classical cryptographic schemes against quantum adversaries (post-quantum cryptography).
The full-time appointment (38 hours per week) will be on a temporary basis, initially for one year with an extension for a further two years on positive evaluation. Depending on experience, the gross monthly salary will range from €2,552 to €4,028 (scale 10), excl. 8% holiday allowance and 8,3% annual allowance.
Prospective candidates should:
- hold or be about to obtain a PhD degree in computer science, mathematics or physics;
- have a proven track record of excellence in cryptography and/or quantum information, as witnessed by a strong publication list in relevant first-tier conference proceedings or journals;
- in-depth knowledge of one of the following fields is a plus: parallel repetition, limited-quantum-storage models, continuous variables, quantum security notions, post-quantum security;
- have strong passion for research, a drive to publish and the wish to learn new skills through working with or assisting in guiding PhD and MSc students;
- have good communication skills in English, both oral and written.
Closing date for applications: 31 January 2017
Contact: Christian Schaffner, http://homepages.cwi.nl/~schaffne
More information: http://goo.gl/rdzIkJ
09 December 2016
Norwegian University of Science and Technology (NTNU), Trondheim, Norway
Job PostingClosing date for applications: 1 February 2017
Contact: Prof Colin Boyd, colin.boyd (at) item.ntnu.no.
Applications must be made through the jobbnorge site (URL below)
More information: https://www.jobbnorge.no/en/available-jobs/job/131846/
The University of Auckland, New Zealand
Job PostingThe successful appointee will have a PhD, demonstrated excellence in research, and a commitment to high quality research-informed teaching. The ideal candidate would have a research program that complements and builds on existing areas of strength within the department (http://www.cs.auckland.ac.nz).
The scope of the search encompasses candidates conducting research in the field of digital security broadly defined (e.g. including but not limited to Cloud Computing (with emphasis on privacy and confidentiality); Digital forensics, Security Testing; Mobile devices; Cyber-physical systems focusing on Internet of Things; Machine-to-Machine systems; Software Obfuscation; and Big Data).
The main criteria for candidates are excellence in research as well as the ability to be a highly effective teacher of both undergraduate and graduate students.
The appointee will be expected to teach at undergraduate and postgraduate levels in their specialist area, at introductory levels more widely, and to engage in research and publication both personally and through the supervision of research students. The appointee would also be expected to seek research funding, to engage with the profession, to engage with industry, and to contribute to departmental service.
This is a full-time, permanent position based on the University of Auckland\'s city campus. The start date for this position will be mid-2017.
The University has an equity policy and welcomes applications from all qualified persons.
Closing date for applications: 15 January 2017
Contact: recruitment (at) auckland.ac.nz
More information: https://www.opportunities.auckland.ac.nz/psp/ps/EMPLOYEE/HRMS/c/HRS_HRAM.HRS_CE.GBL?Page=HRS_CE_JOB_DTL&Action=A&JobOpen
Hong Kong Applied Science and Technology Research Institute Company
Job Posting1. To design and develop cryptographic protocols and schemes
2. To design, analyze and implement cryptographic systems and related systems such as blockchain
3. To study the latest cryptographic algorithms and protocols
Requirements:
- Master degree in computer science, electronic engineering or other relevant disciplines with 3+ years experience; less experience for PhD holders.
- Experience on cryptographic system design and cryptanalysis
- Deep knowledge on number theory and security proofs
- Hands-on experience with C/C++ and Java
- Preferably having experiences on using cryptographic libraries such as OpenSSL, MIRACL, PBC, etc.
- Experience on developing cloud computing systems an advantage, but not a must
- Strong interpersonal and communications skills
- Good command of both written and spoken English
Closing date for applications: 15 December 2016
Contact: charlenechoo (at) astri.org
More information: http://www.astri.org/careers/work-at-astri/jobs/senior-software-engineer-software-engineer-applied-cryptography-5/
Polyas GmbH, Germany
Job PostingAs a researcher at Polyas, you will help us apply modern cryptographic techniques and transform them into viable e-voting solution. You will explore approaches to open problems, validate them and find ways to transform them into useful products.
Responsibilities
- Keep track on new development in academic research on cryptography, e-voting, and the block-chain technology.
- Validate techniques and methods related to electronic voting.
- Conduct and publish research on electronic voting.
- Develop technical solution based on the results of the research and integrate them into our product portfolio.
Qualification
Minimum qualifications:
- MS degree in Computer Science or Mathematics.
- Familiarity with modern cryptography.
- Familiarity with one or more general purpose programming languages and with Java in particular.
Preferred qualifications:
- Experience in research on cryptography confirmed by original publications.
- Knowledge of the techniques used in electronic voting is a plus.
- Strong programming skills. Knowledge of Scala (or other functional languages) is a plus.
- PhD degree in Computer Science or Mathematics is a plus.
Closing date for applications: 1 March 2017
Contact: Tomasz Truderung, t.truderung (at) polyas.com
More information: http://polyas.com