IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
27 June 2017
Mathias Wagner, Stefan Heyse
Skopje, Macedonia, 22 September 2017
Submission deadline: 10 July 2017
Notification: 24 July 2017
Kuwait City , Kuwait , 12 September - 13 September 2017
26 June 2017
The IACR sponsors a small number of Cryptology Schools providing intensive training on clearly identified topics in cryptology. The aim is to develop awareness and increased capacity for research in cryptology. A list of past and upcoming schools can be found at https://www.iacr.org/schools
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
Martin R. Albrecht, Amit Deo
David Leslie, Chris Sherfield, Nigel P. Smart
Céline Blondeau, Roberto Civino, Massimiliano Sala
Alessandro Amadori, Federico Pintore, Massimiliano Sala
Vincent Immler, Robert Specht, Florian Unterstein
As most of the DPA-resistant logic is based on dual-rails, properly implementing them is a challenging task on FPGAs which is due to their fixed architecture and missing freedom in the design tools. While previous works show a significant security gain when using such logic on FPGAs, we demonstrate this only holds for power-analysis. In contrast, our attack using high-resolution electromagnetic analysis is able to exploit local characteristics of the placement and routing such that only a marginal security gain remains, therefore creating a severe threat.
To further analyze the properties of both attack and implementation, we develop a custom placer to improve the default placement of the analyzed AES S-box. Different cost functions for the placement are tested and evaluated w.r.t. the resulting side-channel resistance on a Spartan-6 FPGA. As a result, we are able to more than double the resistance of the design compared to cases not benefiting from the custom placement.
Edward Eaton
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
Xavier Bultel, Pascal Lafourcade
24 June 2017
Tampere University of Technology, Finland
Today, security is an essential ingredient of all information systems. Due to the complexity of the systems, and flaws in the design of the present-day Internet and the web, as well as weaknesses in the development methodologies, software design and tools, large-scale systems face risks due to cyber criminals and other malicious actors. The security related research in the laboratory currently includes topics in side-channel analysis, vulnerabilities in open-source software, security issues in IoT and SDN and network security in general.
The successful candidate aims to excel in:
- scientific research
- conducting and developing education in the field.
The candidate is expected to:
- acquire external competitive funding
- participate in the activities of the global scientific community as well as locally
- interact with society and industry.
Closing date for applications: 28 August 2017
Contact: Miia Haikonen miia.haikonen(at)tut.fi
More information: https://careers.fi/tty/careers.cgi?action=view&job_id=1182&lang=uk#.WU5NOydLc8o
23 June 2017
Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
For a new project which addresses the problem of the security of True Random Number Generator (TRNG). We are looking for candidates with an outstanding Ph.D in applied mathematics and a strong publication record in this field. The main topic of the post-doc is to work on stochastic modeling of TRNG. Knowledge of French is not mandatory.
The Post-Doc position will start in September or October 2017 (flexible starting date), it is funded for 12 month.
To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).
Closing date for applications: 14 July 2017
Contact: Dr. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr
IMDEA Software Institute, Madrid, Spain
The position is based in Madrid, Spain, where the IMDEA Software Institute is situated. Salaries are internationally competitive and include attractive conditions such as access to an excellent public healthcare system. The working language at the institute is English.
Applicants should have already completed, or be close to completing, a PhD in computer science, mathematics, or a related discipline. Applicants should have an excellent research track record demonstrated by publications at major cryptography/security venues, and should have significant experience in the design of cryptographic protocols and provable security. The application requires, among other document, a CV, a research statement, and the names of 3 persons that can provide references about you and your work.
The postdoctoral position is for one year. The starting date is negotiable but not later than January 2018.
Applicants interested in the position should send an email to Dario Fiore and submit the application documents at https://careers.imdea.org/software/. Applications are accepted until the position is filled.
Closing date for applications: 30 November 2017
Contact: For enquiries about the position, please contact:
Dario Fiore dario.fiore (at) imdea.org
Université de Rennes 1/IRISA Rennes
We are looking for a motivated researcher with a good publication record and an interest in real-world cryptography. More particularly we require:
- a basic knowledge of Authenticated Key-Exchange protocols (AKE)
- an understanding of the TLS protocol
- expertise in computational security models and proofs
- knowledge of TLS 1.3 (optional, but a strong plus)
- knowledge of TLS implementations (a strong plus)
The successful candidate is expected to contribute in high-level research, and to work together with the SafeTLS partners (http://safetls.gforge.inria.fr/consortium.html) towards attaining the ambitious goals of the SafeTLS project (http://safetls.gforge.inria.fr/aims.html). We are an international team and will require no knowledge of French.
A successful candidate will be hired for a two-year research contract, hosted by the Université de Rennes 1 (https://international.univ-rennes1.fr/) at the IRISA research center in Rennes, France (https://www.irisa.fr/en). Situated at 2 hours (by express train) from Paris, Rennes is an important research center in cryptography and security, and a strong partner in the Pôle d’Excellence Cybersécurité (PEC) in France -- which attracts competitive and very-high level research in all areas of security and cryptography.
Candidates are invited to apply as soon as possible. Applications will be reviewed as soon as they are received and until the position is filled. For any additional information, please contact Pierre-Alain Fouque pa.fouque (at) gmail.com or Cristina Onete, cristina.onete (at) gmail.com
Closing date for applications: 1 September 2017
Contact: Pierre-Alain Fouque, pa.fouque (at) gmail.com
Cristina Onete, cristina.onete (at) gmail.com
More information: https://www.irisa.fr/emsec
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Sean Bowe, Ariel Gabizon, Matthew D. Green
Building on a work of Ben-Sasson, Chiesa, Green, Tromer and Virza [BCGTV15], we construct a multi-party protocol for generating the CRS of the Pinocchio zk-SNARK [PHGR15], such that as long as at least one participating party is not malicious, no party can later construct fraudulent proofs except with negligible probability. The protocol also provides a strong zero-knowledge guarantee even in the case that all participants are malicious.
This method has been used in practice to generate the required CRS for the Zcash cryptocurrency blockchain.