IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
18 December 2017
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
Ivan Tjuawinata, Tao Huang, Hongjun Wu
Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
17 December 2017
Jeju, Korea , 29 January - 31 January 2018
Submission deadline: 15 December 2017
Notification: 12 January 2018
Hamburg, Germany, 27 August - 30 August 2018
Submission deadline: 15 April 2018
Notification: 1 June 2018
Singapore, Singapore, 8 August - 10 August 2018
Submission deadline: 16 February 2018
Notification: 6 April 2018
Incheon, South Korea, 4 June 2018
Submission deadline: 15 January 2018
Notification: 1 March 2018
16 December 2017
University of Luxembourg
- Applied Cryptography (SK or PK)
- Crypto-currencies, smart-contracts, financial cryptography
- Privacy enhancing technologies
- Distributed consensus protocols
- Cybersecurity
We offer
You will work in an exciting international environment and will carry leading edge research in these rapidly evolving areas, which will have direct impact on the future. Luxembourg’s financial center is one of the largest in Europe and our team is part of Security and Trust (SnT) research center (>200 people researching all aspects of IT security). The University offers highly competitive salaries and is an equal opportunity employer.
Applications, written in English, should be submitted by e-mail, and will be considered on receipt therefore applying before the deadline is encouraged.
Closing date for applications: 28 February 2018
Contact: Prof. Alex Biryukov
More information: https://www.cryptolux.org/index.php/Vacancies
University of Limoges, France
His main role will be to design and evaluate lightweight cryptographic algorithms (dedicated to IoT) secured against side channel analysis.
Skills in design of block ciphers and in side channel analysis will be favourably considered.
Closing date for applications:
Contact: Christophe Clavier (christophe.clavier at unilim.fr)
Technische Universitaet Darmstadt - CYSEC, Darmstadt, Germany
Post-Doc position.
The research focus of the candidate shall be embedded in the group’s current research topics, which encompass among others
- Hardware Security
- Applied cryptography
- Privacy Enhancing Technologies
- Security in Critical Infrastructures
We are looking for highly motivated candidates, who have completed their PhD within the last three years and a proven track record in one or more of the following or related areas: trusted computing, applied cryptography, secure embedded systems, software security, or privacy. We expect professional and independent commitment in both research and teaching (one course per year). We offer a professional work environment and support our staff in the acquisition of external funds and provide many opportunities to work with international collaboration partners from academia and industry through our joint research projects CRISP and CROSSING.
The salary is internationally competitive based on the TU Darmstadt’s wage agreement (TV-TUD) and includes social benefits. TU Darmstadt is an equal-opportunities employer and encourages applications from women. In case of equal qualifications, applicants with a degree of disability of at least 50% will be given preference. Part-time work is possible.
Please send your applications including your CV, a list of publications, two representative copies of your publications, and a letter of motivation to Prof. Stefan Katzenbeisser, TU Darmstadt, Security Engineering Group, Mornewegstrasse 32, 64293 Darmstadt or email to katzenbeisser (at) seceng.informatik.tu-darmstadt.de.
Number: 397
Term for filing application: January 30, 2018
Closing date for applications: 30 January 2018
Contact: Prof. Stefan Katzenbeisser
TU Darmstadt
Security Engineering Group
Mornewegstrasse 32
64293 Darmstadt
katzenbeisser (at) seceng.informatik.tu-darmstadt.de
University of Warsaw, Poland
The goal of this project is to design methods for preventing attacks by malicious hardware manufacturers. Such attacks are possible because manufacturing of integrated circuits is frequently outsourced to external companies. Due to the complexity of these devices it is practically impossible to inspect them in order to check that they were manufactured correctly. Hence, a malicious manufacturer can alter the device\'s design, by introducing the so-called \"hardware Trojan horses\". Such devices can later cause significant damage to their users by malfunctioning, or leaking users\' secrets to the adversary. This is very worrying, especially given a tremendous dependence of modern society on the electronic devices. Another threat associated with the third-party manufacturing is the intellectual property theft and piracy, as the manufacturer gets full access to the device\'s specification. In this project we address these problems by applying state-of-the-art cryptographic techniques.
Profile:
All candidates with a PhD degree and a publication record in cryptography or data security are encouraged to apply and will be carefully considered.
We offer excellent networking and training opportunities, including participation in international workshops and conferences.
The salary will depend on qualifications and will be in the range of approximately PLN 7000 - 8,500 (net/month).
Successful candidates can start from January 2017. Funding is available for 22 months (with possible extensions).
There is no official deadline for this call. We will start looking at the applications from Jan 20, 2018.
,
Closing date for applications: 20 January 2018
Contact: Stefan Dziembowski
More information: http://www.crypto.edu.pl/positions/postdoc
13 December 2017
University of Edinburgh, UK
Closing Dates:
03 January 2018 at 5pm GMT (Security and IoT)
19 January 2018 at 5pm GMT (general post)
For more information please see:
https://www.vacancies.ed.ac.uk/pls/corehrrecruit/erq_jobspec_version_4.jobspec?p_id=042150
https://www.vacancies.ed.ac.uk/pls/corehrrecruit/erq_jobspec_version_4.jobspec?p_id=041914
Closing date for applications: 19 January 2018
Contact: Professor Aggelos Kiayias at akiayias (at) inf.ed.ac.uk or +44 (0) 131 650 5129.
Ammbr Research Labs (ARL), Cambridge, UK
1. technical knowledge of the Hyperledger Fabric architecture and code base
2. technical knowledge of emerging distributed ledger technology
consensus algorithms, smart contracts etc
3. technical knowledge of Byzantine fault tolerant algorithms
4. technical knowledge of open and permissioned blockchain networks
5. knowledge of innovative concepts such as zero knowledge proof
The role will have a strong research and development focus working across the intersection of blockchain, networking and self sovereign digital identifiers to solve some of the core problems related to
universal Internet access and critical services in emerging markets. The person is expected to build the team and lead the crypto group within ARL. ARL will closely collaborate with Prof Leandro Navarro\'s team at UPC in Barcelona and Prof Jean-Jacques Quisquater\'s crypto group at UCL in Belgium. The team will be based out of our Cambridge (UK) city centre office. Good salary, tokens and stock options. Expected start date: March 2018.
If you are interested, send me an email with your CV to arjuna (at) ammbr.com
Closing date for applications: 1 March 2018
Contact: Arjuna Sathiaseelan arjuna (at) ammbr.com
director of N4D lab,
University of Cambridge | GAIUS Networks | Ammbr | GAIA Labs
Personal: http://www.cl.cam.ac.uk/~as2330/
N4D Lab: http://www.cl.cam.ac.uk/~as2330/n4d
12 December 2017
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
Hanno Böck, Juraj Somorovsky, Craig Young
Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
We also discuss how fuzzy signature schemes can be used to realize a biometric-based PKI that uses biometric data itself as a cryptographic key, which we call the \emph{public biometric infrastructure (PBI)}.