01 February 2025
Alex B. Grilo, Ramis Movassagh
Craig Costello, Gaurish Korpal
31 January 2025
Technology Innovation Institute (TII), Abu Dhabi, UAE
We are looking for a permanent researcher to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main task of the team is to conduct applied academic research and assist in product development, spanning topics such as: TLS, QUIC, Tor, Key Exchange, secure channels, cryptographic primitives and their implementation, privacy enhancing technologies, MLS and Secure Messaging, WebRTC, and formal methods. The nature of our work spans both theory and practice, covering aspects such as provable security, security models, efficient designs, implementation aspects, and attacks.
Applicants should have completed (or be close to completing) their PhD in a related area and preferably also have postdoctoral research experience. Preference will be given to applicants with publications in top-tier venues such as CRYPTO, EUROCRYPT, ASIACRYPT, ACM CCS, IEEE S&P, and USENIX.
Required Skills:
- Fluency in English (verbal and written) and an ability to communicate research effectively.
- Good problem-solving skills and an ability to conduct research independently.
- Good interpersonal and collaborative skills.
- Solid knowledge in cryptography with a focus on one or more of the following: Key Exchange, Secure Messaging, Postquantum cryptography, Provable Security, Cryptography Engineering, and Cryptographic Protocols more generally.
Valuable Skills:
- Strong background in Mathematics and/or Computer Science.
- Programming, Software Engineering, experience in implementing cryptographic primitives and attacks on real-world cryptosystems, reverse engineering of closed-source protocols.
- Experience in analyzing protocol standards and specifications.
- Experience in Formal Methods and related tools.
What we offer:
- Vibrant working environment, flexible working conditions, and travel funding.
- Industry-competitive tax-free salary.
- Family-wide health insurance and children’s education allowance.
Closing date for applications:
Contact: Jean Paul Degabriele
More information: https://www.tii.ae/cryptography
School of Cryptology, University of Chinese Academy of Sciences
We are inviting talented and highly motivated applicants to submit applications for a PhD studentship at School of Cryptology, University of Chinese Academy of Sciences, Beijing, China. The positions are fully funded and have a 3 to 5-year duration, with a negotiable start date.
We explore topics including, but not limited to:
Applicant skills/background:
Closing date for applications:
Contact: Siwei Sun (siweisun.isaac at gmail.com)
University of St.Gallen, Switzerland
The student is expected to work on topics that include security and privacy issues in authentication. More precisely, the student will be working on investigating efficient and privacy-preserving authentication that provides: i) provable security guarantees, and ii) rigorous privacy guarantees.
Key Responsibilities:
- Perform exciting and challenging research in the domain of information security and cryptography.
- Support and assist in teaching computer security and cryptography courses.
- The PhD student is expected to have a MSc degree or equivalent, and strong background in cryptography, network security and mathematics.
- Experience in one or more domains such as cryptography, design of protocols, secure multi-party computation and differential privacy is beneficial.
- Excellent programming skills.
- Excellent written and verbal communication skills in English
Please apply by 15th February 2025 through the job link. Applications will be evaluated continuously.
Closing date for applications:
Contact:
Eriane Breu (Administrative matters)
Prof. Katerina Mitrokotsa (Research related questions)
More information: https://jobs.unisg.ch/offene-stellen/funded-phd-student-in-applied-cryptography-privacy-preserving-authentication-m-f-d/36538ff2-210a-4dbd-bd48-575e4b7447cf
Parity Technologies
About Us
Parity is one of the world's most experienced core blockchain infrastructure companies, building the open-source technologies that will lay the foundation for the new decentralised internet.
Parity was founded by Dr. Gavin Wood, co-founder and former CTO of Ethereum, the primary engineer behind the Ethereum Virtual Machine (EVM), inventor of the Solidity programming language, and primary author of the Ethereum Yellowpaper.
We believe in a decentralised web that respects the freedom and data of individuals and empowers developers to create better services. Our vision is to create a world based on truthful, rather than trustful, interactions.
About the Team
The Incubation team operates at the forefront of blockchain innovation. Under the direct leadership of our founder, Dr. Gavin Wood, the team is responsible for identifying and prototyping new ideas for Polkadot. Currently, the team's primary focus is on advancing PolkaJAM - the next-generation decentralised virtual machine - a protocol combining the best elements of Polkadot and Ethereum.
About the Position
- Evaluate and refine technical designs proposed by the team, benchmarking them against blockchain scaling solutions.
- Conduct performance modelling and analysis.
- Document technical insights and formalise research findings.
- Collaborate with engineering teams, translating research insights into actionable technical strategies.
About You
- PhD in Computer Science, Cryptography, Distributed Systems, etc.
- Strong technical knowledge of Ethereum, Layer 2 scaling solutions, cryptography, or low-level systems programming.
- Ability to analyse and evaluate designs proposed by the team
- Experience developing performance models and defining measurement strategies to validate theoretical assumptions.
Closing date for applications:
Contact: Joe Mullaney
More information: https://jobs.ashbyhq.com/parity/c04f3045-bdad-45bf-81e2-e0c5fd7cbde0
The University of Manchester, Department of Computer Science
The successful candidate will lead cutting-edge research in quantum cryptography and related areas. The role includes securing external funding, publishing in top-tier venues, supervising PhD students, and contributing to teaching in the CS department.
Candidates should have a PhD in Computer Science, Mathematics, Physics or a related field, an outstanding research record in quantum cryptography or related areas, experience in securing research funding, and a strong teaching background.
The position is permanent and based in Manchester, a leading hub for quantum research. Salary is competitive and commensurate with experience. For more details and to apply, visit:
https://www.jobs.manchester.ac.uk/Job/JobDetail?JobId=31138
Application deadline: March 31, 2025.
Closing date for applications:
Contact: For informal enquiries please contact Bernardo Magri (bernardo dot magri at manchester.ac.uk)
More information: https://www.jobs.manchester.ac.uk/Job/JobDetail?JobId=31138
Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu
We introduce a more efficient \textit{share-dispersal-then-agree-and-recast} paradigm for constructing $\mathsf{ADKR}$ with preserving adaptive security. The method replaces expensive $O(n)$ asynchronous verifiable secret sharing protocols in classic $\mathsf{ADKG}$ with $O(n)$ cheaper dispersals of publicly-verifiable sharing transcripts; after consensus confirms a set of finished dispersals, it selects a small $\kappa$-subset of finished dispersals for verification, reducing the total overhead to $O(\kappa n^2)$ from $O(n^3)$, where $\kappa$ is a small constant (typically $\sim$30 or less). To further optimize concrete efficiency, we propose an interactive protocol with linear communication to generate publicly verifiable secret sharing (PVSS) transcripts, avoiding computationally expensive non-interactive PVSS. Additionally, we introduce a distributed PVSS verification mechanism, minimizing redundant computations across different parties and reducing the dominating PVSS verification cost by about one-third.
Our design also enables diverse applications: (i) given a quadratic-communication asynchronous coin-flipping protocol, it implies the first quadratic-communication $\mathsf{ADKG}$; and (ii) it can be extended to realize the first quadratic-communication asynchronous dynamic proactive secret sharing (ADPSS) protocol with adaptive security. Experimental evaluations on a global network of 256 AWS servers show up to 40\% lower latency compared to state-of-the-art $\mathsf{ADKG}$ protocols (with simplifications to the reconfiguration setting), highlighting the practicality of our $\mathsf{ADKR}$ in large-scale asynchronous systems.
Vincent Diemunsch, Lucca Hirschi, Steve Kremer
We perform a formal security analysis of the security protocols specified in OPC UA v1.05 and v1.04, for the RSA-based and the new DH-based mode, using the state-of-the-art symbolic protocol verifier ProVerif. Compared to previous studies, our model is much more comprehensive, including the new protocol version, combination of the different sub-protocols for establishing secure channels, sessions and their management, covering a large range of possible configurations. This results in one of the largest models ever studied in ProVerif raising many challenges related to its verification mainly due to the complexity of the state machine. We discuss how we mitigated this complexity to obtain meaningful analysis results. Our analysis uncovered several new vulnerabilities, that have been reported to and acknowledged by the OPC Foundation. We designed and proposed provably secure fixes, most of which are included in the upcoming version of the standard.
Maria Corte-Real Santos, Craig Costello, Sam Frengley
Jinyi Qiu, Aydin Aysu
Reuven Yakar, Avishai Wool, Eyal Ronen
We first validate this hypothesis: We evaluate two commercial-grade GPU-based implementations of RSA within openSSL (called RNS and MP), under a wide range of overclocking levels and temperatures, and demonstrate that both implementations are vulnerable.
However, and more importantly, we show for the first time that even if the GPU is benignly overclocked to a seemingly ``safe'' rate, a successful attack can still be mounted, over the network, by simply sending requests at an aggressive rate to increase the temperature. Hence, setting any level of overclocking on the GPU is risky.
Moreover, we observe a huge difference in the implementations' vulnerability: the rate of RSA breaks for RNS is 4 orders of magnitude higher than that of MP. We attribute this difference to the implementations' memory usage patterns: RNS makes heavy use of the GPU's global memory, which is accessed via both the Unified (L1) cache and the L2 cache; MP primarily uses ``shared'' on-chip memory, which is local to each GPU Streaming MultiProcessor (SM) and is uncached, utilizing the memory banks used for the L1 cache. We believe that the computation faults are caused by reads from the global memory, which under a combination of overclocking, high temperature and high memory contention, occasionally return stale values.
George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bunz
Simon Holmgaard Kamp
This is resolved by attaching justifiers to all messages: forcing the adversary to choose between being ignored by the honest parties, or sending messages with certain validity properties. Using these we define validated proxcensus and show that it can be instantiated in asynchrony with the same recursive structure and round complexity as synchronous proxcensus. In asynchrony the extraction phase incurs a security loss of one bit which is recovered by expanding to twice as many grades using an extra round of communication. This results in a $\lambda+2$ round VABA and a $\lambda+3$ round BA, both with $2^{-\lambda}$ error probability and communication complexity matching Fitzi et al.
Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
Nico Döttling, Jesko Dujmovic, Antoine Joux
In this work, we consider space analogues of timed cryptographic primitives, which we refer to as space-hard primitives. Roughly speaking, these notions require honest protocol parties to invest a certain amount of space and provide security against space constrained adversaries. While inefficient generic constructions of timed-primitives from strong assumptions such as indistinguishability obfuscation can be adapted to the space-hard setting, we currently lack concrete and versatile algebraically structured assumptions for space-hard cryptography. In this work, we initiate the study of space-hard primitives from concrete algebraic assumptions relating to the problem of root-finding of sparse polynomials. Our motivation to study this problem is a candidate construction of VDFs by Boneh et al. (CRYPTO 2018) which are based on the hardness of inverting permutation polynomials. Somewhat anticlimactically, our first contribution is a full break of this candidate. However, we then revise this hardness assumption by dropping the permutation requirement and considering arbitrary sparse high degree polynomials. We argue that this type of assumption is much better suited for space-hardness rather than timed cryptography. We then proceed to construct both space-lock puzzles and verifiable space-hard functions from this assumption.
Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin
In this work we revisit such everlasting privacy model of Dodis and Yeo (ITC'21), which we call Hypervisor EverLasting Privacy (HELP). HELP is a novel architecture for generating shared randomness using a network of semi-trusted servers (or "hypervisors"), trading the need to store/distribute large shared secrets with the assumptions that it is hard to: (a) simultaneously compromise too many publicly accessible ad-hoc servers; and (b) break a computationally-secure encryption scheme very quickly. While Dodis and Yeo presented good HELP solutions in the asymptotic sense, their solutions were concretely expensive and used heavy tools (like large finite fields or gigantic Toeplitz matrices).
We abstract and generalize the HELP architecture to allow for more efficient instantiations, and construct several concretely efficient HELP solutions. Our solutions use elementary cryptographic operations, such as hashing and message authentication. We also prove a very strong composition theorem showing that our EL architecture can use any message transmission method which is computationally-secure in the Universal Composability (UC) framework. This is the first positive composition result for everlasting privacy, which was otherwise known to suffer from many "non-composition" results (Müller-Quade and Unruh; J of Cryptology'10).
29 January 2025
Munich, Germany, 25 June -
Submission deadline: 31 March 2025
Notification: 30 April 2025
Cambridge, USA, 18 April 2025
Submission deadline: 10 February 2025
INSA Lyon, CITI Lab (Villeurbanne, France)
The CITI Lab at INSA Lyon, France, is seeking a motivated PhD student to engage in pioneering research in frugal cryptography.
The research project focuses on designing and analyzing cryptographic primitives, evaluating their energy consumption in various contexts such as Internet communication and Machine Learning. The PhD candidate will also develop generic tools and methodologies to assess the energy impact of cryptographic implementations. The work aims to create secure and efficient cryptographic solutions adapted to the needs of a digital and sustainable future.
This fully funded position has a 3-year duration, with a negotiable start date.
Responsibilities
- Collaborate with faculty and researchers to design innovative cryptographic protocols.
- Publish research findings in leading computer science conferences and journals.
- Participate in academic activities, including seminars, workshops, and conferences, to stay updated on advancements in the field.
- Potentially assist in teaching duties as a teaching assistant (TA).
Requirements
- A strong background in cryptography, with an MSc in Computer Science, Engineering, Mathematics, or a related discipline (preferred but not mandatory).
- Excellent communication and interpersonal skills, with the ability to thrive in a collaborative research environment.
- Strong organizational and time-management abilities to balance research, coursework, and teaching responsibilities.
- Critical thinking and analytical skills, with fluency in technical English.
- Proficiency in programming.
To Apply: Please submit your CV along with transcripts from both your Bachelor’s and Master’s degrees.
Closing date for applications:
Contact: Clementine Gritti (clementine.gritt(at)insa-lyon.fr)