03 March 2025
Rochester, USA, 6 March - 7 March 2025
Seoul, Korea, 19 August - 20 August 2025
Submission deadline: 17 April 2025
Notification: 19 June 2025
-
Submission deadline: 15 March 2025
Notification: 30 June 2025
Rome, Italy, 1 October 2025
Submission deadline: 28 April 2025
Notification: 1 July 2025
Chania, Greece, 2 June - 5 June 2025
Rome, Italy, 16 March 2025
Friedrich-Alexander-Universität Erlangen-Nürnberg
The Chair of Hardware/Software Co-Design at FAU explores methodologies for designing and optimizing computing systems with high demands on availability, performance, and security.
Project DescriptionEnsuring security in IoT systems, particularly confidentiality and integrity of data and application code, is a major challenge. While hardware security, crypto modules, secure boot, and trusted execution environments offer protection, they often increase costs and energy consumption.
This position focuses on system-level design automation for secure embedded systems-on-chip. The goal is to develop a methodology for design space exploration that generates secure architectures and evaluates countermeasures' impact on security, energy, cost, and performance. Additionally, the research includes high-level synthesis techniques to implement secure design candidates as FPGA-based system-on-chip prototypes.
Your Tasks and Opportunities- Conduct research in embedded computer architectures and hardware security.
- Explore security-aware hardware/software co-design, system-level design space exploration, and multi-objective optimization.
- Apply high-level synthesis techniques to integrate security mechanisms into SoC designs and prototype them on FPGA platforms.
- Master’s degree in Computer Science, Electrical Engineering, or a related field.
- Skills and interest in computer architecture, hardware security, system-level design automation, object-oriented programming, hardware description languages, SoC design, RISC-V, or FPGA tools.
- Team-oriented, open-minded, and communicative, with an interest in both theoretical and practical aspects of embedded systems.
- High proficiency in English (German is a plus).
Closing date for applications:
Contact: Jürgen Teich ([email protected]), Stefan Wildermann ([email protected])
27 February 2025
Munich, Germany, 24 June 2025
Submission deadline: 21 March 2025
Notification: 22 April 2025
University of Waterloo
A Ph.D. degree and evidence of excellence in research are required. Successful applicants are expected to maintain an active program of research, and participate in research activities with academic and industry partners in the grant. The annual salary is 70,000 CAD. In addition, a travel fund of 3,000 CAD per year is provided. The positions are available immediately.
Interested individuals should apply using the MathJobs site (https://www.mathjobs.org/jobs/list/26357/). Applications should include a cover letter describing their interest in the position, a curriculum vitae and research statement and at least three reference letters.
The University of Waterloo acknowledges that much of our work takes place on the traditional territory of the Neutral, Anishinaabeg and Haudenosaunee peoples. Our main campus is situated on the Haldimand Tract, the land granted to the Six Nations that includes six miles on each side of the Grand River. Our active work toward reconciliation takes place across our campuses through research, learning, teaching, and community building, and is centralized within our Indigenous Initiatives Office.
The University regards equity and diversity as an integral part of academic excellence and is committed to accessibility for all employees. We encourage applications from candidates who have been historically disadvantaged and marginalized, including applicants who identify as Indigenous peoples (e.g., First Nations, Métis, Inuit/Inuk), Black, racialized, people with disabilities, women and/or 2SLGBTQ+. If you have any application, interview or workplace accommodation requests, please contact Carol Seely-Morrison ([email protected]).
All qualified candidates are encouraged to apply; however, Canadians and permanent residents will be given priority.
Closing date for applications:
Contact: Douglas Stebila ([email protected])
More information: https://www.mathjobs.org/jobs/list/26357
Télécom Paris, Paris, France
Closing date for applications:
Contact: Sébastien Canard ([email protected]), Qingju Wang ([email protected])
Queensland University of Technology, Brisbane, Australia
- Isogeny-based post-quantum cryptography
- Constructive and computational aspects of zk-SNARKs
Closing date for applications:
Contact: [email protected]
KTH Royal Institute of Technology; Stockholm, Sweden
Since this position requires Swedish citizenship, the below description of the position is available in Swedish only.
Centrum för cyberförsvar och informationssäkerhet (CDIS) vid KTH — som är ett samarbete mellan KTH och Försvarsmakten, samt vissa andra myndigheter — söker doktorander. Det rör sig om en bred utlysning inom cybersäkerhetsområdet. Vi vill här särskilt peka ut en möjlig specialisering inom kryptologiområdet.
Mer specifikt har KTH i samarbete med avdelningen för krypto och IT-säkerhet vid Must pågående spetsforskning som syftar till att möta de utmaningar som följer av kvantdatorutvecklingen. Vi söker nu inom ramen för CDIS utlysning en doktorand som kan bidra till den forskningen.
Doktoranden kommer att handledas av Johan Håstad och/eller Douglas Wikström. Forskningssatsningen omfattar även Martin Ekerå och Joel Gärtner. Vid intresse, sök en av de av CDIS utlysta doktorandtjänsterna.
Tjänsten kommer att omfatta 80% doktorandstudier vid KTH och 20% placering vid Must där möjlighet ges att arbeta med några av Sveriges främsta kryptologer. Resultatet för doktoranden blir en unik kombination av teori och praktik inom kryptologiområdet.
För ytterligare information, kontakta Johan Håstad ([email protected]) eller Martin Ekerå ([email protected]).
Sista ansökningsdag är den 13 mars 2025. Observera att svenskt medborgarskap är ett krav för tjänsten, och att tjänsten medför krav på säkerhetsprövning.
Closing date for applications:
Contact: For more information about the position, please contact Johan Håstad ([email protected]) or Martin Ekerå ([email protected]).
More information: https://kth.varbi.com/se/what:job/jobID:790985
25 February 2025
Michele Ciampi, Jure Sternad, Yu Xia
Anja Lehmann, Phillip Nazarian, Cavit Özbay
Michele Ciampi, Ivan Visconti
Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang
First, by exploiting the symplecticity of NTRU and a recent decoding technique, we dramatically improve the key recovery using power leakages within Falcon Gaussian samplers. Compared to the state of the art (Zhang, Lin, Yu and Wang, EUROCRYPT 2023), the amount of traces required by our attack for a full key recovery is reduced by at least 85%.
Secondly, we present a complete power analysis for two exposed power leakages within Falcon’s integer Gaussian sampler. We identify new sources of these leakages, which have not been identified by previous works, and conduct detailed security evaluations within the reference implementation of Falcon on Chipwhisperer.
Thirdly, we propose effective and easy-to-implement countermeasures against both two leakages to protect the whole Falcon’s integer Gaussian sampler. Configured with our countermeasures, we provide security evaluations on Chipwhisperer and report performance of protected implementation. Experimental results highlight that our countermeasures admit a practical trade-off between effciency and side-channel security.
Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang
In this work, we achieve bootstrapping for RMFE-packed ciphertexts with low capacity loss. We first adapt the digit extraction algorithm to work over RMFE-packed ciphertexts, by applying the recode map after every evaluation of the lifting polynomial. This allows us to follow the blueprint of thin bootstrapping, performing digit extraction on a single ciphertext. To achieve the low capacity loss, we introduce correction maps to the Halevi-Shoup digit extraction algorithm, to remove all but the final recode of RMFE digit extraction.
We implement several workflows for bootstrapping RMFE-packed ciphertexts in HElib, and benchmark them against thin bootstrapping for $m=32768$. Our experiments show that the basic strategy of recoding multiple times in digit extraction yield better data packing, but result in very low remaining capacity and latencies of up to hundreds of seconds. On the other hand, using correction maps gives up to $6$ additional multiplicative depth and brings latencies often below $10$ seconds, at the cost of lower packing capacity.
Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
In this work, we focus on computational security against adaptive adversaries and from minimal assumptions, and improve on the works mentioned above in several ways:
- Assuming the existence of non-interactive perfectly binding commitments, we design protocols with $n=3t+1$ or $n=4t$ parties that are efficient and secure whenever $t$ is small compared to the security parameter $\lambda$ (e.g., $t$ is constant). This improves the resiliency of all previous protocols, even those requiring a trusted setup. It also shows that $n=4$ parties are necessary and sufficient for $t=1$ corruptions in the computational setting, while $n=5$ parties are required for information-theoretic security.
- Under the same assumption, we design protocols with $n=4t+2$ or $n=5t+2$ parties (depending on the adversarial network model) which are efficient whenever $t=poly(\lambda)$. This improves on the existing DDH-based protocol both in terms of resiliency and the underlying assumptions. - We design efficient protocols with $n=5t+3$ or $n=6t+3$ parties (depending on the adversarial network model) assuming the existence of one-way functions.
We complement these results by studying lower bounds for randomness generation protocols in the computational setting.