Open Positions in CryptologyIACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at https://www.iacr.org/jobs/. To advertise a job opportunities, please submit your job here. Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments. This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR. |
The Department of Media and Information Technology is looking for a research and research assistant in the field of applied cryptography. The possibility to earn a PhD degree in cooperation with the University of Mannheim is given.
Job description:
Requirements
The position is initially for two years, with possibility for extension upon successful progress in the PhD studies.
Contact: For further information:
Associate Professor Dr. Erik Zenner
mail: erik.zenner (at) hs-offenburg.de
phone: +49 781 205 4609
For application (paper only!):
Klaus Herr
Badstr. 24
77652 Offenburg
Germany
More Information: http://www.hs-offenburg.de/fileadmin/Einrichtungen/zentrale_Seiten/Aktuelles/Stellenangebote/MI_Akad.pdf
Closing Date for Applications: 2013-01-17
The Distributed and Embedded Security Group at the University of Twente is searching for a suitable candidate for a post-doctoral research position to be involved in our system security research, especially related to security of industrial control systems. Suitable candidates are requested to apply immediately. Candidate selection will continue until the position is filled.
More Information: http://www.academictransfer.com/employer/UT/vacancy/16639/lang/en/
Closing Date for Applications: 2013-02-28
The Electronic Health Information Laboratory (EHIL) at the Children's Hospital of Eastern Ontario (CHEO) Research Institute is looking for a Post?Doctoral Fellow responsible for research and development of secure multi?party computation and privacy preserving protocols for applications in the area of health information and medical research.
Candidates should have a Ph.D. in Computer Science, Computer Engineering, Mathematics, Engineering, or a related field, and a strong research track record with journal or conference publications in secure computation and/or privacy preserving statistics and data?mining.
Contact: Dr. Khaled El Emam, kelemam (at) ehealthinformation.ca
More Information: http://www.ehealthinformation.ca/documents/PDFsecurecomputation.pdf
Closing Date for Applications: 2013-04-01
The Cryptography group within the Department of Computer Science has grown considerably in the last year and additional researchers are required in the following areas:
You will hold a PhD, or expect to be awarded soon, and have experience in one of the sub-areas of cryptography mentioned above.
You will have a good level of analytical skills and the ability to communicate complex information clearly, both orally and through the written word together with the ability to use personal initiative, and creativity, to solve problems encountered in the research context.
Ideally, you will also have a strong publication record in top relevant venues, such as the IACR conferences and journal, ACM-CCS, IEEE S&P, ESORICS, etc
Appointment may be made at the Research Assistant (grade I) or Research Associate (grade J) level depending on skills and experience and will be for 2 to 3 years in the first instance.
Please Note: This is a “rolling advert” with a nominal close date only. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received.
Contact: Nigel Smart
nigel (at) cs.bris.ac.uk
Phone: +44 (0) 1454 281284
More Information: http://t.co/xPlyePMr
Closing Date for Applications: 2013-12-31
You will join a vibrant and growing team of security researchers at the Centre for Cybercrime and Computer Security (CCCS) at Newcastle University. The aim of the project is to address one of the grand challenges in the real world: how to develop an e-voting system that is secure, dependable and usable for future elections.
This is a five-year project, supported by the European Research Council (ERC) Starting Grant. The initial appointments will be three years. Further extension by another two years will be possible subject to the performance and available funding. The expected starting date is 1 March, 2013 (flexible)
To apply for the posts, you need to have a PhD in Computer Science, engineering or related discipline, with a solid background in security and an excellent track record. Expertise in one of the following areas is especially desirable: cryptography, dependability and usable security.
Contact: Dr Feng Hao, feng.hao (at) ncl.ac.uk
More Information: http://homepages.cs.ncl.ac.uk/feng.hao/files/ERC_RAs.html
Closing Date for Applications: 2013-01-28
Description and Responsibilities:
Embedded platforms comprising SoCs, i.e., Tablets and Smartphones, have become important players in the products offered by Intel. One of the key component of SoC-based platforms is the baseband processor. The goal of this internship is to investigate the threats posed to/by baseband to a phone platform. In this position, you will be a member of the Security Center of Excellence (SeCoE) in the Intel Architecture Group to identify security vulnerabilities in the architecture, design and implementation of future SoC-based products. During this internship, your responsibilities will include but not be limited to:
- Performing the threat analysis of a current baseband processor,
- Driving the investigation of Intel baseband software and hardware for evaluating their security features,
- Researching literature from conferences (e.g.; BlackHat, PacSec) and technical forums to find out relevant attacks.
You will also be developing software and/or hardware solutions to hack the platform.
Qualifications:
You must be currently enrolled in a Ph.D or a Master's degree program in Computer Science, Computer Engineering or Electrical Engineering or equivalent discipline with knowledge of computer security, applied cryptography, computer architecture, hardware design (SystemVerilog or VHDL) and programming (C, Assembly). Demonstrable results in academic projects involving the above areas are essential. Exposure to security threat analysis and knowledge of existing attacks on security of System-on-chip (SoC) based platforms (For example, smartphones) would be highly desirable. Experience with hacking hardware (programming FPGAs, Flash chips etc) will be a plus. Behavioral skills include: solid analytical skills, willingness to tackle complex problems, attention to detail, self-driven, excellent written and verbal communication skills.
Contact: Reouven Elbaz - reouven.elbaz (at) intel.com
Closing Date for Applications: 2013-02-27
LACS at the University of Luxembourg is looking for a post-doctoral researcher in the area of lightweight cryptography. The successful candidate will contribute to a research project entitled Applied Cryptography for the Internet of Things (ACRYPT), which is funded by the Fonds National de la Recherche (FNR). Besides conducting high-quality research, the tasks associated with this position include the co-supervision of a Ph.D. student and the dissemination of research results. The ACRYPT project is led by Prof. Alex Biryukov and expected to start in summer 2013.
Candidates must hold a Ph.D. degree (or be in the final stages of a Ph.D. program) in cryptography or a closely related discipline. Applications from researchers with experience in embedded systems security, network security, privacy/anonymity, or mobile/wireless security will also be considered. Preference will be given to candidates with a strong publication record including papers in top-tier crypto/security conference proceedings or journals. Candidates with an interest to conduct leading-edge research in one of the following areas are particularly encouraged to apply:
The position is offered on basis of a fixed-term contract for a duration of three years, which includes a probation period of six months. The monthly salary is roughly 3,600 € net (i.e. after deduction of taxes and social security contributions). Interested candidates are invited to submit their application by email to lacs.acrypt(at)gmail.com. The application material should contain a cover letter explaining the candidate's motivation and research interests, a detailed CV (including photo), a list of publications, copies of diploma certificates, and names and contact details of three references. Applications received by 1st February 2013 will be given full consideration, but the position will remain open until filled.
Contact: Alex Biryukov or Johann Großschädl (email addresses can be found at http://lacs.uni.lu/members )
More Information: https://www.cryptolux.org/Vacancies
Closing Date for Applications: 2013-02-01
The Government Communications Headquarters (GCHQ) in Cheltenham has agreed in principle to sponsor a PhD/Doctoral Studentship at CSIT, Queens University Belfast in the area of Novel Application of Advanced Machine Learning Techniques for use in Side Channel Analysis Attacks.
This GCHQ-sponsored PhD studentship provides funding for 3.5 years and commences on 31 September 2013 with a proposed end date of March/April 2017. GCHQ will cover the costs of university fees and will provide an annual stipend to the student corresponding to the National Minimum Stipend (currently £13,590 per annum) plus an additional sum of £7,000 per annum (both tax free). For comparison this is equivalent to approx. £26,555 annual salary. A further £5k of funding will also be available per annum for travel to conferences, collaborative partners, and GCHQ visits.
The studentship is only open to UK nationals and the successful candidate will be required to spend in the region of 2 - 4 weeks per year at GCHQ headquarters in Cheltenham. To be considered for this studentship, candidates must therefore be prepared to undergo GCHQ's security clearance procedures.
Contact: Professor Máire O Neill & Dr Neil Hanley
Email: n.hanley (at) qub.ac.uk
More Information: http://www.qub.ac.uk/schools/eeecs/PhD/PostgraduateResearchScholarships/CSIT-GCHQ1
Closing Date for Applications: 2013-05-03
The School of Computer and Communication Sciences at EPFL invites applications for faculty positions in computer and communication sciences. We are primarily seeking candidates for tenure-track assistant professor positions; suitably qualified candidates for senior positions will also be considered.
Successful candidates will develop an independent and creative research program, participate in both undergraduate and graduate teaching, and supervise PhD students.
Candidates from all areas of computer science will be considered, but preference will be given to candidates in the fields of machine learning or system security, as well as of computer science theory or human-computer-interaction (HCI). An explicit interest in the fields of medicine or energy is a plus.
EPFL offers internationally competitive salaries, significant start-up resources, and outstanding research infrastructure.
To apply, please follow the application procedure at https://academicjobsonline.org/ajo/jobs/2294
The following documents are requested in PDF format: curriculum vitae, including publication list, brief statements of research and teaching interests, names and addresses (including e-mail) of 3 references for junior positions, and 6 for senior positions. Screening will start on January 15, 2013. Further questions can be addressed to :
Prof. Ruediger URBANKE
Chairman of the recruiting committee
School of Computer and Communication Sciences
EPFL
CH-1015 Lausanne
recruiting.ic (at) epfl.ch
For additional information on EPFL, please consult:
http://www.epfl.ch or http://ic.epfl.ch
EPFL is an equal opportunity employer.
Contact: Prof. Ruediger Urbanke
recruiting.ic (at) epfl.ch
More Information: http://professeurs.epfl.ch/page-86855-en.html
Closing Date for Applications: 2013-01-15
The post-doctoral researcher will have the opportunity to work in a dynamic and interdisciplinary team, to pursue research in the area of information security. The post-doctoral researcher will be expected to oversee projects, procedures and students, prepare data and write reports/articles for technical publications as well as participate in future grant proposal development.
Contact: Larry Shi, PhD,
Assistant Professor,
Department of Computer Science,
University of Houston, 501 PGH,
Houston, TX 77204 USA
Email: wshi3 (at) uh.edu
More Information: http://i2c.cs.uh.edu/tiki-index.php?page=Information+Security+and+Applied+Cryptography
Closing Date for Applications: 2013-06-01
The Information Security discipline at the Queensland University of Technology (QUT) in Brisbane, Australia, invites applications for a 2-year post-doctoral researcher position in cryptography starting in 2013. The focus of the position is on analyzing and characterizing the overall security of real-world cryptographic protocols such as TLS. We are looking for outstanding candidates with experience in cryptographic modelling, provable security, and key exchange protocols. The position is supported by an Australia Research Council (ARC) Discovery Project grant.
Applicants should have recently completed, be under examination for, or be close to submitting a PhD. Starting salary is between AUD$57,187 and $77,598 per annum, plus 17% pension contribution. Funds for relocation and travel will also be available.
QUT's Science and Engineering Faculty has an active and growing group with research strengths in cryptography, network security, and digital forensics, with a leading national profile and strong international links. QUT is investing heavily in science and technology research, with a new $240 million facility in the heart of Brisbane's central business district housing many interdisciplinary research groups, including information security. Brisbane is a city of 2 million people with a high quality of living, and many of Queensland's stunning beaches and wilderness are less than half an hour away.
Contact: Questions about the position can be directed to Prof Colin Boyd (c.boyd (at) qut.edu.au). Applications must be submitted through the QUT Jobs website listed below.
More Information: http://www.qut.edu.au/jobs/
Closing Date for Applications: 2013-01-20
The Department of Computer Science, Chair for Security in Information Technology (Prof. Dr. Michael Waidner) is soliciting applications to fill the position of a
Post-doc in Security and Privacy
Code: 2013-01-491 (in PDF)
Deadline for applications: January 6th, 2013 (might be extended)
We are seeking highly motivated candidates with a strong background and interest in IT security and/or privacy who have finished or will finish soon their Doctorate/PhD in Computer Science or a related discipline.
Preference will be given to candidates with experience in at least one of these areas:
Application security, in particular web application security
Secure engineering, in particular software security, assurance for open source projects
Privacy and transparency enhancing technologies
Security, privacy and compliance management for cloud computing
We expect excellent research and contributions to our teaching program. The position will be part of the ongoing research activities at the Security in IT research group. We actively support publication and presentation of research at the top international conferences and offer an internationally well-connected, interdisciplinary and engineering-oriented work environment.
The position is funded by the university and not bound to a specific project (i.e., it is a "Landesstelle"). The position is initially limited to 2 years but may be extended. Compensation follows the Tarifvertrag für die Technische Universität Darmstadt (TV - TU Darmstadt). The Technische Universität Darmstadt aims at increasing the number of female researchers and therefore explicitly encourages women to apply. Severely handicapped will be preferred, given equal qualification.
Applications must include:
Professional CV
List of publications and copies of two selected publications
Copies of diplomas and certificates
At least two references
Applicants are kindly requested to send their application by January 6th, 2013 to Michael Waidner at .
Contact:
Prof. Dr. Michael Waidner
jobs (at) sit.cased.de
More Information: http://www.sit.informatik.tu-darmstadt.de/
Closing Date for Applications: 2013-05-31
The Government Communications Headquarters (GCHQ) in Cheltenham, UK, has agreed in principle to sponsor two PhD/Doctoral Studentships to be held with the Information Security Group of Royal Holloway (University of London) in the area of cryptography. The studentships will be funded for a period of 3.5 years, starting in September 2013. The two studentships available are as follows:
A Computational Algebra Approach to Learning with Errors
Supervisors: Dr Carlos Cid and Prof. Sean Murphy
Randomness in Cryptography – Theory Meets Practice
Supervisor: Prof. Kenny Paterson
Note that the studentships are only open to UK nationals and the successful candidates will be required to spend in the region of 2 - 4 weeks per year at GCHQ headquarters in Cheltenham. To be considered for this studentship, candidates must therefore be prepared to undergo GCHQ's security clearance procedures.
Contact: Interested applicants should contact the relevant supervisor(s) to discuss these positions:
Carlos Cid, Sean Murphy, Kenny Paterson
carlos.cid AT rhul.ac.uk, sean.murphy AT rhul.ac.uk, kenny.paterson AT rhul.ac.uk
More Information: http://www.rhul.ac.uk/isg/news/newsarticles/twogchq-fundedphdstudentshipsincryptography.aspx
The Department of Mathematical Sciences at Florida Atlantic University is seeking an Assistant Professor, starting in August 2013 to extend FAU's program in cryptology and information security. Florida Atlantic University has been designated a National Center of Academic Excellence in Information Assurance Research by NSA and the Department of Homeland Security. Applicants must possess a Ph.D. in mathematics or in a closely related area and an established research record in cryptology or information security. Responsibilities for this position include teaching at both the undergraduate and graduate level, research, and professional service. A successful candidate is expected to direct research at the graduate level.
The salary range is $60K - $70K. For additional information about the position, please contact us by email at search (at) math.fau.edu. Reviewing of applications will begin on January 15, 2013. The position will remain open until filled.
All applicants must complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at https://jobs.fau.edu. Please upload a letter of application, curriculum vitae, list of publications, and separate teaching and research statements in which you discuss your teaching philosophy and research aspirations.
Have three reference letters sent by email to spyros (at) fau.edu, Prof. Spyros S. Magliveras, Hiring Committee Chair, Mathematical Sciences Dept., Florida Atlantic University.
A background check will be required for the candidate selected for this position.
Florida Atlantic University is an Equal Opportunity/Equal Access Institution.
Closing Date for Applications: 2013-02-28
Cryptography, Security & Privacy Research Group at Koç University has multiple openings for both M.Sc. and Ph.D. level applications. All accepted applicants will receive competitive scholarships.
Koç University has a beautiful campus in the middle of a forest, with a nice view of the Black Sea and the Bosporus, and is close to the ?stanbul city center. The application deadline is 15th of January for Spring 2013 applications.
https://crypto.ku.edu.tr
http://gsse.ku.edu.tr
http://kusrp.ku.edu.tr
http://home.ku.edu.tr/~akupcu
Contact: (see above)
More Information: http://gsse.ku.edu.tr
Closing Date for Applications: 2013-01-15
The research will be in the scopes of:
Securing and preserving private computation in the cloud.
Cyber security.
Distributed computing.
Contact: Shlomi Dolev, Prof. and Dean of Natural Sciences,
dolev (at) cs.bgu.ac.il, 972-8-8428032
More Information: http://www.cs.bgu.ac.il/~dolev
Closing Date for Applications: 2013-01-15
The Laboratory of Algorithmics, Cryptology and Security (LACS) of the University of Luxembourg is looking for two Ph.D. students in the area of lightweight cryptography. The successful candidates will contribute to a research project entitled "Applied Cryptography for the Internet of Things (ACRYPT)", which is funded by the Fonds National de la Recherche (FNR). Both Ph.D. students will be supervised by Prof. Alex Biryukov and collaborate with other members of LACS as well as external research partners.
Candidates are expected to hold an M.Sc. degree in computer science, electrical engineering, or applied mathematics with outstanding grades. Applications from M.Sc. students who will graduate in spring 2013 will also be considered. A solid background in algorithms and data structures, discrete mathematics, probability theory and statistics, software development, computer architecture, and information security is a general requirement to qualify for a Ph.D. position in LACS. Hands-on experience in hardware design (VHDL, SystemC) or programming of embedded systems (AVR, MSP430, ARM, etc.) is an asset for one of the two positions. Candidates with an interest to conduct leading-edge research in one of the following areas are particularly encouraged to apply:
Both Ph.D. positions are initially offered for three years, but an extension to a fourth year is possible. The monthly salary is roughly 2,000 Euros net (i.e. after deduction of taxes and social security contributions). Interested candidates are invited to submit their application by email to lacs.acrypt(at)gmail.com. The application material should contain a cover letter explaining the candidate's motivation and research interests, a detailed CV (including photo), a transcript of courses and grades, and copies of diploma certificates. Applications received by 15th January 2013 will be given full consideration, but the positions will remain open until filled.
Contact: Alex Biryukov or Johann Großschädl (email addresses can be found at http://lacs.uni.lu/members )
More Information: https://www.cryptolux.org/Vacancies
Closing Date for Applications: 2013-01-15
The Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than €4 million to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for candidates with an outstanding Ph.D. in the fields of computer science, electrical engineering, mathematics or related areas.
The research training group will study problems which are fundamental for securing the Internet of Things. The research is structured in three levels: cryptographic primitives, device and system level. The research topics range from cryptographic foundations such as fully homomorphic encryption for privacy in cloud computing, over security for medical implants to internet security solutions involving new national ID cards.
Beside the own research, the main task of the Post-Doc is to work with the UbiCrypt Ph.D. students, and to encourage collaboration between them. Thus, an interest in working with doctoral students and a broad interest in current research are required.
- Start: 01.04.2013
- Competitive salary
- Application: Send your documents by January 15, 2013, to grako (at) hgi.rub.de
- Required documents: CV, certificates (Bachelor, Master/Diplom, Ph.D.), transcripts , motivation for applying (1 page), names of at least two people who can provide reference letters (email addresses are sufficient)
A group of internationally renowned researchers together with excellent funding provides an extremely interesting scientific environment. The HGI is known for its good working atmosphere.
Contact:
Britta Scherer
Coordinator UbiCrypt
Horst Görtz Institut for IT-Security
grako (at) hgi.rub.de
More Information: http://www.ubicrypt.org
Closing Date for Applications: 2013-01-15
The Government Communications Headquarters (GCHQ) in Cheltenham has agreed in principle to sponsor two PhD/Doctoral Studentships at Bristol University in the area of Cryptography.
The studentships are only open to UK nationals and the successful candidate will be required to spend in the region of 2 - 4 weeks per year at GCHQ headquarters in Cheltenham. To be considered for this studentship, candidates must therefore be prepared to undergo GCHQ's security clearance procedures.
The two studentships will be in the following areas:
Title: Authentication, Ciphers, and Encryption
Supervisors: Dan Page and Martijn Stam
Title: Information Leakage aware Verification
Supervisors: Elisabeth Oswald and Kerstin Eder
Contact: Martijn Stam (stam (at) cs.bris.ac.uk) and/or
Elisabeth Oswald (Elisabeth.Oswald (at) bristol.ac.uk).
More Information: https://www.cs.bris.ac.uk/Research/CryptographySecurity/phds.html
Closing Date for Applications: 2013-06-01
The Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than €4 million to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for candidates with outstanding Master/Diplom in the fields of computer science, electrical engineering, mathematics or related areas.
The research training group will study problems which are fundamental for securing the Internet of Things. The research is structured in three levels: cryptographic primitives, device and system level. The research topics range from cryptographic foundations such as fully homomorphic encryption for privacy in cloud computing, over security for medical implants to internet security solutions involving new national ID cards. A central goal of the doctoral training is an interdisciplinary and structured education at the highest scientific level. Establishing networks to top internationally research groups is part of the training.
A group of internationally renowned researchers together with excellent funding provides an extremely interesting scientific environment. The HGI is known for its good working atmosphere.
The Ruhr-University Bochum supports women‘s career development. Applications from women are thus explicitly welcome. In those areas in which women are underrepresented they will be considered preferentially according to the regulations of the „Landesgleichstellungsgesetz” if their abilities, aptitude and professional performance are equal with those of the fellow applicants unless reasons concerning the person of a fellow applicant are predominant.
In case of equal qualification, applications of severely disabled persons or persons that are regarded as being on a par with severely disabled persons according to § 2 Abs. 3 SGB IX will be considered preferentially.
Funded by the German Research Foundation.
Contact:
Britta Scherer
Coordinator UbiCrypt
Horst Görtz Institute for IT-Security
Ruhr-University Bochum
44801 Bochum
Germany
mail to: grako (at) hgi.rub.de
More Information: http://www.ubicrypt.org
Closing Date for Applications: 2013-01-15
The Laboratory for Security and Cryptography (LASEC) and the Laboratory for Cryptologic Algorithms (LACAL) at EPFL are hiring PhD students for Fall 2013. Applicants are encouraged to apply to the EDIC doctoral school (the application deadline is January 15, 2013) and, in parallel, to notify us at job_lasec (at) epfl.ch.
LASEC and LACAL are active in research on cryptography and security. More specifically, our main interests span (but are not limited to) the following:
The selection of applicants will be made on a competitive basis.
EPFL is a top-ranked research and teaching institution that attracts some of the best intellects in the world. EPFL offers excellent facilities, environment, and salaries. The EPFL campus is a multi cultural, idyllic spot overlooking Lake Geneva and facing the Alps.
Contact:
Information about EPFL: http://www.epfl.ch
Information about the EDIC doctoral school: http://phd.epfl.ch/edic
Information about LASEC: http://lasec.epfl.ch
Information about LACAL: http://lacal.epfl.ch
Enquiries: job_lasec (at) epfl.ch
More Information: http://phd.epfl.ch/edic
Closing Date for Applications: 2013-01-15
The Laboratory for Security and Cryptography (LASEC) at EPFL is hiring a post doctoral researcher. Applicants are encouraged to apply to job_lasec (at) epfl.ch by sending a detailed CV and a research plan.
LASEC is active in research on cryptography and security. More specifically, our main interests span (but are not limited to) the following:
The selection of applicants will be made on a competitive basis.
Besides conducting top-quality research, postdocs are required to participate the the lab activities such as training students at all levels, running projects, fund raising, etc.
EPFL is a top-ranked research and teaching institution that attracts some of the best intellects in the world. EPFL offers excellent facilities, environment, and salaries. The EPFL campus is a multi cultural, idyllic spot overlooking Lake Geneva and facing the Alps.
Contact:
Information about EPFL: http://www.epfl.ch
Information about LASEC: http://lasec.epfl.ch
Enquiries: job_lasec (at) epfl.ch
More Information: http://lasec.epfl.ch
Closing Date for Applications: 2013-02-15
INDIAN STATISTICAL INSTITUTE
203 B. T. ROAD, KOLKATA - 7OO 108
The R. C. Bose Centre for Cryptology and Security at Indian Statistical Institute is looking for suitable candidates from Indian nationals in the following academic positions.
Essential Requirements:
Lecturers:
Lecturers are not part of the regular faculty cadre in the institute.
Appointment at this level may be made as Lecturer-cum-Post Doctoral Fellow on contractual basis to enable bright young researchers with a Ph.D. degree to teach and earn experience in a premier institution.
Appointment of lecturers will be purely on temporary basis for a maximum period of 3 (three) years.
Assistant, Associate and Full Professors:
These are permanent positions. One should have a Ph.D. with first class or equivalent in the appropriate branch in the preceeding degrees with a very good academic record throughout and at least three, six and ten years (respectively) of industrial/research/teaching experience, excluding however, the experience gained while pursuing Ph.D.
The gross emolument in this position is approximately INR 80,000/-,
1,05,000/-, 1,20,000/- (respectively) per month at this point of time and it is expected to increase at a rate of 6% in each year.
This advertisement is primarily for candidates with strong background in the area of cryptology and data security. However, candidates with
background in computer science, mathematics, or statistics with interest in the area of cryptology and data security are also encouraged to apply.
Suitable relaxations may be granted for outstanding and reserved
(SC, ST, OBC, PH) candidates.
Interested candidates may send the resume by email to coec (at) isical.ac.in attached as a PDF file or by post to "The Director, Indian Statistical Institute, 203 B T Road, Kolkata 700 108". Documents, such as preprints of the papers, certificates etc. are not required for the time being.
More Information: http://www.isical.ac.in/~coec/adv.txt
Closing Date for Applications: 2013-12-31
Responsibilities for this position include:
• Using, enhancing and developing cutting edge analysis techniques to perform side-channel leakage assessments of customer products and prototypes across a wide range of form factors and algorithms
• Documenting and/or publishing innovations in side-channel analysis and staying current with analysis techniques developed by other researchers
• Incorporating new analysis techniques and tools into CRI’s DPA Workstation product
• DPA Training: Instruct existing and prospective DPA countermeasure licensees and DPA workstation customers on topics related to DPA
• Authoring whitepapers, training material and tutorials on side-channel analysis and countermeasures
Qualifications: Education, Experience, Skills, Etc.
Requirements:
• MS/Ph.D in Electrical Engineering or Computer Science
• 3+ years experience in performing DPA on a range of real-world systems, form factors and algorithms, including experience with developing DPA test fixtures for embedded devices, setting up scopes and measurement apparatus, and applying signal processing and DPA techniques on the collected traces
• Exceptional C/C++ skills, working knowledge of Matlab or other signal processing tools, knowledge of multiple scripting languages
• Good written, oral and presentation skills – this position will require technical interactions with customers
Pluses:
• A strong record of scientific publications in the area of side-channel analysis and countermeasures and tamper resistance
• Experience with DPA-resistance certification
• Background in cryptography, tamper resistance (including fault analysis), signal processing or statistics
• Experience with embedded systems
Contact: Dr. Pankaj Rohatgi
pankaj.rohatgi
@cryptography.com
More Information: http://www.cryptography.com/
Closing Date for Applications: 2013-02-25
Responsibilities:
• Serve as a highly visible industry expert on tamper-resistance and DPA countermeasures
• Design and implement DPA-resistant hardware blocks suitable for a variety of applications and device form factors
• Guide customers implementing DPA countermeasures and tamper resistance into their products and systems
• Consult with customers regarding their DPA-resistance certification needs
• Develop tools and training material around methodologies for DPA resistant hardware design
• Author whitepapers and technical papers related to tamper resistance, side-channel analysis and countermeasures
• Provide customer training on DPA
Qualifications:
• 8+ years of experience in tamper resistant hardware design and at least 5 years of experience in developing DPA resistant hardware and products that use algorithms such as DES, 3DES, AES, RSA and ECC.
• Deep knowledge of the statistics of DPA, sources of information leakage in hardware and engineering tradeoffs between different countermeasure choices
• Experience with getting multiple products evaluated for DPA resistance at EAL 5+
• External recognition as an expert in the area of tamper resistance, side-channel analysis and countermeasures, via publications, industry panels, contributions to standards working groups, etc.
• Very high degree of skill with Verilog (or VHDL) and digital design
• In depth understanding of front-end ASIC design flows, including design, simulation, synthesis and timing analysis
• Hardware development experience in UNIX/Linux environments, and with shell/perl scripting
• Excellent interpersonal, presentation and documentation skills
• MS/Ph.D in Electrical Engineering
Pluses: Experience in the following areas
• Mixed mode and analog simulations for assessing DPA resistance at the design stage
• Developing tools and algorithms for performing side-channel analysis
• IP core delivery and handoff issues
• Modern SoC design methodologies and architectures.
Contact: Dr. Pankaj Rohatgi
Email: pankaj.rohatgi (at) cryptography.com
More Information: http://www.cryptography.com
Closing Date for Applications: 2013-02-25
Very frequently open source microprocessors are used to derive secure versions. The hardening of such devices against attacks can be done either invasively (by physically changing the device) or non-invasively (by adding circuits around the device and software inside it). We propose, in collaboration with an industrial partner, a funded PhD thesis on this topic. The student will be based in the Paris area and will benefit from an R&D environment in which several PhD students work already.
The candidate should have good knowledge of HDL design and a creative mindset.
The successful candidate should have a Master’s degree in hardware design or in microelectronics or a related field. Knowledge of cryptography and hardware security is an asset. Knowledge of French is not required.
Contact: David Naccache
david (at) naccache.fr
Closing Date for Applications: 2013-04-01
Biometric authentication (1 to 1 matching) and identification (1 to many) are becoming increasingly popular. To speed-up these operations, we wish to explore the design of dedicated hardware accelerators for fingerprint matching. We propose, in collaboration with an industrial partner, a funded PhD thesis on this topic. The student will be based in the south of France (Aix en Provence area) and will benefit from an academic R&D environment in which several PhD students work already.
The candidate should have good knowledge of HDL design and a creative mindset. Good mastery of mathematics in general and of signal processing in particular is a plus.
The successful candidate should have a Master’s degree in hardware design or in microelectronics or a related field. Knowledge of cryptography and hardware security is an asset. Knowledge of French is not required.
Contact: David Naccache
david (at) naccache.fr
Closing Date for Applications: 2013-02-01
Resistance against side channel and fault attacks is a fast evolving research field.
We propose, in collaboration with an industrial partner, a funded PhD thesis on these topics. The student will be based in the Paris area and will benefit from an academic R&D environment in which several PhD students work already.
The candidate should have good knowledge instrumentation and programming and a creative mindset. Good mastery of mathematics in general and of signal processing in particular is a plus.
The successful candidate should have a Master’s degree in computer science, metrology or a related field. Knowledge of cryptography and hardware security is an asset. Knowledge of French is not required.
Contact: David Naccache
david (at) naccache.fr
Closing Date for Applications: 2013-02-03
A secure microprocessor must be driven by a low-level layer managing access to resources and secure process segregation. The definition and the proof of properties on such layers are becoming increasingly necessary. We propose, in collaboration with an industrial partner, a funded PhD thesis on these topics. The student will be based in the Paris area and will benefit from an academic R&D environment in which several PhD students work already.
The candidate should have good knowledge instrumentation and programming and a creative mindset.
The successful candidate should have a Master’s degree in computer science, metrology or a related field. Knowledge of cryptography and hardware security is an asset. Knowledge of French is not required.
Contact: David Naccache
david (at) naccache.fr
Closing Date for Applications: 2013-02-26
The PhD candidate will contribute to the research in the project “Implementation-Level Analysis of E-Voting Systems”, which is funded by the German Research Foundation (DFG) and is part of the DFG priority programme “Reliably Secure Software Systems - RS3”. The goal of this project is to develop general methods and techniques for the security analysis of Java systems that use cryptography, with e-voting systems being one of the motivating examples. The project combines techniques from program analysis/verification with techniques from cryptography and cryptographic protocol analysis.
We offer a creative international environment and the possibility to participate in internationally visible research. The salary scale for the position is TV-L E13 (100%). Subject to the final decision of the DFG, the position will be available from October 1st, 2012. Contracts are initially offered for two years, with the perspective of an extension by another two years.
The successful candidate should have a Master’s degree (or should be very close to completion thereof) in Computer Science, Mathematics, Information Security, or a related field, with a strong background in Theoretical Computer Science. Knowledge in program analysis/verification, logic, or cryptography is an asset. Good English skills are expected; knowledge of German is not required.
Applications should include:
The deadline for applications is September 30th, 2012. However, late applications will be considered until the position is filled.
Contact:
Prof. Dr. Ralf Kuesters
Universitaet Trier FB IV - Informatik
54286 Trier, Germany
Email: kuesters (at) trier.de
Phone: +49 (0)651 2012852
http://infsec.uni-trier.de/
More Information: http://infsec.uni-trier.de/job-openings/a-full-time-phd-position.html
Closing Date for Applications: 2012-09-30
[ IACR home page ] © IACR