Open Positions in Cryptology
Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.
This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.
The Institute of Mathematics for Industry at Kyushu University (Fukuoka, JAPAN) invites applications for ONE ASSISTANT PROFESSOR POSITION (`Jyokyo` in Japanese) beginning April 2015. Candidates in all areas of mathematical cryptography who are interested in applications of mathematics to, and collaboration with, industry will be considered. We are looking for candidates, who possess a strong record of research achievements and expertise related to mathematical cryptography such as theory of cryptography, number theory, representation theory, computer algebra, quantum computation, graph theory, combinatorics, and so on. The selection will be based on the past achievements and/or the potential of the candidates to work in the area of mathematical cryptography.
Kyushu University is one of the major seven national universities in Japan, located in Fukuoka in the western part of Japan. The Institute of Mathematics for Industry (http://www.imi.kyushu-u.ac.jp/eng) consists of approximately 25 members, who are active in various areas of pure and applied mathematics and also in collaboration with industry.
For full information about the position and the application procedure, visit the URL below.
Contact: Prof. Tsuyoshi Takagi (takagi at imi.kyushu-u.ac.jp)
More Information: http://www.imi.kyushu-u.ac.jp/eng/recruits
Closing Date for Applications: 2015-02-27
The Cryptography Research group at Microsoft Research in Redmond seeks outstanding applicants for Post-doctoral Researcher and Researcher positions in all areas of cryptography. Post-doctoral Researcher positions start in summer 2015 and are for a term of 2 years. Required qualifications include a PhD in computer science or mathematics and experience in cryptography research. Particular areas of interest include: Secure Multi-party Computation, Searchable Encryption, and Homomorphic Encryption. Areas of interest in mathematics include lattice-based cryptography, cyclotomic number fields, elliptic-curve cryptography, pairing-based cryptography, factoring, discrete log, algorithmic number theory.
Contact: Kristin Lauter, Research Manager. Apply online at: http://research.microsoft.com/en-us/jobs/fulltime/researcher.aspx#post-doc
More Information: http://research.microsoft.com/en-us/groups/crypto/default.aspx
Closing Date for Applications: 2015-02-28
Graz University of Technology employs about 60 researchers in the area of information security. We are currently expanding our research team and we are looking for two postdocs and one PhD student in the following fields of research:
In case you are interested in pursuing a PhD in one of the fields or in joining our team as a postdoc, please send an application by email to Stefan Mangard.
The application should include a curriculum vitae, a statement of motivation, a transcript of records as well as names and email addresses of two persons that can provide references. More information on our research topics and our team can be found on our group website - see link below.
Contact: Stefan Mangard, Email: Stefan.Mangard (at) iaik.tugraz.at
More Information: http://www.iaik.tugraz.at/sesys
Closing Date for Applications: 2015-03-16
Cyber-physical systems (CPS) present the new frontier for security. The number of connected devices is expected to grow to 50 billion by the year 2020. This growth is being driven by innovations in the areas of smart cities, internet of things, body-area networks (in healthcare), smart grids and wearable sensors. With digital technologies becoming embedded in everyday objects and infrastructures, CPS offer both great opportunities and great problems of security for modern society. They raise major research challenges with regards to security of the data and information, the systems and infrastructures and the users interacting with them on a daily basis. The research agendas raised by these questions are interdisciplinary and can be tackled from a range of technical, behavioural and socio-economic perspectives. The proposed position will, therefore, be based in Security Lancaster, our inter-disciplinary research centre on Security and Protection Science.
Security Lancaster is one of only four flagship Lancaster Research Centres and was amongst the first 8 Academic Centres of Excellence in Cyber Security Research recognised by the UK government. With over 70 researchers, it is one of the few multi-disciplinary centres to tackle human and technological challenges to cyber security by integrating computer science researchers with expertise from social and behavioural sciences. The centre has a thriving PhD programme with over 30 current graduate students engaged in security research.
For these posts (equivalent to Assistant Professor) we are seeking a ‘rising star’ in security of cyber-physical systems, with a strong and growing international reputation, evidenced by excellent international publications in leading security journals and conferences.
Contact: Professor Awais Rashid (a.rashid (at) lancaster.ac.uk)
More Information: http://hr-jobs.lancs.ac.uk/Vacancy.aspx?ref=A1158
Closing Date for Applications: 2015-02-22
We are looking for a research scientist (post-doc) in cryptography with a special emphasis on topics relevant in the context of security and privacy for cloud environments. Ideally you have experience in fields like multi-party computation, distributed cryptography, rational cryptography or privacy enhancing technologies.
You will be mainly involved in a EU research project on cloud cryptography with tasks related to the design of cryptography for novel distributed information sharing systems.
Direct job posting: http://www.ait.ac.at/fileadmin/inserate/Scientist_for_Cryptography.pdf
Project homepage (avail. Feb. 2015): https://prismacloud.eu
AIT Safety&Security Department: http://www.ait.ac.at/departments/digital-safety-security
Contact: Thomas Loruenser, Department Safety & Security, AIT Austrian Institute of Technology, or Maria Leonhard-Maurer, Head of Human Resources, E-Mail: maria.leonhard-maurer (at) ait.ac.at
More Information: http://www.ait.ac.at/fileadmin/inserate/Scientist_for_Cryptography.pdf
Closing Date for Applications: 2015-04-30
For two NSF projects in the area of hardware Trojans we are looking for post-docs and Ph.D. students who are interested in research that bridge applied cryptography and modern hardware design. Both projects are very exciting and cutting-edge. We are looking for candidates which have previous experience in one of the two areas:
Topic Area 1) Applied cryptography, hardware security, implementation attacks
Topic Area 2) VLSI design, FPGA design, circuit design, embedded systems
Candidates for the post-doc position should have a strong publication record in the leading cryptography conferences (Topic Area 1) or leading computer engineering journals (Topic Area 2). Candidates for the Ph.D. position should have a BS&MS degree with excellent grades, relevant course work and some initial experience in one of the topic areas, either through MS-level research or industry.
The candidates should be open to work in an interdisciplinary fashion, i.e., to conduct high-quality research that bridges applied cryptography and modern hardware design. They will collaborate with Christof Paar (applied cryptography, on leave from the Univ. of Bochum) as well as Sandip Kundu and Russ Tessier (both computer engineering) at UMass Amherst. It is expected that the candidates also interact with researchers at the University of Bochum.
Sounds interesting? Please send your resume (CV, transcript of records) and names/email addresses of two people how can provide references.
Contact: Christof Paar, University of Massachusetts and University of Bochum
Closing Date for Applications: 2015-04-30
The Department of Computing at the University of Surrey (http://www.surrey.ac.uk/computing/) seeks to recruit a motivated doctoral student to work in the area of Information Security.
The studentship is for three years and includes a stipend of £16,000 per year and tuition fees, and is available to students of UK/EU residency.
The successful candidate will participate in the Formal Methods and Security group (http://www.surrey.ac.uk/computing/research/fms/index.htm), will work in an exciting international environment and will have the opportunity to participate in the development of the recently launched Surrey Centre for Cyber Security (http://www.surrey.ac.uk/sccs/index.htm).
The main tasks of the Ph.D. student will be to develop state-of-the-art techniques for the security analysis of real world protocols. In particular, he/she will work in one of the following areas:
- Formal methods applied to security protocols;
- Applied Cryptography and Provable Security.
The position will remain open until a suitable candidate is found so there is no fixed closing date for applications.
Contact: Dr. Anna Lisa Ferrara (a.ferrara (at) surrey.ac.uk)
More Information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=079214
Closing Date for Applications: 2015-05-31
• School of Computer Science and Software Engineering
• Full Time, Fixed Term (3 year) Appointment
• Level B
• Ref No: 25277
The School is one of leading computing schools in Australia. It conducts research in a number of thematic areas including Intelligent Systems, Software Engineering, Computer and Information Security, Visual Information Processing and Multimedia Content Management.
The School of Computer Science and Software Engineering is one of seven Schools with the Faculty of Engineering and Information Sciences. It delivers a full range of quality courses, both onshore and offshore (Dubai, Singapore, Malaysia), ranging from undergraduate Bachelor’s degrees, through Coursework and Research Masters to PhD.
This position will teach and coordinate subjects in the School at undergraduate and postgraduate level; contribute to the research in information security and cryptography and supervise research students. You will work closely with the Head of School and other staff on the introduction, revision and maintenance of undergraduate and postgraduate subjects.
To apply for this position you will need to address the selection criteria as part of your application which is located within the position description below.
Apply online: http://uow.employment.com.au/jobs/Lecturer/1635
Contact: Professor Yi Mu, Head, School of Computer Science and Software Engineering, University of Wollongong, Australia
ymu (at) uow.edu.au
More Information: http://uow.employment.com.au/jobs/Lecturer/1635
Closing Date for Applications: 2015-02-08
We are looking for research scientists with expertise on cyber-physical security and mobile security. The candidates should have PhD in infocomm security with track record of strong R&D capability (at least 2 publications at top security conferences - http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking-history.html, in the past 3 years), be able to perform deep system-level investigations of security mechanisms, be a good team player and have the potential to be a team leader, and also have good presentation and communication skills. The candidates are expected to work closely with industry partners, create valuable intellectual properties, and produce project deliverables in time.
Interested candidates please send CV to Jianying Zhou. Fresh PhD is welcome to apply. Review of applications will begin immediately and will continue until the positions are filled. Only short-listed candidates will be contacted for interview.
Contact: Dr. Jianying Zhou, Dept Head, Infocomm Security, Institute for Infocomm Research. Email: firstname.lastname@example.org
More Information: http://icsd.i2r.a-star.edu.sg/
Closing Date for Applications: 2015-02-28
You are expected to investigate the economic incentives behind users’ participation in sharing personal data, and subsequently establish models for gains and costs in such activities. You then need to propose mechanisms for safeguarding users’ utility and privacy against rational attackers. To complement the developed mechanisms, you also need to propose new cryptographic protocols to safeguard privacy against potential malicious and irrational attackers.
You will work closely with the team members of the APSIA group (led by Prof. Peter Y. A. Ryan) of SnT, in particularly with Dr. Qiang Tang. At the same time, you will work closely with Prof. Benteng Zou from the CREA (Centre for Research in Economics and Management) research centre of the Faculty of Law, Economics and Finance.
Contact: Dr. Qiang Tang: qiang.tang (at) uni.lu
More Information: http://emea3.mrted.ly/jv5c
Closing Date for Applications: 2015-02-15
The Vernam Lab at WPI in Worcester, MA has two open PhD positions in applied cryptography and side channel analysis.
Candidates should have a degree in electronics, computer science or applied mathematics, with strong interest in algorithms and signal processing. Prior experience in side channel analysis and embedded software or hardware design is an asset.
We offer a competitive salary and an international cutting-edge research program in an attractive working environment. WPI is one of the highest-ranked technical colleges in the US. Located in the greater Boston area, it maintains close interaction with many of the nearby universities and companies.
Contact: Thomas Eisenbarth teisenbarth (at) wpi.edu
More Information: http://ecewp.ece.wpi.edu/wordpress/vernam/positions/
Closing Date for Applications: 2015-02-01
The Department of Theoretical Computer Science (the TCS group) at the School of Computer Science and Communication (CSC) invites applications for a full-time tenure-track assistant professor in Computer Science with specialization in Computer Security, starting in the second half of 2015.
The TCS group has a strong academic record and good external funding from EU and national sources. There is active research in foundational topics such as complexity theory, logic, and formal methods, as well as more applied ones such as computer security, cryptography, programming languages, databases, natural languages, and computer science education. Within computer security, research topics include software security and secure execution platforms, network security and privacy preserving computation, and cryptography, in particular in the foundations of electronic voting.
For more information about KTH, the CSC school, and the TCS group visit www.kth.se, www.csc.kth.se, www.csc.kth.se/tcs.
For full information about the position, requirements, and the application procedure visit
Contact: Prof. Mads Dam, mfd (at) kth.se
Closing Date for Applications: 2015-02-10
Applications are invited for a three-years Post-Doc position in the Quality and Computer Security research Lab (http://qualsec.ulb.ac.be) of the Université Libre de Bruxelles.
In the framework of a research project in machine learning and computer security and in collaboration with the Machine Learning Group of the Université Libre de Bruxelles and the Machine Learning Group of the Université Catholique de Louvain, the successful applicant will work on the use of machine learning techniques in the design of secure architectures.
Contact: Applicants are kindly requested to send their application by email: olivier.markowitch (at) ulb.ac.be or by letter to:
Université Libre de Bruxelles
Computer Science Department
Boulevard du Triomphe CP212
More Information: http://qualsec.ulb.ac.be/research/post-doc/
Closing Date for Applications: 2015-01-31
1 PhD Position in Information Security and Cryptography at the Department of Computer Science and Engineering, Chalmers University of Technology, Sweden
We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography.
General goal: Develop secure and privacy-preserving authentication protocols for wireless communications and wearable computing devices.
More precisely, the student shall be working on investigating efficient authentication mechanisms for wearable computing devices (RFID tags, sensors connected with mobile phones or other wireless devices) that provide:
i) accurate and transparent authentication,
ii) rigorous privacy guarantees, even if multiple wearable devices are involved in the authentication.
Special focus on:
- Authentication protocols for noisy and resource constrained environments (RFID systems, wireless sensor networks).
- Achieving security and privacy while minimising resource cost.
- Resistance of authentication protocols against different types of attacks.
- Authentication problems in social networks, smartphone applications.
- Lightweight cryptography.
Experience in one or more of cryptography, probability and statistics, decision and game theory are beneficial. Mathematical maturity is essential.
The PhD student will be supervised by Prof. Katerina Mitrokotsa.
PhD student positions are limited to five years and normally include 20 per cent departmental work, mostly teaching duties. Salary for the position is as specified in Chalmers' general agreement for PhD student positions. Currently the starting salary is 27,835 SEK a month before tax.
Contact: Katerina Mitrokotsa, Assistant Professor, Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg Sweden
More Information: http://goo.gl/md5C1r
Closing Date for Applications: 2015-01-31
I wanted to bring your attention to the availability of post-doc research positions at MSR Cambridge.
The Constructive Security team within Programming Principles and Tools devises formal techniques and models for understanding cryptographic primitives, protocols and security critical systems, and develops related implementation technology. Our approach is informed by code-based cryptographic reasoning as well as cutting-edge language-based security and program verification. We are looking for exceptional postdoctoral research candidates to join our vibrant research community.
MSR Cambridge: http://research.microsoft.com/en-us/labs/cambridge/
Programming Principles and Tools: http://research.microsoft.com/ppt
Constructive Security: http://research.microsoft.com/security
To apply for a post-doc position, use the tool here: http://research.microsoft.com/en-us/jobs/fulltime/apply_researcher.aspx
The deadline for completed applications and references is January 5 – do start early so your referees can upload their letters in time.
It’s a good idea to drop me (markulf (at) microsoft.com) or Cedric (fournet (at) microsoft.com) an email too, to let us know you plan to apply.
Contact: Markulf Kohlweiss, Researcher, markulf (at) microsoft.com
Closing Date for Applications: 2015-01-05
Starting 2015 the Information Security & Cryptography Group at Saarland
University, Germany, has several open positions for postdocs and we are
looking forward to your application.
Our major current research focus is on the recently awarded ERC Synergy
Grant imPACT, which aims at providing foundations for privacy,
accountability, compliance and trust in the Internet of the Future,
including cutting-edge methods and tools for assessing and enhancing
You have the chance to work at one of Europe's top sites for IT security
and privacy research, in the beautiful region between Germany, France
and Luxembourg with a high quality of life. Postdocs are paid employees
of Saarland University. Salary and employment conditions are attractive.
We encourage the application of outstanding PhDs in computer science or
IT security, who would like to work with us in the field of next
generation privacy techniques. The positions start from February 1, 2015
or later and are funded for two years, with a possible extension by one
year. We solicit applications by January 15, 2015, but we will consider
applications until the positions are filled. Applications should include a
curriculum vitae, a brief description of research interests, three
selected own publications, and, if available, letters of recommendation.
Applications and informal inquiries should be sent to Michael Backes at
the following email address: application-erc (at) mail-infsec.cs.uni-saarland.de
Center for IT Security, Privacy and Accountability - http://cispa.saarland
Information Security & Cryptography Group -
ERC Synergy Grant imPACT - http://www.impact-erc.eu
Contact: Michael Backes
Closing Date for Applications: 2015-02-28
The Laboratory of Algorithms, Cryptology and Security (LACS) at the University of Luxembourg is looking for one post-doc and one Ph.D. student to work on a new project on Fully Homomorphic Encryption (FHE). The goal is to improve existing FHE schemes, and possibly design and implement new ones.
The post-doc candidate should have a Ph.D. in cryptography. Experience with FHE is a plus but not a necessity. The Ph.D. candidate should have a master in computer science or in mathematics. Both positions are for three years.
To apply please follow the link below.
Ph.D. student: http://recruitment.uni.lu/en/details.html?nPostingTargetID=5414
Contact: Jean-Sebastien Coron jean-sebastien.coron (at) uni.lu
Closing Date for Applications: 2015-01-15
We are looking for one Postdoc in coding and lattice based cryptography. Contact us if you have (or will have soon) a PhD in Cryptography or a related subject, and an excellent publication record.
The applications will be considered immediately. The position is for 1 year, but renewable.
Contact: Huaxiong Wang
hxwang (at) ntu.edu.sg
Closing Date for Applications: 2015-03-29
The Department of Electronic Systems at the School of Information and Communication Technology, Royal Institute of Technology (KTH), seeks qualified applicants for a postdoctoral position in secure and trustworthy hardware. The research will be focused on developing efficient cryptographic solutions for hardware applications as well as on providing assurance of the new security solutions.
The candidate must hold a PhD Degree in computer science or computer engineering and have top grades.
Send following documents to the contact person (in pdf) :
- Curriculum Vitae
- List of publications
- Poof of English proficiency
- PhD degree and transcripts (translation if the original is not in English)
- Research proposal (1 page) describing the research you would like to do
- Names and contact details of 2 referees
KTH offers highly competitive salaries and is an equal opportunity employer.
Contact: Prof. Elena Dubrova, dubrova (at) kth.se
Closing Date for Applications: 2015-02-02
The Cryptography Group at ETH Zurich, led by Prof. Ueli Maurer, has an open position for a PhD student in the general field of Cryptography. Candidates with an excellent Master's degree in Mathematics, Computer Science, or a related field, and with good English skills (written and spoken), are invited to apply.
More Information: http://www.crypto.ethz.ch/applications/
Closing Date for Applications: 2015-05-30
COSIC’s research focus lays in the design, evaluation and implementation of cryptographic algorithms and protocols, the development of security architectures for information and communication systems, the development of security mechanisms for embedded systems and the design and analysis of privacy preserving systems.
COSIC is looking for 8 motivated researchers who fit into following profiles:
General Profile and Skills required
For all the above positions the candidates must hold a Master’s Degree in engineering, mathematics or computer science, have good grades and have a keen interest in cryptography. We prefer candidates who can demonstrate that they have developed their research skills during their Master’s studies. For the postdoctoral positions a PhD degree in the relevant area is required. The candidate should also have an interest in implementation of cryptographic algorithms.
How to apply
Send following documents (in pdf) to jobs-cosic (at) esat.kuleuven.be.
Closing Date for Applications: 2015-02-28
one postdoc position is opening at Zhejiang University City College, Hangzhou, CHINA. The position is centered on design, implementation and applications of cryptographic algorithms and protocols in the cloud computing and database management systems. The University offers highly competitive salaries and is an equal opportunity employer.
If you are interested in this position, please send your CV and recent 3-publication to zhuhf (at) zucc.edu.cn
Closing Date for Applications: 2015-02-10
You will consult our customers in the areas concerning embedded and automotive cyber security. The consulting includes, but is not limited to, security analysis of existing security applications, security concepts, architecture of security solutions, and design of secure systems. In addition, your task will be the adjustment and enhancement of existing embedded security solutions. Furthermore you will compile surveys and decision memos for new embedded security technologies and products. Depending on your background, you will also develop customized software for client projects in the area of embedded data security and engage in product development. You will assist sales meetings as a technical expert.
Your competencies and qualifications:
Bachelors Degree in Computer Science, Information Technology or Information Security. Masters Degree preferred
Experience in a position as Security Engineer, Security Consultant, or Information Security Analyst is beneficial, ideally with industry experience and special knowledge in one of the following fields: Cryptography, security, privacy, software development (C/C++ and Java), and embedded systems
Willingness to work in a flexible team; reliable; independent and thoughtful Customer oriented
Send us your application to jobs (at) escrypt.com
More Information: http://escrypt.com
Closing Date for Applications: 2015-02-27
Role and Scope
The Cryptography Security Analyst is responsible for developing and maintaining the internal expertise in cryptography and more particularly in the security of algorithms executed on embedded systems.
This will include the analysis of cryptographic codes embedded in products under evaluation, the development and the realisation of high level of cryptographic side-channel attacks, and the support and the training of engineers for evaluation projects.
It includes the representation of the company in industry forums and the management of complex projects. He/She should have a flexible and an innovative approach.
To undertake chargeable security evaluation tasks or duties with the respect of deadlines and customer requirements. The chargeable tasks may include:
o The vulnerability analysis of cryptographic algorithms, more particularly on payment systems with regards to side-channel, fault injection and protocol attacks.
o The development and the realisation of innovative cryptographic attacks on products under evaluation (side-channel, DFA).
o The generation of expertise reports in compliance with industry best standards
To follow-up the latest technical developments and to contribute to the internal innovation in the security in cryptography area.
To provide high-level technical support to the company and to the operations department. This may include test planning and logistics, test procedure updating, training and quality issue resolving.
To represent my client and promote its Security Evaluation services in conferences, exhibitions or any key industry events.
A Master Degree in Cryptography with good skills in algorithms in embedded systems.
A good knowledge of uC architectures and their assembly languages would be highly advantageous.
High analytical skills
Software coding/modelling skills (examples:C,Assembly Languages, etc).
Contact: Vincent Lordier
vincent.lordier (at) ithr.com
Closing Date for Applications: 2015-03-02
The Institute for Quantum Computing and the Centre for Applied Cryptographic Research at the University of Waterloo seek qualified applicants for postdoctoral fellowships and graduate student positions in post-quantum cryptography, in particular in public-key cryptography based on computational assumptions believed to be secure against quantum computers (e.g. systems based on lattices, error-correcting codes codes, multivariate functions, elliptic curve isogenies, and also signature schemes based on hash-functions).
Projects may include studying new attacks (classical or quantum) on proposed systems, improved implementation methods for such systems, and reductions or equivalences between candidate post-quantum systems.
Successful applications will join a broad team of leading researchers in quantum computing and applied cryptography. They will also be able to take advantage of the CryptoWorks21 supplementary training program, which develops the technical and professional skills and knowledge needed to create cryptographic solutions that will be safe in a world with quantum computing technologies.
Contact: Michele Mosca, Deputy Director, Institute for Quantum Computing, mmosca (at) iqc.ca
David Jao, Director, Centre for Applied Cryptographic Research, djao (at) uwaterloo.ca
More Information: https://cryptoworks21.ca/apply/
Closing Date for Applications: 2015-05-15
i_SW is looking for a Staff Scientist with a background in mathematics and cryptography to support a DARPA program focused on program obfuscation to protect DoD assets. Candidate will provide Scientific, Engineering and Technical Assistance (SETA) support to assist in the management and evaluation of the research underlying this effort. Candidate should have experience planning and developing technical projects of a research and development (R&D) nature, concerned with unique or controversial problems which have an important effect on major Department of Defense programs.
This work will be collaborative with DARPA and i_SW corporation located in Arlington, VA
• Demonstrated skill in successfully performing technical assignments including conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques, risk analysis and resolution, tracking technical milestones, and report preparations
• Research focus on the theoretical sides of cryptography
• Demonstrated skill in conceiving, planning, and conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques.
• Demonstrated the ability to independently conduct the appropriate analyses to offer recommendations, solutions, and alternatives to resolve R&D issues, concerns, problems, or methods.
Applicants must be US Citizens in order to obtain security clearances.
MS/PhD Math or Computer Science
Some post-graduate work in mathematics and cryptography preferred.
Contact: Robert Lunsford Robert.lunsford (at) iswcorp.com
More Information: http://www.iswcorp.com
Closing Date for Applications: 2015-03-01
We are looking for two Post-Docs (Research Fellows) on symmetric key cryptography and computer security. The positions are for 2 years.
We encourage candidates with an excellent track-record in cryptography and computer security to apply. Please send your application with a CV, a cover letter and two reference letters.
Review starts immediately until suitable candidates have been hired.
Contact: Hongjun Wu, wuhj (at) ntu.edu.sg
Closing Date for Applications: 2015-01-31
Following recent advances in high throughput sequencing, it can be expected that, in the near future, more and more individuals will have their whole genome extracted, stored and analyzed in a routine fashion. Although this perspective is full of promises in terms of personalized preventive and curative medicine as well as medical research, it should also be acknowledged that the genome of an individual is in essence extremely sensitive data from (at least) a privacy standpoint. Thus, for such personalized medicine-oriented platforms to reliably exist, it is necessary to develop specific counter-measures providing intrinsic protection of the genomic data when manipulated by an IT infrastructure.
In this context, a very promising approach is grounded in homomorphic encryption as a means of computing directly over encrypted data.
The purpose of the present postdoctoral offer is thus to investigate the practical relevance of using homomorphic encryption techniques for privacy-preserving genetic data processing. The main use case will consist in performing requests on a database of genomes represented by their variants. Several scenarios will be investigated in particular with respect to the privacy of the request itself on top of the privacy of the genetic data. In this various scenarios, the candidate is expected to identify the most suitable homomorphic encryption techniques ranging from additive-only (e.g. suitable for private requests on unencrypted data) and multiplicative-only (e.g. suitable for disjunctive public requests on encrypted genetic data) homomorphic encryption systems to the use of the more recent (and more costly) fully homomorphic encryption techniques. The candidate will also be expected to build prototypes for one or more of the above scenarios in order to experimentally demonstrate the practical viability of the solutions, in particular with respect to performances.
Contact: Dr Renaud Sirdey, Head of the Embedded Real-Time & Security Lab
Postal address: DRT/LIST/DACLE/LASTRE - CEA Saclay - 91191 Gif-sur-Yvette Cedex, France
E-mail: renaud.sirdey (at) cea.fr
Phone: +33 (0)1 69 08 45 42
More Information: http://en.drt-cea.com/index.php?module=default&group=offrespostdocs
Closing Date for Applications: 2015-03-31
Applications are invited a post-doctoral position in pairing-based cryptography at Caen University. The successful applicant will participate in the project SIMPATIC (SIM and PAiring Theory for Information and Communications security) financed by the French governemental research funding agency ANR (Agence Nationale de la Recherche) and organized by Orange Labs, Caen. He/she will be a member of one of the research teams in the Computer Science (GREYC) or Mathematics (LMNO) laboratories at Caen University, France.
The position is open for one year. The starting date can be arranged as convenient, but in any case not later than 1st July 2015.
The partners involved in the SIMPATIC project are the crypto teams of the Laboratoire d'Informatique de l'ENS Paris, IMB (Bordeaux), University Paris 8, University Rennes 1, Oberthur, INVIA, STmicroelectronics (Le Mans) and Orange Labs (Caen).
The successful applicant will work on one of the following priorities of the project:
(i) The conception of cryptographic primitives suitable for SIMs and other small supports. Candidates are expected to have a high quality potential in theoretical cryptography. He/she will be expected to interact with members of the Applied Crypto Group (ACG) at Orange Labs (OL) in Caen.
(ii) The study of suitable pairing-friendly curves, both theoretical and algorithmic aspects. Candidates should therefore have a very strong background in relevant number theory and algebraic geometry. Some experience in software implementation (for example in Pari, Magma, Sage, ...) would be useful.
Preference will be given to candidates working on priority (i), but all applications related to the project themes will be examined.
Candidates must hold a PhD thesis or equivalent in mathematics or computer science, together with a strong research record.
Contact: John Boxall john.boxall (at) unicaen.fr
Denis Simon denis.simon (at) unicaen.fr
Fabien Laguillaumie fabien.laguillaumie (at) ens-lyon.fr
More Information: http://simpatic.orange-labs.fr/
Closing Date for Applications: 2014-11-01
We are looking for Post-Docs for a new project on Fully Homomorphic Encryption (FHE). The goal is to implement, test and improve a number of homomorphic encryption schemes. Previous experience with FHE would be a bonus, but not a necessity. However, the ability to pick up and implement advanced mathematical concepts is a must.
Contact: Nigel Smart nigel (at) cs.bris.ac.uk
Closing Date for Applications: 2014-12-31
The Laboratory of Cryptology and Computer Security (LoCCS) at the CS Department of Shanghai Jiao Tong University invites applications for several tenure-track faculty positions in the area of cryptology, in particular (but not limited to), authenticated encryptions, leakage-resilient cryptography, side-channel attacks, obfuscation. Candidates are expected to have the following: (1) a PhD in a relevant area; (2) a proven track record (especially publications at top venues); (3) preferably a postdoctoral training for two years or more. Salaries will be globally competitive and commensurate with candidates' accomplishments and experience. Shanghai Jiao Tong University is a member of China's C9 League and she has one of the country's best CS schools.
Contact: To apply, please send your CV (with names of 4 references) to Prof. Dawu Gu (dwgu(at)sjtu.edu.cn) and Dr. Yu Yu (yyuu(at)sjtu.edu.cn).
Closing Date for Applications: 2015-01-31
Temasek Laboratories at Nanyang Technological University, Singapore is seeking candidates for 4 research scientist positions (from fresh post-docs to senior research scientists) in the areas of symmetric key cryptography and lightweight cryptography, supported by a government funded project of duration 2 years.
Salaries are globally competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Interested applicants are encouraged to send early their detailed CVs, cover letter and reference letters.
Review process starts immediately and will continue until all positions are filled.
Contact: Dr. Jian Guo, guojian (at) ntu.edu.sg
Closing Date for Applications: 2015-03-31
The positions are funded by the German Research Foundation (DFG) in the project WSNSec (Wireless Sensor Network Security). The project is a collaboration between the Universität Mannheim (Germany) and the Friedrich-Alexander Universität Erlangen-Nürnberg (Germany) where the two positions are located, respectively.
Position 1 at the Working Group for Theoretical Computer Science and IT-Security at Universität Mannheim (Germany) focuses on the theoretical aspects of WSNSec:
- Formalization of attacker models and security goals
- Cryptanalysis of existing cryptographic protocols
- Development of provably secure cryptographic protocols
Position 2 at the Chair for IT-Security Infrastructures (Informatik 1) at the Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany) focuses on the practical aspects of WSNSec:
- Investigation of security strengths and weaknesses of the real WSNs at both the hardware and the software levels
- Implementation of cryptographic protocols for WSNs in simulation environments and on the real sensor nodes
Contact: Frederik Armknecht, armknecht (at) uni-mannheim.de
Zinaida Benenson, zinaida.benenson (at) informatik.uni-erlangen.de
More Information: http://ls.wim.uni-mannheim.de/de/ths/arbeitsgruppe/offene-stellen/
The Interdisciplinary Research (IR) Lab in the Department of Computer Science at Southern Illinois University Carbondale (SIUC) is looking for talented and highly motivated PhD students.
The IR Lab explores interesting and exciting research areas on the intersection of computer and social sciences ranging from computer security and privacy, applied cryptography, game theory, big data analysis and software development to economics, psychology and cognitive science. Our interdisciplinary setting provides attractive and flexible research environment for brilliant and creative PhD candidates.
Currently, there are many active projects in the IR lab among which are: computational models of trust and influence mimicking human reasoning, securely computable economic model, game theory and economic aspects of security and privacy, design and analysis of sealed-bid auction protocols, and computational models of collaboration by social networks analysis and mining.
The successful candidates perform research on the aforementioned projects based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications as well as research experience in the following areas are specifically encouraged to apply: secret sharing, secure multiparty computation, rational cryptography, game theory and computational or mathematical modeling.
Financial support and tuition waiver are provided for these positions and they will remain open until filled.
Contact: A potential candidate should send his/her complete CV to the attention of Mehrdad Nojoumian through `nojoumian (at) cs.siu.edu` with PhD Applicant in the subject line as soon as possible. For more information, you can visit http://www.cs.siu.edu/~nojoumian/
Closing Date for Applications: 2014-12-15
The Chair for Information Security and Cryptography at University of Trier, Germany, offers a full-time PhD/Postdoc position.
The position involves both research and teaching in the area of cryptography/information security. The successful candidate is expected to contribute to research in cryptographic protocols and/or electronic voting.
The position is available immediately and is fully funded, with an internationally competitive salary.
Contracts are initially offered for two years. An extension to a total duration of up to six years is possible.
He or she is given the possibility to carry out a Ph.D. or, for Postdocs, a Habilitation.
The successful candidate should have a Master's degree or a Ph.D. (or should be very close to completion thereof) in Computer Science, Mathematics, Information Security, or a related field, with strong analytical and mathematical skills. Knowledge in cryptography is an asset. Since teaching is mostly done in German, sufficient knowledge of German is required.
The deadline for applications is October 5th, 2014. However, late applications will be considered until the position is filled.
See http://infsec.uni-trier.de/job-openings.html for the official job announcement (in German).
Prof. Dr. Ralf Kuesters
kuesters (at) uni-trier.de
More Information: http://infsec.uni-trier.de/job-openings.htm
Closing Date for Applications: 2014-10-05