Open Positions in Cryptology
Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.
This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.
You are expected to investigate the economic incentives behind users’ participation in sharing personal data, and subsequently establish models for gains and costs in such activities. You then need to propose mechanisms for safeguarding users’ utility and privacy against rational attackers. To complement the developed mechanisms, you also need to propose new cryptographic protocols to safeguard privacy against potential malicious and irrational attackers.
You will work closely with the team members of the APSIA group (led by Prof. Peter Y. A. Ryan) of SnT, in particularly with Dr. Qiang Tang. At the same time, you will work closely with Prof. Benteng Zou from the CREA (Centre for Research in Economics and Management) research centre of the Faculty of Law, Economics and Finance.
Contact: Dr. Qiang Tang: qiang.tang (at) uni.lu
More Information: http://emea3.mrted.ly/jv5c
Closing Date for Applications: 2015-02-15
The Vernam Lab at WPI in Worcester, MA has two open PhD positions in applied cryptography and side channel analysis.
Candidates should have a degree in electronics, computer science or applied mathematics, with strong interest in algorithms and signal processing. Prior experience in side channel analysis and embedded software or hardware design is an asset.
We offer a competitive salary and an international cutting-edge research program in an attractive working environment. WPI is one of the highest-ranked technical colleges in the US. Located in the greater Boston area, it maintains close interaction with many of the nearby universities and companies.
Contact: Thomas Eisenbarth teisenbarth (at) wpi.edu
More Information: http://ecewp.ece.wpi.edu/wordpress/vernam/positions/
Closing Date for Applications: 2015-02-01
The Department of Theoretical Computer Science (the TCS group) at the School of Computer Science and Communication (CSC) invites applications for a full-time tenure-track assistant professor in Computer Science with specialization in Computer Security, starting in the second half of 2015.
The TCS group has a strong academic record and good external funding from EU and national sources. There is active research in foundational topics such as complexity theory, logic, and formal methods, as well as more applied ones such as computer security, cryptography, programming languages, databases, natural languages, and computer science education. Within computer security, research topics include software security and secure execution platforms, network security and privacy preserving computation, and cryptography, in particular in the foundations of electronic voting.
For more information about KTH, the CSC school, and the TCS group visit www.kth.se, www.csc.kth.se, www.csc.kth.se/tcs.
For full information about the position, requirements, and the application procedure visit
Contact: Prof. Mads Dam, mfd (at) kth.se
Closing Date for Applications: 2015-02-10
Applications are invited for a three-years Post-Doc position in the Quality and Computer Security research Lab (http://qualsec.ulb.ac.be) of the Université Libre de Bruxelles.
In the framework of a research project in machine learning and computer security and in collaboration with the Machine Learning Group of the Université Libre de Bruxelles and the Machine Learning Group of the Université Catholique de Louvain, the successful applicant will work on the use of machine learning techniques in the design of secure architectures.
Contact: Applicants are kindly requested to send their application by email: olivier.markowitch (at) ulb.ac.be or by letter to:
Université Libre de Bruxelles
Computer Science Department
Boulevard du Triomphe CP212
More Information: http://qualsec.ulb.ac.be/research/post-doc/
Closing Date for Applications: 2015-01-31
1 PhD Position in Information Security and Cryptography at the Department of Computer Science and Engineering, Chalmers University of Technology, Sweden
We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography.
General goal: Develop secure and privacy-preserving authentication protocols for wireless communications and wearable computing devices.
More precisely, the student shall be working on investigating efficient authentication mechanisms for wearable computing devices (RFID tags, sensors connected with mobile phones or other wireless devices) that provide:
i) accurate and transparent authentication,
ii) rigorous privacy guarantees, even if multiple wearable devices are involved in the authentication.
Special focus on:
- Authentication protocols for noisy and resource constrained environments (RFID systems, wireless sensor networks).
- Achieving security and privacy while minimising resource cost.
- Resistance of authentication protocols against different types of attacks.
- Authentication problems in social networks, smartphone applications.
- Lightweight cryptography.
Experience in one or more of cryptography, probability and statistics, decision and game theory are beneficial. Mathematical maturity is essential.
The PhD student will be supervised by Prof. Katerina Mitrokotsa.
PhD student positions are limited to five years and normally include 20 per cent departmental work, mostly teaching duties. Salary for the position is as specified in Chalmers' general agreement for PhD student positions. Currently the starting salary is 27,835 SEK a month before tax.
Contact: Katerina Mitrokotsa, Assistant Professor, Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg Sweden
More Information: http://goo.gl/md5C1r
Closing Date for Applications: 2015-01-31
I wanted to bring your attention to the availability of post-doc research positions at MSR Cambridge.
The Constructive Security team within Programming Principles and Tools devises formal techniques and models for understanding cryptographic primitives, protocols and security critical systems, and develops related implementation technology. Our approach is informed by code-based cryptographic reasoning as well as cutting-edge language-based security and program verification. We are looking for exceptional postdoctoral research candidates to join our vibrant research community.
MSR Cambridge: http://research.microsoft.com/en-us/labs/cambridge/
Programming Principles and Tools: http://research.microsoft.com/ppt
Constructive Security: http://research.microsoft.com/security
To apply for a post-doc position, use the tool here: http://research.microsoft.com/en-us/jobs/fulltime/apply_researcher.aspx
The deadline for completed applications and references is January 5 – do start early so your referees can upload their letters in time.
It’s a good idea to drop me (markulf (at) microsoft.com) or Cedric (fournet (at) microsoft.com) an email too, to let us know you plan to apply.
Contact: Markulf Kohlweiss, Researcher, markulf (at) microsoft.com
Closing Date for Applications: 2015-01-05
Starting 2015 the Information Security & Cryptography Group at Saarland
University, Germany, has several open positions for postdocs and we are
looking forward to your application.
Our major current research focus is on the recently awarded ERC Synergy
Grant imPACT, which aims at providing foundations for privacy,
accountability, compliance and trust in the Internet of the Future,
including cutting-edge methods and tools for assessing and enhancing
You have the chance to work at one of Europe's top sites for IT security
and privacy research, in the beautiful region between Germany, France
and Luxembourg with a high quality of life. Postdocs are paid employees
of Saarland University. Salary and employment conditions are attractive.
We encourage the application of outstanding PhDs in computer science or
IT security, who would like to work with us in the field of next
generation privacy techniques. The positions start from February 1, 2015
or later and are funded for two years, with a possible extension by one
year. We solicit applications by January 15, 2015, but we will consider
applications until the positions are filled. Applications should include a
curriculum vitae, a brief description of research interests, three
selected own publications, and, if available, letters of recommendation.
Applications and informal inquiries should be sent to Michael Backes at
the following email address: application-erc (at) mail-infsec.cs.uni-saarland.de
Center for IT Security, Privacy and Accountability - http://cispa.saarland
Information Security & Cryptography Group -
ERC Synergy Grant imPACT - http://www.impact-erc.eu
Contact: Michael Backes
Closing Date for Applications: 2015-02-28
The Laboratory of Algorithms, Cryptology and Security (LACS) at the University of Luxembourg is looking for one post-doc and one Ph.D. student to work on a new project on Fully Homomorphic Encryption (FHE). The goal is to improve existing FHE schemes, and possibly design and implement new ones.
The post-doc candidate should have a Ph.D. in cryptography. Experience with FHE is a plus but not a necessity. The Ph.D. candidate should have a master in computer science or in mathematics. Both positions are for three years.
To apply please follow the link below.
Ph.D. student: http://recruitment.uni.lu/en/details.html?nPostingTargetID=5414
Contact: Jean-Sebastien Coron jean-sebastien.coron (at) uni.lu
Closing Date for Applications: 2015-01-15
We are looking for one Postdoc in coding and lattice based cryptography. Contact us if you have (or will have soon) a PhD in Cryptography or a related subject, and an excellent publication record.
The applications will be considered immediately. The position is for 1 year, but renewable.
Contact: Huaxiong Wang
hxwang (at) ntu.edu.sg
Closing Date for Applications: 2015-03-29
The Department of Electronic Systems at the School of Information and Communication Technology, Royal Institute of Technology (KTH), seeks qualified applicants for a postdoctoral position in secure and trustworthy hardware. The research will be focused on developing efficient cryptographic solutions for hardware applications as well as on providing assurance of the new security solutions.
The candidate must hold a PhD Degree in computer science or computer engineering and have top grades.
Send following documents to the contact person (in pdf) :
- Curriculum Vitae
- List of publications
- Poof of English proficiency
- PhD degree and transcripts (translation if the original is not in English)
- Research proposal (1 page) describing the research you would like to do
- Names and contact details of 2 referees
KTH offers highly competitive salaries and is an equal opportunity employer.
Contact: Prof. Elena Dubrova, dubrova (at) kth.se
Closing Date for Applications: 2015-01-31
The Cryptography Group at ETH Zurich, led by Prof. Ueli Maurer, has an open position for a PhD student in the general field of Cryptography. Candidates with an excellent Master's degree in Mathematics, Computer Science, or a related field, and with good English skills (written and spoken), are invited to apply.
More Information: http://www.crypto.ethz.ch/applications/
Closing Date for Applications: 2015-05-30
COSIC’s research focus lays in the design, evaluation and implementation of cryptographic algorithms and protocols, the development of security architectures for information and communication systems, the development of security mechanisms for embedded systems and the design and analysis of privacy preserving systems.
COSIC is looking for 8 motivated researchers who fit into following profiles:
General Profile and Skills required
For all the above positions the candidates must hold a Master’s Degree in engineering, mathematics or computer science, have good grades and have a keen interest in cryptography. We prefer candidates who can demonstrate that they have developed their research skills during their Master’s studies. For the postdoctoral positions a PhD degree in the relevant area is required. The candidate should also have an interest in implementation of cryptographic algorithms.
How to apply
Send following documents (in pdf) to jobs-cosic (at) esat.kuleuven.be.
Closing Date for Applications: 2014-12-31
one postdoc position is opening at Zhejiang University City College, Hangzhou, CHINA. The position is centered on design, implementation and applications of cryptographic algorithms and protocols in the cloud computing and database management systems. The University offers highly competitive salaries and is an equal opportunity employer.
If you are interested in this position, please send your CV and recent 3-publication to zhuhf (at) zucc.edu.cn
Closing Date for Applications: 2015-02-10
You will consult our customers in the areas concerning embedded and automotive cyber security. The consulting includes, but is not limited to, security analysis of existing security applications, security concepts, architecture of security solutions, and design of secure systems. In addition, your task will be the adjustment and enhancement of existing embedded security solutions. Furthermore you will compile surveys and decision memos for new embedded security technologies and products. Depending on your background, you will also develop customized software for client projects in the area of embedded data security and engage in product development. You will assist sales meetings as a technical expert.
Your competencies and qualifications:
Bachelors Degree in Computer Science, Information Technology or Information Security. Masters Degree preferred
Experience in a position as Security Engineer, Security Consultant, or Information Security Analyst is beneficial, ideally with industry experience and special knowledge in one of the following fields: Cryptography, security, privacy, software development (C/C++ and Java), and embedded systems
Willingness to work in a flexible team; reliable; independent and thoughtful Customer oriented
Send us your application to jobs (at) escrypt.com
More Information: http://escrypt.com
Closing Date for Applications: 2015-02-27
A successful candidate should be an excellent young researcher with a focus in computeralgebra specializing for example in number theory, algebraic geometry, cryptography, combinatorics, or symbolic computation. Collaboration within the university and as well as the acquisition of third party funding is desired.
Contact: Stefan Wewers
stefan.wewers (at) uni-ulm.de
Closing Date for Applications: 2015-01-02
Role and Scope
The Cryptography Security Analyst is responsible for developing and maintaining the internal expertise in cryptography and more particularly in the security of algorithms executed on embedded systems.
This will include the analysis of cryptographic codes embedded in products under evaluation, the development and the realisation of high level of cryptographic side-channel attacks, and the support and the training of engineers for evaluation projects.
It includes the representation of the company in industry forums and the management of complex projects. He/She should have a flexible and an innovative approach.
To undertake chargeable security evaluation tasks or duties with the respect of deadlines and customer requirements. The chargeable tasks may include:
o The vulnerability analysis of cryptographic algorithms, more particularly on payment systems with regards to side-channel, fault injection and protocol attacks.
o The development and the realisation of innovative cryptographic attacks on products under evaluation (side-channel, DFA).
o The generation of expertise reports in compliance with industry best standards
To follow-up the latest technical developments and to contribute to the internal innovation in the security in cryptography area.
To provide high-level technical support to the company and to the operations department. This may include test planning and logistics, test procedure updating, training and quality issue resolving.
To represent my client and promote its Security Evaluation services in conferences, exhibitions or any key industry events.
A Master Degree in Cryptography with good skills in algorithms in embedded systems.
A good knowledge of uC architectures and their assembly languages would be highly advantageous.
High analytical skills
Software coding/modelling skills (examples:C,Assembly Languages, etc).
Contact: Vincent Lordier
vincent.lordier (at) ithr.com
Closing Date for Applications: 2015-03-02
The Institute for Quantum Computing and the Centre for Applied Cryptographic Research at the University of Waterloo seek qualified applicants for postdoctoral fellowships and graduate student positions in post-quantum cryptography, in particular in public-key cryptography based on computational assumptions believed to be secure against quantum computers (e.g. systems based on lattices, error-correcting codes codes, multivariate functions, elliptic curve isogenies, and also signature schemes based on hash-functions).
Projects may include studying new attacks (classical or quantum) on proposed systems, improved implementation methods for such systems, and reductions or equivalences between candidate post-quantum systems.
Successful applications will join a broad team of leading researchers in quantum computing and applied cryptography. They will also be able to take advantage of the CryptoWorks21 supplementary training program, which develops the technical and professional skills and knowledge needed to create cryptographic solutions that will be safe in a world with quantum computing technologies.
Contact: Michele Mosca, Deputy Director, Institute for Quantum Computing, mmosca (at) iqc.ca
David Jao, Director, Centre for Applied Cryptographic Research, djao (at) uwaterloo.ca
More Information: https://cryptoworks21.ca/apply/
Closing Date for Applications: 2015-05-15
We are looking for an excellent, motivated, self-driven PhD student to work in the area of cloud computing with a focus on security, privacy and trusted computing. The position is for four years and the main aim of the PhD project is to develop security protocols for cloud environments and specifically for IaaS and PaaS.
The successful candidate is expected to perform research on the aforementioned areas based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known security related conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications as well as research experience in the following areas are specifically encouraged to apply: cloud computing, security and privacy in cloud environments, trusted computing and applied cryptography.
Candidates should fulfill the following requirements:
- A Master degree in Computer Science;
- Knowledge of Cryptographic Protocols;
- Trusted Computing;
- Cloud Computing Architecture;
- Good Academic Writing and Presentation Skills;
- Good Social and Organizational Skills;
Publications in security and privacy will be regarded as an additional merit.
The Security Lab in SICS intends to increase the number of women in those areas where they are underrepresented. Therefore women are explicitly encouraged to apply.
Details about Employment
PhD student positions are limited to four years and the starting salary is 27.000 SEK a month before taxes.
Contact: Christian Gehrmann, chrisg (at) sics.se
More Information: https://www.sics.se/people/christian-gehrmann
Closing Date for Applications: 2014-12-15
i_SW is looking for a Staff Scientist with a background in mathematics and cryptography to support a DARPA program focused on program obfuscation to protect DoD assets. Candidate will provide Scientific, Engineering and Technical Assistance (SETA) support to assist in the management and evaluation of the research underlying this effort. Candidate should have experience planning and developing technical projects of a research and development (R&D) nature, concerned with unique or controversial problems which have an important effect on major Department of Defense programs.
This work will be collaborative with DARPA and i_SW corporation located in Arlington, VA
• Demonstrated skill in successfully performing technical assignments including conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques, risk analysis and resolution, tracking technical milestones, and report preparations
• Research focus on the theoretical sides of cryptography
• Demonstrated skill in conceiving, planning, and conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques.
• Demonstrated the ability to independently conduct the appropriate analyses to offer recommendations, solutions, and alternatives to resolve R&D issues, concerns, problems, or methods.
Applicants must be US Citizens in order to obtain security clearances.
MS/PhD Math or Computer Science
Some post-graduate work in mathematics and cryptography preferred.
Contact: Robert Lunsford Robert.lunsford (at) iswcorp.com
More Information: http://www.iswcorp.com
Closing Date for Applications: 2015-03-01
We are looking for two Post-Docs (Research Fellows) on symmetric key cryptography and computer security. The positions are for 2 years.
We encourage candidates with an excellent track-record in cryptography and computer security to apply. Please send your application with a CV, a cover letter and two reference letters.
Review starts immediately until suitable candidates have been hired.
Contact: Hongjun Wu, wuhj (at) ntu.edu.sg
Closing Date for Applications: 2015-01-31
Serve as a SME (Subject Matter Expert) advising SafeNet customers, partners and prospects on SafeNet Data Protection solutions to secure data while at rest (storage, file and database encryption), in use (hardware security modules, encryption technologies), and in transit (wide area network encryption).
This focused expertise will drive increased revenue for SafeNet StorageSecure, Hardware Security Modules, KeySecure and ProtectV products.
• Experienced in the concepts of Cryptography, Security and PKI
• Experience with Hardware Security Modules (HSM)
• Experience with the concept and practice of Key Management
• Experience with virtualisation products such as VMWare, XEN and HyperV is beneficial, as well as prior involvement with Amazon Web Services
• Strong familiarity with Windows and Linux based systems
• Familiarity with a range of enterprise security solutions would be beneficial as they relate to the wider SafeNet portfolio. These include database encryption, data tokenization, storage encryption, wide area network encryption, and authentication.
The position will require significant travel throughout the EMEA region.
For further information, please contact julia.robson (at) safenet-inc.com
Contact: Julia Robson
EMEA Talent Management
+44 1276 608 000
julia.robson (at) safenet-inc.com
Closing Date for Applications: 2014-12-15
PhD position in Secure and Private Machine Learning and Decision Making
at the Department of Computer Science and Engineering, Chalmers University of Technology
Application deadline: November 21, 2014
Expected starting date: January 2015
We are looking for an excellent, motivated, self-driven doctoral student to work in the area of machine learning and decision theory with a focus on security and privacy. The position is for five years at the Department of Computer Science and Engineering, within the division of Computing Science and the group of Algorithms, Learning and Computational Biology (http://www.cse.chalmers.se/research/lab/), who are doing research on fields ranging from machine learning, statistics, algorithms, optimisation, reinforcement learning to computational biology, text and massive data analysis.
The student will be expected to develop and analyse state-of-the-art algorithms for distributed machine learning and decision making that provide users with strong privacy guarantees. In particular, the research will be focused on machine learning and differential privacy for distributed systems, but some aspects of the work will involve recent advances in cryptography. The student will be supervised by Dr. Christos Dimitrakakis (Machine learning, decision theory and differential privacy - see http://www.cse.chalmers.se/~chrdimi/ ) and co-supervised by Dr. Katerina Mitrokotsa (Cryptography and security - see http://www.cse.chalmers.se/~aikmitr/ ).
Employment will be in the scope of the Swiss Sense Synergy project, whose aim is to develop intelligent location-based networking protocols and crowdsourcing applications, in collaboration with three Swiss universities. Further info about the Swiss Sense Synergy project can be found here http://goo.gl/tmQ9NJ
Details about Employment
PhD student positions are limited to five years and normally include 20 per cent departmental work, mostly teaching duties. Currently the starting salary is 26,250 SEK a month before tax.
Contact: Christos Dimitrakakis , http://www.cse.chalmers.se/~chrdimi/
Katerina Mitrokotsa , http://www.cse.chalmers.se/~aikmitr/
Closing Date for Applications: 2014-11-21
Following recent advances in high throughput sequencing, it can be expected that, in the near future, more and more individuals will have their whole genome extracted, stored and analyzed in a routine fashion. Although this perspective is full of promises in terms of personalized preventive and curative medicine as well as medical research, it should also be acknowledged that the genome of an individual is in essence extremely sensitive data from (at least) a privacy standpoint. Thus, for such personalized medicine-oriented platforms to reliably exist, it is necessary to develop specific counter-measures providing intrinsic protection of the genomic data when manipulated by an IT infrastructure.
In this context, a very promising approach is grounded in homomorphic encryption as a means of computing directly over encrypted data.
The purpose of the present postdoctoral offer is thus to investigate the practical relevance of using homomorphic encryption techniques for privacy-preserving genetic data processing. The main use case will consist in performing requests on a database of genomes represented by their variants. Several scenarios will be investigated in particular with respect to the privacy of the request itself on top of the privacy of the genetic data. In this various scenarios, the candidate is expected to identify the most suitable homomorphic encryption techniques ranging from additive-only (e.g. suitable for private requests on unencrypted data) and multiplicative-only (e.g. suitable for disjunctive public requests on encrypted genetic data) homomorphic encryption systems to the use of the more recent (and more costly) fully homomorphic encryption techniques. The candidate will also be expected to build prototypes for one or more of the above scenarios in order to experimentally demonstrate the practical viability of the solutions, in particular with respect to performances.
Contact: Dr Renaud Sirdey, Head of the Embedded Real-Time & Security Lab
Postal address: DRT/LIST/DACLE/LASTRE - CEA Saclay - 91191 Gif-sur-Yvette Cedex, France
E-mail: renaud.sirdey (at) cea.fr
Phone: +33 (0)1 69 08 45 42
More Information: http://en.drt-cea.com/index.php?module=default&group=offrespostdocs
Closing Date for Applications: 2015-03-31
Recently, there has been increasing interest in the paradigm of data mining-as-a-service, where a company lacking of expertise of computation resources outsources its mining needs to the cloud. However, privacy concerns have become a major barrier to the widespread growth of data mining-as-a-service.
We offer one PhD scholarship to support a PhD student to work on a project which aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service. The candidate is expected to submit a PhD thesis based on the research.
Candidates should have a Master degree in Computer Science, Knowledge of cryptographic protocols, data mining algorithms and cloud computing architecture. Publications in database security and privacy will be regarded as an additional merit.
Send your CV and publication record to xun.yi (at) rmit.edu.au.
Contact: Professor Xun Yi, School of CS and IT, RMIT University, GPO Box 2476, Melbourne, VIC 3001, Australia. Email: xun.yi (at) rmit.edu.au
More Information: http://www.rmit.edu.au/compsci/research
Closing Date for Applications: 2014-10-30
Applications are invited a post-doctoral position in pairing-based cryptography at Caen University. The successful applicant will participate in the project SIMPATIC (SIM and PAiring Theory for Information and Communications security) financed by the French governemental research funding agency ANR (Agence Nationale de la Recherche) and organized by Orange Labs, Caen. He/she will be a member of one of the research teams in the Computer Science (GREYC) or Mathematics (LMNO) laboratories at Caen University, France.
The position is open for one year. The starting date can be arranged as convenient, but in any case not later than 1st July 2015.
The partners involved in the SIMPATIC project are the crypto teams of the Laboratoire d'Informatique de l'ENS Paris, IMB (Bordeaux), University Paris 8, University Rennes 1, Oberthur, INVIA, STmicroelectronics (Le Mans) and Orange Labs (Caen).
The successful applicant will work on one of the following priorities of the project:
(i) The conception of cryptographic primitives suitable for SIMs and other small supports. Candidates are expected to have a high quality potential in theoretical cryptography. He/she will be expected to interact with members of the Applied Crypto Group (ACG) at Orange Labs (OL) in Caen.
(ii) The study of suitable pairing-friendly curves, both theoretical and algorithmic aspects. Candidates should therefore have a very strong background in relevant number theory and algebraic geometry. Some experience in software implementation (for example in Pari, Magma, Sage, ...) would be useful.
Preference will be given to candidates working on priority (i), but all applications related to the project themes will be examined.
Candidates must hold a PhD thesis or equivalent in mathematics or computer science, together with a strong research record.
Contact: John Boxall john.boxall (at) unicaen.fr
Denis Simon denis.simon (at) unicaen.fr
Fabien Laguillaumie fabien.laguillaumie (at) ens-lyon.fr
More Information: http://simpatic.orange-labs.fr/
Closing Date for Applications: 2014-11-01
We are looking for Post-Docs for a new project on Fully Homomorphic Encryption (FHE). The goal is to implement, test and improve a number of homomorphic encryption schemes. Previous experience with FHE would be a bonus, but not a necessity. However, the ability to pick up and implement advanced mathematical concepts is a must.
Contact: Nigel Smart nigel (at) cs.bris.ac.uk
Closing Date for Applications: 2014-12-31
The Laboratory of Cryptology and Computer Security (LoCCS) at the CS Department of Shanghai Jiao Tong University invites applications for several tenure-track faculty positions in the area of cryptology, in particular (but not limited to), authenticated encryptions, leakage-resilient cryptography, side-channel attacks, obfuscation. Candidates are expected to have the following: (1) a PhD in a relevant area; (2) a proven track record (especially publications at top venues); (3) preferably a postdoctoral training for two years or more. Salaries will be globally competitive and commensurate with candidates' accomplishments and experience. Shanghai Jiao Tong University is a member of China's C9 League and she has one of the country's best CS schools.
Contact: To apply, please send your CV (with names of 4 references) to Prof. Dawu Gu (dwgu(at)sjtu.edu.cn) and Dr. Yu Yu (yyuu(at)sjtu.edu.cn).
Closing Date for Applications: 2015-01-31
Temasek Laboratories at Nanyang Technological University, Singapore is seeking candidates for 4 research scientist positions (from fresh post-docs to senior research scientists) in the areas of symmetric key cryptography and lightweight cryptography, supported by a government funded project of duration 2 years.
Salaries are globally competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Interested applicants are encouraged to send early their detailed CVs, cover letter and reference letters.
Review process starts immediately and will continue until all positions are filled.
Contact: Dr. Jian Guo, guojian (at) ntu.edu.sg
Closing Date for Applications: 2014-12-31
The positions are funded by the German Research Foundation (DFG) in the project WSNSec (Wireless Sensor Network Security). The project is a collaboration between the Universität Mannheim (Germany) and the Friedrich-Alexander Universität Erlangen-Nürnberg (Germany) where the two positions are located, respectively.
Position 1 at the Working Group for Theoretical Computer Science and IT-Security at Universität Mannheim (Germany) focuses on the theoretical aspects of WSNSec:
- Formalization of attacker models and security goals
- Cryptanalysis of existing cryptographic protocols
- Development of provably secure cryptographic protocols
Position 2 at the Chair for IT-Security Infrastructures (Informatik 1) at the Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany) focuses on the practical aspects of WSNSec:
- Investigation of security strengths and weaknesses of the real WSNs at both the hardware and the software levels
- Implementation of cryptographic protocols for WSNs in simulation environments and on the real sensor nodes
Contact: Frederik Armknecht, armknecht (at) uni-mannheim.de
Zinaida Benenson, zinaida.benenson (at) informatik.uni-erlangen.de
More Information: http://ls.wim.uni-mannheim.de/de/ths/arbeitsgruppe/offene-stellen/
The Interdisciplinary Research (IR) Lab in the Department of Computer Science at Southern Illinois University Carbondale (SIUC) is looking for talented and highly motivated PhD students.
The IR Lab explores interesting and exciting research areas on the intersection of computer and social sciences ranging from computer security and privacy, applied cryptography, game theory, big data analysis and software development to economics, psychology and cognitive science. Our interdisciplinary setting provides attractive and flexible research environment for brilliant and creative PhD candidates.
Currently, there are many active projects in the IR lab among which are: computational models of trust and influence mimicking human reasoning, securely computable economic model, game theory and economic aspects of security and privacy, design and analysis of sealed-bid auction protocols, and computational models of collaboration by social networks analysis and mining.
The successful candidates perform research on the aforementioned projects based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications as well as research experience in the following areas are specifically encouraged to apply: secret sharing, secure multiparty computation, rational cryptography, game theory and computational or mathematical modeling.
Financial support and tuition waiver are provided for these positions and they will remain open until filled.
Contact: A potential candidate should send his/her complete CV to the attention of Mehrdad Nojoumian through `nojoumian (at) cs.siu.edu` with PhD Applicant in the subject line as soon as possible. For more information, you can visit http://www.cs.siu.edu/~nojoumian/
Closing Date for Applications: 2014-12-15
The Institute for Logic, Language & Computation (ILLC) at the University of Amsterdam, and the Centrum Wiskunde & Informatica (CWI) are looking for a PhD candidate in the area of quantum cryptography.
The aim of the PhD project is to develop new quantum-cryptographic protocols (beyond the task of key distribution) and explore their limitations. An example of an active research is position-based quantum cryptography. Another aspect is to investigate the security of classical cryptographic schemes against quantum adversaries (post-quantum cryptography).
Full-time appointment is on a temporary basis for a period of four years. For the first two years the PhD candidate will be appointed at the ILLC, University of Amsterdam, initially for a period of 18 months and then, on positive evaluation, for a further six months. During the final two years, the PhD candidate will be employed by the Centrum Wiskunde and Informatica (CWI). On the basis of a full-time appointment (38 hours per week), the gross monthly salary amounts to €2,083 during the first year, rising to €2,664 during the fourth year.
Contact: Christian Schaffner, c(dot)schaffner(at)uva(dot)nl
Closing Date for Applications: 2014-10-31
The Chair for Information Security and Cryptography at University of Trier, Germany, offers a full-time PhD/Postdoc position.
The position involves both research and teaching in the area of cryptography/information security. The successful candidate is expected to contribute to research in cryptographic protocols and/or electronic voting.
The position is available immediately and is fully funded, with an internationally competitive salary.
Contracts are initially offered for two years. An extension to a total duration of up to six years is possible.
He or she is given the possibility to carry out a Ph.D. or, for Postdocs, a Habilitation.
The successful candidate should have a Master's degree or a Ph.D. (or should be very close to completion thereof) in Computer Science, Mathematics, Information Security, or a related field, with strong analytical and mathematical skills. Knowledge in cryptography is an asset. Since teaching is mostly done in German, sufficient knowledge of German is required.
The deadline for applications is October 5th, 2014. However, late applications will be considered until the position is filled.
See http://infsec.uni-trier.de/job-openings.html for the official job announcement (in German).
Prof. Dr. Ralf Kuesters
kuesters (at) uni-trier.de
More Information: http://infsec.uni-trier.de/job-openings.htm
Closing Date for Applications: 2014-10-05
Make the world smart and secure – join NXP!
NXP is the trusted partner to authenticate identities, secure transactions and provide convenient interactions by delivering Identification Solutions.
The business area Security & Connectivity develops secure solutions that connect people and objects. Its strong portfolio of advanced semiconductor technology, unmatched device performance, world-class security and complete answers approach is used worldwide for protecting personal information in bank cards, passports, and more.
You can be part of an ambitious team of professionals operating in an incredibly exciting industry to help the world be more connected and more secure.
We are looking for passionate, talented experts in the field of Crypto & Security. Examplary roles include:
Currently we are hiring in San Jose (US), Eindhoven (NL), Glasgow (UK), Gratkorn (AT), Hamburg (DE) and Leuven (BE). There are more than 30 Crypto & Security positions for all sort of experience levels!
We are looking forward to your application via our Crypto & Security career website on LinkedIn.
Contact: Alexander Herbst, Human Resources, NXP Semiconductors
More Information: https://www.linkedin.com/groups?jobs=&gid=8137804
The Engineering Cryptographic Protocols Group at TU Darmstadt is looking for a doctoral student in Engineering Cryptographic Protocols for Cloud Computing.
Our group is involved in the two main research centers for IT security in Darmstadt, the Center for Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE). We develop new methods and tools to optimize and automatically generate cryptographic protocols. See http://encrypto.de for details.
The candidate will work in the EU FP 7 research project PRACTICE (Privacy-Preserving Computation in the Cloud), http://www.practice-project.eu, with the goal of developing, optimizing, and automatically generating secure computation protocols for cloud computing.
The candidate is expected to have a completed Master (or equivalent) degree with excellent grades in IT security, computer science, electrical engineering, mathematics, or a closely related field. Solid knowledge in IT security, applied cryptography, and programming skills is required. Additional knowledge in cryptographic protocols, parallel computing, compiler construction, programming languages, and software engineering is a plus.
Review of applications starts immediately until the position is filled.
Please consult the webpage given below for more details and how to apply.
Contact: Dr. Thomas Schneider
More Information: http://encrypto.de/jobs/PRACTICE.pdf