International Association for Cryptologic Research

Open Positions in Cryptology

IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at To advertise a job opportunities, please submit your job here.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.

Technische Universitaet Muenchen; Instiute for Security in Information Technology; Munich; Germany
Research Associate

Our Institute is part of the TUM Department of Electrical and Computer Engineering. We develop innovative technologies for embedded systems, to counteract new threats in hardware security. Physical Unclonable Functions (PUFs) – as important new security elements – and countermeasures against side channel leakage and fault attacks are only two of the exciting topics in the focus of our institute’s research. Our teaching activities range from lectures on basics in cryptology to lab courses where students design secure embedded systems on their own.

For research in the field of Countermeasures against Attacks on Physical Unclonable Functions we are searching for the closest possible point in time for a

Research Associate (m/f)

for a full time position.

Your Tasks:

  • Carrying out your own research in the field of secure PUF concepts
  • Participation in industry-related and scientific research projects
  • Supervising students


    finished your master’s degree in Electrical Engineering, Computer Sciences or equivalent with outstanding grades.

  • have strong focus on security.
  • have profound knowledge in hardware attacks and counter measures
  • have a sound education in information theory and error correcting codes
  • are a creative thinking and independent working person, can work in teams, and are highly motivated.
  • like to work with students.
  • should have practical or theoretical previous knowledge on embedded systems.

We offer a very interesting position as research associate which is rich in variety and includes the ability to carry out a Doctoral thesis in engineering. With your research in the field of PUFs, you contribute to one of the main fields of the Institute for Security in Information Technology and are pushing forward the security of embedded systems for the future.

Contact: Technische Universität München

Institute for Security in Information Technology

Prof. Dr.-Ing. Georg Sigl

Department of Electrical and Computer Engineering

attn. Marion Burhop

Arcisstr.21, 80333 Munich

email: sec (at)

More Information:

Closing Date for Applications: 2015-04-01

University of Mannheim, Germany
Full-time PhD or Postdoc positions in the area of Wireless Sensor Networks (WSN) Security

The positions is funded by the German Research Foundation (DFG) in the project WSNSec (Wireless Sensor Network Security), being a collaboration with Universtiy of Erlangen-Nuremberg.


This position ocuses on the theoretical aspects of WSNSec:

- Formalization of attacker models and security goals

- Cryptanalysis of existing cryptographic protocols

- Development of provably secure cryptographic protocols


The candidate should have the following qualifications:

• Master degree (or an equivalent degree) in Mathematics, Computer Science or a related discipline

• Experience in cryptography

• Knowledge in the modeling and formal analysis of cryptographic protocols is helpful, but not required

Contact: Frederik Armknecht armknecht [at]

Closing Date for Applications: 2016-01-01

Cyber Security Researchers of Waikato (CROW), University of Waikato
Research Fellows (2 Openings)

2 Research Fellow Openings, Department of Computer Science, Faculty of Computing and Mathematical Sciences

We have two fixed-term positions available to be a part of an exciting new MBIE-funded Cyber Security STRATUS (Security Technologies Returning Accountability, Transparency and User-centric Services to the Cloud) project, led by the Faculty’s CROW (Cyber Security Researchers of Waikato) Research Group (

STRATUS will deliver a platform of user-empowering cloud security software, human capability and technical resources easily accessible by a broad range of NZ industry and government organisations.

You will have a PhD in Computer Science or a related field in an active area of research and will have demonstrated the ability to sustain a successful quality research programme. You will be expected to enhance the Department’s research environment, technology commercialisation process, and to produce high quality research and publications in computer security and Cloud computing as a part of this externally funded programme.

In addition to the requirements above, preference will be given to those with experience in data provenance, network security, digital forensics, linked data visualisation, data mining, applied cryptography and/or related areas.

Current salary range for Research Fellows is NZ$67,477 to $82,383 per year.

Fixed-term for three years.

Closing date: 6 March 2015 (NZ time) Vacancy number: 350045

For more information and to apply, visit

Contact: Dr Ryan Ko, Head, Cyber Security Lab, The University of Waikato, Private Bag 3105, Hamilton 3240, New Zealand, Email: ryan AT

More Information:

Closing Date for Applications: 2015-03-06

The Information Security Centre of Excellence, University of New Brunswick, Fredericton, Canada
Post-doctorate in Information and Network Security

The Information Security Centre of Excellence (ISCX) is seeking a full-time postdoctoral fellow to work with Dr. Natalia Stakhanova to carry out research & development activities in the areas of Critical infrastructure protection and Network Security. The Center is a vibrant research centre known for its active collaboration with industry.

Applicants should have an expertise in one or more of the following research areas:

• Network Security, and network technologies and tools.

• Security of Critical infrastructure

• Malware analysis

The post-doc appointment is for one year and can be extended for up to three more years depending upon the availability of funding.

Applications will be considered until the available position is filled. To apply submit your CV via email to Dr. Natalia Stakhanova


Closing Date for Applications: 2015-02-25

Institute of Distributed Systems, Ulm University, Germany
PostDoc on Vehicular Networking Security

You are expected to support and strengthen our research activities in the area of security and privacy in Intelligent Transport Systems (ITS) and vehicular networking. In addition, you may contribute to topics like high-speed networking and physical-layer security. You will work in ongoing projects, as well as contribute to new project proposals. You will be involved in project management and support the supervision of PhD candidates.

The ideal candidate has experience in ITS security or vehicular networking, which is docu­mented by high-quality publications, a Ph.D. degree in computer science or a closely related discipline from an internationally renowned university, and a strong motivation to become part of our team. Proficient knowledge of written and spoken English is required. Conversational German skills are an advantage.

Contact: Submit your application before February 28, 2015 via email to Prof. Dr. Frank Kargl (frank.kargl (at) Please indicate the index number 109 in the subject line of your E-Mail.

More Information:

Closing Date for Applications: 2015-02-28

Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK
Post-Doctoral Research Fellow Positions

Applications are invited for Post-Doctoral Research Fellow positions to conduct research into the design and implementation of practical, robust and physically secure lattice-based cryptographic architectures as part of the EU H2020 SAFEcrypto project. The SAFEcrypto consortium comprises 6 other partners (HWCommunications, Ruhr Universität Bochum, RSA, Thales, INRIA and Universitá della Svizzera Italiana) and post holders will be expected to collaborate with these partners.

Applicants must have at least a 2:1 Honours Degree in Electrical and Electronics Engineering, Computer Science, Mathematics or closely related discipline and a PhD, or expect, within 6 months, to obtain a PhD, in a relevant subject. At least 3 years relevant research experience in one or more of the following is essential: embedded systems design; FPGA or ASIC hardware design; integrated hardware/software design. Evidence of a strong publication record commensurate with career stage and experience is also essential.

(Ref: 15/103726)

More Information:

Closing Date for Applications: 2015-03-06

New York University Abu Dhabi, Center for Interdisciplinary Studies in Security & Privacy (CRISSP)
Postdoctoral Researcher Positions

New York University Abu Dhabi established the Center for Interdisciplinary Studies in Security and Privacy (CRISSP-AD) in 2011 to meet the growing challenges that are faced in securing networked information technology systems that have become pervasive and address broader political, economic and policy issues that help understand and mitigate cyber risk. The goal of CRISSP-AD is to bring together a cadre of technologists and scientists who model integration of technical, legal, financial, and psychological aspects to develop secure, reliable, and practical solutions to meet the information security and privacy challenges in today’s interconnected world.

Currently CRISSP-AD has over half a dozen faculty and several researchers who are focusing on a variety of cutting edge research projects, and the center is seeking outstanding postdoctoral candidates to join our team to further support its research activities. The areas of expertise aimed at, but not limited to, are: cyber threat intelligence and network analytics; hardware and critical-infrastructure security; and user-centric security. Candidates must hold (or be close to completing) a Ph.D. in Computer Science, Electrical and Computer Engineering or quantitative social sciences. PhD holders with a strong publication record and hands-on skills are encouraged to apply.

New York University has established itself as a Global Network University, a multisite, organically connected network encompassing key global cities and idea capitals. The network has three foundational degree-granting campuses: New York, Abu Dhabi, and Shanghai, complemented by a network of over 15 research and study-away sites across five continents. Faculty and students will circulate within the network in pursuit of common research interests and cross-cultural, interdisciplinary endeavours, both local and global.

Contact: Applications will be accepted immediately and candidates will be considered on a rolling basis. To be considered, all applicants need to submit a cover letter, curriculum vitae, and a statement of research interests, all in PDF format to crisspad (at) Please visit our center’s website at for further information.

More Information:

Closing Date for Applications: 2015-08-01

Newcastle University, UK

Applications are invited for one post-doctoral Research Associate post to work on next-generation electronic voting and related topics, supported by the European Research Council Starting Grant. This is a five-year project from 2013 to 2017. The initial appointment will be two years with possible extension towards the end of 2017, subject to satisfactory performance and available funding.

The successful applicant will join a vibrant and growing security research team at Newcastle University and have the flexibility of working on a range of topics such as electronic voting, key exchange, NFC payment, BitCoin and so on. Our research work has been largely driven by tackling real-world security problems. Hence, an ideal candidate is one who has 1) a solid theoretical background; 2) good practical skills; 3) and a keen interest to work on real-world problems with aim for practical impact.

About us: Newcastle University is accredited as one of the eleven Academic Centres of Excellence in Cyber Security Research (ACEs-CSR) in the UK. In the latest 2014 Research Excellence Frame (REF) assessment, under the category of computer science, Newcastle University is ranked the first among the UK universities for its research impact.

How to apply: follow the online application link below. To help speed up the process, please also send your CV and a brief cover letter to feng.hao (at)

Contact: feng.hao (at)

More Information:

Closing Date for Applications: 2015-03-06

Université de Caen Basse-Normandie

Applications are invited a post-doctoral position in pairing-based cryptography at Caen University. The successful applicant will participate in the project SIMPATIC (SIM and PAiring Theory for Information and Communications security) financed by the French governemental research funding agency ANR (Agence Nationale de la Recherche) and organized by Orange Labs, Caen. He/she will be a member of one of the research teams in the Computer Science (GREYC) or Mathematics (LMNO) laboratories at Caen University, France.

The position is open for one year. The starting date can be arranged as convenient, but in any case not later than 1st July 2015.

The partners involved in the SIMPATIC project are the crypto teams of the Laboratoire d'Informatique de l'ENS Paris, of IMB (Bordeaux), of University Paris 8, of University Rennes 1, Oberthur, INVIA, ST (Le Mans) and Orange Labs (Caen).

The successful applicant will work on the conception of cryptographic primitives suitable for SIMs and other small supports. Candidates are expected to have a high quality potential in theoretical cryptography. He/she will be expected to interact with members of the Applied Crypto Group (ACG) at Orange Labs (OL) in Caen.

However, if no suitable applicant is found, we shall consider hiring a candidate to work on one of the other themes of the project, with a priority on the study of suitable pairing-friendly curves, both theoretical and algorithmic aspects. Such candidates should have a very strong background in relevant number theory and algebraic geometry. Some experience in software implementation (for example in Pari, Magma, Sage, ...) would be useful.

Candidates must hold a PhD thesis or equivalent in mathematics or computer science, together with a strong research record. Applicants should send a detailed curriculum vitae, list of publications, and arrange for letters of recommandation to arrive not later than 1st April 2015.

Contact: John Boxall ( john.boxall (at) )

Denis Simon ( denis.simon (at) )

Fabien Laguillaumie ( fabien.laguillaumie (at) ).

Sébastien Canard ( sebastien.canard (at) )

More Information:

Closing Date for Applications: 2015-04-01

Florida Atlantic University, Department of CEECS, USA
PhD Positions

The Interdisciplinary Research Lab in the Department of Computer & Electrical Engineering and Computer Science at FAU is looking for two highly motivated and talented PhD students.

Our lab explores interesting and exciting research areas on the intersection of computer and social sciences ranging from `applied cryptography, security and privacy, trust management, game theory, big data analytics and software development` to `economics, psychology and cognitive science`. Our interdisciplinary setting provides attractive and flexible research environment for brilliant and creative PhD candidates.

Currently, there are many active projects in the lab among which are: computational models of trust and influence mimicking human reasoning, securely computable economic model, game theory and economic aspects of security and privacy, design and analysis of sealed-bid auction protocols, and privacy-preserving protocols for big data analytics.

The successful candidates perform research on the aforementioned projects based on their experience and research interests. They must have strong background in Computer Science and/or Mathematics. They are expected to publish articles in well-known computer science conferences and journals. Although all applications will be carefully evaluated, candidates with prior publications and intensive research experiences are specifically encouraged to apply.

A potential candidate should send his/her complete CV to the attention of Mehrdad Nojoumian through `mnojoumian (at)` with PhD Applicant in the subject line as soon as possible. Financial support, in the form of research assistantships, and tuition waiver are provided for successful candidates. These positions will remain open until filled.

Contact: Mehrdad Nojoumian

mnojoumian (at)

Closing Date for Applications: 2015-05-01

Kyushu University, Fukuoka (Japan)
Assistant Professor

The Institute of Mathematics for Industry at Kyushu University (Fukuoka, JAPAN) invites applications for ONE ASSISTANT PROFESSOR POSITION (`Jyokyo` in Japanese) beginning April 2015. Candidates in all areas of mathematical cryptography who are interested in applications of mathematics to, and collaboration with, industry will be considered. We are looking for candidates, who possess a strong record of research achievements and expertise related to mathematical cryptography such as theory of cryptography, number theory, representation theory, computer algebra, quantum computation, graph theory, combinatorics, and so on. The selection will be based on the past achievements and/or the potential of the candidates to work in the area of mathematical cryptography.

Kyushu University is one of the major seven national universities in Japan, located in Fukuoka in the western part of Japan. The Institute of Mathematics for Industry ( consists of approximately 25 members, who are active in various areas of pure and applied mathematics and also in collaboration with industry.

For full information about the position and the application procedure, visit the URL below.

Contact: Prof. Tsuyoshi Takagi (takagi at

More Information:

Closing Date for Applications: 2015-02-27

Microsoft Research, Redmond, Washington
Post-doctoral Researcher and Researcher positions

The Cryptography Research group at Microsoft Research in Redmond seeks outstanding applicants for Post-doctoral Researcher and Researcher positions in all areas of cryptography. Post-doctoral Researcher positions start in summer 2015 and are for a term of 2 years. Required qualifications include a PhD in computer science or mathematics and experience in cryptography research. Particular areas of interest include: Secure Multi-party Computation, Searchable Encryption, and Homomorphic Encryption. Areas of interest in mathematics include lattice-based cryptography, cyclotomic number fields, elliptic-curve cryptography, pairing-based cryptography, factoring, discrete log, algorithmic number theory.

Contact: Kristin Lauter, Research Manager. Apply online at:

More Information:

Closing Date for Applications: 2015-02-28

Graz University of Technology
1 PhD student, 2 Postdocs

Graz University of Technology employs about 60 researchers in the area of information security. We are currently expanding our research team and we are looking for two postdocs and one PhD student in the following fields of research:

  • Leakage-resilient cryptography
  • Side-channel and fault attacks
  • System security
  • Secure processor design
  • Verification tools and compilers for security

In case you are interested in pursuing a PhD in one of the fields or in joining our team as a postdoc, please send an application by email to Stefan Mangard.

The application should include a curriculum vitae, a statement of motivation, a transcript of records as well as names and email addresses of two persons that can provide references. More information on our research topics and our team can be found on our group website - see link below.

Contact: Stefan Mangard, Email: Stefan.Mangard (at)

More Information:

Closing Date for Applications: 2015-03-16

AIT Austrian Institute of Technology

We are looking for a research scientist (post-doc) in cryptography with a special emphasis on topics relevant in the context of security and privacy for cloud environments. Ideally you have experience in fields like multi-party computation, distributed cryptography, rational cryptography or privacy enhancing technologies.

You will be mainly involved in a EU research project on cloud cryptography with tasks related to the design of cryptography for novel distributed information sharing systems.

  • Direct job posting:

  • Project homepage (avail. Feb. 2015):

  • AIT Safety&Security Department:

Contact: Thomas Loruenser, Department Safety & Security, AIT Austrian Institute of Technology, or Maria Leonhard-Maurer, Head of Human Resources, E-Mail: maria.leonhard-maurer (at)

More Information:

Closing Date for Applications: 2015-04-30

University of Massachusetts Amherst
Post-Doc, Ph.D. student

For two NSF projects in the area of hardware Trojans we are looking for post-docs and Ph.D. students who are interested in research that bridge applied cryptography and modern hardware design. Both projects are very exciting and cutting-edge. We are looking for candidates which have previous experience in one of the two areas:

Topic Area 1) Applied cryptography, hardware security, implementation attacks

Topic Area 2) VLSI design, FPGA design, circuit design, embedded systems

Candidates for the post-doc position should have a strong publication record in the leading cryptography conferences (Topic Area 1) or leading computer engineering journals (Topic Area 2). Candidates for the Ph.D. position should have a BS&MS degree with excellent grades, relevant course work and some initial experience in one of the topic areas, either through MS-level research or industry.

The candidates should be open to work in an interdisciplinary fashion, i.e., to conduct high-quality research that bridges applied cryptography and modern hardware design. They will collaborate with Christof Paar (applied cryptography, on leave from the Univ. of Bochum) as well as Sandip Kundu and Russ Tessier (both computer engineering) at UMass Amherst. It is expected that the candidates also interact with researchers at the University of Bochum.

Sounds interesting? Please send your resume (CV, transcript of records) and names/email addresses of two people how can provide references.

Contact: Christof Paar, University of Massachusetts and University of Bochum

Closing Date for Applications: 2015-04-30

University of Surrey, Guildford (UK)
Ph.D in Information Security

The Department of Computing at the University of Surrey ( seeks to recruit a motivated doctoral student to work in the area of Information Security.

The studentship is for three years and includes a stipend of £16,000 per year and tuition fees, and is available to students of UK/EU residency.

The successful candidate will participate in the Formal Methods and Security group (, will work in an exciting international environment and will have the opportunity to participate in the development of the recently launched Surrey Centre for Cyber Security (

The main tasks of the Ph.D. student will be to develop state-of-the-art techniques for the security analysis of real world protocols. In particular, he/she will work in one of the following areas:

- Formal methods applied to security protocols;

- Applied Cryptography and Provable Security.

The position will remain open until a suitable candidate is found so there is no fixed closing date for applications.

Contact: Dr. Anna Lisa Ferrara (a.ferrara (at)

More Information:

Closing Date for Applications: 2015-05-31

Institute for Infocomm Research, Singapore
Research Scientists

We are looking for research scientists with expertise on cyber-physical security and mobile security. The candidates should have PhD in infocomm security with track record of strong R&D capability (at least 2 publications at top security conferences -, in the past 3 years), be able to perform deep system-level investigations of security mechanisms, be a good team player and have the potential to be a team leader, and also have good presentation and communication skills. The candidates are expected to work closely with industry partners, create valuable intellectual properties, and produce project deliverables in time.

Interested candidates please send CV to Jianying Zhou. Fresh PhD is welcome to apply. Review of applications will begin immediately and will continue until the positions are filled. Only short-listed candidates will be contacted for interview.

Contact: Dr. Jianying Zhou, Dept Head, Infocomm Security, Institute for Infocomm Research. Email:

More Information:

Closing Date for Applications: 2015-02-28

KTH Royal Institute of Technology
Assistant Professor in Computer Science with Specialization in Computer Security

The Department of Theoretical Computer Science (the TCS group) at the School of Computer Science and Communication (CSC) invites applications for a full-time tenure-track assistant professor in Computer Science with specialization in Computer Security, starting in the second half of 2015.

The TCS group has a strong academic record and good external funding from EU and national sources. There is active research in foundational topics such as complexity theory, logic, and formal methods, as well as more applied ones such as computer security, cryptography, programming languages, databases, natural languages, and computer science education. Within computer security, research topics include software security and secure execution platforms, network security and privacy preserving computation, and cryptography, in particular in the foundations of electronic voting.

For more information about KTH, the CSC school, and the TCS group visit,,

For full information about the position, requirements, and the application procedure visit

Contact: Prof. Mads Dam, mfd (at)

More Information:

Closing Date for Applications: 2015-02-10

Université Libre de Bruxelles

Applications are invited for a three-years Post-Doc position in the Quality and Computer Security research Lab ( of the Université Libre de Bruxelles.

In the framework of a research project in machine learning and computer security and in collaboration with the Machine Learning Group of the Université Libre de Bruxelles and the Machine Learning Group of the Université Catholique de Louvain, the successful applicant will work on the use of machine learning techniques in the design of secure architectures.

Contact: Applicants are kindly requested to send their application by email: olivier.markowitch (at) or by letter to:

Olivier Markowitch

Université Libre de Bruxelles

Computer Science Department

Boulevard du Triomphe CP212

1050 Brussels


More Information:

Closing Date for Applications: 2015-01-31

Chalmers University of Technology, Sweden
PhD student

1 PhD Position in Information Security and Cryptography at the Department of Computer Science and Engineering, Chalmers University of Technology, Sweden

We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography.

General goal: Develop secure and privacy-preserving authentication protocols for wireless communications and wearable computing devices.

More precisely, the student shall be working on investigating efficient authentication mechanisms for wearable computing devices (RFID tags, sensors connected with mobile phones or other wireless devices) that provide:

i) accurate and transparent authentication,

ii) rigorous privacy guarantees, even if multiple wearable devices are involved in the authentication.

Special focus on:

- Authentication protocols for noisy and resource constrained environments (RFID systems, wireless sensor networks).

- Achieving security and privacy while minimising resource cost.

- Resistance of authentication protocols against different types of attacks.

- Authentication problems in social networks, smartphone applications.

- Lightweight cryptography.

Experience in one or more of cryptography, probability and statistics, decision and game theory are beneficial. Mathematical maturity is essential.

The PhD student will be supervised by Prof. Katerina Mitrokotsa.

PhD student positions are limited to five years and normally include 20 per cent departmental work, mostly teaching duties. Salary for the position is as specified in Chalmers' general agreement for PhD student positions. Currently the starting salary is 27,835 SEK a month before tax.

Contact: Katerina Mitrokotsa, Assistant Professor, Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg Sweden

More Information:

Closing Date for Applications: 2015-01-31

Saarland University, Germany

Starting 2015 the Information Security & Cryptography Group at Saarland

University, Germany, has several open positions for postdocs and we are

looking forward to your application.

Our major current research focus is on the recently awarded ERC Synergy

Grant imPACT, which aims at providing foundations for privacy,

accountability, compliance and trust in the Internet of the Future,

including cutting-edge methods and tools for assessing and enhancing

customer privacy.

You have the chance to work at one of Europe's top sites for IT security

and privacy research, in the beautiful region between Germany, France

and Luxembourg with a high quality of life. Postdocs are paid employees

of Saarland University. Salary and employment conditions are attractive.

We encourage the application of outstanding PhDs in computer science or

IT security, who would like to work with us in the field of next

generation privacy techniques. The positions start from February 1, 2015

or later and are funded for two years, with a possible extension by one

year. We solicit applications by January 15, 2015, but we will consider

applications until the positions are filled. Applications should include a

curriculum vitae, a brief description of research interests, three

selected own publications, and, if available, letters of recommendation.

Applications and informal inquiries should be sent to Michael Backes at

the following email address: application-erc (at)

Further information:

Center for IT Security, Privacy and Accountability -

Information Security & Cryptography Group -

ERC Synergy Grant imPACT -

Contact: Michael Backes

Closing Date for Applications: 2015-02-28

University of Luxembourg
Ph.D. student and Post-Doc

The Laboratory of Algorithms, Cryptology and Security (LACS) at the University of Luxembourg is looking for one post-doc and one Ph.D. student to work on a new project on Fully Homomorphic Encryption (FHE). The goal is to improve existing FHE schemes, and possibly design and implement new ones.

The post-doc candidate should have a Ph.D. in cryptography. Experience with FHE is a plus but not a necessity. The Ph.D. candidate should have a master in computer science or in mathematics. Both positions are for three years.

To apply please follow the link below.

Ph.D. student:


Contact: Jean-Sebastien Coron jean-sebastien.coron (at)

Closing Date for Applications: 2015-01-15

Nanyang Technological University, Singapore

We are looking for one Postdoc in coding and lattice based cryptography. Contact us if you have (or will have soon) a PhD in Cryptography or a related subject, and an excellent publication record.

The applications will be considered immediately. The position is for 1 year, but renewable.

Contact: Huaxiong Wang

hxwang (at)

Closing Date for Applications: 2015-03-29

ETH Zurich, Switzerland
PhD Student

The Cryptography Group at ETH Zurich, led by Prof. Ueli Maurer, has an open position for a PhD student in the general field of Cryptography. Candidates with an excellent Master's degree in Mathematics, Computer Science, or a related field, and with good English skills (written and spoken), are invited to apply.

More Information:

Closing Date for Applications: 2015-05-30

Cosic, KU Leuven, Belgium
6 Ph.D. students and 2 Post-docs

COSIC’s research focus lays in the design, evaluation and implementation of cryptographic algorithms and protocols, the development of security architectures for information and communication systems, the development of security mechanisms for embedded systems and the design and analysis of privacy preserving systems.

COSIC is looking for 8 motivated researchers who fit into following profiles:

  • PhD candidate in public key cryptography and cryptographic protocols (multiple positions)
  • PhD candidate in symmetric cryptography and PRNGs
  • PhD position in biometry and federated identity management
  • PhD position in secure circuits for RNG and PUFs
  • Post-doctoral position in biometry and federated identity management
  • Post-doctoral position in multi party computation

General Profile and Skills required

For all the above positions the candidates must hold a Master’s Degree in engineering, mathematics or computer science, have good grades and have a keen interest in cryptography. We prefer candidates who can demonstrate that they have developed their research skills during their Master’s studies. For the postdoctoral positions a PhD degree in the relevant area is required. The candidate should also have an interest in implementation of cryptographic algorithms.

How to apply

Send following documents (in pdf) to jobs-cosic (at)

  • Curriculum Vitae
  • Motivation letter
  • List of publications
  • Relevant research experience
  • Study curriculum with rankings
  • English proficiency
  • Pdf of diploma and transcripts (translation if the original is not in Dutch, English, French or German)
  • Research proposal (1 page) describing which research questions you would like to work on
  • Names (and e-mail) of 2 reference persons and the nature of contact with them

Closing Date for Applications: 2015-02-28

Security Engineer

Your responsibilities:

You will consult our customers in the areas concerning embedded and automotive cyber security. The consulting includes, but is not limited to, security analysis of existing security applications, security concepts, architecture of security solutions, and design of secure systems. In addition, your task will be the adjustment and enhancement of existing embedded security solutions. Furthermore you will compile surveys and decision memos for new embedded security technologies and products. Depending on your background, you will also develop customized software for client projects in the area of embedded data security and engage in product development. You will assist sales meetings as a technical expert.

Your competencies and qualifications:

Bachelors Degree in Computer Science, Information Technology or Information Security. Masters Degree preferred

Experience in a position as Security Engineer, Security Consultant, or Information Security Analyst is beneficial, ideally with industry experience and special knowledge in one of the following fields: Cryptography, security, privacy, software development (C/C++ and Java), and embedded systems

Willingness to work in a flexible team; reliable; independent and thoughtful Customer oriented

Send us your application to jobs (at)

More Information:

Closing Date for Applications: 2015-02-27

UK Security Lab
Cryptography Security Analyst

Role and Scope

The Cryptography Security Analyst is responsible for developing and maintaining the internal expertise in cryptography and more particularly in the security of algorithms executed on embedded systems.

This will include the analysis of cryptographic codes embedded in products under evaluation, the development and the realisation of high level of cryptographic side-channel attacks, and the support and the training of engineers for evaluation projects.

It includes the representation of the company in industry forums and the management of complex projects. He/She should have a flexible and an innovative approach.


To undertake chargeable security evaluation tasks or duties with the respect of deadlines and customer requirements. The chargeable tasks may include:

o The vulnerability analysis of cryptographic algorithms, more particularly on payment systems with regards to side-channel, fault injection and protocol attacks.

o The development and the realisation of innovative cryptographic attacks on products under evaluation (side-channel, DFA).

o The generation of expertise reports in compliance with industry best standards

To follow-up the latest technical developments and to contribute to the internal innovation in the security in cryptography area.

To provide high-level technical support to the company and to the operations department. This may include test planning and logistics, test procedure updating, training and quality issue resolving.

To represent my client and promote its Security Evaluation services in conferences, exhibitions or any key industry events.

Person Specifications

A Master Degree in Cryptography with good skills in algorithms in embedded systems.

A good knowledge of uC architectures and their assembly languages would be highly advantageous.

High analytical skills

Software coding/modelling skills (examples:C,Assembly Languages, etc).

Contact: Vincent Lordier

vincent.lordier (at)

Closing Date for Applications: 2015-03-02

University of Waterloo
PhD students and Postdoctoral Fellowships in Post-Quantum Cryptography

The Institute for Quantum Computing and the Centre for Applied Cryptographic Research at the University of Waterloo seek qualified applicants for postdoctoral fellowships and graduate student positions in post-quantum cryptography, in particular in public-key cryptography based on computational assumptions believed to be secure against quantum computers (e.g. systems based on lattices, error-correcting codes codes, multivariate functions, elliptic curve isogenies, and also signature schemes based on hash-functions).

Projects may include studying new attacks (classical or quantum) on proposed systems, improved implementation methods for such systems, and reductions or equivalences between candidate post-quantum systems.

Successful applications will join a broad team of leading researchers in quantum computing and applied cryptography. They will also be able to take advantage of the CryptoWorks21 supplementary training program, which develops the technical and professional skills and knowledge needed to create cryptographic solutions that will be safe in a world with quantum computing technologies.

Contact: Michele Mosca, Deputy Director, Institute for Quantum Computing, mmosca (at)

David Jao, Director, Centre for Applied Cryptographic Research, djao (at)

More Information:

Closing Date for Applications: 2015-05-15

Advanced Digital Sciences Center, Singapore
Research scientist & post-doc

We are actively seeking competent researchers for the project "A Cyber-Physical Approach to Securing Urban Transportation Systems" - Future cities will increasingly be smart, providing an environment where people's everyday lives are supported by various cyber-physical infrastructures including urban transportation systems. ADSC will develop new security technologies for urban transportation systems and make fundamental breakthroughs in cyber security research through collaboration with Singapore's Institute for Infocomm Research (I2R), Singapore University of Technology and Design (SUTD), and industry partners.

Contact: For enquiries, please contact security.job (at)

More Information:

Closing Date for Applications: 2015-01-01

DARPA-i_SW Arlington, VA
Senior Cryptographic/Software Obfuscation Engineer

i_SW is looking for a Staff Scientist with a background in mathematics and cryptography to support a DARPA program focused on program obfuscation to protect DoD assets. Candidate will provide Scientific, Engineering and Technical Assistance (SETA) support to assist in the management and evaluation of the research underlying this effort. Candidate should have experience planning and developing technical projects of a research and development (R&D) nature, concerned with unique or controversial problems which have an important effect on major Department of Defense programs.

This work will be collaborative with DARPA and i_SW corporation located in Arlington, VA

Required Skills

• Demonstrated skill in successfully performing technical assignments including conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques, risk analysis and resolution, tracking technical milestones, and report preparations

• Research focus on the theoretical sides of cryptography

• Demonstrated skill in conceiving, planning, and conducting research in problem areas of considerable scope and complexity requiring unconventional or novel approaches and sophisticated research techniques.

• Demonstrated the ability to independently conduct the appropriate analyses to offer recommendations, solutions, and alternatives to resolve R&D issues, concerns, problems, or methods.

Applicants must be US Citizens in order to obtain security clearances.


MS/PhD Math or Computer Science

Some post-graduate work in mathematics and cryptography preferred.

Contact: Robert Lunsford Robert.lunsford (at)

More Information:

Closing Date for Applications: 2015-03-01

Nanyang Technological University, Singapore

We are looking for two Post-Docs (Research Fellows) on symmetric key cryptography and computer security. The positions are for 2 years.

We encourage candidates with an excellent track-record in cryptography and computer security to apply. Please send your application with a CV, a cover letter and two reference letters.

Review starts immediately until suitable candidates have been hired.

Contact: Hongjun Wu, wuhj (at)

Closing Date for Applications: 2015-01-31

Commissariat à l\'Energie Atomique (French DoE), Paris area, France

Following recent advances in high throughput sequencing, it can be expected that, in the near future, more and more individuals will have their whole genome extracted, stored and analyzed in a routine fashion. Although this perspective is full of promises in terms of personalized preventive and curative medicine as well as medical research, it should also be acknowledged that the genome of an individual is in essence extremely sensitive data from (at least) a privacy standpoint. Thus, for such personalized medicine-oriented platforms to reliably exist, it is necessary to develop specific counter-measures providing intrinsic protection of the genomic data when manipulated by an IT infrastructure.

In this context, a very promising approach is grounded in homomorphic encryption as a means of computing directly over encrypted data.

The purpose of the present postdoctoral offer is thus to investigate the practical relevance of using homomorphic encryption techniques for privacy-preserving genetic data processing. The main use case will consist in performing requests on a database of genomes represented by their variants. Several scenarios will be investigated in particular with respect to the privacy of the request itself on top of the privacy of the genetic data. In this various scenarios, the candidate is expected to identify the most suitable homomorphic encryption techniques ranging from additive-only (e.g. suitable for private requests on unencrypted data) and multiplicative-only (e.g. suitable for disjunctive public requests on encrypted genetic data) homomorphic encryption systems to the use of the more recent (and more costly) fully homomorphic encryption techniques. The candidate will also be expected to build prototypes for one or more of the above scenarios in order to experimentally demonstrate the practical viability of the solutions, in particular with respect to performances.

Contact: Dr Renaud Sirdey, Head of the Embedded Real-Time & Security Lab

Postal address: DRT/LIST/DACLE/LASTRE - CEA Saclay - 91191 Gif-sur-Yvette Cedex, France

E-mail: renaud.sirdey (at)

Phone: +33 (0)1 69 08 45 42

More Information:

Closing Date for Applications: 2015-03-31

University of Bristol
Post-Doc Fully Homomorphic Encryption

We are looking for Post-Docs for a new project on Fully Homomorphic Encryption (FHE). The goal is to implement, test and improve a number of homomorphic encryption schemes. Previous experience with FHE would be a bonus, but not a necessity. However, the ability to pick up and implement advanced mathematical concepts is a must.

Contact: Nigel Smart nigel (at)

More Information:

Closing Date for Applications: 2014-12-31

Shanghai Jiao Tong University, Shanghai, China
Tenure-Track Faculty Positions

The Laboratory of Cryptology and Computer Security (LoCCS) at the CS Department of Shanghai Jiao Tong University invites applications for several tenure-track faculty positions in the area of cryptology, in particular (but not limited to), authenticated encryptions, leakage-resilient cryptography, side-channel attacks, obfuscation. Candidates are expected to have the following: (1) a PhD in a relevant area; (2) a proven track record (especially publications at top venues); (3) preferably a postdoctoral training for two years or more. Salaries will be globally competitive and commensurate with candidates' accomplishments and experience. Shanghai Jiao Tong University is a member of China's C9 League and she has one of the country's best CS schools.

Contact: To apply, please send your CV (with names of 4 references) to Prof. Dawu Gu (dwgu(at) and Dr. Yu Yu (yyuu(at)

Closing Date for Applications: 2015-01-31

Temasek Laboratories at Nanyang Technological University, Singapore
4 Research Scientists

Temasek Laboratories at Nanyang Technological University, Singapore is seeking candidates for 4 research scientist positions (from fresh post-docs to senior research scientists) in the areas of symmetric key cryptography and lightweight cryptography, supported by a government funded project of duration 2 years.

Salaries are globally competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Interested applicants are encouraged to send early their detailed CVs, cover letter and reference letters.

Review process starts immediately and will continue until all positions are filled.

Contact: Dr. Jian Guo, guojian (at)

Closing Date for Applications: 2015-03-31

University of Trier, Germany
Ph.D. student or Post-Doc (cryptographic protocols and/or electronic voting)

The Chair for Information Security and Cryptography at University of Trier, Germany, offers a full-time PhD/Postdoc position.

The position involves both research and teaching in the area of cryptography/information security. The successful candidate is expected to contribute to research in cryptographic protocols and/or electronic voting.

The position is available immediately and is fully funded, with an internationally competitive salary.

Contracts are initially offered for two years. An extension to a total duration of up to six years is possible.

He or she is given the possibility to carry out a Ph.D. or, for Postdocs, a Habilitation.

The successful candidate should have a Master's degree or a Ph.D. (or should be very close to completion thereof) in Computer Science, Mathematics, Information Security, or a related field, with strong analytical and mathematical skills. Knowledge in cryptography is an asset. Since teaching is mostly done in German, sufficient knowledge of German is required.

The deadline for applications is October 5th, 2014. However, late applications will be considered until the position is filled.

See for the official job announcement (in German).

Contact: Prof. Dr. Ralf Kuesters
kuesters (at)

More Information:

Closing Date for Applications: 2014-10-05

[ IACR home page ] © IACR