International Association for Cryptologic Research

International Association
for Cryptologic Research

Open Positions in Cryptology

Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


Tenure-track Faculty Positions
IMDEA Software Institute, Madrid, Spain

The IMDEA Software Institute invites applications for tenure-track (Assistant Professor) positions. We are primarily interested in excellent candidates in Systems, including Distributed Systems, Embedded Systems, etc.; Data Science, including machine learning; Security and Privacy; Software Engineering; and Cyber-Physical Systems. Exceptional candidates in other topics within the research areas of the Institute will also be considered. Tenured-level (Associate and Full Professor) applications are also welcome.

The primary mission of the IMDEA Software Institute is to perform research of excellence at the highest international level in the area of software development technologies. It is one of the highest ranked institutions worldwide in its main topic areas.

All positions require a doctoral degree in CS or closely related area, earned by the expected start date. Candidates for tenure-track positions will have shown exceptional promise in research and ability to work independently as well as collaboratively. Candidates for tenured positions must have an outstanding research record, recognized international stature, and demonstrated leadership. Experience in graduate student supervision is also valued at this level.

For full consideration, complete applications must be received by December 1, 2020 but will continue to be accepted until the positions are filled.

The institute is located in the vibrant area of Madrid, Spain. It offers an ideal working environment, combining the best aspects of a research center and a university department. The institute offers institutional funding and also encourages participation in national and international research projects. The working language at the institute is English.

Salaries at the Institute are internationally competitive, established on an individual basis, and include social security provisions, and in particular access to an excellent public health care system.

COVID Note: The Institute continues working and hiring, while strictly adopting all recommended

Contact: hiring@software.imdea.org
Last updated: 2020-09-27 posted on 2020-09-27

Post-Doc in Lattice-based Cryptography (PROMETHEUS)
Information Security Group, Royal Holloway, University of London, UK
We are seeking to recruit a post-doctoral research assistant to work in the area of cryptography. The position is available now until 1 June 2022.

The PDRA will work alongside Dr. Martin Albrecht, Dr. Rachel Player and other cryptographic researchers at Royal Holloway on topics in lattice-based cryptography. This post is part of the EU H2020 PROMETHEUS project (http://prometheuscrypt.gforge.inria.fr) for building privacy preserving systems from advanced lattice primitives. Our research focus within this project is on cryptanalysis and implementations, but applicants with a strong background in other areas such as protocol/primitive design are also encouraged to apply.
Contact: Martin Albrecht
Last updated: 2020-09-27 posted on 2020-09-25

Post-Doc
University of Warsaw

We are looking for talented and motivated Post-docs to work on the ERC AdG project PROCONTRA: Smart-Contract Protocols: Theory for Applications. The project is about theoretical and applied aspects of blockchain and smart contracts.

The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.

We offer competitive salary, a budget for conference travel and research visit, and membership in a young and vibrant team with several international contacts (for more see: www.crypto.edu.pl).

A successful candidate will be given a substantial academic freedom and can work on a variety of research problems related to the main theme of the project.

There is no specific deadline for this call, but we will start looking at the applications from Oct 15th, 2020.

Contact: Stefan Dziembowski
Last updated: 2020-09-27 posted on 2020-09-25

Ph.D. Student
CISPA − Helmholtz Center for Information Security

What we are always looking for?
CISPA constantly seeks applications from outstanding students regardless of their national origin or citizenship. Currently we are looking for students interested in applied cryptography and topics like:

  • privacy-preserving signatures,
  • anonymous credentials,
  • eID and ePassport security.

Admission to the Computer Science graduate program is highly competitive. A successful Master’s degree from a top-tier, research-oriented institution of higher education in a subject relevant to our research is required. Applicants should have an outstanding academic record, proficiency in spoken and written English, and strong letters of recommendation from their academic advisors.

What we offer?
CISPA maintains an open, international and diverse work environment. Every Ph.D. student is a member of a research group lead by his or her supervisor. Admitted students are as a rule paid employees of CISPA with a full time contract (TV-L E 13). The working language is English.

How to apply?
https://jobs.cispa.saarland/jobs/detail/phd-students-in-all-areas-related-to-cybersecurity-privacy-cryptography-and-machine-learning-1

Contact: Lucjan Hanzlik (hanzlik@cispa.saarland)
Last updated: 2020-09-27 posted on 2020-09-24

Postdoctoral researcher in Cryptography & Information Security
University of St. Gallen, Switzerland
The University of St. Gallen in Switzerland and the chair of Cyber Security invites applications from PhD holders in the area of cryptography and information security. The researcher will join a group of researchers focusing in applied and theoretical cryptography, network and information security and privacy-preservation led by Prof. Katerina Mitrokotsa. We are affiliated to the Department of Computer Science (DCS) and the Institute of Computer Science.
The position has an attractive salary and located in beautiful St. Gallen and Switzerland.
Research area: Research areas include but are not limited to:
  • Verifiable computation
  • Secure Multi Party Computation
  • Privacy-preserving authentication
  • Cryptographic primitives
Your Profile
  • A PhD degree in Cryptography, information security;
  • Strong mathematical and algorithmic CS background;
  • Strong publication record;
  • Good skills in programming is beneficial;
  • Excellent written and verbal communication skills in English
Deadline for applications: 30 September
Starting date: Fall 2020 or by mutual agreement
How to apply Submit your application through the online application system
Contact: Katerina Mitrokotsa
Last updated: 2020-09-27 posted on 2020-09-24

Post-doc position
EMSEC, University of Rennes 1, Rennes, France
We are looking for Research Fellow (Post-Doc), to join our group. The applicants should have background and be interested in working on different aspects of lattice based cryptography, in particular on:
  • security proofs for lattice-based schemes,
  • building and implementing lattice-based constructions,
  • cryptanalysis and side channels attacks.
The research will take place in the Embedded Security and Cryptography (EMSEC) team, within the IRISA computer science institute located in Rennes, France.
To apply please send us by email your detailed CV (with publication list). The positions has flexible starting date. Review of applications will start immediately until the positions are filled.
Contact: Adeline Roux-Langlois / adeline.roux-langlois@irisa.fr
Last updated: 2020-09-27 posted on 2020-09-24

Funded PhD student in Cryptography & Information Security
University of St. Gallen, Switzerland
The University of St. Gallen in Switzerland and the chair of Cyber Security invites applications from PhD holders in the area of cryptography and information security. The researcher will join a group of researchers focusing in applied and theoretical cryptography, network and information security and privacy-preservation led by Prof. Katerina Mitrokotsa. We are affiliated to the Department of Computer Science (DCS) and the Institute of Computer Science. More precisely, the student shall be working on investigating efficient authentication and verifiable delegation of computation mechanisms that provide: i) provable security guarantees, and ii) rigorous privacy guarantees. The overall aim of the PhD position will be to design and evaluate provably secure cryptographic protocols for privacy-preserving authentication and verifiable delegation of computation protocols. The research shall also consider the case where multiple clients outsource jointly computations to untrusted cloud servers.
Research area: Research areas include but are not limited to:
  • Verifiable computation
  • Secure Multi Party Computation
  • Privacy-preserving authentication
  • Cryptographic primitives
Your Profile
  • A MsC degree in Computer Science, Applied Mathematics or a relevant field;
  • Strong mathematical and algorithmic CS background;
  • Good skills in programming is beneficial;
  • Excellent written and verbal communication skills in English
Deadline for applications: 30 September
Starting date: Fall 2020 or by mutual agreement
Contact: Katerina Mitrokotsa
Last updated: 2020-09-27 posted on 2020-09-24

ConsensusLab Lead
Protocol Labs
We seek a Research Project Manager to support and coordinate our research on problems within the field of consensus while assembling a team of world-class researchers. Research at Protocol Labs We’re not an ordinary Research Lab. We’re working hard to build the core protocols of the decentralized web pursuant to our vision for the future of the Internet. As part of our research team, you’ll be enabling outcomes at the forefront of our mission. Our research team is granted both the freedom to develop knowledge by working on novel applications and a responsibility to contribute those skills toward advancing the flagship projects of Protocol Labs and the research endeavors of leading institutions in the field. You’ll feel at home working with us if your knowledge and optimism enable you to craft creative solutions working around evolving needs. What will the ConsensusLab do The goal of ConsensusLab will be to focus on long-term research problems facing Filecoin and other Protocol Labs projects related to secure, scalable consensus mechanisms. As ConsensusLab Lead you will… Coordinate with teammates across the research and project teams to drive progress against the goals we want ConsensusLab to accomplish, driving consensus research to support multiple autonomous projects within the company Track and coordinate the known problems that must be solved to hit those goals, the proposed solutions to those problems, the interactions and constraints that proposed solutions have on each other, and the effects design requirements have on proposed solutions. Assemble a team of researchers to drive progress against these problems. You may be a fit for this role if you have... Strong organizational and project management skills A familiarity with consensus research, in which you explored security or scalability of a system with byzantine or rational actors A love of supporting others in their efforts to learn and push the boundaries of human knowledge Bonus points... You’ve applied game theory, mechanism design, or agent-based modeling to fault tolerant system You’ve previously managed a team of researchers working on novel consensus algorithms
Contact: Ed Burns
Last updated: 2020-09-27 posted on 2020-09-23

Multiple post-doc positions
University of Maryland
Several postdoctoral positions are available in the following areas:
  • Post-quantum (including lattice-based) zero-knowledge proofs.
  • Fast implementation of fully homomorphic encryption and lattice-based cryptography.
  • Adversarial machine learning, broadly defined
Contact: Jonathan Katz
Last updated: 2020-09-27 posted on 2020-09-23

Cryptography Hardware Engineer
Technology Innovation Institute - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.

Responsibilities

  • Specify, design, implement and deploy cryptographic IP cores (including quantum-secure solutions)
  • Conduct research on (but not limited to) efficient cryptographic implementations, implementation attacks and countermeasures, design methodologies and tools
  • Perform security reviews of hardware designs and implementations
  • Work closely with the integration team and other teams in the organization to design and prototype secure systems and communication protocols

    Minimum qualifications:

  • BSc, MSc or PhD degree in Cryptography, Computer Science, Engineering or similar degree with 3+ years of relevant work or research
  • Thorough knowledge of computer architecture and digital design principles Relevant hardware development experience with a focus on hardware security
  • Extensive experience developing for FPGA and/or ASIC platforms in Verilog/VHDL
  • Experience writing testbenches and using waveform-based debugging tools
  • Solid understanding of cryptography, side-channel analysis attacks and countermeasures


    Preferred qualifications:

  • Knowledge of UVM and assertion-based formal tools
  • Understanding of low-power and high-performance techniques
  • Understanding of micro-architectural attacks (e.g., Spectre, Meltdown, MDS)
  • Hands-on experience integrating IP blocks in complex systems (SoCs)
  • Programming skills in C/C++, Python, and/or Tcl
  • Hands-on experience with lab equipment (e.g., oscilloscopes, function generators)
Contact: Mehdi Messaoudi
Talent Acquisition Manager
mehdi.messaoudi@tii.ae

Last updated: 2020-09-27 posted on 2020-09-23

Post-doc
Jean Monnet University in Saint-Etienne, Hubert Curien Laboratory, Saint-Etienne, France
We are looking for candidates for a free Post-Doc position in the field of design and modeling of self-timed rings (STR) as a source of randomness in logic devices, implementation of true random number generators (TRNG) based on STRs in FPGAs and ASICs, analysis of statistical properties of the generated numbers, statistical modeling of the proposed TRNGs and construction of efficient embedded tests dedicated to the proposed generators and based on their stochastic models. Desired profile: Ph.D. degree is required. Required skills: a) good knowledge of digital electronics and embedded systems; b) knowledge of CAD tools and FPGA design (Intel, Xilinx or Microsemi) as well as simulation tools (Modelsim); c) ASIC design using Cadence tools (design, simulation, verification); d) good level of English. Other useful skills: e) data acquisition and data analysis (use of tcl and python languages in particular); f) signal processing, mathematical modeling, statistics; g) basic knowledge in information security.
Contact: fischer(at)univ-st-etienne.fr
Last updated: 2020-09-23 posted on 2020-09-22

Postdoctoral Researcher - Cryptography
Algorand, Inc.
We are looking for a Postdoctoral Cryptography Researcher to join our Team. This is an opportunity for someone who is genuinely excited by new technologies to influence the design and implementation of bleeding edge advanced cryptographic systems and protocols. Functioning somewhat independently and working within the larger Research Team, the Postdoctoral Cryptography Researcher will research and design cryptographic protocols and concepts, partnering with the team to develop prototypes. Our Researchers are also internal subject matter experts, providing guidance and learning opportunities to our extended staff. Researchers are also responsible for publishing meaningful research, independently and with other members of staff.

You will be working on a fast-paced, rapidly growing, high-profile project with a significant opportunity for industry-level impact on emerging blockchain and cryptocurrency technologies.

Overseen by Silvio Micali, this opportunity is for one (1) year with the possibility for extension.

Full role description (including responsibilities and qualifications) and application link is available at the further information link.

Interested candidates should submit their application at the further information link along with their CV (including list of publications), one (1) recently published paper relevant to the position responsibilities, and two (2) reference letters. You can share your paper and reference letter via the "Portfolio" link when applying, or upload the files with you CV. This position is available immediately and thus candidates who are already in the US are preferred.

Contact: Regnia O'Brien, Head of People & Talent
Last updated: 2020-09-23 posted on 2020-09-21

Senior Cryptographer
SICPA - international company with HQ in Lausanne, Switzerland
Leveraging decades of expertise in security inks and solutions, SICPA aims at providing the next generation of trust-enabling security systems for citizens, central banks and governments in the domains of digital currency, identity and value chains. This is a great opportunity to join a strategic project and work with a team of passionate people to design, architect and develop innovative solutions.

WHAT YOU WILL DO

Shape new concepts and ideas, quickly and iteratively, through prototyping.

Have meaningful impact on the crafting and delivery in the early stages of the idea, and product life cycles.

Collaborate closely with our development team to craft solid foundation for future product development.

Deliver, as part of the team, a prototype.

Deliver a functioning sandbox environment, with goal to identify competitive advantage and help implement that in practice.

Drive cooperation with platform and lab teams.

WHAT WE NEED FROM YOU

You have relevant technical skills gained via formal education (PhD preferred), and/or red/blue team experience.

You have expertise in applied cryptography, long-term security, Multi-Party Computation (MPC), key rotation schemes, SoC, SE, TEE, solving difficult challenges for systems in highly adversarial environments.

Also, you master cryptographic protocols and standards (FIPS, AAL, PKI, NIST, ISO/IEC 27001).

You are curious to solve hard problems, oftentimes with competing priorities, using smartly assembled primitives, protocols and solutions, as well as advise on choice tradeoffs.

Besides being a great listener, you are an educator that acts as an advisor and mentor to team members on your domain of expertise.

You thrive in asynchronous communication environments and can express clearly your ideas and thinking, in writing.

You have a natural ability to explain, communicate and influence a broad audience (from highly technical to managerial), seek and engage in external collaboration with academia or red teams.

Read the full job ad here: https://jobs.sicpa.com/job/Prilly_Floris-%28CH01%29-Senior-Cryptographer/616

Contact: Mrs Iuliana Petcu Talent Acquisition Manager hrrecruitment@sicpa.com
Last updated: 2020-09-21 posted on 2020-09-18

Post-Doc in Lattice-based Cryptography
Information Security Group, Royal Holloway, University of London, UK
The postdoc will work alongside Prof. Martin Albrecht and other cryptographic researchers in the ISG on topics in lattice-based cryptography and related fields. This post is funded by a joint grant between Royal Holloway and Imperial College (Dr. Cong Ling) for bridging the gap between lattice-based cryptography and coding theory.

The ISG is a nice place to work; it’s a friendly environment with strong research going on in several areas. We got people working across the field of information security including several people working on cryptography. For example, Carlos Cid, Anamaria Costache, Lydia Garms, Jianwei Li, Sean Murphy, Rachel Player, Eamonn Postlethwaite, Joe Rowell, Fernando Virdia and Martin Albrecht all have looked at or are looking at lattice-based cryptography.

The ISG is one of the largest departments dedicated to information security in the world with 21 core academic staff in the department, as well as research and support staff. We work with many research partners in other departments and have circa 90 PhD students working on a wide range of security research, many of whom are fully funded through our Centre for Doctoral Training in Cyber Security. We have a strong, vibrant, embedded and successful multi-disciplinary research profile spanning from cryptography to systems security and social aspects of security. This vibrant environment incorporates visiting researchers, weekly research seminars, weekly reading groups, PhD seminars and mini conferences, the WISDOM group (Women in the Security Domain Or Mathematics) and we are proud of our collegial atmosphere and approach.

A postdoc here is a 100% research position, i.e. the postdoc would not have teaching duties. That said, if the applicant would like to gain some teaching experience, we can arrange for that as well.
Contact: Martin Albrecht
Last updated: 2020-09-19 posted on 2020-09-17

Post-Doc position
TU Darmstadt, Germany
We are looking for outstanding Post doctoral researchers working on topics related to cryptography and IT Security.

Current topics of interest include (but are not limited to):
  • Secure cryptographic implementations
  • Leakage/tamper resilient cryptography
  • Blockchains and cryptocurrencies
  • Distributed cryptography
The application must include a curriculum vitae, a short research statement, and names of 2 contacts that can provide reference about the applicant and her/his work.

The candidate shall be able to show solid expertise in cryptography/IT Security illustrated in form of publications at major crypto/security venues such as CRYPTO, EUROCRYPT, ASIACRYPT, TCC, PKC, CHES, FC, ACM CCS, Oakland, USENIX Security, NDSS etc.

The position offers an internationally competitive salary including social benefits. TU Darmstadt is a leading university for Computer Science and offers excellent working environment in the heart of the Rhein-Main metropolitan area. It has a strong institute for research on IT security and cryptography with more than 300 researchers working on all aspects of cybersecurity. Review of applications starts immediately until the position is filled.
Contact: sebastian.faust@cs.tu-darmstadt.de
Last updated: 2020-09-16 posted on 2020-09-16

Ph.D. students (Cryptographic Engineering)
Villanova University
Three Ph.D. positions opening at Dr. Jiafeng Harvest Xie's research group at the Department of Electrical and Computer Engineering of Villanova University, Villanova, PA (west of Philadelphia, USA). The research topics of these positions are focused on cryptographic engineering and fault detection related security analysis. Interested ones are warmly welcomed to apply and send their resume/CV to Dr. Xie through email: jiafeng.xie@villanova.edu

Requirements: preferred to be at the majors of Computer Science or Computer Engineering. Majoring in Mathematics are also ok. Proficiency in programming languages such as C, C++, Python, and so on is needed. Good at English communication and writing. Great enthusiasm of doing research oriented tasks. Excellent team worker.

Degree: both B.S. and M.S. graduates or similar are warmly welcomed to apply.

Deadline: better to start at Spring 2021 (Fall 2021 is also ok). It is always better to apply as early as possible. Positions are open until they are filled.

Contact: Jiafeng Harvest Xie (jiafeng.xie@villanova.edu)
Last updated: 2020-09-16 posted on 2020-09-15

PhD student position in Lightweight MPC-friendly Symmetric Ciphers
Research Group COSIC at University of Leuven, Belgium
We have an open PhD position in the domain of Scalable and Secure Data Sharing. The prospective candidate is expected to investigate how conventional lightweight symmetric ciphers perform over MPC, as well as benchmark their performance over MPC. The work also entails provable security in this context. The candidate must hold a Master's degree in mathematics / computer science / electrical engineering / cryptography, with strong grades. Strong background in mathematics / computer science / cryptography is expected. Any prior publications and experience in C/C++ and Python are merited.
Contact: jobs-cosic@esat.kuleuven.be
Last updated: 2020-09-16 posted on 2020-09-15

Postdoc Position in Privacy-Preserving Machine Learning using MPC
Research Group COSIC at University of Leuven, Belgium
We have an open postdoc position in the domain of Scalable and Secure Data Sharing. The prospective candidate is expected to design and develop efficient MPC protocols for privacy-preserving data analytics. The work includes, but not limited to, investigating machine learning algorithms that best suit MPC and that can be efficiently implemented over MPC. You will be working closely with tools such as https://github.com/KULeuven-COSIC/SCALE-MAMBA. The candidate must hold a PhD degree in Cryptography or a related subject with strong publication records in crypto/security venues. In addition to a strong background in both public and symmetric cryptography, good knowledge in MPC, machine learning algorithms, and cryptographic protocols are expected. The candidate should also have coding experience in C/C++ and Python, experience in practical aspects of secure computation is a must.
Contact: jobs-cosic@esat.kuleuven.be
Last updated: 2020-09-16 posted on 2020-09-15

Senior Cryptographer
NCC Group, North America
**Senior Cryptography Researchers have a responsibility to help grow NCC Group Cryptography Services. They will be key contributors to project delivery and research (we have an entire division dedicated to Research and your bonus includes doing research during company hours) at NCC Group Cryptography Services. **Activities and Responsibilities (include): • Delivery of consultancy projects within Cryptography Services • Research and tool development in Cryptography Services • External delivery of client-facing and public speaking events in Cryptography Services • Assistance with sales support for Cryptography Services • Mentoring and leadership for staff at NCC Group **Skills and Experience: Blockchain Security experience is a requirement. The amount of experience with this is flexible. Minimum of five (5) years of experience in Cryptography disciplines with focus areas including some of the following: • Cryptographic Analysis and Review • Elliptic Curve Cryptography • Finite Field Cryptography • Symmetric Cryptography and Hashes • Post-quantum Cryptography • Cryptanalysis of Novel Cryptosystems • Implementation Review of Cryptographic Primitives • Key Management Design and Implementation Review
Contact: Danielle Owen
Last updated: 2020-09-09 posted on 2020-09-09

PhD and Post-Doc
AAU, Austria
We are looking for a PhD student and a Post-Doc in the area of (applied crypto) and/or side-channels.

The PhD post can be in any (fun) area of crypto; the candidate will be supervised by Elisabeth Oswald, and as co-supervisors A. Roy and E. Andreeva are potentially available.

The Post-Doc is related to ERC funding and therefore will work in the area of side channels; our areas of interest here are techniques for secure software development, and RISC-V.

Both posts are available immediately. The salary is around 32k per annum for the PhD student and 35k upwards (depending on prior experience) for the Post-Doc. Further information about the group is under www.cybersecurityresearch.at

Contact: Elisabeth Oswald (firstname.lastname@aau.at)
Last updated: 2020-09-09 posted on 2020-09-09

PhD and Postdoc Position
Research Group COSIC at University of Leuven, Belgium
PhD candidate to work on Cryptography secured against physical attacks. The traditional application of cryptography is the protection of communication lines. In modern applications the attacker often has physical access to the device that is executing the cryptographic algorithm, and can measure side channels (execution time, power consumption, electro-magnetic radiation) or perform fault attacks. With the advent of the IOT, the interest in embedded cryptographic systems and side-channel/fault attacks on these systems is steadily increasing. Protection against side channel attacks (SCA) is usually done via masking, i.e. by randomizing any sensitive data manipulated during computations. Protection against fault injection attacks (FA)is typically done either by duplication or by using infection, i.e., ensuring that any induced fault results in a garbage output. The research direction of combined countermeasures -that is, countermeasures against both SCA and FA -is quite young and experimental. We are looking for a postdoc to work on: (1) formal security definitions and methods to defend implementations against combined attacks as well as new countermeasures against combined attacks which have improved performance and a more realistic adversary model. (2) the development of robust automated verification tools capable of handling entire and practical implementations. (3) defining metrics for combined security and to develop procedures for their evaluation using verification tools. Specific Skills Required: The candidates should hold a PhD degree with aproven research track record in any aspects of Cryptography or Embedded Security. We are especially looking for researchers with a broad research spectrum, going from mathematical aspects, to implementations on FPGA and physical attacks evaluation.
Contact: jobs-cosic@esat.kuleuven.be
Last updated: 2020-09-08 posted on 2020-09-08

PhD student and Postdoc position
Research Group Cosic at University of Leuven, Belgium
We are looking for a PhD and Post-Doc in post-quantum cryptography, including cryptanalysis, secure implementation, hardness of underlying problems, novel primitives and protocols. We are in particular interested in people who have hands on experience with the design, implementation and/or analysis of cryptosystems submitted to NIST's post-quantum standardization effort. Strong background in mathematics is an absolute must, together with computer science and cryptography. A proven research track record in any aspects of post-quantum cryptography is required. We are especially looking for researchers with a broad research spectrum, going from mathematical aspects, to very practical such as implementation aspects
Contact: jobs-cosic@esat.kuleuven.be
Last updated: 2020-09-10 posted on 2020-09-08

PhD student
Research Group Cosic at University of Leuven, Belgium
PhD position on Cybersecurity Attacks on the Electric Supply System (CYPRESS project) We haven an open PhD position in the domain of cybersecurity of critical infrastructures –more particular of the electric energy supply system. The position is funded by the federal ETF project CYPRESS. This is a fundamental research project, in collaboration with other Belgian research groups, with the ambition to contribute to the cyber-physical reliability management of the electric transmission grid. The three goals of the projects are to: (i) improve modeling practice, (ii) perform cyber-physical risk assessment, and (iii) develop appropriate mitigation approaches. The cyber-physical risks considered in the projects range from simple bugs and configuration errors to malicious tampering and cybersecurity attacks. The security researcher that will be working on this project, will focus in particular on the security evaluation of critical (embedded) components in the electric energy supply system and corresponding countermeasures to mitigate these security threats. The security evaluation work in the CYPRESS project includes both risk and threat modeling as well as actual lab work (i.e. embedded security analysis –hacking–of the components in a lab setup). Candidates must hold a master’s degree in electronics engineering or computer science, have good grades and have a keen interest in cryptography and embedded security. The applicant should have a strong background in C and C++. Prior research experience in embedded security, reverse-engineering and/or hacking of IoT devices is an advantage.
Contact: jobs-cosic@esat.kuleuven.be
Last updated: 2020-09-08 posted on 2020-09-08

Postdoc / Research Fellow
Singapore University of Technology and Design (SUTD), Singapore
Multiple positions are available. Candidates should have the expertise on applied crypto, ML, IoT/CPS security and programming skill.

Interested candidates please send your CV with a research statement to Prof. Jianying Zhou. Only short-listed candidates will be contacted for interview.

Contact: Prof. Jianying Zhou (jianying_zhou@sutd.edu.sg)
Last updated: 2020-09-06 posted on 2020-09-06

3x Post-Doc Research Fellow
Cryptanalysis Taskforce @ Nanyang Technological University, Singapore
(COVID-19 may slow down the process, but our hiring is not disrupted) The Cryptanalysis Taskforce at Nanyang Technological University in Singapore led by Prof. Jian Guo is seeking for candidates to fill 3 post-doctoral research fellow positions on symmetric-key cryptography, including but not limited to the following sub-areas:
  • tool aided cryptanalysis, such as MILP, CP, STP, and SAT
  • machine learning aided cryptanalysis and designs
  • privacy-preserving friendly symmetric-key designs
  • quantum cryptanalysis
  • theory and Proof
  • cryptanalysis against SHA-3 and AES
Established in 2014, the Cryptanalysis Taskforce is a group dedicated for research in symmetric-key cryptography. Since then, the team has been active in both publications in and services for IACR. It has done quite some cryptanalysis work on various important targets such as SHA-3, and is expanding its interests to the areas mentioned above, with strong funding support from the university and government agencies in Singapore. We offer competitive salary package with extremely low tax, as well as excellent environment dedicating for research in Singapore. The contract will be initially for 2 years, and has the possibility to be extended. Candidates are expected to have proven record of publications in IACR conferences. Interested candidates are to send their CV and 2 reference letters to Jian Guo. Review of applicants will start immediately until the positions are filled. More information about the Cryptanalysis Taskforce research group can be found via http://team.crypto.sg
Contact: Asst Prof. Jian Guo, guojian@ntu.edu.sg
Last updated: 2020-09-06 posted on 2020-09-04

PhD Students and Post-Docs (Available Immediately)
North Carolina State University, Raleigh, NC, USA
We are seeking multiple Ph.D. students and Post-Doc scholars on architectural and hardware security for a joint funded project of Prof. Amro Awad and Prof. Aydin Aysu at NC State University. The positions are in the broad area of computer architecture and hardware security. The candidates will be part of a project that is collaborative between two research groups (led by Prof. Awad and Prof. Aysu) at NC State and are expected to work on the intersection between hardware security and emerging computing architectures.

The project will explore the security aspects of hardware accelerators. The goal of this project is to identify efficient solutions for defending against a wide set of attacks (e.g., side-channel attacks) targeting hardware accelerators. We will also investigate different challenges and security concerns related to the programming models and run-time environments of particular interest to our funding agency. More information will be shared with the applicants.

PhD Applicants: Following are the minimum requirements for PhD applicants:

  • GPA >= 3.8 -- among top 10% of your graduating class.
  • Strong background in computer architecture (experience in GPUs/FPGAs is preferred)
  • Familiarity with Linux environment, and background in OS (experience in device drivers is preferred)
  • Self-motivated and independent
  • US citizenship is preferred due to the nature of the project, but exceptions will be made on a case-by-case basis.

    Post-Doc Applicants:

    We are also hiring post-doctoral scholars to lead some of the efforts in this project. Post-Doc candidates should have PhD with focus on computer architecture or systems with familiarity with hardware accelerators (e.g., FPGA and GPUs). The positions are available immediately and thus candidates who are already in the US are preferred.

    Links to research groups:

    Prof. Awad: https://sacagroup.github.io/

    Prof. Aysu: https://research.ece.ncsu.edu/aaysu/

  • Contact: Amro Awad (ajawad@ncsu.edu) and Aydin Aysu (aaysu@ncsu.edu)
    Last updated: 2020-09-02 posted on 2020-09-02

    Postdoc in Cryptography
    IMDEA Software Institute, Madrid, Spain

    The IMDEA Software Institute offers a postdoc position in the area of cryptography, in the context of the project "Cryptographic Primitives for Randomness Generation and Privacy". The postdoc will work under the supervision of Dario Fiore and Ignacio Cascudo, in the following topics and their application to blockchain systems: Zero knowledge proofs, and Random beacon generation.

    Who should apply? Applicants should have a PhD in cryptography or a related topic. Experience in the research topics of the projects is highly valued.

    Working at IMDEA Software The position is based in Madrid, Spain, where the IMDEA Software Institute is situated. The institute provides for travel expenses and an internationally competitive salary. The working language at the institute is English.

    Dates The position has guaranteed funding for at least 2 years. The preferred starting date is around the end of 2020, but starting dates in early 2021 are also possible.

    How to apply? Applicants interested in the position should submit their application at https://careers.software.imdea.org/ using reference code 2020-09-postdoc-cryptoprimitives. Deadline for applications is October 23rd, 2020. Review of applications will begin immediately.

    Contact: For enquiries about the position, please contact: dario.fiore (at) imdea.org and/or ignacio.cascudo (at) imdea.org
    Last updated: 2020-09-02 posted on 2020-09-02

    Post-Doctoral Researcher Position at the Cryptography, Security & Privacy Research Group
    Koç University, İstanbul, Turkey
    Cryptography, Security & Privacy Research Group at Koç University has one opening at the post-doctoral researcher level. Accepted applicants may receive competitive salary, housing (accommodation) support, health insurance, computer, travel support, and lunch meal card.

    Your duties include performing research on cryptography, security, and privacy in line with our research group's focus, and direct graduate and undergraduate students in their research and teaching. The project funding is related to cryptography, game theory and mechanism design, and blockchain technologies.

    Applicants are expected to have already obtained their Ph.D. degrees in Computer Science or related discipline with a thesis topic related to the duties above.

    For more information about joining our group and projects, visit

    https://crypto.ku.edu.tr/work-with-us/

    Submit your application via email including
    • full CV,
    • sample publications,
    • a detailed research proposal,
    • and 2-3 reference letters sent directly by the referees.
    Application and start dates are flexible.
    Contact: Assoc. Prof. Alptekin Küpçü
    https://mysite.ku.edu.tr/akupcu/

    Last updated: 2020-09-02 posted on 2020-09-02

    PostDoc in Applied Cryptography / Provable Security
    Tampere University

    The Network and Information Security Group is currently looking for several motivated and talented PostDoctoral researchers to contribute to research projects related to applied cryptography, hardware security, security and privacy. The successful candidates will primarily be working on the following topics (but not limited to):

    • Differential Privacy;
    • Functional Encryption;
    • Privacy-Preserving Analytics;
    • Privacy-Preserving Machine Learning;
    • Searchable Encryption and data structures enabling efficient search operations on encrypted data;
    • Processing of encrypted data in outsourced and untrusted environments;
    • IoT Security and Applications to Smart Cities.

    Programming skills is a must.

    The positions are principa research-focused. Activities include:

    • Conducting both theoretical and applied research;
    • Design of secure and/or privacy-preserving protocols;
    • Software development and validation;
    • Reading and writing scientific articles;
    • Presentation of the research results at seminars and conferences in Finland and abroad;
    • Acquiring (or assisting in acquiring) further funding.

    Successful candidates will be working in EU and industrial research projects. Topics will be spanning from the theoretical foundations of cryptography to the design and implementation of provable secure communication protocols with direct applications to smart cities, cloud computing and eHealth.

    To apply please send the following:

    • Your latest CV;
    • A research statement (max 2 pages long);
    • The three best papers you have co-authored.
    Contact:
    • Antonis Michalas (Provable Security and Privacy): antonios.michalas@tuni.fi

    Last updated: 2020-09-02 posted on 2020-09-02

    Research Engineer
    HashCloak Inc, Toronto Canada

    HashCloak Inc is a R&D lab and consultancy focused on privacy, anonymity and scalability for blockchains and cryptocurrencies. Our team is well-known for working on state of the art Ethereum projects such as Ethereum 2.0, Shyft Network and Althea, for pioneering optimistic rollups and bringing forth the first empirical analysis of Ethereum's privacy guarantees and applications.

    We are hiring our very first research engineer that will help us bring our internal research projects to the world. As a research engineer at HashCloak, you will have the opportunity to work on anonymous networking, private information retrieval, zero-knowledge proofs and many more exciting areas at the intersection pf cryptography, game theory and finance!

    You will be working with a small, young and international team based in different time zones around the world. We are a remote-only company and have a very flexible and relaxed culture.

    As our first research engineer, you will have many of the following qualifications:

    • Master's degree or above in cryptography, computer science, mathematics or related fields
    • 3+ years programming experience in a systems programming language such as C/C++, Go (Preferred), Rust (Preferred).
    • Knowledge of one or more of the following: anonymous networking, zero-knowledge proofs, PIR, MPC
    • Knowledge of secure software practices
    • Experience in deploying production-ready applications
    At HashCloak, you will have the following responsibilities:
    • Implement PoCs and prototypes for our internal research projects
    • Conducting research in one of the previously mentioned fields
    • Collaborate with our clients and research partners
    • Write papers targeted at top conferences as well as blog posts targeted at general audiences
    • Contribute to open source projects that we use in our research
    • Stay up to date on research and development in the blockchain and cryptography ecosystems
    For consideration, please send a CV/Resume with a link to Github or any other website that showcases code you have written to careers@hashcloak.com with the subject line "Rese
    Contact: Mikerah Quintyne-Collins - CEO and Founder
    Last updated: 2020-09-07 posted on 2020-08-27

    Full-Time PhD Position in Evidence-Based Security Response
    University of Twente, The Netherlands

    The Services and Cybersecurity (SCS) group at the University of Twente invites applications for a 4-year PhD position in evidence-based security response.

    We are looking for candidates with a solid background in network and system security.

    More information and the link to apply:
    https://www.utwente.nl/en/organisation/careers/!/1297620/full-time-phd-position-in-evidence-based-security-response

    Deadline for applications: 30 September 2020, 23:59 CET

    Contact: Dr. Andreas Peter (a.peter@utwente.nl)
    Last updated: 2020-09-01 posted on 2020-08-27

    Assistant Professor (tenure-track) and Professor positions in Computer Science
    Institute of Science and Technology Austria

    The Institute of Science and Technology Austria invites applications for several open positions in all areas of computer science including cryptography, systems security and privacy.

    IST Austria offers:

    • A highly international and interdisciplinary research environment with English as working language on campus
    • State-of the art facilities and scientific support services (www.ist.ac.at/scientific-service-units/)
    • Competitive start-up package and salary
    • Guaranteed annual base funding including funding for PhD students and postdocs
    • Wide portfolio of career support
    • Child-care facilities and support on campus

    IST Austria is an international institute dedicated to basic research and graduate education in the natural, mathematical, and computational sciences. The Institute fosters an interactive, collegial, and supportive atmosphere, sharing space and resources between research groups whenever possible, and facilitating cross-disciplinary collaborations. Our PhD program involves a multi-disciplinary course schedule and rotations in research groups and hire scholars from diverse international backgrounds. The campus of IST Austria is located close to Vienna, one of the most livable cities in the world.

    Assistant professors receive independent group leader positions with an initial contract of six years, at the end of which they are reviewed by international peers. If the evaluation is positive, an assistant professor is promoted to a tenured professor.
    Candidates for tenured positions are distinguished scientists in their respective research fields and have at least six years of experience in leading a research group.

    Please apply online at: www.ist.ac.at/jobs/faculty

    The closing date for applications is October 30, 2020.

    IST Austria values diversity and is committed to equal opportunity. We strive for increasing the number of women, particularly in fields where they are underrepresented, and therefore we strongly encourage female researchers to apply.

    Contact: krzysztof.pietrzak@ist.ac.at
    Last updated: 2020-08-26 posted on 2020-08-26

    Cryptography Expert
    Apheris | Deep tech company for privacy-preserving data ecosystems in Berlin, Germany

    We are looking for an Expert in Cryptography and/or Privacy-Preserving Computations with the right skillset to complement our team with practical deep tech and coding expertise.
    Join us putting cutting-edge privacy-preserving technologies and federated computations into production.


    As a domain Expert in Cryptography, you will help us build never-seen-before deep tech products for our high-profile customers. You contribute to the Apheris products, including protocol and architecture and author detailed technical concepts around cryptography. You identify and resolve performance bottlenecks and perform and participate in code reviews. Together with our CTO and other senior engineers you will help us hit product milestones by writing high quality, well tested code.

    Contact: Robin Röhm, career@apheris.com
    Last updated: 2020-08-26 posted on 2020-08-25

    Post-Doc
    Max Planck Institute for Security and Privacy
    The Max Planck Institute (MPI) for Security and Privacy (https://www.mpi-sp.org/) is looking to hire Postdocs in cryptography and computer security. The topic of the position depends on common interests, including (but not limited to):

  • Public-key, lattice-based, and advanced cryptographic primitives.
  • Cryptocurrencies, blockchains, and concurrent systems.
  • Post-quantum cryptography and quantum computing.

    In order to be considered for the position, the candidate must:

  • Have completed (or be close to completing) a PhD in computer science, mathematics, or related fields.
  • Show a record of excellent publications in leading venues for security (S&P, CCS, Usenix Sec, NDSS) cryptography (CRYPTO, EUROCRYPT, ASIACRYPT) or general theory of computer science (STOC, FOCS, ICALP).

    The MPI for Security and Privacy is co-located with the Ruhr University of Bochum (Germany) and offers a vibrant atmosphere for research that spans across all aspects of computer security. The knowledge of German is not required for a successful career at MPI. To apply for the position, send an email to Giulio Malavolta (address below) including the following documents:

  • A curriculum vitae (including list of publications).
  • The names of 2/3 referees for recommendation letters.

    If you have any questions, don’t hesitate to get in touch.

  • Contact: Giulio Malavolta (giulio.malavolta@hotmail.it)
    Last updated: 2020-08-25 posted on 2020-08-25

    Cryptographic Protocols Researcher
    DFINITY Foundation
    DFINITY is reimagining the Internet as a public network that hosts secure software and services. The Internet Computer is a new technology stack that is unhackable, fast, scales to billions of users around the world, and supports a new kind of autonomous software that promises to reverse Big Tech’s monopolization of the internet.

    DFINITY is looking for a full-time Cryptography Researcher, specialized in practical and provably secure cryptographic protocols for blockchains. The main task will be to design, develop, and prove secure, efficient cryptographic protocols for a distributed system and you will contribute in creating a high-performance blockchain computer. We offer a flexible work environment and an opportunity to collaborate with a dynamic and talented team of researchers and developers from around the world.

    Requirements:
  • PhD in Cryptography, emphasis on efficient and provably secure protocols
  • Excellent record of peer-reviewed publications, in particular at IACR, ACM, and IEEE conferences
  • Experience in the implementation of cryptographic protocols in C or Rust
  • Good understanding of practical systems and their security
  • Responsibilities:
  • Identify functional and security requirements of cryptographic protocols for the DFINITY platform
  • Design provably secure, scalable and practical cryptographic protocols
  • Design security models, capturing requirements and adversarial models
  • Provide full implementation specification of cryptographic protocols
  • Collaborate with a team of Researchers and Developers across our global research centers
  • Participate in software architecture decisions, providing necessary information in a clear fashion
  • Collaborate with engineers to implement cryptographic protocols
  • Write high-quality research papers targeted at top conferences and journals
  • Represent the company in academic and industry conferences and share technical information with the public
  • Contact: Jan Camenisch - please submit via https://dfinity.org/careers/
    Last updated: 2020-08-19 posted on 2020-08-19

    Fully funded, multiple Ph.D. Student Openings
    University of South Florida, The Department of Computer Science and Engineering, Tampa, FL, USA.
    We have (fully funded) multiple PhD positions in the areas of applied cryptography beginning from Fall 2021 (August 2021) or Spring 2021 (January 2021) at University of South Florida (USF). USF is a Rank-1 Research University (rank 31 of CS departments at US public universities per according Academic Analytics on Scholarly Research Index) and offers a competitive salary with an excellent working environment, all within close proximity of high-tech industry and beautiful beaches of Sunny Florida. Tampa/Orlando area is a key part of the Florida High Technology Corridor and harbors major tech and research companies. The qualified candidate will have opportunities for research internship and joint-projects with lead-industrial companies. Topics include:

    Trustworthy and Scalable Blockchains
    • New cryptographic schemes for consensus and distributed transactions in Blockchains
    • Practical quantum-safe cryptographic deployments for Blockchains
    Secure and Reliable Internet of Things and Systems (IoT)
    • Lightweight cryptography for IoT
    • Efficient cryptography for vehicular and unmanned aerial systems
    • Efficient digital signatures
    Privacy-Enhancing Technologies
    • Searchable encryption, Oblivious RAM, and multi-party computation
    Trustworthy Machine Learning (TML)
    • Privacy-Preserving Machine Learning
    • Adversarial Machine Learning
    Requirements:
    • A BS degree in ECE/CS with a high-GPA
    • Very good programming skills (e.g., C, C++), familiarity with Linux
    • MS degree in ECE/CS/Math is a big plus. Publications in security and privacy are highly desirable
    Please send (by e-mail) to below contact information:
    • Transcripts
    • Curriculum vitae
    • Three reference letters (send by referees)
    • Research statement
    • GRE and TOEFL
    Contact: Dr. Attila A. Yavuz
    Email: attilaayavuz@usf.edu
    Webpage : http://www.csee.usf.edu/~attilaayavuz/

    Last updated: 2020-08-20 posted on 2020-08-15

    Post-Doc in Cryptography and Privacy Engineering
    Technical University of Darmstadt, Germany

    The Cryptography and Privacy Engineering Group (ENCRYPTO) @Department of Computer Science @Technical University of Darmstadt offers a full position for a Postdoctoral Researcher in Cryptography & Privacy Engineering, available immediately and for initially up to 2.5 years.

    Our mission is to demonstrate that privacy can be efficiently protected in real-world applications via cryptographic protocols.

    TU Darmstadt is a top research university for IT security, cryptography and computer science in Europe. The position is based in the City of Science Darmstadt, which is very international, livable and well-connected in the Rhine-Main area around Frankfurt. Initially, no knowledge of German is necessary and TU Darmstadt offers corresponding support.

    Job description

    As postdoc @ENCRYPTO, you conduct research, build prototype implementations, and publish and present the results at top venues. You are involved in project management, teaching, co-advise PhD students and supervise thesis students & student research assistants. The position is co-funded by the ERC Starting Grant “Privacy-preserving Services on the Internet” (PSOTI), where we build privacy-preserving services on the Internet, which includes designing protocols for privately processing data among untrusted service providers using secure multi-party computation and implementing a scalable framework.

    Your profile
    • Completed PhD degree (or equivalent) at a top university in IT security, computer science, applied mathematics, electrical engineering, or a similar area
    • Publications at top venues (CORE rank A*/A) for IT security/applied cryptography (e.g., S&P, CCS, NDSS, USENIX SEC, EUROCRYPT), ideally on cryptographic protocols and secure computation
    • Experience in software development, project management and supervising students
    • Self-motivated, reliable, creative, can work in a team, and want to do excellent research on challenging scientific problems with practical relevance
    • The working language at ENCRYPTO is English, so you must be able to discuss/write/present scientific results in English, whereas German is not required.
    Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
    Last updated: 2020-08-17 posted on 2020-08-13

    Assistant/Associate Professorship
    FACULTY POSITIONS AT DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, NATIONAL SUN YAT-SEN UNIVERSITY
    The Department of Computer Science and Engineering at National Sun Yat-sen University invites applications for tenure-track positions from February 2021 or August 2021. Applicants in areas of information security and artificial intelligence are sought. Applicants for assistant professorship must demonstrate strong research potential, in addition to good teaching ability. Applicants for associate professorship and professorship must have an exceptional record of research achievement. All successful candidates are expected to conduct both research and teaching activities. The department offers BS, MS and Ph. D. degrees in Computer Science and Engineering. The official language of teaching is Chinese, and English teaching is encouraged by the university. For more information, please visit our website: https://cse.nsysu.edu.tw/index.php?Lang=en Applications should include a curriculum vitae, recent publications, and reference letters from at least three people who can comment on the applicant's professional qualification. Other supporting material is welcome. Applications should be sent to: Faculty Recruiting Committee Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung, Taiwan 80424 Email:srkuang@cse.nsysu.edu.tw TEL:+886-7-5252000 ext. 4340 FAX:+886-7-5254301 The deadline for applications is October 31, 2020, and will continue to receive documents as appropriate until February 28, 2021.
    Contact: Email: srkuang@cse.nsysu.edu.tw TEL:+886-7-5252000 ext. 4340 FAX:+886-7-5254301
    Last updated: 2020-08-17 posted on 2020-08-10

    Assistant/Associate Professorship
    FACULTY POSITIONS AT DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, NATIONAL SUN YAT-SEN UNIVERSITY
    The Department of Computer Science and Engineering at National Sun Yat-sen University invites applications for tenure-track positions from February 2021 or August 2021. Applicants in areas of information security and artificial intelligence are sought. Applicants for assistant professorship must demonstrate strong research potential, in addition to good teaching ability. Applicants for associate professorship and professorship must have an exceptional record of research achievement. All successful candidates are expected to conduct both research and teaching activities. The department offers BS, MS and Ph. D. degrees in Computer Science and Engineering. The official language of teaching is Chinese, and English teaching is encouraged by the university. For more information, please visit our website: https://cse.nsysu.edu.tw/index.php?Lang=en Applications should include a curriculum vitae, recent publications, and reference letters from at least three people who can comment on the applicant's professional qualification. Other supporting material is welcome. Applications should be sent to: Faculty Recruiting Committee Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung, Taiwan 80424 Email:srkuang@cse.nsysu.edu.tw TEL:+886-7-5252000 ext. 4340 FAX:+886-7-5254301 The deadline for applications is October 31, 2020, and will continue to receive documents as appropriate until February 28, 2021.
    Contact: Email: srkuang@cse.nsysu.edu.tw TEL:+886-7-5252000 ext. 4340 FAX:+886-7-5254301
    Last updated: 2020-08-10 posted on 2020-08-10

    Post-Doc
    National Cheng Kung University, Taiwan
    Qualification: - Candidates should have a Ph.D. Degree (CS or EE), and strong background on • Artificial Intelligence/Machine Learning, Federated Learning, Edge/Fog Computation, Internet-of-Things, Cryptographic Protocols, Applied Cryptography - Strong publication record (major journals or top conference papers). - Good written and oral communication skills. - Work experience in relevant research projects is preferable. The initial appointment will be for 1 year but it can be extended depending on the availability of funding and the candidate's performance. These positions come with attractive salary and benefits. The travel support will also be provided to attend international conferences or to visit oversea universities. How to apply: Interested candidates kindly send their CV to Prof. Tony Q.S. Quek (email: tonyquek@sutd.edu.sg). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.
    Contact: Prof. Tony Q.S. Quek (email: tonyquek@sutd.edu.sg)
    Last updated: 2020-08-10 posted on 2020-08-07

    Postdoctoral Researcher
    TalTech, Centre for HW Security; Tallinn, Estonia
    The Centre for Hardware Security at TalTech (https://www.taltech.ee/en/) invites applications for a postdoctoral research position in post quantum cryptography. We are looking for motivated individuals with a strong background in circuit design, especially with experience in ASICs and/or hardware implementation of crypto cores. The end goal of the project is to validate a PQC algorithm in silicon.

    Requirements for postdoctoral research position: Having a PhD degree is mandatory for this position but candidates close to the completion of a PhD are also highly encouraged to apply. The ideal candidate should have a track record in the topic or in a closely related field, as well as in-depth knowledge of digital IC design tools (genus, innovus, design compiler, ICC, etc.)
    General conditions: Funding for this position is project-based and is already in place. Candidates with adequate backgrounds will be invited to interview over Skype. This position has an immediate start date (but a future start date can be arranged given the current situation w/ coronavirus). Salary is commensurate with experience.
    How to apply: Please submit your CV to Prof. Pagliarini by email (samuel.pagliarini@taltech.ee) using the subject ‘PQC postdoc position’.
    Contact: Samuel Pagliarini (samuel.pagliarini@taltech.ee)
    Last updated: 2020-08-04 posted on 2020-08-04

    PhD position in Information Security and Cryptography
    University of St. Gallen, Switzerland
    We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography. The position is within the group of Prof. Katerina Mitrokotsa (Chair of Cyber Security) who is doing research in cryptographic protocols that guarantee reliable authentication, privacy-preservation and verifiable delegation of computation. The topic of this project is focusing on investigating security and privacy issues for resource-constrained devices (e.g., sensors) that rely on external untrusted servers in order to perform computations. More precisely, the student shall be working on investigating efficient authentication and verifiable delegation of computation mechanisms that provide: i) provable security guarantees, and ii) rigorous privacy guarantees. The overall aim of the PhD position will be to design and evaluate provably secure cryptographic protocols for privacy-preserving authentication and verifiable delegation of computation protocols. The research shall also consider the case where multiple clients outsource jointly computations to untrusted cloud servers.
    Contact: Katerina Mitrokotsa
    Last updated: 2020-07-22 posted on 2020-07-19

    Embedded Cryptographic Software Engineer
    Secure-IC Pte Ltd
    To support our growth and in order to strengthen our team, we are looking for an Embedded Cryptographic Software Engineer (M/F). You will be based in Singapore and participate in the development of the Secure-IC portfolio of secure solutions. Missions consist in:
    • Ensuring the various phases of specifications for applications embedding cryptography
    • C and C++ programming and testing
    • Integration and validation on target embedded microprocessor. (knowledge of ARM processors is preferable)
    • Developing non-regression tests along with benchmarking tests
    • Bringing innovative ideas to improve our products, the quality of deliveries and development processes
    • Delivery of customers projects (consulting and training)
    Requirements:
    • Embedded software development engineer with 5 years minimum experience in an equivalent position
    • First experience in the field of automotive: CAN bus, automotive Ethernet
    • Master’s degree (or higher) in Computer Science, Mathematics or similar field
    • Proficiency in C/C++ language and assembly skills
    • Knowledge of ARM processors, development for security and safety
    • Proficiency in English
    • Knowledge of cryptography
    • Excellent communication skills
    • Ability to work in a team
    • Outstanding analytical and problem-solving skills
    Contact: Sylvain Guilley
    Last updated: 2020-07-18 posted on 2020-07-16

    PhD Student in Cryptography and Privacy Engineering
    TU Darmstadt, Germany

    The Cryptography and Privacy Engineering Group (ENCRYPTO) @Department of Computer Science @Technical University of Darmstadt offers a full position for a Doctoral Researcher (Research Assistant/PhD Student) in Cryptography & Privacy Engineering, available immediately and for up to 3 years with the possibility of extension.

    Our mission is to demonstrate that privacy can be efficiently protected in real-world applications via cryptographic protocols.

    TU Darmstadt is a top research university for IT security, cryptography and computer science in Europe. The position is based in the City of Science Darmstadt, which is very international, livable and well-connected in the Rhine-Main area around Frankfurt. Initially, no knowledge of German is necessary and TU Darmstadt offers corresponding support.

    Job description

    As doctoral researcher @ENCRYPTO, you conduct research, build prototype implementations, and publish and present the results at top venues. You will also participate in teaching and supervise thesis students and student assistants. The position is co-funded by the ERC Starting Grant “Privacy-preserving Services on the Internet” (PSOTI), where we build privacy-preserving services on the Internet, which includes designing protocols for privately processing data among untrusted service providers using secure multi-party computation and implementing a scalable framework.

    Your profile
    • Completed Master's degree (or equivalent) at a top university with excellent grades in IT security, computer science, applied mathematics, electrical engineering, or a similar area.
    • Extensive knowledge in applied cryptography/IT security and excellent software development skills.
    • Additional knowledge in cryptographic protocols (ideally secure computation) is a plus.
    • You are self-motivated, reliable, creative, can work independently, and want to do excellent research on challenging scientific problems with practical relevance.
    • The working language at ENCRYPTO is English, so you must be able to discuss/write/present scientific results in English, whereas German is not required.
    no application deadline
    Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
    Last updated: 2020-07-18 posted on 2020-07-14

    PostDoc and Ph.D.-level researchers in the field of "Vehicular Security & Privacy"
    Ulm University, Germany
    The Institute of Distributed Systems at Ulm University is searching for enthusiastic PostDoc and Ph.D.-level researchers who are expected to support and strengthen our research activities in the area of security and privacy in vehicular networking and automotive systems. You will contribute to ongoing projects, as well as new project proposals. As PostDoc, you will also be involved in project management and support the supervision of PhD candidates.

    The ideal candidate for the PostDoc position has a Ph.D. degree in computer science, or a closely related discipline, from an internationally-renowned university, a strong background in system security with focus on vehicular security and privacy, documented by high-quality publications, and a strong motivation to become part of our team.
    For Ph.D.-level researchers, we require a M.Sc. degree in computer science, or a closely related discipline, from an internationally-renowned university with a visible focus in system security.
    Proficient knowledge of written and spoken English is required for both positions. Conversational German skills are a substantial advantage.
    We are one of the leading research groups in vehicular security and privacy. Our group and university offer a unique environment for automotive-related research with excellent facilities and highly competitive salary. Automotive technologies are a priority area at Ulm University, and many research groups are active in fields like vehicle-driver interaction and automated driving. Being situated in Southern Germany between Stuttgart and Munich, we are located in the right heart of German car industry in one of the strongest economic regions in Europe. We have strong ties with companies like Daimler, Audi, BMW, and Bosch and many of those companies have research or development labs at our campus.

    For more information visit:
    https://www.uni-ulm.de/in/vs/inst/offene-stellen/postdoc-and-phd-level-researchers-vehicular-security-privacy/
    Contact: Prof. Dr. Frank Kargl (vs-jobs@uni-ulm.de)
    Last updated: 2020-07-18 posted on 2020-07-13

    Post-doc in cryptography
    University of Luxembourg

    The Applied Crypto Group of the University of Luxembourg has multiple post-doc positions, funded by the H2020 ERC programme.

    Possible topics of interests are:
    • fully homomorphic encryption and multilinear maps
    • public-key cryptanalysis
    • side channel attacks and countermeasures
    • white-box cryptography
    • blockchain applications

    Candidates must have a Ph.D. degree in cryptography or related field. The duration of the positions is 2.5 years. The post-docs will be members of the Security and Trust (SnT) research center from the University of Luxembourg (>200 researchers in all aspects of IT security). We offer a competitive salary (about 60,000 euro/year).

    Deadline for application: September 15th, 2020.

    Contact: Jean-Sebastien Coron: jean-sebastien.coron@uni.lu
    Last updated: 2020-07-18 posted on 2020-07-13

    Research Positions in Applied Cryptography, Provable and Hardware Security
    Tampere University

    The Network and Information Security Group is currently looking for several motivated and talented researchers at all levels (PhD, PostDoc) to contribute to research projects related to applied cryptography, hardware security, security and privacy. The successful candidates will primarily be working on the following topics (but not limited to):

    • Differential Privacy;
    • Functional Encryption;
    • Privacy-Preserving Analytics;
    • Privacy-Preserving Machine Learning;
    • Searchable Encryption and data structures enabling efficient search operations on encrypted data;
    • Processing of encrypted data in outsourced and untrusted environments;
    • Applying encrypted search techniques to Trusted Execution Environments;
    • Revocable Attribute-Based Encryption schemes and their application to cloud services;
    • IoT Security and Applications to Smart Cities;
    • Side Channel Analysis (SCA);
    • Machine Learning based SCA;
    • Embedded security (e.g. ARM-based SoC);
    • TEE security and development (e.g. TrustZone, Trusted Applications, etc.).

    Programming skills is a must.

    The positions are principa research-focused. Activities include:

    • Conducting both theoretical and applied research;
    • Design of secure and/or privacy-preserving protocols;
    • Software development and validation;
    • Reading and writing scientific articles;
    • Presentation of the research results at seminars and conferences in Finland and abroad;
    • Acquiring (or assisting in acquiring) further funding.

    Successful candidates will be working in EU and industrial research projects. Topics will be spanning from the theoretical foundations of cryptography to the design and implementation of provable secure communication protocols with direct applications to smart cities, cloud computing and eHealth.

    To apply please send the following:

    • Your latest CV;
    • A research statement (max 2 pages long);
    • The three best papers you have co-authored.
    Contact:
    • Billy Bob Brumley (Hardware Security and SCA): billy.brumley@tuni.fi
    • Antonis Michalas (Provable Security and Privacy): antonios.michalas@tuni.fi

    Last updated: 2020-07-13 posted on 2020-07-13

    PhD position in the area of database privacy
    Universitat Politècnica de Catalunya, Department of Network Engineering (Spain, Barcelona)

    The SISCOM Research Group (https://siscom.upc.edu/en) within the Department of Network Engineering (https://entel.upc.edu/en) at the Universitat Politècnica de Catalunya (UPC) (https://www.upc.edu/en/) welcomes and encourages applications for a PhD position in the area of database privacy to start in fall 2020.

    DESCRIPTION OF POSITION

    The PhD position has a duration of 3 years and is made available through the research project “Big Data Anonymization” funded by “la Caixa”, a top Spanish financial institution. The main objectives of this project are to pioneer advance beyond state of the art on the design of anonymization algorithms and to develop a comprehensive understanding of privacy in a context of big data. The ultimate aim is to contribute to making big data compatible with the right to privacy. For the scholarship, we are looking for a candidate who is qualified to undertake supervised independent research in the area of database anonymization, in particular in the protection of dynamic data under popular syntactic models (e.g., l-diversity, t-closeness) and differential privacy.

    QUALIFICATIONS

    We seek a highly motivated PhD student

    • who has completed or is about to complete by summer 2020 a Master's degree in mathematics, computer science, or telecom engineering;
    • with excellent academic record;
    • good analytical skills;
    • strong oral and written communication skills.

    APPLICATION

    Candidates should send to Prof. Jordi Forné (jordi.forne@upc.edu) the following information:

    • their CV (including list of publications, if any);
    • their academic record (with marks);
    • a certificate of English (TOEFL, Cambridge or similar).

    DEADLINE

    September 15, 2020.

    Contact: Prof. Jordi Forné
    Last updated: 2020-07-10 posted on 2020-07-10

    Ph.D Student
    Max Planck Institute for Security and Privacy

    The Max Planck Institute (MPI) for Security and Privacy is looking for motivated students to apply for a Ph.D. program. The research will be conducted on the theory of cryptography and computer security and more specifically in one of the following topics:

  • Homomorphic encryption and code obfuscation
  • Zero-knowledge proofs and succinct arguments
  • Cryptocurrencies and blockchains
  • Post-quantum and lattice-based cryptography
  • Multi-party computation
  • Other research proposals by the candidate will also be considered, depending on the common interests.

    The ideal candidate shall satisfy the following requirements:

  • Have a Master degree or equivalent (or is close to complete one) in computer science, mathematics, or related fields
  • Is fluent in English and has excellent communication and writing skills
  • Is familiar with probability theory and mathematical proofs. Strong background in cryptography, linear algebra, number theory, or complexity theory is a plus
  • Most importantly, is passionate about learning new concepts and determined to solve challenging questions in the theory of cryptography and computer security
  • Publications (or manuscripts under submission) in related areas are greatly valued but are not mandatory

    The MPI for Security and Privacy is co-located with the Ruhr University of Bochum (Germany) and offers a vibrant atmosphere for research that spans across all aspects of computer security. The Ph.D. program is entirely in English and the knowledge of German is not required for a successful career at MPI.

    The position is fully funded (100%) and paid according to the E-13 pay category. The starting date if flexible but ideally somewhere in fall 2020. To apply for the position, send an email to Giulio Malavolta (address below) including the following documents:

  • A curriculum vitae
  • 2-3 recommendation letters from previous advisors or employers
  • A brief cover letter (half page at most) describing your research interests

    If you have any question, don’t hesitate to get in touch.

  • Contact: Giulio Malavolta (giulio.malavolta@berkeley.edu)
    Last updated: 2020-06-30 posted on 2020-06-29

    Senior Security Researcher (m/f/d)
    Huawei Technologies Duesseldorf Gmbh (Munich Research Center, Germany)
    Your responsibilities:

    • Research the security properties of 3GPP radio access network technologies including 4G and 5G (NR), identifying possible weaknesses / enhancements • Research mitigations of identified security/privacy issues. • Collaborate with EU universities on 5G security research • Help shape the industry with new innovation via standardization bodies e.g. 3GPP, ETSI, etc. • Work with the world leading researchers on the most advanced technologies including AI, IoT under the scope of 5G security.

    Our requirements:

    • PhD in computer science or advanced PhD with focus on telecommunication security (preferably radio access technologies, the 3GPP air-interface protocol stack). • Several years of experience in network security research, specifically in the domains of protocol analysis, vulnerability detection, protocol correctness, protocol verification, etc. • Several years of experience researching and developing tools/demos/PoCs which demonstrate the impact of such security issues (vulnerabilities) on the network. • Several years of experience researching and implementing mitigation solutions (PoC/Demo level) for protocol vulnerabilities including algorithms development, performance/cost and impact analysis of algorithms implementation. • Openness to work in a diversified work environment with unique work cultures. • Experience in presenting technical information to both technical and non-technical audience. • Fluent in English (written and spoken).

    Must be eligible to work in the EU to be considered for this position.

    Please apply here: https://apply.workable.com/j/64698ECA7B

    By applying to this position, you agree with our PRIVACY STATEMENT. You can read in full our privacy policy via the link below. https://career.huawei.com/reccampportal/portal5/grcprivacy.html

    Contact: Viet-Duc Benedikt Lai (email: duc.lai.ext[at]huawei.com)
    Last updated: 2020-07-03 posted on 2020-06-29

    Research Assistant Professor in Additive Manufacturing with Emphasis on Cybersecurity
    University of North Texas; Denton, Texas, USA
    Department Summary: University of North Texas (UNT) is rapidly building its Center for Agile and Adaptive Manufacturing (CAAAM), a State of Texas funded multi-million-dollar initiative with a multi-disciplinary focus on further advancing the science and technology of additive manufacturing (AM). CAAAM involves a multi-disciplinary team of researchers from materials science, mechanical engineering, manufacturing, data science, cybersecurity and logistics & supply chain, committed to collaborating on large research projects with an emphasis on additive manufacturing.

    Position Summary: CAAAM is seeking a Research Assistant Professor to collaborate with a team of faculty on cybersecurity issues related to AM. This is a non-tenure track terminal position with a primary association with CAAAM and secondary association with an appropriate academic department. The selected candidate is expected to focus on cybersecurity in the context of advanced manufacturing systems in general and additive manufacturing systems more specifically. A successful candidate will work closely with faculty in the Computer Science and Engineering department as well as other faculty and researchers in CAAAM. The candidate is expected to conduct research on securing advanced manufacturing systems and develop fundamental and innovative approaches to the design and validation of secure, trustworthy and resilient cyber systems for industrial automation. The candidate is also expected to develop educational material for training workforce to operate advanced manufacturing systems as well as mentor graduate students and post-doctoral researchers working in CAAAM.

    Minimum qualifications include an earned doctorate in Computer Engineering, Computer Science or a related discipline with a research focus on cybersecurity in general but more specifically, cybersecurity related to cyber-physical systems, security in edge devices, hardware/systems security, security of IoT’s and Industrial IoT’s, design and validation of secure and resilient cyber-physical systems. The research background should be evident from high quality publications.

    Contact: Krishna Kavi (Krishna.Kavi@unt.edu), Mary Chandler (Mary.Chandler@unt.edu)
    Last updated: 2020-06-26 posted on 2020-06-25

    Research Scientist (Brussels, Belgium)
    OneSpan Brussels
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Research Scientist (Cambridge)
    OneSpan
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Lecturer in Cybersecurity
    New Jersey Institute of Technology
    The Department of Computer Science at New Jersey Institute of Technology (NJIT) seeks candidates to fill a University Lecturer/Senior University Lecturer position. Successful candidates must have an MS in Computer Science or a related computing area and will have demonstrated an expert grasp of knowledge of the Cybersecurity field at all levels, either through a demonstrated record of teaching excellence, or through industrial experience.

    Candidates are expected to mainly teach courses under the umbrella of Cybersecurity in support of our graduate and undergraduate programs. The successful candidate will also be involved in creating course content and materials with a focus on experiential and project-based learning.

    Interested applicants should submit their CV and the names of at least two references by applying as soon as possible at https://njit.csod.com/ats/careersite/JobDetails.aspx?site=1&id=1961. Applications will be reviewed on a rolling basis until the position is filled.

    Work environment and location:
    The Computer Science department, part of the Ying Wu College of Computing Sciences, is the largest at NJIT, comprising one tenth of the student population. It is also the largest computer science department among all research universities in the New York metropolitan area.​ Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.
    Contact: Reza Curtmola
    Last updated: 2020-06-23 posted on 2020-06-22

    Fully Funded PhD Position in Privacy-Preserving & Robust Machine Learning
    University of Lübeck, Institute of IT-Security, Privacy & Security Group, Lübeck, Germany
    The Privacy & Security group at University of Luebeck seeks to hire doctoral students for research in the one or more of the following areas:
    • enhancing or attacking training-data-privacy in machine learning algorithms
    • ensuring or attacking the robustness of machine learning algorithms
    • privacy-preserving health applications (including epidemiological applications)
    • privacy-preserving Smart Grid, Smart City applications
    • anonymous communication
    The ideal candidate is enthusiastic and has a strong background and interest in one or more of the following areas:
    • information security, differential privacy, or cryptography
    • mathematical statistics and probability theory
    • machine learning
    Candidates with a strong theoretical background in related areas are also encouraged to apply. Formal requirements for doctoral students are a master's or equivalent degree. The doctoral student will be a paid employee of University of Lübeck according to standard collective labour agreement regulations (TV-L E13, 100%), which compared to the local cost of living provides an attractive salary and attractive working conditions.

    Applications should include a curriculum vitae, a brief description of research interests, transcripts of grades, 2-3 letters of recommendation from teachers or employers, and, if possible, the Master's or Bachelor's thesis and publications.
    • Application deadline: 30 August 2020 (later applications might also be considered)
    • Starting date: 1 October 2020 (negotiable)
    About our group: The Privacy & Security group at the Institute for IT-security at the University of Lübeck works on researching privacy-preserving and robust methods to perform computations on large datasets such that the system work as expected and privacy of individuals is protected, including privacy-preserving machine learning, and anonymous communication.

    Contact: Prof. Dr. Esfandiar Mohammadi
    Privacy & Security group
    University of Lübeck
    https://mohammadi.eu

    Last updated: 2020-06-21 posted on 2020-06-21

    Two PhD positions in Privacy-preserving biometric authentication
    Chalmers University of Technology, Sweden
    The PhD students will join Prof. Mitrokotsa's group focusing on security and cryptography, working in the area of privacy-preserving biometric authentication and within the Marie Curie ITN project: "TRESPASS-ETN: Training in Secure and Privacy-preserving biometrics". Privacy-preserving biometric authentication focuses on guaranteeing accurate biometric authentication, while at the same time providing strong privacy guarantees (e.g., avoid tracking, profiling of users and leakage of sensitive information). The focus of one of the PhD positions would be to examine how to guarantee privacy-preservation in biometric authentication systems by employing advanced cryptographic methods such as secure multiparty computation (SMPC) primitives (e.g., homomorphic encryption) and verifiable computation (when biometric authentication is applied in a distributed setting). The second PhD position will focus on employing differentially private mechanisms in the biometric authentication process. The goal is to achieve high accuracy in the authentication process, while at the same time avoid any leakage of information. The PhD student will be supervised by Prof. Katerina Mitrokotsa in the area of information security and cryptography.
    Contact: Prof. Katerina Mitrokotsa
    Last updated: 2020-06-21 posted on 2020-06-18

    Ph.D. Student
    Grenoble INP LCIS
    Securing components for the IoT market, as well as critical cyberphysical infrastructures, requires analyzing their vulnerabilities and defining hardware and software countermeasures at the fair cost. The increasing complexity of the processors and the applications they run means that the software fault models (such as instruction skips, or instruction replacement) usually used to analyze the vulnerability of their code are no longer sufficient to express the diversity of faulty behaviors in modern architectures [1]. Indeed, architecture designers have progressively added many complex hardware blocks (such as pipeline, cache memory, branch prediction, or speculative execution) to processors in order to optimize program execution. At the same time, fault injection techniques are constantly progressing (e.g., localized ElectroMagnetic or laser attacks, glitch injection attacks) allowing today higher-order injections (both multi-temporal and multi-spatial). Faced with these attacks, designers must implement countermeasures to detect or mask the effects of injected faults. These countermeasures can be implemented at the hardware level (e.g., duplication of elements, error correcting codes, isolation mechanisms) or at the software level (e.g., duplication of instructions or algorithms, insertion of security tests, signature verification). The design and validation of these countermeasures requires a realistic representation of the effects of faulty attacks (fault model) at the hardware and/or software level. The difficulties encountered are then: (1) the relevance of the fault models: do these fault models correctly represent the effects that an attacker can generate on a target processor? (2) the adequacy of countermeasures: do the countermeasures effectively protect the system, are they oversized and therefore too costly? (3) the link between software and hardware countermeasures: how to combine software and hardware countermeasures efficiently and at the fair cost, how to link the different levels for fault modeling? The CLAM project and the thesis that we propose aim to answer these questions by associating 3 French laboratories with complementary specialties.
    Contact: vincent.beroulle(at)lcis.grenoble-inp.fr; paolo.maistri(at)univ-grenoble-alpes.fr
    Last updated: 2020-06-17 posted on 2020-06-15

    Post-Doc
    Carnegie Mellon University
    Applications are invited for a post-doc position at Carnegie Mellon University. The specific topic of the research is flexible and will be determined based on the common interests. Samples areas include secure multi-party computation, zero-knowledge proofs, post-quantum/lattice-based cryptography, and non-malleable cryptography. Must have a strong track record of publications in top crypto conferences.
    Contact: Vipul Goyal (vipul at cmu.edu)
    Last updated: 2020-05-30 posted on 2020-05-28

    Post-Doctoral Researcher in Symmetric Cryptography
    CryptoLux Group, University of Luxembourg

    The CryptoLux group of the University of Luxembourg has a vacancy for a post-doctoral researcher in the area of symmetric cryptography. The successful candidate will contribute to a research project entitled "Analysis and Protection of Lightweight Cryptographic Algorithms (APLICA)", which is funded by the Luxembourgish Fonds National de la Recherche and the German Research Foundation. Starting in early 2021, APLICA will run over a period of 3 years as a joint research project between the CryptoLux group and the Workgroup for Symmetric Cryptography of Ruhr-University Bochum. The mission of the APLICA project is to develop new cryptanalytic techniques for lightweight authenticated encryption algorithms and hash functions, and to design and implement new countermeasures against side-channel attacks that are suitable for constrained devices.

    Candidates must have a Ph.D. degree in symmetric cryptography or a closely related field. Preference will be given to candidates with a strong publication record that includes at least one paper at an IACR-sponsored conference/workshop or one of the top-4 security conferences. Experience in software development for embedded systems or mounting side-channel attacks is a plus. Candidates with an interest to conduct research in one of the following areas are particularly encouraged to apply:

    • Cryptanalysis of authenticated encryption algorithms or hash functions
    • Leakage resilience or leakage reduction by design (e.g. modes of operation)
    • Security evaluation of leakage-resilient primitives or constructions

    The position is available from Jan. 2021 on basis of a fixed-term contract for 3 years, which includes a probation period of 6 months. The University of Luxembourg offers excellent working conditions and a highly competitive salary. Interested candidates are invited to send their application by email to Alex Biryukov before Sept. 15, 2020. The application material should contain a cover letter explaining the candidate's research interests, a detailed CV (incl. photo), a list of publications, scans of diploma certificates, and the names and contact details of 3 references.

    Contact: Prof. Alex Biryukov (alex.biryukov@uni.lu)
    Last updated: 2020-08-12 posted on 2020-05-27

    Post-doc (2 posts, up to 4 years)
    University of Warwick, UK

    We have two post-docs posts (Research Fellow and Senior Research Fellow, each for up to 4 years) available in the Department of Computer Science, University of Warwick, as part of a 4-year EPSRC project on "End to End Authentication of Caller ID in Heterogeneous Telephony Systems", working with Professor Feng Hao (PI) and Dr Adrian Von Mühlenen (co-I). The primary aim of this project is to improve security in telecommunication systems, in particular, providing reliable authentication of the caller ID without requiring any PKI, and protecting end-to-end privacy of the call contents.

    The candidates will join a dynamic and growing team of security researchers in the Department of Computer Science, University of Warwick. Warwick Computer Science is ranked 1st in research output, 2nd in research impact, and 2nd overall among all computer science departments in the UK based on REF 2014. The candidates will have the flexibility to collaborate with other members in the security team on a wider range of topics, such as key exchange, e-voting, e-auction, PUF, cryptocurrency, mobile security, IoT, web security and e-payment security. Our work has been largely driven by tackling real-world security problems. Candidates who have a strong interest in working on real-world problems for practical impacts are encouraged to apply. Those who have industrial experiences are also most welcome to apply.

    1. Research fellow: https://tinyurl.com/y8spmtb5
    2. Senior research fellow (equivalent grade as Assistant Professor): https://tinyurl.com/ybjyqzh4

    Application deadline: 17 June, 2020. After the deadline, the posts will be vacant until they are filled. Interested candidates are encouraged to contact Prof Feng Hao with an expression of interest as early as possible.

    Contact: Professor Feng Hao (feng.hao@warwick.ac.uk)
    Last updated: 2020-05-25 posted on 2020-05-22

    Junior Research Group Leader
    Max Planck Institute for Security and Privacy in Bochum, Germany

    This program offers young scientists the opportunity to develop their independent research program. We welcome applicants whose work covers aspects of security and privacy irrespective of field. The vision of MPI-SP is to grow into an interdisciplinary institute that brings together computer scientists with academics working at the intersection with social science, economics, law, humanities, and more. Areas of interest include, but are not limited to, foundations, cryptography, software and hardware security, AI safety and adversarial machine learning, as well as interdisciplinary aspects of security and privacy.

    The positions are funded for 5 years. We offer a competitive salary, base funding, as well as administrative and technical support. The positions come with no teaching obligations, although teaching opportunities exist. As an employee in Germany you will enjoy great working conditions, including 30 paid vacation days per year and considerable family support.

    Applicants must have completed a doctoral degree in any field or area broadly relevant to security and privacy and must have demonstrated outstanding research vision, and potential to successfully lead a research group. Successful candidates are expected to build a highly visible research agenda, to mentor Ph.D. students, and to participate in collaborative projects.

    We maintain an open, international, and diverse work environment and seek applications from outstanding researchers regardless of national origin. Our working language is English. We encourage applications from women, persons with severe disabilities, or members of any other underrepresented group.

    Please apply at https://apply.cis.mpg.de/register/mpispjrgl To receive full consideration, applications should be received by 14 June 2020. Reviewing of applications will start immediately and will continue until the positions are filled. The expected starting date for the positions is Fall 2020, open to negotiations.

    Contact: applications-jrgl@mpi-sp.org
    Last updated: 2020-06-02 posted on 2020-05-18

    Post-Doctoral Researcher in Computational Diversity in Cybersecurity (Job ID: 604850)
    Northern Arizona University, School of Informatics, Computing, and Cyber Systems (SICCS); Flagstaff
    The School of Informatics, Computing & Cyber Systems at Northern Arizona University is seeking a postdoctoral scientist in computational diversity for cybersecurity to work on a US Air Force Research Laboratory funded project. The successful candidates will work closely with the Principal Investigator and collaborators in the development, analysis, and implementation of innovative algorithms, architectures, and implementations. Exceptional candidates from all relevant areas will be considered, but specific topics of research interest include computer architecture and microarchitecture, hardware-based security and cryptographic systems. While the project is open to international candidates, there may be certain limitations. The start date is negotiable, but should not be later than October 1, 2020.

    Duties include:
    1. Perform research in the broad area of hardware-centric cybersecurity
    2. Publish papers and present research results at conferences and symposia
    3. Write grant and contract proposals
    4. Supervise and coordinate the efforts of PhD, MS, and undergraduate students on a day-to-day basis
    5. Assist in preparing progress reports to funding agencies
    The ideal candidate should have:
    1. Earned doctoral (Ph.D. or Sc.D.) degree in Computer Science, Electrical Engineering or closely related area by the start date.
    2. Demonstrated expertise in one or more of the following areas: computer architecture and microarchitecture, hardware-based security and cryptographic systems
    3. Demonstrated academic excellence through scholarly publications, i.e. at least one publication in top-ranked conferences/journals
    4. Excellent communication skills; experience in effectively working with people from a variety of culturally diverse backgrounds; experience in mentoring undergraduate and graduate students
    Contact: Dr. Paul Flikkema (paul.flikkema@nau.edu)
    Last updated: 2020-05-17 posted on 2020-05-16

    Post-Doc
    University of Warsaw

    We are looking for talented and motivated Post-Docs to work on the ERC AdG project PROCONTRA: Smart-Contract Protocols: Theory for Applications. The project is about theoretical and applied aspects of blockchain and smart contracts.

    The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.

    We offer competitive salary and a budget for conference travel and research visit.

    The project is expected to start on Sep 1, 2020. There is no specific deadline for this call, but we will start looking at the applications from Jun 15th, 2020. For the application instructions go to the following page: www.crypto.edu.pl/positions.

    Contact: Stefan Dziembowski
    Last updated: 2020-05-20 posted on 2020-05-16

    Cryptographic Researcher/engineer
    Beijing Genomics Institute, Shenzhen, China
    Responsibilities

    1. Collaborate with other biological data scientists and responsible for health data (eg. genetic data) security and privacy protection research and development. Propose new solutions based on cutting-edge security technology to meet the needs of healthcare field.

    2. Follow up research on the application of cutting-edge cryptography technology, cryptographic algorithm implementation and performance optimization, such as lattice cryptography, homomorphic encryption, and zero-knowledge proof in the field of blockchain or data storage.

    Qualifications

    1. Master degree or above (PhD prefered) in cryptography, computer science, mathematics or related fields

    2. Excellent in security fundamentals, such as digest algorithm, symmetric encryption, asymmetric encryption and signature algorithm principles and their implementation

    3. Familiar with cutting-edge cryptography technologies, including secure multi-party computing, homomorphic encryption, etc .

    4. Interested in healthcare big data management and privacy protection

    Contact: Dr. Yuantong Ding, dingyuantong(at)genomics.cn
    Last updated: 2020-05-08 posted on 2020-05-07

    Protocol Engineer
    Status
    Status is building a communications tool with extreme security, coercion resistance and privacy in mind. As a protocol engineer in the Vac team, you will help us research and develop new and existing technologies in secure messaging.
    Contact: Ceri Power CA29 FB53 97E3 0232 106A  2DE6 9F07 1B10 A0D1 12EB
    Last updated: 2020-04-30 posted on 2020-04-30

    Ph.D. Student (3 years)
    XLIM, University of Limoges (France)

    This Ph.D. thesis is offered as part of the ANR-funded 4-year research project MobiS5. The goal of MobiS5 is to provide a cryptographic toolbox for the emerging 5G technologies. More information can be found at: https://mobis5.limos.fr/index.html.


    This 3-year Ph.D. thesis will focus on the two following aspects of 5G security:

    • 5G Core Network security
    • Delegation in the context of 5G networks
    We are looking for motivated and hard-working students with a strong background in cryptography, with a degree in Mathematics, Applied Mathematics, or Computer Science (with an affinity for mathematics). Understanding of basic cryptographic primitives and protocols is a requirement. You must also have a good level of spoken and written English. A basic working knowledge of provable security and/or formal verification are a strong plus. Spoken and written French are also a plus. Interested? Here is how to apply ! https://mobis5.limos.fr/jobs.html
    Contact: Cristina Onete (maria-cristina.onete@unilim.fr) or Olivier Blazy
    Last updated: 2020-04-22 posted on 2020-04-22

    Phd
    CEA-LETI, Grenoble, France
    Side-channel attacks consist in measuring the physical activity emitted by a circuit (processor, microcontroller or cryptographic accelerator) to extract secrets. The consumption of the circuit or the electromagnetic emanation are the most commonly exploited signals. Due to the development of the Internet of Things (IoT), more and more systems are exposed to these attacks. Unfortunately, integrating countermeasures (software or hardware) against such attacks is extremely expensive. Therefore, it is essential to have an accurate idea of side-channel leakages as early as possible in the design phases. On the one hand to target countermeasures on critical areas and on the other hand to have a realistic view of leakages in order to automate the application of countermeasures. The thesis topic is the exploration of electromagnetic leakage models and different ways of interpreting them. The general objective of this work is to model the leakages of a processor based on its state at different abstraction level: Register Transfer Level (RTL), microarchitecture or even instruction set simulator (ISS). The LSOSP laboratory of CEA-LETI where the thesis will take place has a strong experience on physical measurements and has already performed preliminary research on the subject. Therefore, the candidate will start from these results and will perform physical measurements and manipulate different logic models to create a precise leakage model of the targeted processor.
    Contact: Vincent Dimper
    Last updated: 2020-04-21 posted on 2020-04-16

    Phd
    CEA-LETI Grenoble, France
    Industrial systems are often used to monitor and control a physical process such as energy production and distribution, water cleaning or transport systems. They are often simply called Supervisory Control And Data Acquisition (SCADA) systems. Due to their interaction withthe real world, the safety of these systems is critical and any incident can potentially harm humans and the environment. One of the main research axis in cybersecurity of industrial systems deals with combination of safety and security properties. Safety relates to applicative properties of the system (e.g. chemical properties for a chemical factory); while security properties take into account how an intruder can harm the system. As show in [3], combining safety and security is a challenging topic as these properties can be either dependent, strengthening, antagonist or independent. currently no tool is able to handle both aspects at the same time. In this context, we propose a Ph.D thesis revolving around modeling of industrial systems taking into account both safety properties of the physical process and security properties. Besides the definition of an accurate, yet automatically analyzable modeling framework/language, many aspects can be part of the subject. For instance, programmable automata (PLC) configuration files could be generated from this model in order to only deploy programs validated beforehand. PLC vulnerabilities could be studied (firmware reverse engineering, protocol fuzzing) in order to test the technical feasibility of found attacks. Finally, in a certification context, security analyzes on the model could include requirements from standards such as IEC 62443 [5] to help evaluation process
    Contact: Maxime Puys
    Last updated: 2020-04-27 posted on 2020-04-16

    Phd
    CEA-LETI (Grenoble, France)
    As a consequence of the rapid development of the Internet of Things (IoT), where devices are massively interconnected, security breaches are discovered daily. The growing threat of physical attacks, on which connected objects are widely exposed, forces chipmakers to increase the security of their products. True Random Number Generators are the cornerstone of device security; they are required for running cryptographic algorithms and fully integrated into encryption engines. The security level of the system directly depends on the randomness of the bits generated. Furthermore, IoT chips are facing harsh constraints in terms of price and power consumption. In order to be integrated into these chips, TRNG must offer an efficient tradeoff between cost and security. In this perspective, TRNGs based on already integrated components, such as RRAM memories, is a promising lead.
    Contact: Florian Pebay-Peyroula
    Last updated: 2020-04-27 posted on 2020-04-16

    PhD
    CEA-LETI
    This study is focused on the security of embedded systems and in particular asymmetric cryptography against horizontal attacks and Template attacks. Recent studies, applied to symmetric cryptography, have made it possible to build new techniques for side channel attacks. By improving the effectiveness of Template attacks, these new attacks make it easier to bypass masking countermeasures. It seems appropriate to study these new tools in depth in the context of Template and horizontal attacks against asymmetric cryptography, especially for elliptic curves. The use of machine learning in the context of side channel attacks. The main purpose of the thesis is to evaluate the security properties of ECCs against the most advanced Template and Horizontal attacks that use machine learning. Depending on the results obtained, new countermeasures will have to be constructed in order to address any new weaknesses.
    Contact: Antoine Loiseau
    Last updated: 2020-04-27 posted on 2020-04-16