International Association for Cryptologic Research

International Association
for Cryptologic Research

Open Positions in Cryptology

Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


Postdoctoral Researcher
TalTech, Centre for HW Security; Tallinn, Estonia
The Centre for Hardware Security at TalTech (https://www.taltech.ee/en/) invites applications for a postdoctoral research position in post quantum cryptography. We are looking for motivated individuals with a strong background in circuit design, especially with experience in ASICs and/or hardware implementation of crypto cores. The end goal of the project is to validate a PQC algorithm in silicon.

Requirements for postdoctoral research position: Having a PhD degree is mandatory for this position but candidates close to the completion of a PhD are also highly encouraged to apply. The ideal candidate should have a track record in the topic or in a closely related field, as well as in-depth knowledge of digital IC design tools (genus, innovus, design compiler, ICC, etc.)
General conditions: Funding for this position is project-based and is already in place. Candidates with adequate backgrounds will be invited to interview over Skype. This position has an immediate start date (but a future start date can be arranged given the current situation w/ coronavirus). Salary is commensurate with experience.
How to apply: Please submit your CV to Prof. Pagliarini by email (samuel.pagliarini@taltech.ee) using the subject ‘PQC postdoc position’.
Contact: Samuel Pagliarini (samuel.pagliarini@taltech.ee)
Last updated: 2020-08-04 posted on 2020-08-04

Postdoc/cryptography researcher
ETH Zurich OR Crypto Quantique, London
Thanks to a collaborative project between The Applied Cryptography Group at ETH Zurich and the London-based startup Crypto Quantique, there are openings for Cryptography researchers with both institutions. The project is funded by Eureka Eurostars.

The Project Crypto Quantique’s role is to develop a novel Key Provisioning Architecture (KPA) for the generation, distribution, and certification of cryptographic keys used by lnternet of Things (IoT) devices and cloud services. The aim is to build a quantum-driven security platform by combining the KPA with cryptographic keys generated through quantum tunnelling behaviour in semiconductor devices. The Applied Cryptography Group’s main role in the project is to lead an investigation of how to transition Crypto Quantique’s KPA to use post-quantum cryptographic algorithms in the KPA protocols. They will also assist Crypto Quantique in conducting formal security analysis of the constituent protocols currently used in the KPA, and in developing and analysing new cryptographic protocols where necessary.

How to Apply? We look forward to receiving your online application with the following documents: CV; list of scientific publications; pointers to relevant software development projects, if applicable; contact details for 3 referees.

If you would like to apply for a role at Crypto Quantique, please use this link where the CQ team look forward to reviewing your CV: https://bit.ly/2Ot5OSc

If you would like to apply for the role with ETH Zurich please apply online at: https://bit.ly/3j88Vgs

Contact: Kenny Paterson (kenny.paterson@inf.ethz.ch) or Christian Saade (csaade@cryptoquantique.com)
Last updated: 2020-07-27 posted on 2020-07-24

Doctoral researcher (PhD) in Applied Cryptography
CryptoLux Group, University of Luxembourg
The University of Luxembourg invites applications from M.Sc. holders in the general area of applied cryptography. Cryptolux.org is a team of cryptographers and security researchers interested in applied cryptography, cryptanalysis, privacy, network security, cryptographic blockchains and is led by Prof. Alex Biryukov. We are affiliated to the Department of Computer Science (DCS) and to the interdisciplinary Security and Trust center (SnT).

Area (potential topics of the thesis)

  • Cryptanalysis and design of cryptographic primitives
  • Lightweight block ciphers, hash functions, authenticated encryption schemes
  • Privacy Enhancing Technology (Tor-like networks, privacy for cryptocurrencies, blockchains)
  • Blockchain Cryptography
  • Design of proofs of work, resource-hard functions, commitment schemes
  • Side-channel attacks and countermeasures
  • White-box cryptography
The University offers a Ph.D. study program with an Initial contract of 36 months, with a further possible 1-year extension if required. The University offers competitive salaries and is an equal opportunity employer. You will work in an exciting international environment and will have a chance to participate in the development of a newly created research center.

Starting date 15-Oct-2020 or later upon agreement. Early submission is encouraged; applications will be processed upon receipt.
Contact: Prof. Alex Biryukov
Last updated: 2020-07-23 posted on 2020-07-20

Research Associate (Postdoc) in Blockchain, Financial Crypto, Cybersecurity and Privacy
CryptoLux Group, University of Luxembourg
The University of Luxembourg, Computer Science department and Centre for Security, Reliability and Trust (SnT) invite applications from Ph.D. holders in the general area of Applied Cryptography. SnT is carrying out interdisciplinary research in secure, reliable and trustworthy ICT. CryptoLux/SnT team is currently doing research in cryptography, distributed ledgers and privacy.

Research area The successful candidate will join the CryptoLux research team led by Prof. Alex Biryukov. He or she will contribute to a research project entitled "Security, Scalability, and Privacy in Blockchain Applications and Smart Contracts (FINCRYPT)", which is funded by the Luxembourg National Research Fund (FNR). Candidates with proven research track record in one or more of the following areas are particularly encouraged to apply:

Applied Cryptography (SK or PK, PoWs, efficient ZK proofs, etc.)
Crypto-currencies, smart-contracts, financial cryptography, blockchains
Privacy enhancing technologies
Distributed consensus protocols

Your Profile

  • A Ph.D. degree in Computer Science, Applied Mathematics or a related field
  • Competitive research record in cryptography or information security (at least one paper in top 10 IT security/crypto conferences)
  • Strong mathematical and algorithmic CS background, interest in economics/finance - a plus
  • Good skills in programming and scripting languages
  • Fluent written and verbal communication skills in English are mandatory
Starting date 1-Oct-2020 or later upon agreement. Due to Covid, EU citizens or residents will be given preference. Position is for 12 month with possible extension.

Contact: Prof. Alex Biryukov
Last updated: 2020-07-23 posted on 2020-07-20

Post-Doc in Information Security and Cryptography
University of St. Gallen, Switzerland
We are looking for an excellent, motivated, post-doctoral researcher to work in the area of information security and cryptography. The post-doctoral researcher will join Katerina Mitrokotsa's research group (Chair of Cyber Security), working in the area of information and communication security with a focus on authentication protocols, verifiable delegation of computation, and secure multi-party computation. The position is available for one plus one year after a successful review evaluation.
Contact: Katerina Mitrokotsa
Last updated: 2020-07-22 posted on 2020-07-19

PhD position in Information Security and Cryptography
University of St. Gallen, Switzerland
We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography. The position is within the group of Prof. Katerina Mitrokotsa (Chair of Cyber Security) who is doing research in cryptographic protocols that guarantee reliable authentication, privacy-preservation and verifiable delegation of computation. The topic of this project is focusing on investigating security and privacy issues for resource-constrained devices (e.g., sensors) that rely on external untrusted servers in order to perform computations. More precisely, the student shall be working on investigating efficient authentication and verifiable delegation of computation mechanisms that provide: i) provable security guarantees, and ii) rigorous privacy guarantees. The overall aim of the PhD position will be to design and evaluate provably secure cryptographic protocols for privacy-preserving authentication and verifiable delegation of computation protocols. The research shall also consider the case where multiple clients outsource jointly computations to untrusted cloud servers.
Contact: Katerina Mitrokotsa
Last updated: 2020-07-22 posted on 2020-07-19

Embedded Cryptographic Software Engineer
Secure-IC Pte Ltd
To support our growth and in order to strengthen our team, we are looking for an Embedded Cryptographic Software Engineer (M/F). You will be based in Singapore and participate in the development of the Secure-IC portfolio of secure solutions. Missions consist in:
  • Ensuring the various phases of specifications for applications embedding cryptography
  • C and C++ programming and testing
  • Integration and validation on target embedded microprocessor. (knowledge of ARM processors is preferable)
  • Developing non-regression tests along with benchmarking tests
  • Bringing innovative ideas to improve our products, the quality of deliveries and development processes
  • Delivery of customers projects (consulting and training)
Requirements:
  • Embedded software development engineer with 5 years minimum experience in an equivalent position
  • First experience in the field of automotive: CAN bus, automotive Ethernet
  • Master’s degree (or higher) in Computer Science, Mathematics or similar field
  • Proficiency in C/C++ language and assembly skills
  • Knowledge of ARM processors, development for security and safety
  • Proficiency in English
  • Knowledge of cryptography
  • Excellent communication skills
  • Ability to work in a team
  • Outstanding analytical and problem-solving skills
Contact: Sylvain Guilley
Last updated: 2020-07-18 posted on 2020-07-16

PhD Student in Cryptography and Privacy Engineering
TU Darmstadt, Germany

The Cryptography and Privacy Engineering Group (ENCRYPTO) @Department of Computer Science @Technical University of Darmstadt offers a full position for a Doctoral Researcher (Research Assistant/PhD Student) in Cryptography & Privacy Engineering, available immediately and for up to 3 years with the possibility of extension.

Our mission is to demonstrate that privacy can be efficiently protected in real-world applications via cryptographic protocols.

TU Darmstadt is a top research university for IT security, cryptography and computer science in Europe. The position is based in the City of Science Darmstadt, which is very international, livable and well-connected in the Rhine-Main area around Frankfurt. Initially, no knowledge of German is necessary and TU Darmstadt offers corresponding support.

Job description

As doctoral researcher @ENCRYPTO, you conduct research, build prototype implementations, and publish and present the results at top venues. You will also participate in teaching and supervise thesis students and student assistants. The position is co-funded by the ERC Starting Grant “Privacy-preserving Services on the Internet” (PSOTI), where we build privacy-preserving services on the Internet, which includes designing protocols for privately processing data among untrusted service providers using secure multi-party computation and implementing a scalable framework.

Your profile
  • Completed Master's degree (or equivalent) at a top university with excellent grades in IT security, computer science, applied mathematics, electrical engineering, or a similar area.
  • Extensive knowledge in applied cryptography/IT security and excellent software development skills.
  • Additional knowledge in cryptographic protocols (ideally secure computation) is a plus.
  • You are self-motivated, reliable, creative, can work independently, and want to do excellent research on challenging scientific problems with practical relevance.
  • The working language at ENCRYPTO is English, so you must be able to discuss/write/present scientific results in English, whereas German is not required.
no application deadline
Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
Last updated: 2020-07-18 posted on 2020-07-14

PostDoc and Ph.D.-level researchers in the field of "Vehicular Security & Privacy"
Ulm University, Germany
The Institute of Distributed Systems at Ulm University is searching for enthusiastic PostDoc and Ph.D.-level researchers who are expected to support and strengthen our research activities in the area of security and privacy in vehicular networking and automotive systems. You will contribute to ongoing projects, as well as new project proposals. As PostDoc, you will also be involved in project management and support the supervision of PhD candidates.

The ideal candidate for the PostDoc position has a Ph.D. degree in computer science, or a closely related discipline, from an internationally-renowned university, a strong background in system security with focus on vehicular security and privacy, documented by high-quality publications, and a strong motivation to become part of our team.
For Ph.D.-level researchers, we require a M.Sc. degree in computer science, or a closely related discipline, from an internationally-renowned university with a visible focus in system security.
Proficient knowledge of written and spoken English is required for both positions. Conversational German skills are a substantial advantage.
We are one of the leading research groups in vehicular security and privacy. Our group and university offer a unique environment for automotive-related research with excellent facilities and highly competitive salary. Automotive technologies are a priority area at Ulm University, and many research groups are active in fields like vehicle-driver interaction and automated driving. Being situated in Southern Germany between Stuttgart and Munich, we are located in the right heart of German car industry in one of the strongest economic regions in Europe. We have strong ties with companies like Daimler, Audi, BMW, and Bosch and many of those companies have research or development labs at our campus.

For more information visit:
https://www.uni-ulm.de/in/vs/inst/offene-stellen/postdoc-and-phd-level-researchers-vehicular-security-privacy/
Contact: Prof. Dr. Frank Kargl (vs-jobs@uni-ulm.de)
Last updated: 2020-07-18 posted on 2020-07-13

Post-doc in cryptography
University of Luxembourg

The Applied Crypto Group of the University of Luxembourg has multiple post-doc positions, funded by the H2020 ERC programme.

Possible topics of interests are:
  • fully homomorphic encryption and multilinear maps
  • public-key cryptanalysis
  • side channel attacks and countermeasures
  • white-box cryptography
  • blockchain applications

Candidates must have a Ph.D. degree in cryptography or related field. The duration of the positions is 2.5 years. The post-docs will be members of the Security and Trust (SnT) research center from the University of Luxembourg (>200 researchers in all aspects of IT security). We offer a competitive salary (about 60,000 euro/year).

Deadline for application: September 15th, 2020.

Contact: Jean-Sebastien Coron: jean-sebastien.coron@uni.lu
Last updated: 2020-07-18 posted on 2020-07-13

Research Positions in Applied Cryptography, Provable and Hardware Security
Tampere University

The Network and Information Security Group is currently looking for several motivated and talented researchers at all levels (PhD, PostDoc) to contribute to research projects related to applied cryptography, hardware security, security and privacy. The successful candidates will primarily be working on the following topics (but not limited to):

  • Differential Privacy;
  • Functional Encryption;
  • Privacy-Preserving Analytics;
  • Privacy-Preserving Machine Learning;
  • Searchable Encryption and data structures enabling efficient search operations on encrypted data;
  • Processing of encrypted data in outsourced and untrusted environments;
  • Applying encrypted search techniques to Trusted Execution Environments;
  • Revocable Attribute-Based Encryption schemes and their application to cloud services;
  • IoT Security and Applications to Smart Cities;
  • Side Channel Analysis (SCA);
  • Machine Learning based SCA;
  • Embedded security (e.g. ARM-based SoC);
  • TEE security and development (e.g. TrustZone, Trusted Applications, etc.).

Programming skills is a must.

The positions are principa research-focused. Activities include:

  • Conducting both theoretical and applied research;
  • Design of secure and/or privacy-preserving protocols;
  • Software development and validation;
  • Reading and writing scientific articles;
  • Presentation of the research results at seminars and conferences in Finland and abroad;
  • Acquiring (or assisting in acquiring) further funding.

Successful candidates will be working in EU and industrial research projects. Topics will be spanning from the theoretical foundations of cryptography to the design and implementation of provable secure communication protocols with direct applications to smart cities, cloud computing and eHealth.

To apply please send the following:

  • Your latest CV;
  • A research statement (max 2 pages long);
  • The three best papers you have co-authored.
Contact:
  • Billy Bob Brumley (Hardware Security and SCA): billy.brumley@tuni.fi
  • Antonis Michalas (Provable Security and Privacy): antonios.michalas@tuni.fi

Last updated: 2020-07-13 posted on 2020-07-13

PhD position in the area of database privacy
Universitat Politècnica de Catalunya, Department of Network Engineering (Spain, Barcelona)

The SISCOM Research Group (https://siscom.upc.edu/en) within the Department of Network Engineering (https://entel.upc.edu/en) at the Universitat Politècnica de Catalunya (UPC) (https://www.upc.edu/en/) welcomes and encourages applications for a PhD position in the area of database privacy to start in fall 2020.

DESCRIPTION OF POSITION

The PhD position has a duration of 3 years and is made available through the research project “Big Data Anonymization” funded by “la Caixa”, a top Spanish financial institution. The main objectives of this project are to pioneer advance beyond state of the art on the design of anonymization algorithms and to develop a comprehensive understanding of privacy in a context of big data. The ultimate aim is to contribute to making big data compatible with the right to privacy. For the scholarship, we are looking for a candidate who is qualified to undertake supervised independent research in the area of database anonymization, in particular in the protection of dynamic data under popular syntactic models (e.g., l-diversity, t-closeness) and differential privacy.

QUALIFICATIONS

We seek a highly motivated PhD student

  • who has completed or is about to complete by summer 2020 a Master's degree in mathematics, computer science, or telecom engineering;
  • with excellent academic record;
  • good analytical skills;
  • strong oral and written communication skills.

APPLICATION

Candidates should send to Prof. Jordi Forné (jordi.forne@upc.edu) the following information:

  • their CV (including list of publications, if any);
  • their academic record (with marks);
  • a certificate of English (TOEFL, Cambridge or similar).

DEADLINE

September 15, 2020.

Contact: Prof. Jordi Forné
Last updated: 2020-07-10 posted on 2020-07-10

Ph.D. positions Fall 2020 (cryptographic hardware, fault detection, post-quantum cryptography)
Villanova University, Department of Electrical and Computer Engineering
1. Overall introduction. There are Ph.D. position openings (full scholarship, tuition & very competitive stipend) at Dr. Jiafeng Harvest Xie's Security & Cryptography (SAC) Lab for the Fall of 2020, located at the Department of Electrical and Computer Engineering of Villanova University (PA, USA).

2. Research area. Post quantum cryptography hardware implementation, fault detection/attack, and hardware security.

3. Qualification. Preferred to have research experience in the areas of cryptographic engineering, fault detection, hardware security, and VLSI design. Students from electrical/computer engineering, computer science, and cryptography (applied mathematics) or other related majors are WARMLY welcome! Programming skills such as HDL, C++ will be more favorable.

NOTE: because of the time urgency, it's better that you are currently in U.S.

4. Application process. Interested students can directly send the CV/resume to Dr. Jiafeng Harvest Xie's email: jiafeng.xie@villanova.edu.

5. Application information. The detailed application requirement is available at the department website.

6. Additional information. Villanova University is a private research university located in Radnor Township, a suburb northwest of Philadelphia, Pennsylvania. U.S. News & World Report ranks Villanova as tied for the 46th best National University in the U.S. for 2020.

7. PI introduction. Dr. Jiafeng Harvest Xie is currently an Assistant Professor at the Department of Electrical and Computer Engineering of Villanova University. His research interests include cryptographic engineering, hardware security, and VLSI digital design. He is the Best Paper Awardee of IEEE HOST 2019. He is also the Associate Editor for Microelectronics Journal, IEEE Access, and IEEE Trans. Circuits and Systems II.

Contact: Dr. Jiafeng Harvest Xie, email: jiafeng.xie@villanova.edu

Contact: Dr. Jiafeng Harvest Xie, email: jiafeng.xie@villanova.edu
Last updated: 2020-07-08 posted on 2020-07-07

Innovation Manager in the Field of Computing on Encrypted Data
KU Leuven, Belgium
This position in the COSIC research group of the KU Leuven, addresses valorization opportunities in new forms of cryptography that support calculations on encrypted data, without having to decrypt the data. These new forms of cryptography include fully homomorphic encryption, multi-party computation, trusted execution environments and related topics.

The Innovation Manager will identify opportunities for bilateral projects and research platforms, technology transfer, and potentially spin-off companies, including the definition of licenses, patents or other forms of valorization. All these tasks are executed in coordination with KU Leuven Research and Development. In particular, the Innovation Manager will assist in defining and maintaining a strategic research agenda to create a continuum between fundamental research, strategic research and applied research.

The lndustrial Research Fund (lOF) of KU Leuven forms a bridge between strategic basic research, technological innovations and industrial collaborations. Based on cooperations with KU Leuven research groups and different stakeholders from industry and society, we aim to broaden our valorization portfolio and to increase the transfer of knowledge. We have a team of more than 40 experienced innovation managers involved in the development of practical and innovative technological solutions based on the expertise and infrastructure of the research groups within KU Leuven.

Profile

  • PhD or equivalent research expertise in applied cryptography
  • Preferably industrial experience
  • At least a high level understanding or parts of MPC, FHE, PQC, TEE
  • Experience in valorization of research results
  • Creative, enthusiastic, with a strong commitment to research valorization
  • Proactive, entrepreneurial mindset
  • Strong communication skills, including international and intercultural
  • Willing to travel globally
Offer An exciting and challenging job, focused on continuous innovation and development in a transdisciplinary and international context. We offer a permanent position as Innovation Manager of the Industrial Research Fund (IOF) at KU
Contact: Nigel Smart (nigel.smart@kuleuven.be) Ingrid Verbauwhede (ingrid.verbauwhede@kuleuven.be) Frederik Vercauteren (frederik.vercauteren@kuleuven.be)
Last updated: 2020-07-03 posted on 2020-07-03

Ph.D Student
Max Planck Institute for Security and Privacy

The Max Planck Institute (MPI) for Security and Privacy is looking for motivated students to apply for a Ph.D. program. The research will be conducted on the theory of cryptography and computer security and more specifically in one of the following topics:

  • Homomorphic encryption and code obfuscation
  • Zero-knowledge proofs and succinct arguments
  • Cryptocurrencies and blockchains
  • Post-quantum and lattice-based cryptography
  • Multi-party computation
  • Other research proposals by the candidate will also be considered, depending on the common interests.

    The ideal candidate shall satisfy the following requirements:

  • Have a Master degree or equivalent (or is close to complete one) in computer science, mathematics, or related fields
  • Is fluent in English and has excellent communication and writing skills
  • Is familiar with probability theory and mathematical proofs. Strong background in cryptography, linear algebra, number theory, or complexity theory is a plus
  • Most importantly, is passionate about learning new concepts and determined to solve challenging questions in the theory of cryptography and computer security
  • Publications (or manuscripts under submission) in related areas are greatly valued but are not mandatory

    The MPI for Security and Privacy is co-located with the Ruhr University of Bochum (Germany) and offers a vibrant atmosphere for research that spans across all aspects of computer security. The Ph.D. program is entirely in English and the knowledge of German is not required for a successful career at MPI.

    The position is fully funded (100%) and paid according to the E-13 pay category. The starting date if flexible but ideally somewhere in fall 2020. To apply for the position, send an email to Giulio Malavolta (address below) including the following documents:

  • A curriculum vitae
  • 2-3 recommendation letters from previous advisors or employers
  • A brief cover letter (half page at most) describing your research interests

    If you have any question, don’t hesitate to get in touch.

  • Contact: Giulio Malavolta (giulio.malavolta@berkeley.edu)
    Last updated: 2020-06-30 posted on 2020-06-29

    Senior Security Researcher (m/f/d)
    Huawei Technologies Duesseldorf Gmbh (Munich Research Center, Germany)
    Your responsibilities:

    • Research the security properties of 3GPP radio access network technologies including 4G and 5G (NR), identifying possible weaknesses / enhancements • Research mitigations of identified security/privacy issues. • Collaborate with EU universities on 5G security research • Help shape the industry with new innovation via standardization bodies e.g. 3GPP, ETSI, etc. • Work with the world leading researchers on the most advanced technologies including AI, IoT under the scope of 5G security.

    Our requirements:

    • PhD in computer science or advanced PhD with focus on telecommunication security (preferably radio access technologies, the 3GPP air-interface protocol stack). • Several years of experience in network security research, specifically in the domains of protocol analysis, vulnerability detection, protocol correctness, protocol verification, etc. • Several years of experience researching and developing tools/demos/PoCs which demonstrate the impact of such security issues (vulnerabilities) on the network. • Several years of experience researching and implementing mitigation solutions (PoC/Demo level) for protocol vulnerabilities including algorithms development, performance/cost and impact analysis of algorithms implementation. • Openness to work in a diversified work environment with unique work cultures. • Experience in presenting technical information to both technical and non-technical audience. • Fluent in English (written and spoken).

    Must be eligible to work in the EU to be considered for this position.

    Please apply here: https://apply.workable.com/j/64698ECA7B

    By applying to this position, you agree with our PRIVACY STATEMENT. You can read in full our privacy policy via the link below. https://career.huawei.com/reccampportal/portal5/grcprivacy.html

    Contact: Viet-Duc Benedikt Lai (email: duc.lai.ext[at]huawei.com)
    Last updated: 2020-07-03 posted on 2020-06-29

    Research Assistant Professor in Additive Manufacturing with Emphasis on Cybersecurity
    University of North Texas; Denton, Texas, USA
    Department Summary: University of North Texas (UNT) is rapidly building its Center for Agile and Adaptive Manufacturing (CAAAM), a State of Texas funded multi-million-dollar initiative with a multi-disciplinary focus on further advancing the science and technology of additive manufacturing (AM). CAAAM involves a multi-disciplinary team of researchers from materials science, mechanical engineering, manufacturing, data science, cybersecurity and logistics & supply chain, committed to collaborating on large research projects with an emphasis on additive manufacturing.

    Position Summary: CAAAM is seeking a Research Assistant Professor to collaborate with a team of faculty on cybersecurity issues related to AM. This is a non-tenure track terminal position with a primary association with CAAAM and secondary association with an appropriate academic department. The selected candidate is expected to focus on cybersecurity in the context of advanced manufacturing systems in general and additive manufacturing systems more specifically. A successful candidate will work closely with faculty in the Computer Science and Engineering department as well as other faculty and researchers in CAAAM. The candidate is expected to conduct research on securing advanced manufacturing systems and develop fundamental and innovative approaches to the design and validation of secure, trustworthy and resilient cyber systems for industrial automation. The candidate is also expected to develop educational material for training workforce to operate advanced manufacturing systems as well as mentor graduate students and post-doctoral researchers working in CAAAM.

    Minimum qualifications include an earned doctorate in Computer Engineering, Computer Science or a related discipline with a research focus on cybersecurity in general but more specifically, cybersecurity related to cyber-physical systems, security in edge devices, hardware/systems security, security of IoT’s and Industrial IoT’s, design and validation of secure and resilient cyber-physical systems. The research background should be evident from high quality publications.

    Contact: Krishna Kavi (Krishna.Kavi@unt.edu), Mary Chandler (Mary.Chandler@unt.edu)
    Last updated: 2020-06-26 posted on 2020-06-25

    Research Scientist (Brussels, Belgium)
    OneSpan Brussels
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Research Scientist (Cambridge)
    OneSpan
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Research Associate (Postdoc) in Applied Cryptography
    CryptoLux Group, University of Luxembourg
    The CryptoLux group of the University of Luxembourg invites applications from Ph.D. holders in the general area of applied cryptography. CryptoLux is a group of cryptographers and security researchers interested in applied cryptography, cryptanalysis, privacy, network security, cryptographic blockchains and is led by Prof. Alex Biryukov. Candidates with interest in the following topics are welcome to apply:
    • Design and cryptanalysis of symmetric cryptographic primitives
    • Cryptocurrencies, blockchain
    • Privacy enhancing technologies, Tor
    • Side-channel attacks and countermeasures
    • White-box cryptography
    Candidates must have a Ph.D. degree in Computer Science, Applied Mathematics or a related field; competitive research record in applied cryptography or information security (at least one paper in top 10 IT security conferences); strong mathematical and algorithmic CS background; fluent written and verbal communication skills in English.

    The University offers a two-year employment contract, which may be extended up to five years. The University of Luxembourg offers excellent working conditions and a highly competitive salary. Interested candidates are invited to send their application by email to Alex Biryukov before August 1, 2020. The application should contain a brief cover letter explaining the candidate's research interests, CV with photo, a list of publications and the names and contacts of 3 references.

    Contact: Prof. Alex Biryukov
    Last updated: 2020-06-23 posted on 2020-06-22

    Lecturer in Cybersecurity
    New Jersey Institute of Technology
    The Department of Computer Science at New Jersey Institute of Technology (NJIT) seeks candidates to fill a University Lecturer/Senior University Lecturer position. Successful candidates must have an MS in Computer Science or a related computing area and will have demonstrated an expert grasp of knowledge of the Cybersecurity field at all levels, either through a demonstrated record of teaching excellence, or through industrial experience.

    Candidates are expected to mainly teach courses under the umbrella of Cybersecurity in support of our graduate and undergraduate programs. The successful candidate will also be involved in creating course content and materials with a focus on experiential and project-based learning.

    Interested applicants should submit their CV and the names of at least two references by applying as soon as possible at https://njit.csod.com/ats/careersite/JobDetails.aspx?site=1&id=1961. Applications will be reviewed on a rolling basis until the position is filled.

    Work environment and location:
    The Computer Science department, part of the Ying Wu College of Computing Sciences, is the largest at NJIT, comprising one tenth of the student population. It is also the largest computer science department among all research universities in the New York metropolitan area.​ Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.
    Contact: Reza Curtmola
    Last updated: 2020-06-23 posted on 2020-06-22

    Fully Funded PhD Position in Privacy-Preserving & Robust Machine Learning
    University of Lübeck, Institute of IT-Security, Privacy & Security Group, Lübeck, Germany
    The Privacy & Security group at University of Luebeck seeks to hire doctoral students for research in the one or more of the following areas:
    • enhancing or attacking training-data-privacy in machine learning algorithms
    • ensuring or attacking the robustness of machine learning algorithms
    • privacy-preserving health applications (including epidemiological applications)
    • privacy-preserving Smart Grid, Smart City applications
    • anonymous communication
    The ideal candidate is enthusiastic and has a strong background and interest in one or more of the following areas:
    • information security, differential privacy, or cryptography
    • mathematical statistics and probability theory
    • machine learning
    Candidates with a strong theoretical background in related areas are also encouraged to apply. Formal requirements for doctoral students are a master's or equivalent degree. The doctoral student will be a paid employee of University of Lübeck according to standard collective labour agreement regulations (TV-L E13, 100%), which compared to the local cost of living provides an attractive salary and attractive working conditions.

    Applications should include a curriculum vitae, a brief description of research interests, transcripts of grades, 2-3 letters of recommendation from teachers or employers, and, if possible, the Master's or Bachelor's thesis and publications.
    • Application deadline: 30 August 2020 (later applications might also be considered)
    • Starting date: 1 October 2020 (negotiable)
    About our group: The Privacy & Security group at the Institute for IT-security at the University of Lübeck works on researching privacy-preserving and robust methods to perform computations on large datasets such that the system work as expected and privacy of individuals is protected, including privacy-preserving machine learning, and anonymous communication.

    Contact: Prof. Dr. Esfandiar Mohammadi
    Privacy & Security group
    University of Lübeck
    https://mohammadi.eu

    Last updated: 2020-06-21 posted on 2020-06-21

    Two PhD positions in Privacy-preserving biometric authentication
    Chalmers University of Technology, Sweden
    The PhD students will join Prof. Mitrokotsa's group focusing on security and cryptography, working in the area of privacy-preserving biometric authentication and within the Marie Curie ITN project: "TRESPASS-ETN: Training in Secure and Privacy-preserving biometrics". Privacy-preserving biometric authentication focuses on guaranteeing accurate biometric authentication, while at the same time providing strong privacy guarantees (e.g., avoid tracking, profiling of users and leakage of sensitive information). The focus of one of the PhD positions would be to examine how to guarantee privacy-preservation in biometric authentication systems by employing advanced cryptographic methods such as secure multiparty computation (SMPC) primitives (e.g., homomorphic encryption) and verifiable computation (when biometric authentication is applied in a distributed setting). The second PhD position will focus on employing differentially private mechanisms in the biometric authentication process. The goal is to achieve high accuracy in the authentication process, while at the same time avoid any leakage of information. The PhD student will be supervised by Prof. Katerina Mitrokotsa in the area of information security and cryptography.
    Contact: Prof. Katerina Mitrokotsa
    Last updated: 2020-06-21 posted on 2020-06-18

    Software Developer for Payment Systems
    Be ys Pay France
    About be-ys

    Be-ys creates and monitors digital solutions for sensitive data processing in demanding business sectors such as healthcare and banking.
    We are the national leader in data security, which is expanding internationally and deploying its solutions using state-of-the-art technologies.
    We are now looking for new talents to strengthen our leading position and continue bringing innovation to the market.

    Job Description

    Our Be ys Pay subsidiary has created worldwide payment solutions. Our aim is to develop disruptive technologies for bank payment systems with smart card, mobile device and Blockchain. As part of its development, we are looking for a Software Developer for Payment Systems.
    As part of an expert team dedicated to the payment technology, smart card, blockchain, cryptography and cryptography business sectors, your main tasks will be to develop products in C, C++, Java and NodeJS languages for smart card personalization, payment transaction authorization, token generation/validation and wallets for mobile devices.
    You will be responsible for the development and implementation of algorithms, protocols and applications for PC or mobile devices for smart card issuance, as well as the development of solutions for the validation and generation of tokens for banking payment systems.

    Profile description

    • You have a 5-year degree in engineering, development and/or crypto
    • You have an excellent knowledge of C, C++, Java and cryptography.
    • Knowledge of payment technology with EMV standard and Blockchain would be a plus.
    • You enjoy working as part of a team and working collaboratively in an agile mode.
    • You are autonomous, proactive and have an interest in experimenting.
    • You like innovation and enjoy working in a constantly changing environment.
    • You must be fluent in English (written and spoken).
    Contact: Above all, we are looking for potential. We believe that passion for the job and skills are the key to a successful employee.
    We transform your energy into talent.
    To apply, please send your resume to: recrutement@almerys.com

    Last updated: 2020-06-17 posted on 2020-06-16

    Ph.D. Student
    Grenoble INP LCIS
    Securing components for the IoT market, as well as critical cyberphysical infrastructures, requires analyzing their vulnerabilities and defining hardware and software countermeasures at the fair cost. The increasing complexity of the processors and the applications they run means that the software fault models (such as instruction skips, or instruction replacement) usually used to analyze the vulnerability of their code are no longer sufficient to express the diversity of faulty behaviors in modern architectures [1]. Indeed, architecture designers have progressively added many complex hardware blocks (such as pipeline, cache memory, branch prediction, or speculative execution) to processors in order to optimize program execution. At the same time, fault injection techniques are constantly progressing (e.g., localized ElectroMagnetic or laser attacks, glitch injection attacks) allowing today higher-order injections (both multi-temporal and multi-spatial). Faced with these attacks, designers must implement countermeasures to detect or mask the effects of injected faults. These countermeasures can be implemented at the hardware level (e.g., duplication of elements, error correcting codes, isolation mechanisms) or at the software level (e.g., duplication of instructions or algorithms, insertion of security tests, signature verification). The design and validation of these countermeasures requires a realistic representation of the effects of faulty attacks (fault model) at the hardware and/or software level. The difficulties encountered are then: (1) the relevance of the fault models: do these fault models correctly represent the effects that an attacker can generate on a target processor? (2) the adequacy of countermeasures: do the countermeasures effectively protect the system, are they oversized and therefore too costly? (3) the link between software and hardware countermeasures: how to combine software and hardware countermeasures efficiently and at the fair cost, how to link the different levels for fault modeling? The CLAM project and the thesis that we propose aim to answer these questions by associating 3 French laboratories with complementary specialties.
    Contact: vincent.beroulle(at)lcis.grenoble-inp.fr; paolo.maistri(at)univ-grenoble-alpes.fr
    Last updated: 2020-06-17 posted on 2020-06-15

    Symmetric Cryptography Researcher
    Technology Innovation Institute - Abu Dhabi, UAE

    Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead. At TII, we help society to overcome its biggest hurdles through a rigorous approach to scientific discovery and inquiry, using state-of-the-art facilities and collaboration with leading international institutions

    As a Symmetric Cryptography Researcher, you will:

  • Design and implement symmetric cryptographic algorithms on software.
  • Conduct research in the field of symmetric cryptography and lightweight cryptography
  • Perform security assessments of cryptographic primitives at theoretical and implementation level.
  • Work closely with the other R&D teams to build secure systems using state-of-the-art cryptographic algorithms and protocols.

    Minimum qualifications:

  • PhD degree in one of the following: Cryptography, Applied Cryptography, Information theory, Mathematics, Computer Science or any relevant Engineering degree.
  • Valuable publications record in the field of Symmetric Cryptography.
  • Knowledge of relevant theoretical and practical cryptanalysis techniques.
  • Extensive experience developing in C, C++, x86 or ARM assembly, Rust or Go.
  • Understanding of security attacks, including: timing, cache-based and microarchitectural attacks, and the corresponding countermeasures.
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Post Quantum Cryptography Researcher
    Technology Innovation Institute - Abu Dhabi, UAE

    As a Post-Quantum Crypto Researcher, you will:

  • Design and implement quantum-safe PKE/KEM and digital signature schemes.
  • Conduct research and development in one of the following: lattice-based cryptography, code-based cryptography, hash-based cryptography, isogeny-based cryptography
  • Perform security assessments of crypto-primitives and cryptosystems at the theoretical and implementation level

    Minimum qualifications:

  • MSc or PhD degree in Cryptography, Applied Cryptography, Information Theory, Mathematics or Computer Science
  • Extensive experience developing in C, C++, Rust or Go
  • Deep understanding of cryptographic algorithms and protocols
  • Understanding of security attacks, including: side-channel analysis, fault injection, microarchitectural attacks, and the corresponding countermeasures
  • Familiarity with hardware languages is a plus
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Lead Cryptographic Protocols Researcher
    Technology Innovation Institute - Abu Dhabi, UAE
    As a Lead Cryptographic Protocols Researcher, you will:

  • Lead the scientific watch specialized in cryptographic protocols
  • Guide the team members in their research and development work
  • Analyze project requirements and provide technical and functional recommendations
  • Design and implement classical, quantum-resistant and hybrid cryptographic protocols and algorithms
  • Conduct research and development on state-of-the-art modern protocols
  • Perform security assessments of cryptographic protocols at the theoretical and implementation level

    Minimum Qualifications:

  • MSc or PhD degree in Cryptography, Applied Cryptography, Information Theory, Mathematics or Computer Science
  • 6+ years of work experience. Previous experience heading teams is a plus
  • Knowledge of widely-deployed cryptographic protocols and primitives
  • Experience in C desired, C++, Rust or Go relevant as well
  • Solid engineering practices and processes, such as development and testing methodology and documentation
  • Prior contributions to crypto protocols and open source software collaboration preferred
  • Quick learner, geared towards implementation
  • Eager to develop new skills and willing to take ownership of projects
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Postdoc Research Fellow x3
    Cryptanalysis Taskforce @ Nanyang Technological University, Singapore

    (Yes ! We are still hiring despite COVID-19)

    The Cryptanalysis Taskforce at Nanyang Technological University in Singapore led by Prof. Jian Guo is seeking for candidates to fill 3 postdoctoral research fellow positions on symmetric-key cryptography, including but not limited to the following sub-areas:
    • privacy-preserving friendly symmetric-key designs
    • tool aided cryptanalysis, such as MILP, CP, STP, and SAT
    • machine learning aided cryptanalysis and designs
    • quantum cryptanalysis
    • cryptanalysis against SHA-3 and AES
    Established in 2014, the Cryptanalysis Taskforce is a group dedicated for research in symmetric-key cryptography. Since then, the team has been active in both publications in and services for IACR. It has done quite some cryptanalysis work on various important targets such as SHA-3, and is expanding its interests to the areas mentioned above, with strong funding support from the university and government agencies in Singapore. We offer competitive salary package with extremely low tax, as well as an environment dedicated for research in Singapore. The contract will be initially for 2 years, and has the possibility to be extended. Candidates are expected to have proven record of publications in IACR conferences. Interested candidates are to send their CV and 2 reference letters to Jian Guo. Review of applicants will start immediately until the positions are filled. More information about the Cryptanalysis Taskforce research group can be found via http://team.crypto.sg
    Contact: Asst Prof. Jian Guo, guojian@ntu.edu.sg
    Last updated: 2020-05-30 posted on 2020-05-29

    Post-Doc
    Carnegie Mellon University
    Applications are invited for a post-doc position at Carnegie Mellon University. The specific topic of the research is flexible and will be determined based on the common interests. Samples areas include secure multi-party computation, zero-knowledge proofs, post-quantum/lattice-based cryptography, and non-malleable cryptography. Must have a strong track record of publications in top crypto conferences.
    Contact: Vipul Goyal (vipul at cmu.edu)
    Last updated: 2020-05-30 posted on 2020-05-28

    Post-Doctoral Researcher in Symmetric Cryptography
    CryptoLux Group, University of Luxembourg

    The CryptoLux group of the University of Luxembourg has a vacancy for a post-doctoral researcher in the area of symmetric cryptography. The successful candidate will contribute to a research project entitled "Analysis and Protection of Lightweight Cryptographic Algorithms (APLICA)", which is funded by the Luxembourgish Fonds National de la Recherche and the German Research Foundation. Starting in Fall 2020, APLICA will run over a period of 3 years as a joint research project between the CryptoLux group and the Workgroup for Symmetric Cryptography of Ruhr-University Bochum. The mission of the APLICA project is to develop new cryptanalytic techniques for lightweight authenticated encryption algorithms and hash functions, and to design and implement new countermeasures against side-channel attacks that are suitable for constrained devices.

    Candidates must have a Ph.D. degree in symmetric cryptography or a closely related field. Preference will be given to candidates with a strong publication record that includes at least one paper at an IACR-sponsored conference/workshop or one of the top-4 security conferences. Experience in software development for embedded systems or mounting side-channel attacks is a plus. Candidates with an interest to conduct research in one of the following areas are particularly encouraged to apply:

    • Cryptanalysis of authenticated encryption algorithms or hash functions
    • Leakage resilience or leakage reduction by design (e.g. modes of operation)
    • Security evaluation of leakage-resilient primitives or constructions

    The position is available from Sept. 2020 on basis of a fixed-term contract for 3 years, which includes a probation period of 6 months. The University of Luxembourg offers excellent working conditions and a highly competitive salary. Interested candidates are invited to send their application by email to Alex Biryukov before July 31, 2020. The application material should contain a cover letter explaining the candidate's research interests, a detailed CV (incl. photo), a list of publications, scans of diploma certificates, and the names and contact details of 3 references.

    Contact: Prof. Alex Biryukov (alex.biryukov@uni.lu)
    Last updated: 2020-07-02 posted on 2020-05-27

    Post-doc (2 posts, up to 4 years)
    University of Warwick, UK

    We have two post-docs posts (Research Fellow and Senior Research Fellow, each for up to 4 years) available in the Department of Computer Science, University of Warwick, as part of a 4-year EPSRC project on "End to End Authentication of Caller ID in Heterogeneous Telephony Systems", working with Professor Feng Hao (PI) and Dr Adrian Von Mühlenen (co-I). The primary aim of this project is to improve security in telecommunication systems, in particular, providing reliable authentication of the caller ID without requiring any PKI, and protecting end-to-end privacy of the call contents.

    The candidates will join a dynamic and growing team of security researchers in the Department of Computer Science, University of Warwick. Warwick Computer Science is ranked 1st in research output, 2nd in research impact, and 2nd overall among all computer science departments in the UK based on REF 2014. The candidates will have the flexibility to collaborate with other members in the security team on a wider range of topics, such as key exchange, e-voting, e-auction, PUF, cryptocurrency, mobile security, IoT, web security and e-payment security. Our work has been largely driven by tackling real-world security problems. Candidates who have a strong interest in working on real-world problems for practical impacts are encouraged to apply. Those who have industrial experiences are also most welcome to apply.

    1. Research fellow: https://tinyurl.com/y8spmtb5
    2. Senior research fellow (equivalent grade as Assistant Professor): https://tinyurl.com/ybjyqzh4

    Application deadline: 17 June, 2020. After the deadline, the posts will be vacant until they are filled. Interested candidates are encouraged to contact Prof Feng Hao with an expression of interest as early as possible.

    Contact: Professor Feng Hao (feng.hao@warwick.ac.uk)
    Last updated: 2020-05-25 posted on 2020-05-22

    Junior Research Group Leader
    Max Planck Institute for Security and Privacy in Bochum, Germany

    This program offers young scientists the opportunity to develop their independent research program. We welcome applicants whose work covers aspects of security and privacy irrespective of field. The vision of MPI-SP is to grow into an interdisciplinary institute that brings together computer scientists with academics working at the intersection with social science, economics, law, humanities, and more. Areas of interest include, but are not limited to, foundations, cryptography, software and hardware security, AI safety and adversarial machine learning, as well as interdisciplinary aspects of security and privacy.

    The positions are funded for 5 years. We offer a competitive salary, base funding, as well as administrative and technical support. The positions come with no teaching obligations, although teaching opportunities exist. As an employee in Germany you will enjoy great working conditions, including 30 paid vacation days per year and considerable family support.

    Applicants must have completed a doctoral degree in any field or area broadly relevant to security and privacy and must have demonstrated outstanding research vision, and potential to successfully lead a research group. Successful candidates are expected to build a highly visible research agenda, to mentor Ph.D. students, and to participate in collaborative projects.

    We maintain an open, international, and diverse work environment and seek applications from outstanding researchers regardless of national origin. Our working language is English. We encourage applications from women, persons with severe disabilities, or members of any other underrepresented group.

    Please apply at https://apply.cis.mpg.de/register/mpispjrgl To receive full consideration, applications should be received by 14 June 2020. Reviewing of applications will start immediately and will continue until the positions are filled. The expected starting date for the positions is Fall 2020, open to negotiations.

    Contact: applications-jrgl@mpi-sp.org
    Last updated: 2020-06-02 posted on 2020-05-18

    Post-Doctoral Researcher in Computational Diversity in Cybersecurity (Job ID: 604850)
    Northern Arizona University, School of Informatics, Computing, and Cyber Systems (SICCS); Flagstaff
    The School of Informatics, Computing & Cyber Systems at Northern Arizona University is seeking a postdoctoral scientist in computational diversity for cybersecurity to work on a US Air Force Research Laboratory funded project. The successful candidates will work closely with the Principal Investigator and collaborators in the development, analysis, and implementation of innovative algorithms, architectures, and implementations. Exceptional candidates from all relevant areas will be considered, but specific topics of research interest include computer architecture and microarchitecture, hardware-based security and cryptographic systems. While the project is open to international candidates, there may be certain limitations. The start date is negotiable, but should not be later than October 1, 2020.

    Duties include:
    1. Perform research in the broad area of hardware-centric cybersecurity
    2. Publish papers and present research results at conferences and symposia
    3. Write grant and contract proposals
    4. Supervise and coordinate the efforts of PhD, MS, and undergraduate students on a day-to-day basis
    5. Assist in preparing progress reports to funding agencies
    The ideal candidate should have:
    1. Earned doctoral (Ph.D. or Sc.D.) degree in Computer Science, Electrical Engineering or closely related area by the start date.
    2. Demonstrated expertise in one or more of the following areas: computer architecture and microarchitecture, hardware-based security and cryptographic systems
    3. Demonstrated academic excellence through scholarly publications, i.e. at least one publication in top-ranked conferences/journals
    4. Excellent communication skills; experience in effectively working with people from a variety of culturally diverse backgrounds; experience in mentoring undergraduate and graduate students
    Contact: Dr. Paul Flikkema (paul.flikkema@nau.edu)
    Last updated: 2020-05-17 posted on 2020-05-16

    Post-Doc
    University of Warsaw

    We are looking for talented and motivated Post-Docs to work on the ERC AdG project PROCONTRA: Smart-Contract Protocols: Theory for Applications. The project is about theoretical and applied aspects of blockchain and smart contracts.

    The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.

    We offer competitive salary and a budget for conference travel and research visit.

    The project is expected to start on Sep 1, 2020. There is no specific deadline for this call, but we will start looking at the applications from Jun 15th, 2020. For the application instructions go to the following page: www.crypto.edu.pl/positions.

    Contact: Stefan Dziembowski
    Last updated: 2020-05-20 posted on 2020-05-16

    Cryptographic Researcher/engineer
    Beijing Genomics Institute, Shenzhen, China
    Responsibilities

    1. Collaborate with other biological data scientists and responsible for health data (eg. genetic data) security and privacy protection research and development. Propose new solutions based on cutting-edge security technology to meet the needs of healthcare field.

    2. Follow up research on the application of cutting-edge cryptography technology, cryptographic algorithm implementation and performance optimization, such as lattice cryptography, homomorphic encryption, and zero-knowledge proof in the field of blockchain or data storage.

    Qualifications

    1. Master degree or above (PhD prefered) in cryptography, computer science, mathematics or related fields

    2. Excellent in security fundamentals, such as digest algorithm, symmetric encryption, asymmetric encryption and signature algorithm principles and their implementation

    3. Familiar with cutting-edge cryptography technologies, including secure multi-party computing, homomorphic encryption, etc .

    4. Interested in healthcare big data management and privacy protection

    Contact: Dr. Yuantong Ding, dingyuantong(at)genomics.cn
    Last updated: 2020-05-08 posted on 2020-05-07

    Protocol Engineer
    Status
    Status is building a communications tool with extreme security, coercion resistance and privacy in mind. As a protocol engineer in the Vac team, you will help us research and develop new and existing technologies in secure messaging.
    Contact: Ceri Power CA29 FB53 97E3 0232 106A  2DE6 9F07 1B10 A0D1 12EB
    Last updated: 2020-04-30 posted on 2020-04-30

    Ph.D. Student (3 years)
    XLIM, University of Limoges (France)

    This Ph.D. thesis is offered as part of the ANR-funded 4-year research project MobiS5. The goal of MobiS5 is to provide a cryptographic toolbox for the emerging 5G technologies. More information can be found at: https://mobis5.limos.fr/index.html.


    This 3-year Ph.D. thesis will focus on the two following aspects of 5G security:

    • 5G Core Network security
    • Delegation in the context of 5G networks
    We are looking for motivated and hard-working students with a strong background in cryptography, with a degree in Mathematics, Applied Mathematics, or Computer Science (with an affinity for mathematics). Understanding of basic cryptographic primitives and protocols is a requirement. You must also have a good level of spoken and written English. A basic working knowledge of provable security and/or formal verification are a strong plus. Spoken and written French are also a plus. Interested? Here is how to apply ! https://mobis5.limos.fr/jobs.html
    Contact: Cristina Onete (maria-cristina.onete@unilim.fr) or Olivier Blazy
    Last updated: 2020-04-22 posted on 2020-04-22

    Phd
    CEA-LETI, Grenoble, France
    Side-channel attacks consist in measuring the physical activity emitted by a circuit (processor, microcontroller or cryptographic accelerator) to extract secrets. The consumption of the circuit or the electromagnetic emanation are the most commonly exploited signals. Due to the development of the Internet of Things (IoT), more and more systems are exposed to these attacks. Unfortunately, integrating countermeasures (software or hardware) against such attacks is extremely expensive. Therefore, it is essential to have an accurate idea of side-channel leakages as early as possible in the design phases. On the one hand to target countermeasures on critical areas and on the other hand to have a realistic view of leakages in order to automate the application of countermeasures. The thesis topic is the exploration of electromagnetic leakage models and different ways of interpreting them. The general objective of this work is to model the leakages of a processor based on its state at different abstraction level: Register Transfer Level (RTL), microarchitecture or even instruction set simulator (ISS). The LSOSP laboratory of CEA-LETI where the thesis will take place has a strong experience on physical measurements and has already performed preliminary research on the subject. Therefore, the candidate will start from these results and will perform physical measurements and manipulate different logic models to create a precise leakage model of the targeted processor.
    Contact: Vincent Dimper
    Last updated: 2020-04-21 posted on 2020-04-16

    Phd
    CEA-LETI Grenoble, France
    Industrial systems are often used to monitor and control a physical process such as energy production and distribution, water cleaning or transport systems. They are often simply called Supervisory Control And Data Acquisition (SCADA) systems. Due to their interaction withthe real world, the safety of these systems is critical and any incident can potentially harm humans and the environment. One of the main research axis in cybersecurity of industrial systems deals with combination of safety and security properties. Safety relates to applicative properties of the system (e.g. chemical properties for a chemical factory); while security properties take into account how an intruder can harm the system. As show in [3], combining safety and security is a challenging topic as these properties can be either dependent, strengthening, antagonist or independent. currently no tool is able to handle both aspects at the same time. In this context, we propose a Ph.D thesis revolving around modeling of industrial systems taking into account both safety properties of the physical process and security properties. Besides the definition of an accurate, yet automatically analyzable modeling framework/language, many aspects can be part of the subject. For instance, programmable automata (PLC) configuration files could be generated from this model in order to only deploy programs validated beforehand. PLC vulnerabilities could be studied (firmware reverse engineering, protocol fuzzing) in order to test the technical feasibility of found attacks. Finally, in a certification context, security analyzes on the model could include requirements from standards such as IEC 62443 [5] to help evaluation process
    Contact: Maxime Puys
    Last updated: 2020-04-27 posted on 2020-04-16

    Phd
    CEA-LETI (Grenoble, France)
    As a consequence of the rapid development of the Internet of Things (IoT), where devices are massively interconnected, security breaches are discovered daily. The growing threat of physical attacks, on which connected objects are widely exposed, forces chipmakers to increase the security of their products. True Random Number Generators are the cornerstone of device security; they are required for running cryptographic algorithms and fully integrated into encryption engines. The security level of the system directly depends on the randomness of the bits generated. Furthermore, IoT chips are facing harsh constraints in terms of price and power consumption. In order to be integrated into these chips, TRNG must offer an efficient tradeoff between cost and security. In this perspective, TRNGs based on already integrated components, such as RRAM memories, is a promising lead.
    Contact: Florian Pebay-Peyroula
    Last updated: 2020-04-27 posted on 2020-04-16

    PhD
    CEA-LETI
    This study is focused on the security of embedded systems and in particular asymmetric cryptography against horizontal attacks and Template attacks. Recent studies, applied to symmetric cryptography, have made it possible to build new techniques for side channel attacks. By improving the effectiveness of Template attacks, these new attacks make it easier to bypass masking countermeasures. It seems appropriate to study these new tools in depth in the context of Template and horizontal attacks against asymmetric cryptography, especially for elliptic curves. The use of machine learning in the context of side channel attacks. The main purpose of the thesis is to evaluate the security properties of ECCs against the most advanced Template and Horizontal attacks that use machine learning. Depending on the results obtained, new countermeasures will have to be constructed in order to address any new weaknesses.
    Contact: Antoine Loiseau
    Last updated: 2020-04-27 posted on 2020-04-16

    PhD scholarship for UK/EU/International student
    University of Warwick

    This is a fully-funded Ph.D. position for a UK/EU/International student (tuition fees plus stipend) to pursue a Ph.D. research degree in the Department of Computer Science, University of Warwick. Note that for international students, the overseas tuition gap will be covered as well.

    The project is in the area of security and cryptography, in particular, investigating next-generation cryptocurrency that is more scalable, privacy-preserving, and usable than what we have today.

    An ideal candidate should have excellent undergraduate and master degrees (equivalent to at least a UK 2.1) in Computer Science or relevant disciplines such as Mathematics and Engineering; a solid mathematical background as well as strong programming skills; experience in security research.

    The closing date for application is 30 April 2020.

    Interested candidates are encouraged to apply as early as possible. First, express your interest by sending your CV to Prof Feng Hao (feng.hao@warwick.ac.uk). If your background is found suitable, you will be directed to make a formal application. All formal applications will need to be made online through https://warwick.ac.uk/study/postgraduate/apply/research/.

    Further information about the research environment: The Department of Computer Science, University of Warwick is one of the leading CS departments in the UK. In the latest 2014 REF (Research Excellence Framework) assessment participated by all UK universities, Warwick Computer Science is ranked the 1st for research output, 2nd for research impact, and 2nd overall among 89 CS departments in the UK. The University of Warwick is consistently ranked among the top 10 universities in the UK. It is also known for its beautiful campus, friendly social environment, vivid student lives, and easy transport links to all major cities in the UK including London.

    Contact: Professor Feng Hao
    Last updated: 2020-03-29 posted on 2020-03-27

    Research Fellow / Postdoc
    Nanyang Technological University / Temasek Labs @ NTU
    We are looking for candidates for 1 Research Fellow / postdoc position (from fresh post-docs to senior research fellows, flexible contract duration) on symmetric-key cryptography and/or side-channel analysis. Candidates are expected to have a proven record of publications in top cryptography/security venues. Salaries are competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Interested applicants should send their detailed CVs, cover letter and references to Prof. Thomas Peyrin (thomas.peyrin@ntu.edu.sg). Review of applications starts immediately and will continue until positions are filled.
    Contact: Thomas Peyrin (thomas.peyrin@ntu.edu.sg)
    Last updated: 2020-03-27 posted on 2020-03-26

    Post-Doc in Secure Multi-Party Computation
    UC Berkeley
    The Security & Crypto Group in the EECS Department at UC Berkeley welcomes inquiries for postdoctoral fellowships in the area of secure multi-party computation. Please send a CV to raluca.popa@berkeley.edu, and list at least three letter writers in the CV.
    Contact: raluca.popa@berkeley.edu
    Last updated: 2020-03-19 posted on 2020-03-19

    Cryptographer
    SHIELD Crypto Systems, Toronto, Canada
    Responsibilities include but are not limited to conducting research in the areas of homomorphic encryption, post-quantum cryptography, privacy-preserving mechanisms applied to machine learning, and security proofs, and building software prototypes to demonstrate the feasibility of technical solutions. The ideal candidate will initiate and organize the design, development, execution, implementation, documentation and feasibility studies of scientific research projects to fuel SHIELD’s growth in secure computing and cloud product concepts and new business opportunities. They will also pioneer substantial new knowledge of state-of-the-art principles and theories, contribute to scientific literature and conferences, and participate in the development of intellectual property. Required Abilities: 1) Highly competent in interpersonal communication. 2) A self-starter with initiative and a strong drive to identify and resolve technical issues. 3) Able to clearly explain complex concepts and take the lead in team decision-making. Qualifications: 1) PhD in cryptography. 2) One or more publications on cryptography in a top-tier, peer-reviewed conference/journal. 3) Deep expertise in the state-of-the-art of partially-, somewhat-, and fully homomorphic encryption; experience implementing prototypes is a strong asset. 4) Thorough understanding of lattice-based cryptography, including the underlying security problems, parameter selection, implementation, and side-channel resistance. 5) Skill in developing software prototypes in any of the following programming languages: C++, C, Python, Go or Rust. Preferred Qualifications: 1) Familiarity with other post-quantum cryptography families (e.g. hash-based signatures, code-based, isogeny or multivariate quadratic cryptography). 2) Familiarity with the application of privacy-preserving cryptographic techniques to machine learning. 3) Familiarity with highly regulated industries, such as banking, government, and/or health care. For immediate consideration, please submit your CV/resume and transcripts to careers(at)shieldcrypto.com and include “Cryptographer” in the subject line.
    Contact: Alhassan Khedr (CTO)
    Last updated: 2020-03-18 posted on 2020-03-17

    Senior Cryptographic Researcher - Single assignment
    Australian Payments Network, Sydney, Australia
    The PCI Standards Council (PCI SCSC) was founded in 2006 by American Express, Discover, JCB International, MasterCard and Visa Inc. who share equally in governance and execution of the organisation’s work. Its stated aim is to bring payments industry stakeholders together to develop and drive adoption of data security standards and resources for safe payments worldwide. PCI SSC mandates in the PIN Security Requirements and Testing Procedures: V3 2018 that to achieve “Control Objective 5: Keys are used in a manner that prevents or detects their unauthorised usage”, that “Encrypted symmetric keys must be managed in structures called key blocks. The key usage must be cryptographically bound to the key using accepted methods.” This is PIN Security Requirement 18-3, which further details three acceptable methods of implementing this requirement but also states that these methods are not an exhaustive list. The Australian payments industry does not use key blocks to manage the symmetric keys used as PIN Encrypting Keys (PEK). The question of which other methods are acceptable has been raised, which has resulted in a PCI FAQ. The latest version of which is in the publicly available document PCI PTS PIN Security Requirements, Technical FQAs V3, February 2020, FAQ 27, and requires an independent expert to assess the equivalency of other methods. PCI has also produced several blogs on the case for key blocks and two Informational Supplements, PCI PTS PIN: Cryptographic Key Blocks June 2017 and PCI PIN Security Requirement: PIN Security Requirement 18-3 Key Blocks: June 2019. AusPayNet is seeking to engage an independent expert, who meets the requirements set out by PCI in the PIN Security FAQ 27. This expert must assess the Australian PEK key management methodologies and determine if they provide equivalent levels of protection that prevent or detect their unauthorised usage, as compared to key blocks. AusPayNet is seeking to have the work completed in Q2 2020. For more information or to provide a copy of your CV and some indicative costs.
    Contact: Arthur Van Der Merwe - avande22@myune.edu.au
    Last updated: 2020-03-18 posted on 2020-03-11

    Three Ph.D. positions (post-quantum cryptography hardware, fault detection, and cryptanalysis)
    Villanova University, Department of Electrical and Computer Engineering
    1. Overall introduction. There are three Ph.D. position openings (full scholarship, tuition & very competitive stipend) at Dr. Jiafeng Harvest Xie's Security & Cryptography (SAC) Lab for the Fall of 2020, located at the Department of Electrical and Computer Engineering of Villanova University (PA, USA).

    2. Research area. Post quantum cryptography hardware, fault detection/attack, and cryptanalysis.

    3. Qualification. Preferred to have research experience in the areas of cryptographic engineering, fault detection, cryptanalysis, and VLSI design. Students from electrical/computer engineering, computer science, and cryptography (applied mathematics) or other related majors are WARMLY welcome! Programming skills such as HDL, C++, Python will be more favorable.

    4. Application process. Interested students can directly send the CV/resume to Dr. Jiafeng Harvest Xie's email: jiafeng.xie@villanova.edu.

    5. Application information. The detailed application requirement is available at https://www1.villanova.edu/villanova/engineering/grad/admission/departmentalRequirements.html

    6. Additional information. Villanova University is a private research university located in Radnor Township, a suburb northwest of Philadelphia, Pennsylvania. U.S. News & World Report ranks Villanova as tied for the 46th best National University in the U.S. for 2020.

    7. PI introduction. Dr. Jiafeng Harvest Xie is currently an Assistant Professor at the Department of Electrical and Computer Engineering of Villanova University. His research interests include cryptographic engineering, hardware security, and VLSI digital design. He is the Best Paper Awardee of IEEE HOST 2019. He is also the Associate Editor for Microelectronics Journal, IEEE Access, and IEEE Trans. Circuits and Systems II.

    Contact: Dr. Jiafeng Harvest Xie, email: jiafeng.xie@villanova.edu
    Last updated: 2020-03-18 posted on 2020-03-10

    Post-doc, Assistant/Associate/Full Professor
    Shanghai Jiao Tong University
    The School of Cyber Science and Engineering (formerly known as the School of Information Security Engineering) of Shanghai Jiao Tong University was founded in October 2000. It was the first school-level training base for high-level information security professionals in China and was jointly established by the Ministry of Education of China, the Ministry of Science and Technology of China, and the Shanghai Municipal People’s Government. The undergraduate and postgraduate students of the school mainly come from the top 100 key high schools and 985/double first-class universities in China. The school is ranked among the best cyberspace security nationwide every year. The school has a solid foundation and strength in the field of academic research and technological innovation on cyberspace security. The school is committed to building a world-class academic research center, cultivating the talents of the country and society. The school is in great demand of a number of world renowned professors, outstanding young researchers, full-time research fellows and post-doctors. The school now has about 20 positions available at the rank of tenure-track Assistant Professors, tenure-track Associate Professors, or tenured Full Professors in theory and practice of cyberspace security. Applicants should have (a) a doctoral degree in Computer Science, Electronic Engineering, Communication, Mathematics or Statistics; (b) an established track record in research and scholarship; (c) expertise in the cryptographic and security research areas; and (d) a demonstrated commitment to excellence in teaching. The school will provide highly competitive remuneration packages and assist applicants to apply for various national, provincial and ministerial level talent programs such as “1000 Youth Talents Program”, Shanghai “Oriental Scholar Program”,etc. We will also assist on employment of spouses, schooling for children and medical care.
    Contact: Chaoping Xing, emial: xingcp@sjtu.edu.cn Linjie Li, email: lilinjie@sjtu.edu.cn
    Last updated: 2020-03-10 posted on 2020-03-09

    Postdoc
    University of Edinburgh
    A postdoctoral positions related to privacy-enhancing cryptography in distributed ledgers. Strong applicants in other areas of cryptography, or security & privacy might also be considered. Candidates should have a PhD in cryptography, or a security & privacy related field.
    Contact: Please apply with a cover letter and updated curriculum vitae to Markulf Kohlweiss, mkohlwei@ed.uk.ac. The position will be available until filled; only short-listed candidates will be notified.
    Last updated: 2020-03-10 posted on 2020-03-04

    20 Research Positions in Cryptography and Blockchain (all levels)
    Beijing Intitute of Mathematical Sciences and Aplications, Beijing, China
    BIMSA

    Beijing Institute of Mathematical Sciences and Applications (BIMSA) is a new research institution to be established and lead by Professor Shing-Tung Yau, a Fields medalist of 1982. Its location is in the Yanqi Lake area of Beijing where APEC 2014 was hosted. It was expected to launch by the end of March 2020.

    Program

    Advanced Cryptography and Blockchain Program will be one of the many research groups of BIMSA. It will be focused on:

    • zero knowledge proofs (zk-SNARKs etc.)
    • fully homomorphic encryption
    • secure multiparty computation
    • related cryptographic schemes
    • blockchain

    with a combination of theoretical studies and practical implementations.

    Positions

    We have 20 open positions on all levels, with competitive compensation packages:

    • Distinguished Research Professor
    • Research Professor
    • Associate Research Professor
    • Assistant Research Professor (tenure-track)
    • Visiting Research Professor
    • Research Fellowship (postdoc)

    We intend to build a strong and highly international team, participating in the mainstream of academic studies and industrial innovations worldwide.

    For further information, please check the following links:

    http://ymsc.tsinghua.edu.cn/en/content/show/91-275.html

    https://www.mathjobs.org/jobs/jobs/14633

    https://www.linkedin.com/feed/update/urn:li:activity:6634985279591718912/

    Contact: Prof. Kevin Mo, cryptogroup.bimsa@outlook.com
    Last updated: 2020-03-05 posted on 2020-02-26

    PhD & Postdoc Positions in Cryptography and Privacy
    Hasso-Plattner-Institute, University of Potsdam, Germany

    The Cybersecurity - Identity Management group at the Hasso-Plattner-Institute (HPI), University of Potsdam is seeking to fill several PhD and PostDoc positions in the area of cryptography and privacy.

    Your future tasks
    • Development of provably secure cryptographic protocols for real-world problems. Topics of interest include (but are not limited to):
      • Distributed identity management
      • Privacy-enhancing technologies
      • Foundations and solutions for real-world cryptography
    • Publish and present results at top-tier international conferences
    • Participate in teaching activities
    Your skills
    • Master's degree (or PhD for postdoctoral position) in Computer Science, Mathematics, or a related area by the time of appointment
    • Profound knowledge in the areas of cryptography and IT security (for postdoctoral candidates proven in the form of publications in these areas)
    • Excellent English language skills
    What we offer
    • Collaborative work environment in a newly established research group
    • Outstanding setting to conduct top academic research with strong connections to industry
    • Working at the HPI campus in Potsdam-Babelsberg (S-Bahn station Griebnitzsee) near to Berlin

    We look forward to your application including two references, motivation letter and copies of relevant diplomas and certificates. Please submit your application documents (only as PDF) via email.

    Contact: Anja Lehman, email: anja.lehmann (at) hpi.de
    Last updated: 2020-02-21 posted on 2020-02-21

    Post-Doc
    University of Clermont-Auvergne, France
    Constraint Programming for Cryptanalysis of Symmetric Encryption Schemes
    • Location: LIMOS, Clermont-Ferrand, France
    • Salary: 2000€
    • Duration: 1 year
    • Keywords: Cryptanalysis symmetric, constraint programming, SAT solving, ILP.
    • Starting date: As soon as possible, when we have a good candidate; at least before October 2020.
    Your Profile
    • A PhD in Computer Science, Applied Mathematics, Cryptography or related field.
    • Competitive research record in symmetric cryptography or in constraint programming.
    • Commitment, team working and a critical mind.
    • Good written and verbal communication skills in English are essential.

    This post-doc is founded by the ANR project Decrypt started in January 2019.

    Transforming a theoretical cryptanalysis into a SAT problem or into a set of linear constraints could be a hard and time-consuming task. Our aim is to use constraint programming (CP) to simplify the way the symmetric key attacks are modeled and thus to overpass existing cryptanalytic results. Preliminary studies are really encouraging.

    Goal

    The main goal is to identify schemes and attacks for which it is possible to use off-the-shelf CP, SAT or ILP approaches. To achieve this goal, the work will be divided into the following tasks.

    1. Study symmetric encryption schemes and identify for several schemes the different components that are used in the scheme design.
    2. Design CP, SAT, and ILP models for cryptanalytic problems on selected schemes. We will mainly focus on the following attacks: cube attacks, conditional cube attacks with division property, (related-key) differential and linear cryptanalysis, word-based division property / integral distinguisher.
    3. Experimentally evaluate CP, SAT, and ILP solvers on the models designed in previous tasks, and compare these solvers with existing dedicated cryptanalysis approaches. Design of a tool to automate this task is one of the goals of the project.
    Contact: Pascal Lafourcade pascal.Lafourcade@uca.fr
    Last updated: 2020-02-21 posted on 2020-02-20

    Ph.D. student
    Taiyuan University of Technology (TYUT), China

    2 PhD positions are provided in College of Big Data, Taiyuan University of Technology (TYUT), China. The research topics include but not limited to: blockchain, IoT security, data security, and applied cryptography.

    Taiyuan University of Technology (TYUT), which was one of the first three national universities in China, was established in 1902. TYUT now has 30960 undergraduates, 7017 postgraduates and 762 doctoral students.

    Scholarship for graduates from TYUT: tuition fees will be waived, and the monthly living allowance will be provided. Scholarship and admission details can be found in the pdf file from this link: http://ciee.tyut.edu.cn/info/1016/3205.htm

    Application deadline: open until the positions are filled. All successful candidates are expected to start in September 2020.

    Interested applicants are advised to email the following documents to huangxin@tyut.edu.cn. (1) CV, (2) Reference letters, (3) Personal statement, (4) School transcripts, (5) Publications if possible.

    Contact: Prof. Xin Huang, Email: huangxin@tyut.edu.cn
    Last updated: 2020-02-18 posted on 2020-02-17

    Post-Doc in Applied Cryptography/Cryptographic Protocols
    TU Darmstadt, Germany

    The Cryptography and Privacy Engineering Group (ENCRYPTO) at Technische Universität Darmstadt offers a position for a Postdoctoral Researcher in the project “Privacy-preserving Services on The Internet” (PSOTI) funded via an ERC Starting Grant. We develop techniques and tools for protecting privacy in applications.

    Job Description
    The fully funded position is for up to 2.5 years with starting date as soon as possible. In our project, we will build privacy-preserving services on the Internet. This includes protocols for privately outsourcing, searching and processing data among untrusted service providers using secure multi-party computation, and building a scalable secure multi-party computation framework. You will co-advise PhD students, be involved in the project management, do research, build prototype implementations, and publish the results at top venues in IT security / applied cryptography. We provide an open and international working environment for excellent research in a sociable team. TU Darmstadt is ranked as a top university for IT security and cryptography in Europe and computer science in Germany. The position is based in the “City of Science” Darmstadt, which is very international and livable, and well-connected in the Rhine-Main area around Frankfurt.

    Your Profile
    • You have a completed PhD degree (or equivalent) from a top university in IT security, computer science, applied mathematics, electrical engineering, or a similar area.
    • Publications at top venues for IT security/applied cryptography (e.g., S&P, CCS, NDSS, USENIX SEC, EUROCRYPT), ideally on cryptographic protocols and secure computation, are required.
    • Experience in software development, project management, and supervising students is needed.
    • You are self-motivated, reliable, creative, able to discuss/write/present scientific results in English, and can conduct excellent research on challenging scientific problems with practical relevance.
    Application deadline: None; applications will be accepted until the position is filled.
    Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
    Last updated: 2020-06-17 posted on 2020-01-20