International Association for Cryptologic Research

International Association
for Cryptologic Research

Open Positions in Cryptology

Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


Innovation Manager in the Field of Computing on Encrypted Data
KU Leuven, Belgium
This position in the COSIC research group of the KU Leuven, addresses valorization opportunities in new forms of cryptography that support calculations on encrypted data, without having to decrypt the data. These new forms of cryptography include fully homomorphic encryption, multi-party computation, trusted execution environments and related topics.

The Innovation Manager will identify opportunities for bilateral projects and research platforms, technology transfer, and potentially spin-off companies, including the definition of licenses, patents or other forms of valorization. All these tasks are executed in coordination with KU Leuven Research and Development. In particular, the Innovation Manager will assist in defining and maintaining a strategic research agenda to create a continuum between fundamental research, strategic research and applied research.

The lndustrial Research Fund (lOF) of KU Leuven forms a bridge between strategic basic research, technological innovations and industrial collaborations. Based on cooperations with KU Leuven research groups and different stakeholders from industry and society, we aim to broaden our valorization portfolio and to increase the transfer of knowledge. We have a team of more than 40 experienced innovation managers involved in the development of practical and innovative technological solutions based on the expertise and infrastructure of the research groups within KU Leuven.

Profile

  • PhD or equivalent research expertise in applied cryptography
  • Preferably industrial experience
  • At least a high level understanding or parts of MPC, FHE, PQC, TEE
  • Experience in valorization of research results
  • Creative, enthusiastic, with a strong commitment to research valorization
  • Proactive, entrepreneurial mindset
  • Strong communication skills, including international and intercultural
  • Willing to travel globally
Offer An exciting and challenging job, focused on continuous innovation and development in a transdisciplinary and international context. We offer a permanent position as Innovation Manager of the Industrial Research Fund (IOF) at KU
Contact: Nigel Smart (nigel.smart@kuleuven.be) Ingrid Verbauwhede (ingrid.verbauwhede@kuleuven.be) Frederik Vercauteren (frederik.vercauteren@kuleuven.be)
Last updated: 2020-07-03 posted on 2020-07-03

Cryptography/Blockchain Software Engineer (Remote)
Fujitsu Laboratories of America
The Security and Cryptography team in Fujitsu Laboratories of America is looking for an engineer for contributing to opensource blockchain projects. You will work closely with a team of cryptographers and security researchers located in Sunnyvale, California and Tokyo, Japan. Your main task will be secure software development in C/C++/Rust/golang/Nodejs as part of Fujitsu Laboratory's OSS activity in Hyperledger. In addition, you will also be encouraged to write academic papers based on your work leading to publications in top tier cryptography and security conferences.

Profile Description:

  • Proven experience in production quality software development.
  • Previous experience and code contributions to open source projects is a plus.
  • Experience in implementation of cryptographic libraries.
  • Graduate level knowledge of crypto theory. Familiarity with threshold cryptosystems and multiparty protocols (MPC). Academic publications in Crypto/Security is a plus.
  • Experience in design and implementation of large software systems and writing secure code in C/C++/Rust/Golang.
  • Familiarity with blockchain systems such as Hyperledger Fabric and/or Ethereum.
  • Ability to meet deliverables and deadlines with minimal supervision.
  • Fluent in written and spoken english.
Working hours are flexible. Initially you will be offered a full time (we are also open to offering part time) remote contractor position for six months. Depending on your performance and status of the project, the contract can be extended or can be converted to a full time permanent position based on Sunnyvale, California.

Deadline for Application: Open until the position is filled.
Start Date: Immediate, but flexible.
Salary: Very attractive, depends on experience.

Contact: Avradip Mandal, Researcher. amandal@fujitsu.com
Last updated: 2020-06-30 posted on 2020-06-29

Ph.D Student
Max Planck Institute for Security and Privacy

The Max Planck Institute (MPI) for Security and Privacy is looking for motivated students to apply for a Ph.D. program. The research will be conducted on the theory of cryptography and computer security and more specifically in one of the following topics:

  • Homomorphic encryption and code obfuscation
  • Zero-knowledge proofs and succinct arguments
  • Cryptocurrencies and blockchains
  • Post-quantum and lattice-based cryptography
  • Multi-party computation
  • Other research proposals by the candidate will also be considered, depending on the common interests.

    The ideal candidate shall satisfy the following requirements:

  • Have a Master degree or equivalent (or is close to complete one) in computer science, mathematics, or related fields
  • Is fluent in English and has excellent communication and writing skills
  • Is familiar with probability theory and mathematical proofs. Strong background in cryptography, linear algebra, number theory, or complexity theory is a plus
  • Most importantly, is passionate about learning new concepts and determined to solve challenging questions in the theory of cryptography and computer security
  • Publications (or manuscripts under submission) in related areas are greatly valued but are not mandatory

    The MPI for Security and Privacy is co-located with the Ruhr University of Bochum (Germany) and offers a vibrant atmosphere for research that spans across all aspects of computer security. The Ph.D. program is entirely in English and the knowledge of German is not required for a successful career at MPI.

    The position is fully funded (100%) and paid according to the E-13 pay category. The starting date if flexible but ideally somewhere in fall 2020. To apply for the position, send an email to Giulio Malavolta (address below) including the following documents:

  • A curriculum vitae
  • 2-3 recommendation letters from previous advisors or employers
  • A brief cover letter (half page at most) describing your research interests

    If you have any question, don’t hesitate to get in touch.

  • Contact: Giulio Malavolta (giulio.malavolta@berkeley.edu)
    Last updated: 2020-06-30 posted on 2020-06-29

    Senior Security Researcher (m/f/d)
    Huawei Technologies Duesseldorf Gmbh (Munich Research Center, Germany)
    Your responsibilities:

    • Research the security properties of 3GPP radio access network technologies including 4G and 5G (NR), identifying possible weaknesses / enhancements • Research mitigations of identified security/privacy issues. • Collaborate with EU universities on 5G security research • Help shape the industry with new innovation via standardization bodies e.g. 3GPP, ETSI, etc. • Work with the world leading researchers on the most advanced technologies including AI, IoT under the scope of 5G security.

    Our requirements:

    • PhD in computer science or advanced PhD with focus on telecommunication security (preferably radio access technologies, the 3GPP air-interface protocol stack). • Several years of experience in network security research, specifically in the domains of protocol analysis, vulnerability detection, protocol correctness, protocol verification, etc. • Several years of experience researching and developing tools/demos/PoCs which demonstrate the impact of such security issues (vulnerabilities) on the network. • Several years of experience researching and implementing mitigation solutions (PoC/Demo level) for protocol vulnerabilities including algorithms development, performance/cost and impact analysis of algorithms implementation. • Openness to work in a diversified work environment with unique work cultures. • Experience in presenting technical information to both technical and non-technical audience. • Fluent in English (written and spoken).

    Must be eligible to work in the EU to be considered for this position.

    Please apply here: https://apply.workable.com/j/64698ECA7B

    By applying to this position, you agree with our PRIVACY STATEMENT. You can read in full our privacy policy via the link below. https://career.huawei.com/reccampportal/portal5/grcprivacy.html

    Contact: Viet-Duc Benedikt Lai (email: duc.lai.ext[at]huawei.com)
    Last updated: 2020-07-03 posted on 2020-06-29

    Project Scientist
    Indian Institute of Technology Delhi (Workplace: IIT Bhilai, Raipur)
    Work Sub-area:
  • Lightweight Cryptography including authentication protocols
  • Secure boot mechanisms for embedded/IoT devices

    Funding Agency: Ministry of Communication and Information Technology

    Tentative Duration: Upto:31/03/2021

    Qualifications: B. Tech. (with GATE qualification) / MSc. (with NET/SET qualification) / M.C.A. (with GATE* qualification) 1st class or equivalent in the appropriate discipline.

    Desirables: Basic knowledge of cryptography or some experience with using RFID tags or experience on some Raspberry based project or using Trusted Platform Modules (TPMs)

    Note: The requirement of qualifying NET/SET/GATE qualification may be relaxed by the Committee in case of highly meritorious candidates.

  • Contact:
    Dr. Dhiman Saha,
    Department of Electrical Engineering and Computer Science,
    Indian Institute of Technology Bhilai.
    email: dhiman [at] iitbhilai [dot] ac [dot] in

    For more info about the research group and other opportunities visit: http://de.ci.phe.red

    Last updated: 2020-06-30 posted on 2020-06-29

    Post-Doc in Lattice-based Cryptography
    Information Security Group, Royal Holloway, University of London, UK

    The ISG is seeking to recruit a post-doctoral research assistant to work in the area of cryptography. The position is available now until 1 June 2022.

    The PDRA will work alongside Prof. Martin Albrecht, Dr. Rachel Player and other cryptographic researchers at Royal Holloway on topics in lattice-based cryptography. This post is part of the EU H2020 PROMETHEUS project (https://www.h2020prometheus.eu) for building privacy preserving systems from advanced lattice primitives. Our research focus within this project is on cryptanalysis and implementations, but applicants with a strong background in other areas such as protocol/primitive design are also encouraged to apply.

    See also this blog post (https://martinralbrecht.wordpress.com/2020/06/26/postdoc-at-royal-holloway-on-lattice-based-cryptography-3/) for more details.

    Contact: Martin Albrecht or Rachel Player
    Last updated: 2020-06-26 posted on 2020-06-26

    Research Assistant Professor in Additive Manufacturing with Emphasis on Cybersecurity
    University of North Texas; Denton, Texas, USA
    Department Summary: University of North Texas (UNT) is rapidly building its Center for Agile and Adaptive Manufacturing (CAAAM), a State of Texas funded multi-million-dollar initiative with a multi-disciplinary focus on further advancing the science and technology of additive manufacturing (AM). CAAAM involves a multi-disciplinary team of researchers from materials science, mechanical engineering, manufacturing, data science, cybersecurity and logistics & supply chain, committed to collaborating on large research projects with an emphasis on additive manufacturing.

    Position Summary: CAAAM is seeking a Research Assistant Professor to collaborate with a team of faculty on cybersecurity issues related to AM. This is a non-tenure track terminal position with a primary association with CAAAM and secondary association with an appropriate academic department. The selected candidate is expected to focus on cybersecurity in the context of advanced manufacturing systems in general and additive manufacturing systems more specifically. A successful candidate will work closely with faculty in the Computer Science and Engineering department as well as other faculty and researchers in CAAAM. The candidate is expected to conduct research on securing advanced manufacturing systems and develop fundamental and innovative approaches to the design and validation of secure, trustworthy and resilient cyber systems for industrial automation. The candidate is also expected to develop educational material for training workforce to operate advanced manufacturing systems as well as mentor graduate students and post-doctoral researchers working in CAAAM.

    Minimum qualifications include an earned doctorate in Computer Engineering, Computer Science or a related discipline with a research focus on cybersecurity in general but more specifically, cybersecurity related to cyber-physical systems, security in edge devices, hardware/systems security, security of IoT’s and Industrial IoT’s, design and validation of secure and resilient cyber-physical systems. The research background should be evident from high quality publications.

    Contact: Krishna Kavi (Krishna.Kavi@unt.edu), Mary Chandler (Mary.Chandler@unt.edu)
    Last updated: 2020-06-26 posted on 2020-06-25

    Research and Development Technologist, CBDC
    Bank of Canada, Ottawa, Ontario, Canada
    What you will do

    Reporting to the Director, Fintech Research team in the IT Services department, you use your expertise and intellect to solve unique and difficult problems. Working in a talented and diverse team you touch all phases of a research and development project towards meeting challenging policy goals.

    You will have the opportunity to use your specialized skills, develop these further and contribute to other areas of the project:
    - Devise technical solutions to difficult and unique problems either independently, with team members or with external vendors and experts as required
    -Identify gaps and Investigate emerging technologies as required for their application for CBDC
    - Liaise closely with, and consider impacts on, other aspects of the system, outside the immediate area of responsibility, in formulating technical designs
    - Recommend solutions to specific problem to solution architect and project leadership with a holistic view of impacts (e.g. effectiveness of solution, costs, risks, evolution over time)
    - Explain and justify design choices, especially when multiple options are available
    - Explain technologies and solutions to other technical audiences and occasionally business stakeholders in the Bank
    - Assist in the design and development of proof-of-technologies / proof-of-concepts
    - Contribute to development of a working CBDC system
    - Contribute to the documentation and body of knowledge of technical designs
    - Give intellectual leadership to other members of the team involved in the same domain area
    - Manage day-to-day relationship with external parties such as vendors to ensure efficient work practices and management of risks
    - Manage and balance the workloads of multiple simultaneous projects

    What you can expect from us

    Salaries are based on qualifications and experience and typically range from $94,100 and $117,600 (job grade 18). The intent is to staff at job grade job grade 18. Based on business needs and the successful candidate’s experience, knowledge and competencies, the position may be staffed at JG 17 ($83,900 and $104,
    Contact: Apply Online using above link
    Last updated: 2020-06-26 posted on 2020-06-25

    Research Scientist (Brussels, Belgium)
    OneSpan Brussels
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Research Scientist (Cambridge)
    OneSpan
    OneSpan is seeking applications for highly motivated and self-driven research scientists to complement its Innovation Centre team currently working on cutting-edge research in security, privacy, machine learning and digital identity. The Innovation Centre was established to research and prototype the next generation of digital technologies to improve online security. We seek to make technological advances in areas ranging from OneSpan’s core business of strong authentication, to areas of growing importance such as cybersecurity incidents detection, digital identity and privacy. Our work aims to generate new scientific knowledge, prototypes, and intellectual property that can be transferred into products. We also aspire to be a leading academic-industry partner of choice on emerging technologies related to online security. Job Duties and Responsibilities The objective of the research scientist is to conduct applied research linked to OneSpan’s product range with the aim of enhancing OneSpan’s offering in the short and mid-term. Your key tasks are: Propose research agenda. Perform first-class research. Create research software prototypes that could lead to new products. Show leadership in your field of expertise. Work collaboratively in a team that spans international borders and departments. Requirements Must haves A PhD degree or equivalent experience in information engineering, computer science. Candidates expected to finish their PhD before autumn 2020 will also be considered. Strong proven interest and knowledge of one or more of these research areas: security, machine learning, digital identity, and privacy A willingness to learn and the ability to quickly understand unfamiliar areas of technology. Desirable skills Interest in computer security and machine learning. Some experience in software development. Experience in working in multi-disciplinary teams Authoring reports for and presenting to non-technical audiences. Demonstrated ability to innovate through publications, patents or equivalent
    Contact: Julie Tinel
    Last updated: 2020-06-26 posted on 2020-06-24

    Post-doctoral position on blockchains (2 years)
    École polytechnique, France
    Cap Gemini funds a chair « blockchains and B2B platforms » fostering research and teaching at École Polytechnique. The Departments of Computer Science and Economics at École Polytechnique thus welcome applications for a post-doctoral research position in the blockchain domain.

    Depending on her/his profile, the chosen candidate will become a member of the cryptography team («Grace», joint with INRIA) at the Department of Computer Science, or of the Department of Economics. Candidates must hold a Ph.D. in computer science or in Economics, and have demonstrated great ability in research and teaching. Candidates must present a scientific research project in relation to blockchains.

    The mission of the accepted candidate will be to develop research, coordinate with PhD students and researchers, and also support the activities of the chair, by outreaching to the blockchain network in the Paris area, but also worldwide, and by supporting the communication and PR of the chair. If she/he wishes to, the candidate will be able to complement his or her activity by doing lectures, labs and student projects about blockchain platforms.

    Through a fast and lightweight process the candidate will be hired from Winter 2020 for two years, which could be extended for two more years after a further review process. The complementary teaching activity, if any, may complement the base salary. Successful candidates will work at Ecole Polytechnique located in Palaiseau, Paris area, France.

    Deadline for Application: July 23rd, 2020

    Contact: Daniel Augot, Senior researcher, INRIA and École polytechnique. Daniel.Augot@inria.fr
    Last updated: 2020-06-23 posted on 2020-06-22

    Research Associate (Postdoc) in Applied Cryptography
    CryptoLux Group, University of Luxembourg
    The CryptoLux group of the University of Luxembourg invites applications from Ph.D. holders in the general area of applied cryptography. CryptoLux is a group of cryptographers and security researchers interested in applied cryptography, cryptanalysis, privacy, network security, cryptographic blockchains and is led by Prof. Alex Biryukov. Candidates with interest in the following topics are welcome to apply:
    • Design and cryptanalysis of symmetric cryptographic primitives
    • Cryptocurrencies, blockchain
    • Privacy enhancing technologies, Tor
    • Side-channel attacks and countermeasures
    • White-box cryptography
    Candidates must have a Ph.D. degree in Computer Science, Applied Mathematics or a related field; competitive research record in applied cryptography or information security (at least one paper in top 10 IT security conferences); strong mathematical and algorithmic CS background; fluent written and verbal communication skills in English.

    The University offers a two-year employment contract, which may be extended up to five years. The University of Luxembourg offers excellent working conditions and a highly competitive salary. Interested candidates are invited to send their application by email to Alex Biryukov before August 1, 2020. The application should contain a brief cover letter explaining the candidate's research interests, CV with photo, a list of publications and the names and contacts of 3 references.

    Contact: Prof. Alex Biryukov
    Last updated: 2020-06-23 posted on 2020-06-22

    Lecturer in Cybersecurity
    New Jersey Institute of Technology
    The Department of Computer Science at New Jersey Institute of Technology (NJIT) seeks candidates to fill a University Lecturer/Senior University Lecturer position. Successful candidates must have an MS in Computer Science or a related computing area and will have demonstrated an expert grasp of knowledge of the Cybersecurity field at all levels, either through a demonstrated record of teaching excellence, or through industrial experience.

    Candidates are expected to mainly teach courses under the umbrella of Cybersecurity in support of our graduate and undergraduate programs. The successful candidate will also be involved in creating course content and materials with a focus on experiential and project-based learning.

    Interested applicants should submit their CV and the names of at least two references by applying as soon as possible at https://njit.csod.com/ats/careersite/JobDetails.aspx?site=1&id=1961. Applications will be reviewed on a rolling basis until the position is filled.

    Work environment and location:
    The Computer Science department, part of the Ying Wu College of Computing Sciences, is the largest at NJIT, comprising one tenth of the student population. It is also the largest computer science department among all research universities in the New York metropolitan area.​ Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.
    Contact: Reza Curtmola
    Last updated: 2020-06-23 posted on 2020-06-22

    Fully Funded PhD Position in Privacy-Preserving & Robust Machine Learning
    University of Lübeck, Institute of IT-Security, Privacy & Security Group, Lübeck, Germany
    The Privacy & Security group at University of Luebeck seeks to hire doctoral students for research in the one or more of the following areas:
    • enhancing or attacking training-data-privacy in machine learning algorithms
    • ensuring or attacking the robustness of machine learning algorithms
    • privacy-preserving health applications (including epidemiological applications)
    • privacy-preserving Smart Grid, Smart City applications
    • anonymous communication
    The ideal candidate is enthusiastic and has a strong background and interest in one or more of the following areas:
    • information security, differential privacy, or cryptography
    • mathematical statistics and probability theory
    • machine learning
    Candidates with a strong theoretical background in related areas are also encouraged to apply. Formal requirements for doctoral students are a master's or equivalent degree. The doctoral student will be a paid employee of University of Lübeck according to standard collective labour agreement regulations (TV-L E13, 100%), which compared to the local cost of living provides an attractive salary and attractive working conditions.

    Applications should include a curriculum vitae, a brief description of research interests, transcripts of grades, 2-3 letters of recommendation from teachers or employers, and, if possible, the Master's or Bachelor's thesis and publications.
    • Application deadline: 30 August 2020 (later applications might also be considered)
    • Starting date: 1 October 2020 (negotiable)
    About our group: The Privacy & Security group at the Institute for IT-security at the University of Lübeck works on researching privacy-preserving and robust methods to perform computations on large datasets such that the system work as expected and privacy of individuals is protected, including privacy-preserving machine learning, and anonymous communication.

    Contact: Prof. Dr. Esfandiar Mohammadi
    Privacy & Security group
    University of Lübeck
    https://mohammadi.eu

    Last updated: 2020-06-21 posted on 2020-06-21

    Two PhD positions in Privacy-preserving biometric authentication
    Chalmers University of Technology, Sweden
    The PhD students will join Prof. Mitrokotsa's group focusing on security and cryptography, working in the area of privacy-preserving biometric authentication and within the Marie Curie ITN project: "TRESPASS-ETN: Training in Secure and Privacy-preserving biometrics". Privacy-preserving biometric authentication focuses on guaranteeing accurate biometric authentication, while at the same time providing strong privacy guarantees (e.g., avoid tracking, profiling of users and leakage of sensitive information). The focus of one of the PhD positions would be to examine how to guarantee privacy-preservation in biometric authentication systems by employing advanced cryptographic methods such as secure multiparty computation (SMPC) primitives (e.g., homomorphic encryption) and verifiable computation (when biometric authentication is applied in a distributed setting). The second PhD position will focus on employing differentially private mechanisms in the biometric authentication process. The goal is to achieve high accuracy in the authentication process, while at the same time avoid any leakage of information. The PhD student will be supervised by Prof. Katerina Mitrokotsa in the area of information security and cryptography.
    Contact: Prof. Katerina Mitrokotsa
    Last updated: 2020-06-21 posted on 2020-06-18

    Software Developer for Payment Systems
    Be ys Pay France
    About be-ys

    Be-ys creates and monitors digital solutions for sensitive data processing in demanding business sectors such as healthcare and banking.
    We are the national leader in data security, which is expanding internationally and deploying its solutions using state-of-the-art technologies.
    We are now looking for new talents to strengthen our leading position and continue bringing innovation to the market.

    Job Description

    Our Be ys Pay subsidiary has created worldwide payment solutions. Our aim is to develop disruptive technologies for bank payment systems with smart card, mobile device and Blockchain. As part of its development, we are looking for a Software Developer for Payment Systems.
    As part of an expert team dedicated to the payment technology, smart card, blockchain, cryptography and cryptography business sectors, your main tasks will be to develop products in C, C++, Java and NodeJS languages for smart card personalization, payment transaction authorization, token generation/validation and wallets for mobile devices.
    You will be responsible for the development and implementation of algorithms, protocols and applications for PC or mobile devices for smart card issuance, as well as the development of solutions for the validation and generation of tokens for banking payment systems.

    Profile description

    • You have a 5-year degree in engineering, development and/or crypto
    • You have an excellent knowledge of C, C++, Java and cryptography.
    • Knowledge of payment technology with EMV standard and Blockchain would be a plus.
    • You enjoy working as part of a team and working collaboratively in an agile mode.
    • You are autonomous, proactive and have an interest in experimenting.
    • You like innovation and enjoy working in a constantly changing environment.
    • You must be fluent in English (written and spoken).
    Contact: Above all, we are looking for potential. We believe that passion for the job and skills are the key to a successful employee.
    We transform your energy into talent.
    To apply, please send your resume to: recrutement@almerys.com

    Last updated: 2020-06-17 posted on 2020-06-16

    Ph.D. Student
    Grenoble INP LCIS
    Securing components for the IoT market, as well as critical cyberphysical infrastructures, requires analyzing their vulnerabilities and defining hardware and software countermeasures at the fair cost. The increasing complexity of the processors and the applications they run means that the software fault models (such as instruction skips, or instruction replacement) usually used to analyze the vulnerability of their code are no longer sufficient to express the diversity of faulty behaviors in modern architectures [1]. Indeed, architecture designers have progressively added many complex hardware blocks (such as pipeline, cache memory, branch prediction, or speculative execution) to processors in order to optimize program execution. At the same time, fault injection techniques are constantly progressing (e.g., localized ElectroMagnetic or laser attacks, glitch injection attacks) allowing today higher-order injections (both multi-temporal and multi-spatial). Faced with these attacks, designers must implement countermeasures to detect or mask the effects of injected faults. These countermeasures can be implemented at the hardware level (e.g., duplication of elements, error correcting codes, isolation mechanisms) or at the software level (e.g., duplication of instructions or algorithms, insertion of security tests, signature verification). The design and validation of these countermeasures requires a realistic representation of the effects of faulty attacks (fault model) at the hardware and/or software level. The difficulties encountered are then: (1) the relevance of the fault models: do these fault models correctly represent the effects that an attacker can generate on a target processor? (2) the adequacy of countermeasures: do the countermeasures effectively protect the system, are they oversized and therefore too costly? (3) the link between software and hardware countermeasures: how to combine software and hardware countermeasures efficiently and at the fair cost, how to link the different levels for fault modeling? The CLAM project and the thesis that we propose aim to answer these questions by associating 3 French laboratories with complementary specialties.
    Contact: vincent.beroulle(at)lcis.grenoble-inp.fr; paolo.maistri(at)univ-grenoble-alpes.fr
    Last updated: 2020-06-17 posted on 2020-06-15

    Symmetric Cryptography Researcher
    Technology Innovation Institute - Abu Dhabi, UAE

    Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead. At TII, we help society to overcome its biggest hurdles through a rigorous approach to scientific discovery and inquiry, using state-of-the-art facilities and collaboration with leading international institutions

    As a Symmetric Cryptography Researcher, you will:

  • Design and implement symmetric cryptographic algorithms on software.
  • Conduct research in the field of symmetric cryptography and lightweight cryptography
  • Perform security assessments of cryptographic primitives at theoretical and implementation level.
  • Work closely with the other R&D teams to build secure systems using state-of-the-art cryptographic algorithms and protocols.

    Minimum qualifications:

  • PhD degree in one of the following: Cryptography, Applied Cryptography, Information theory, Mathematics, Computer Science or any relevant Engineering degree.
  • Valuable publications record in the field of Symmetric Cryptography.
  • Knowledge of relevant theoretical and practical cryptanalysis techniques.
  • Extensive experience developing in C, C++, x86 or ARM assembly, Rust or Go.
  • Understanding of security attacks, including: timing, cache-based and microarchitectural attacks, and the corresponding countermeasures.
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Post Quantum Cryptography Researcher
    Technology Innovation Institute - Abu Dhabi, UAE

    As a Post-Quantum Crypto Researcher, you will:

  • Design and implement quantum-safe PKE/KEM and digital signature schemes.
  • Conduct research and development in one of the following: lattice-based cryptography, code-based cryptography, hash-based cryptography, isogeny-based cryptography
  • Perform security assessments of crypto-primitives and cryptosystems at the theoretical and implementation level

    Minimum qualifications:

  • MSc or PhD degree in Cryptography, Applied Cryptography, Information Theory, Mathematics or Computer Science
  • Extensive experience developing in C, C++, Rust or Go
  • Deep understanding of cryptographic algorithms and protocols
  • Understanding of security attacks, including: side-channel analysis, fault injection, microarchitectural attacks, and the corresponding countermeasures
  • Familiarity with hardware languages is a plus
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Lead Cryptographic Protocols Researcher
    Technology Innovation Institute - Abu Dhabi, UAE
    As a Lead Cryptographic Protocols Researcher, you will:

  • Lead the scientific watch specialized in cryptographic protocols
  • Guide the team members in their research and development work
  • Analyze project requirements and provide technical and functional recommendations
  • Design and implement classical, quantum-resistant and hybrid cryptographic protocols and algorithms
  • Conduct research and development on state-of-the-art modern protocols
  • Perform security assessments of cryptographic protocols at the theoretical and implementation level

    Minimum Qualifications:

  • MSc or PhD degree in Cryptography, Applied Cryptography, Information Theory, Mathematics or Computer Science
  • 6+ years of work experience. Previous experience heading teams is a plus
  • Knowledge of widely-deployed cryptographic protocols and primitives
  • Experience in C desired, C++, Rust or Go relevant as well
  • Solid engineering practices and processes, such as development and testing methodology and documentation
  • Prior contributions to crypto protocols and open source software collaboration preferred
  • Quick learner, geared towards implementation
  • Eager to develop new skills and willing to take ownership of projects
  • Contact: Mehdi Messaoudi - Talent Acquisition Partner
    Last updated: 2020-06-08 posted on 2020-06-08

    Ph. D student in Post-Quantum Cryptography
    ISAE SUPAERO, Toulouse, France

    In late 2016, NIST issued a call for proposals for the standardization of cryptographic systems resistant to a quantum computer for encryption, key exchange and signature primitives (hereafter NIST PQC). The standardization process is currently ending its second phase, with only 26 candidates remaining.

    Each submission comes with a software implementation, targeting standard security levels for widespread applications, such as e-commerce.

    Topic 1: General improvement of post-quantum primitives

    During this thesis, the successful candidate will study the NIST PQC submissions still running for standardization and will propose modifications that improve the submissions in general (e.g. tighter reductions, improved theoretical error rate analysis, etc.), or that provide specific advantages in constrained settings (e.g. soft/hard implementation simplicity, reduced bandwidth, reduced latency, etc.).

    Topic 2: Hardware implementations of cryptographic schemes based on error-correcting codes and/or lattices

    The software performance of NIST PQC submissions has been thoroughly studied. On the other hand, the hardware performance (e.g. energy cost or gate cost on broadly available FPGAs) of many submissions is still not very well understood. During this thesis, the successful candidate will study code-based and/or lattice-based NIST PQC submissions, and propose hardware implementations of both the original submisssions and variations designed by the candidate to improve hardware performance.

    Contact: Carlos Aguilar Melchor
    Last updated: 2020-06-08 posted on 2020-06-05

    Postdoc Research Fellow x3
    Cryptanalysis Taskforce @ Nanyang Technological University, Singapore

    (Yes ! We are still hiring despite COVID-19)

    The Cryptanalysis Taskforce at Nanyang Technological University in Singapore led by Prof. Jian Guo is seeking for candidates to fill 3 postdoctoral research fellow positions on symmetric-key cryptography, including but not limited to the following sub-areas:
    • privacy-preserving friendly symmetric-key designs
    • tool aided cryptanalysis, such as MILP, CP, STP, and SAT
    • machine learning aided cryptanalysis and designs
    • quantum cryptanalysis
    • cryptanalysis against SHA-3 and AES
    Established in 2014, the Cryptanalysis Taskforce is a group dedicated for research in symmetric-key cryptography. Since then, the team has been active in both publications in and services for IACR. It has done quite some cryptanalysis work on various important targets such as SHA-3, and is expanding its interests to the areas mentioned above, with strong funding support from the university and government agencies in Singapore. We offer competitive salary package with extremely low tax, as well as an environment dedicated for research in Singapore. The contract will be initially for 2 years, and has the possibility to be extended. Candidates are expected to have proven record of publications in IACR conferences. Interested candidates are to send their CV and 2 reference letters to Jian Guo. Review of applicants will start immediately until the positions are filled. More information about the Cryptanalysis Taskforce research group can be found via http://team.crypto.sg
    Contact: Asst Prof. Jian Guo, guojian@ntu.edu.sg
    Last updated: 2020-05-30 posted on 2020-05-29

    Post-Doc
    Carnegie Mellon University
    Applications are invited for a post-doc position at Carnegie Mellon University. The specific topic of the research is flexible and will be determined based on the common interests. Samples areas include secure multi-party computation, zero-knowledge proofs, post-quantum/lattice-based cryptography, and non-malleable cryptography. Must have a strong track record of publications in top crypto conferences.
    Contact: Vipul Goyal (vipul at cmu.edu)
    Last updated: 2020-05-30 posted on 2020-05-28

    Post-Doctoral Researcher in Symmetric Cryptography
    CryptoLux Group, University of Luxembourg

    The CryptoLux group of the University of Luxembourg has a vacancy for a post-doctoral researcher in the area of symmetric cryptography. The successful candidate will contribute to a research project entitled "Analysis and Protection of Lightweight Cryptographic Algorithms (APLICA)", which is funded by the Luxembourgish Fonds National de la Recherche and the German Research Foundation. Starting in Fall 2020, APLICA will run over a period of 3 years as a joint research project between the CryptoLux group and the Workgroup for Symmetric Cryptography of Ruhr-University Bochum. The mission of the APLICA project is to develop new cryptanalytic techniques for lightweight authenticated encryption algorithms and hash functions, and to design and implement new countermeasures against side-channel attacks that are suitable for constrained devices.

    Candidates must have a Ph.D. degree in symmetric cryptography or a closely related field. Preference will be given to candidates with a strong publication record that includes at least one paper at an IACR-sponsored conference/workshop or one of the top-4 security conferences. Experience in software development for embedded systems or mounting side-channel attacks is a plus. Candidates with an interest to conduct research in one of the following areas are particularly encouraged to apply:

    • Cryptanalysis of authenticated encryption algorithms or hash functions
    • Leakage resilience or leakage reduction by design (e.g. modes of operation)
    • Security evaluation of leakage-resilient primitives or constructions

    The position is available from Sept. 2020 on basis of a fixed-term contract for 3 years, which includes a probation period of 6 months. The University of Luxembourg offers excellent working conditions and a highly competitive salary. Interested candidates are invited to send their application by email to Alex Biryukov before July 31, 2020. The application material should contain a cover letter explaining the candidate's research interests, a detailed CV (incl. photo), a list of publications, scans of diploma certificates, and the names and contact details of 3 references.

    Contact: Prof. Alex Biryukov (alex.biryukov@uni.lu)
    Last updated: 2020-07-02 posted on 2020-05-27

    Open PhD position in Memristors-based Cryptography
    University of Stuttgart, Germany
    The Institute for Computer Architecture and Computer Engineering (ITI) at the University of Stuttgart seeks applications for a research position for the recently approved DFG project MEMCRYPTO in the field of memristor-based cryptography. The objective of the project is to explore novel memristive devices and architectures on their basis for construction of secure cryptographic hardware blocks, such as block ciphers. The project, which is part of DFG’s new Priority Program “Nano Security” (SPP 2253), will involve a tight collaboration with a research group in material science at TU Chemnitz capable of manufacturing and testing memristive devices and circuits. The position is suitable for PhD candidates, yet interested candidates who already hold a PhD degree can be employed as well. Located in Stuttgart, one of Europe’s main economic hubs, the Institute offers you an inspiring working atmosphere in a successful international team. The remuneration is according to the German public-service salary grade TV-L E13. Part-time employment, or a combination with a teaching-assistant position associated with a teaching load, are possible. To qualify for this position, you need an above-average Master’s degree in Computer Science, Electrical Engineering or a related discipline. Moreover, we expect proven skills or experiences in at least one of the three areas listed below (and credible interest in the other two): 1. Design of digital circuits, including their specification in Verilog or VHDL, synthesis for ASIC or FPGA, simulation on different levels of abstraction. 2. Cryptography, ideally with a focus on resilience of cryptographic implementations against physical attacks (side-channel analysis, fault-injections). 3. Memristive technologies, e.g., modeling or simulation of memristive behavior, synthesis of circuits in memristive logic families. To apply, please send, by email, your cover letter (explicitly explaining your interest in the topic and pointing out which of the three above-mentioned areas you feel competent in), CV and scans of your Master’s and Bachelor’s degree certificates including the transcripts with all grades.
    Contact: Ilia Polian
    Last updated: 2020-05-27 posted on 2020-05-27

    Post-doc (2 posts, up to 4 years)
    University of Warwick, UK

    We have two post-docs posts (Research Fellow and Senior Research Fellow, each for up to 4 years) available in the Department of Computer Science, University of Warwick, as part of a 4-year EPSRC project on "End to End Authentication of Caller ID in Heterogeneous Telephony Systems", working with Professor Feng Hao (PI) and Dr Adrian Von Mühlenen (co-I). The primary aim of this project is to improve security in telecommunication systems, in particular, providing reliable authentication of the caller ID without requiring any PKI, and protecting end-to-end privacy of the call contents.

    The candidates will join a dynamic and growing team of security researchers in the Department of Computer Science, University of Warwick. Warwick Computer Science is ranked 1st in research output, 2nd in research impact, and 2nd overall among all computer science departments in the UK based on REF 2014. The candidates will have the flexibility to collaborate with other members in the security team on a wider range of topics, such as key exchange, e-voting, e-auction, PUF, cryptocurrency, mobile security, IoT, web security and e-payment security. Our work has been largely driven by tackling real-world security problems. Candidates who have a strong interest in working on real-world problems for practical impacts are encouraged to apply. Those who have industrial experiences are also most welcome to apply.

    1. Research fellow: https://tinyurl.com/y8spmtb5
    2. Senior research fellow (equivalent grade as Assistant Professor): https://tinyurl.com/ybjyqzh4

    Application deadline: 17 June, 2020. After the deadline, the posts will be vacant until they are filled. Interested candidates are encouraged to contact Prof Feng Hao with an expression of interest as early as possible.

    Contact: Professor Feng Hao (feng.hao@warwick.ac.uk)
    Last updated: 2020-05-25 posted on 2020-05-22

    Junior Research Group Leader
    Max Planck Institute for Security and Privacy in Bochum, Germany

    This program offers young scientists the opportunity to develop their independent research program. We welcome applicants whose work covers aspects of security and privacy irrespective of field. The vision of MPI-SP is to grow into an interdisciplinary institute that brings together computer scientists with academics working at the intersection with social science, economics, law, humanities, and more. Areas of interest include, but are not limited to, foundations, cryptography, software and hardware security, AI safety and adversarial machine learning, as well as interdisciplinary aspects of security and privacy.

    The positions are funded for 5 years. We offer a competitive salary, base funding, as well as administrative and technical support. The positions come with no teaching obligations, although teaching opportunities exist. As an employee in Germany you will enjoy great working conditions, including 30 paid vacation days per year and considerable family support.

    Applicants must have completed a doctoral degree in any field or area broadly relevant to security and privacy and must have demonstrated outstanding research vision, and potential to successfully lead a research group. Successful candidates are expected to build a highly visible research agenda, to mentor Ph.D. students, and to participate in collaborative projects.

    We maintain an open, international, and diverse work environment and seek applications from outstanding researchers regardless of national origin. Our working language is English. We encourage applications from women, persons with severe disabilities, or members of any other underrepresented group.

    Please apply at https://apply.cis.mpg.de/register/mpispjrgl To receive full consideration, applications should be received by 14 June 2020. Reviewing of applications will start immediately and will continue until the positions are filled. The expected starting date for the positions is Fall 2020, open to negotiations.

    Contact: applications-jrgl@mpi-sp.org
    Last updated: 2020-06-02 posted on 2020-05-18

    Post-Doctoral Researcher in Computational Diversity in Cybersecurity (Job ID: 604850)
    Northern Arizona University, School of Informatics, Computing, and Cyber Systems (SICCS); Flagstaff
    The School of Informatics, Computing & Cyber Systems at Northern Arizona University is seeking a postdoctoral scientist in computational diversity for cybersecurity to work on a US Air Force Research Laboratory funded project. The successful candidates will work closely with the Principal Investigator and collaborators in the development, analysis, and implementation of innovative algorithms, architectures, and implementations. Exceptional candidates from all relevant areas will be considered, but specific topics of research interest include computer architecture and microarchitecture, hardware-based security and cryptographic systems. While the project is open to international candidates, there may be certain limitations. The start date is negotiable, but should not be later than October 1, 2020.

    Duties include:
    1. Perform research in the broad area of hardware-centric cybersecurity
    2. Publish papers and present research results at conferences and symposia
    3. Write grant and contract proposals
    4. Supervise and coordinate the efforts of PhD, MS, and undergraduate students on a day-to-day basis
    5. Assist in preparing progress reports to funding agencies
    The ideal candidate should have:
    1. Earned doctoral (Ph.D. or Sc.D.) degree in Computer Science, Electrical Engineering or closely related area by the start date.
    2. Demonstrated expertise in one or more of the following areas: computer architecture and microarchitecture, hardware-based security and cryptographic systems
    3. Demonstrated academic excellence through scholarly publications, i.e. at least one publication in top-ranked conferences/journals
    4. Excellent communication skills; experience in effectively working with people from a variety of culturally diverse backgrounds; experience in mentoring undergraduate and graduate students
    Contact: Dr. Paul Flikkema (paul.flikkema@nau.edu)
    Last updated: 2020-05-17 posted on 2020-05-16

    Post-Doc
    University of Warsaw

    We are looking for talented and motivated Post-Docs to work on the ERC AdG project PROCONTRA: Smart-Contract Protocols: Theory for Applications. The project is about theoretical and applied aspects of blockchain and smart contracts.

    The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.

    We offer competitive salary and a budget for conference travel and research visit.

    The project is expected to start on Sep 1, 2020. There is no specific deadline for this call, but we will start looking at the applications from Jun 15th, 2020. For the application instructions go to the following page: www.crypto.edu.pl/positions.

    Contact: Stefan Dziembowski
    Last updated: 2020-05-20 posted on 2020-05-16

    Post-doc
    Inria, Paris region, France
    High-assurance cryptography for IoT applications.

    The RIOT-FP project is looking for a postdoctoral research to work with Inria's GRACE team (on the campus of École poytechnique in the southern suburbs of Paris) and the PROSECCO team (in central Paris). The project aims to develop high-speed, high-security, low-memory cryptographic primitives (especially post-quantum public-key algorithms), backed by proven implementations with safety guarantees for software execution on low-end IoT devices. The real-world objective is to provide some future-proofing for RIOT OS (https:/riot-os.org), a free and open-source operating system for low-end IoT devices.

    Candidates are expected to have a strong background in cryptographic algorithms, IoT software security, or formally verified software. They must have, or expect to hold, a PhD in a field related to the project; they must also have strong programming experience and mathematical skills. They should have an international research profile, and be fluent in written and spoken English.

    Contact: Benjamin Smith, at inria dot fr
    Last updated: 2020-05-12 posted on 2020-05-12

    Post-Doctoral Fellow in Concrete Cryptography
    Simula UiB, Bergen, Norway
    Cryptology forms the backbone of modern digital security. While in theory it is known how to make secure cryptosystems that are asymptotically secure, a considerable gap with practice is demonstrated time and again by breaks of practical, implemented cryptosystems, deployed as part of a larger security ecosystem. The project “concrete cryptology” aims to provide concrete and meaningful security guarantees from low-level implementation to high-level deployment.

    The postdoc will have considerable freedom in selecting specific problems to work on within the larger scope of the project. One focus is the effect that side-channel attacks that do not result in full key recovery have on security, including provable security, higher up the chain. Another focus is the effect that large-scale deployment deviating from some abstract ideal has.

    Simula UiB Offers

    - Excellent opportunities for performing high-quality research, as part of a highly competent and motivated team of international researchers and engineers.

    - An informal and inclusive international working environment

    - Generous support for travel and opportunities to build international networks, through established collaboration with industry, exchange programs and research visits with other universities, and funding to attend conferences

    - Modern office facilities located in downtown Bergen

    - A competitive salary. Starting salary from NOK 532.300

    - Numerous benefits: access to company cabin, BabyBonus arrangements, sponsored social events, generous equipment budgets (e.g., computer, phone and subscription), comprehensive travel/health insurance policy, etc

    - Relocation assistance: accommodation, visas, complimentary Norwegian language courses, etc

    - Administrative research support: e.g., quality assurance process for grant proposals (including RCN and EU programs)

    - Wellness and work-life balance. Our employees’ health and well-being is a priority and we encourage them to make use of our flexible work arrangements to help balance their work and home lives efficiently

    Contact: Martijn Stam
    Last updated: 2020-05-12 posted on 2020-05-11

    Associate
    Osaka University, Graduate School of Engineering, Suita-city, Japan
    [Summary] Osaka University invites applications from outstanding individuals for a faculty position in the field of Cryptology and network security area in Graduate School of Engineering. [Explanation of institution (recruitment background, institution details, explanation of project, etc.)] cryptology, privacy in the field of Information Security, algebraic and number-theoretic algorithms, secure network or software [Job details (duties, subject responsible for, etc.)] Research and Education of information security [Address of work location and other information] 2-1 Yamadaoka, Suita, Osaka, Japan 565-0871 Suita Campus, Osaka University [Available positions (Job title, number of positions, etc.)] Specially Appointed Associate (full time) 1 person. English job title "Specially Appointed Associate" corresponds to the JREC-IN Portal job type "Assistant Professor level" at Osaka University. [Starting date] October 1st, 2020 (as soon as possible, negotiable)
    Contact: Atsuko Miyaji phone number: 06-6879-7715 E-Mail myj-comm-course@crypto-cybersec.comm.eng.osaka-u.ac.jp
    Last updated: 2020-05-08 posted on 2020-05-08

    Cryptographic Researcher/engineer
    Beijing Genomics Institute, Shenzhen, China
    Responsibilities

    1. Collaborate with other biological data scientists and responsible for health data (eg. genetic data) security and privacy protection research and development. Propose new solutions based on cutting-edge security technology to meet the needs of healthcare field.

    2. Follow up research on the application of cutting-edge cryptography technology, cryptographic algorithm implementation and performance optimization, such as lattice cryptography, homomorphic encryption, and zero-knowledge proof in the field of blockchain or data storage.

    Qualifications

    1. Master degree or above (PhD prefered) in cryptography, computer science, mathematics or related fields

    2. Excellent in security fundamentals, such as digest algorithm, symmetric encryption, asymmetric encryption and signature algorithm principles and their implementation

    3. Familiar with cutting-edge cryptography technologies, including secure multi-party computing, homomorphic encryption, etc .

    4. Interested in healthcare big data management and privacy protection

    Contact: Dr. Yuantong Ding, dingyuantong(at)genomics.cn
    Last updated: 2020-05-08 posted on 2020-05-07

    Protocol Engineer
    Status
    Status is building a communications tool with extreme security, coercion resistance and privacy in mind. As a protocol engineer in the Vac team, you will help us research and develop new and existing technologies in secure messaging.
    Contact: Ceri Power CA29 FB53 97E3 0232 106A  2DE6 9F07 1B10 A0D1 12EB
    Last updated: 2020-04-30 posted on 2020-04-30

    Post-Doc
    TU Darmstadt, Germany
    We are looking for outstanding Post doctoral researchers working on topics related to cryptography and IT Security.

    Current topics of interest include (but are not limited to):
    • Secure cryptographic implementations
    • Leakage/tamper resilient cryptography
    • Blockchains and cryptocurrencies
    • Distributed cryptography
    The application must include a curriculum vitae, a short research statement, and names of 2 contacts that can provide reference about the applicant and her/his work. The candidate shall be able to show solid expertise in cryptography/IT Security illustrated in form of publications at major crypto/security venues such as CRYPTO, EUROCRYPT, ASIACRYPT, TCC, PKC, CHES, FC, ACM CCS, Oakland, USENIX Security, NDSS etc.

    The position offers an internationally competitive salary including social benefits. TU Darmstadt offers excellent working environment in the heart of the Rhein-Main area, and has a strong institute for research on IT security with more than 300 researchers working on all aspects of cybersecurity.

    Review of applications starts immediately until the position is filled.
    Contact: Sebastian Faust, sebastian@cs.tu-darmstadt.de
    Last updated: 2020-04-27 posted on 2020-04-27

    Ph.D. Student (3 years)
    XLIM, University of Limoges (France)

    This Ph.D. thesis is offered as part of the ANR-funded 4-year research project MobiS5. The goal of MobiS5 is to provide a cryptographic toolbox for the emerging 5G technologies. More information can be found at: https://mobis5.limos.fr/index.html.


    This 3-year Ph.D. thesis will focus on the two following aspects of 5G security:

    • 5G Core Network security
    • Delegation in the context of 5G networks
    We are looking for motivated and hard-working students with a strong background in cryptography, with a degree in Mathematics, Applied Mathematics, or Computer Science (with an affinity for mathematics). Understanding of basic cryptographic primitives and protocols is a requirement. You must also have a good level of spoken and written English. A basic working knowledge of provable security and/or formal verification are a strong plus. Spoken and written French are also a plus. Interested? Here is how to apply ! https://mobis5.limos.fr/jobs.html
    Contact: Cristina Onete (maria-cristina.onete@unilim.fr) or Olivier Blazy
    Last updated: 2020-04-22 posted on 2020-04-22

    Phd
    CEA-LETI, Grenoble, France
    Side-channel attacks consist in measuring the physical activity emitted by a circuit (processor, microcontroller or cryptographic accelerator) to extract secrets. The consumption of the circuit or the electromagnetic emanation are the most commonly exploited signals. Due to the development of the Internet of Things (IoT), more and more systems are exposed to these attacks. Unfortunately, integrating countermeasures (software or hardware) against such attacks is extremely expensive. Therefore, it is essential to have an accurate idea of side-channel leakages as early as possible in the design phases. On the one hand to target countermeasures on critical areas and on the other hand to have a realistic view of leakages in order to automate the application of countermeasures. The thesis topic is the exploration of electromagnetic leakage models and different ways of interpreting them. The general objective of this work is to model the leakages of a processor based on its state at different abstraction level: Register Transfer Level (RTL), microarchitecture or even instruction set simulator (ISS). The LSOSP laboratory of CEA-LETI where the thesis will take place has a strong experience on physical measurements and has already performed preliminary research on the subject. Therefore, the candidate will start from these results and will perform physical measurements and manipulate different logic models to create a precise leakage model of the targeted processor.
    Contact: Vincent Dimper
    Last updated: 2020-04-21 posted on 2020-04-16

    Phd
    CEA-LETI Grenoble, France
    Industrial systems are often used to monitor and control a physical process such as energy production and distribution, water cleaning or transport systems. They are often simply called Supervisory Control And Data Acquisition (SCADA) systems. Due to their interaction withthe real world, the safety of these systems is critical and any incident can potentially harm humans and the environment. One of the main research axis in cybersecurity of industrial systems deals with combination of safety and security properties. Safety relates to applicative properties of the system (e.g. chemical properties for a chemical factory); while security properties take into account how an intruder can harm the system. As show in [3], combining safety and security is a challenging topic as these properties can be either dependent, strengthening, antagonist or independent. currently no tool is able to handle both aspects at the same time. In this context, we propose a Ph.D thesis revolving around modeling of industrial systems taking into account both safety properties of the physical process and security properties. Besides the definition of an accurate, yet automatically analyzable modeling framework/language, many aspects can be part of the subject. For instance, programmable automata (PLC) configuration files could be generated from this model in order to only deploy programs validated beforehand. PLC vulnerabilities could be studied (firmware reverse engineering, protocol fuzzing) in order to test the technical feasibility of found attacks. Finally, in a certification context, security analyzes on the model could include requirements from standards such as IEC 62443 [5] to help evaluation process
    Contact: Maxime Puys
    Last updated: 2020-04-27 posted on 2020-04-16

    Phd
    CEA-LETI (Grenoble, France)
    As a consequence of the rapid development of the Internet of Things (IoT), where devices are massively interconnected, security breaches are discovered daily. The growing threat of physical attacks, on which connected objects are widely exposed, forces chipmakers to increase the security of their products. True Random Number Generators are the cornerstone of device security; they are required for running cryptographic algorithms and fully integrated into encryption engines. The security level of the system directly depends on the randomness of the bits generated. Furthermore, IoT chips are facing harsh constraints in terms of price and power consumption. In order to be integrated into these chips, TRNG must offer an efficient tradeoff between cost and security. In this perspective, TRNGs based on already integrated components, such as RRAM memories, is a promising lead.
    Contact: Florian Pebay-Peyroula
    Last updated: 2020-04-27 posted on 2020-04-16

    PhD
    CEA-LETI
    This study is focused on the security of embedded systems and in particular asymmetric cryptography against horizontal attacks and Template attacks. Recent studies, applied to symmetric cryptography, have made it possible to build new techniques for side channel attacks. By improving the effectiveness of Template attacks, these new attacks make it easier to bypass masking countermeasures. It seems appropriate to study these new tools in depth in the context of Template and horizontal attacks against asymmetric cryptography, especially for elliptic curves. The use of machine learning in the context of side channel attacks. The main purpose of the thesis is to evaluate the security properties of ECCs against the most advanced Template and Horizontal attacks that use machine learning. Depending on the results obtained, new countermeasures will have to be constructed in order to address any new weaknesses.
    Contact: Antoine Loiseau
    Last updated: 2020-04-27 posted on 2020-04-16

    PhD Position in Applied Cryptography
    Institute of Cybersecurity and Cryptology, University of Wollongong, Australia
    The Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong, Australia offers a full-time PhD position (3.5 years) in the area of applied cryptography. The PhD candidate will work on the ARC DP200100144 project titled “Securing Public Cloud Storage with Protection against Malicious Senders” under the supervision of Prof. Willy Susilo, A/Prof. Guomin Yang and Dr. Fuchun Guo.

    We are looking for an enthusiastic and outstanding student with an Honours or Master degree in Computer Science or related area. Applicants with prior research experience in cryptography are more favourable. As women are underrepresented in this area, women are strongly encouraged to apply.

    The PhD candidate will receive a full scholarship (stipend approx. AUD$27,094/annum + the tuition fee waiver valued at approx. AUD$ 30,000/annum).

    Any interested applicant will need to send their full CV + record in prior study (Bachelor and Master transcripts) to A/Prof. Guomin Yang (gyang@uow.edu.au) by 1 June 2020, and highlighting their previous experience in cryptography research in the email. Please use the subject “PhD scholarship application to iC2” in the email sent. The successful candidate will be expected to start his/her study from August 2020 (depending on the approval of the required student visa).
    Contact: Guomin Yang
    Last updated: 2020-04-14 posted on 2020-04-09

    PhD scholarship for UK/EU/International student
    University of Warwick

    This is a fully-funded Ph.D. position for a UK/EU/International student (tuition fees plus stipend) to pursue a Ph.D. research degree in the Department of Computer Science, University of Warwick. Note that for international students, the overseas tuition gap will be covered as well.

    The project is in the area of security and cryptography, in particular, investigating next-generation cryptocurrency that is more scalable, privacy-preserving, and usable than what we have today.

    An ideal candidate should have excellent undergraduate and master degrees (equivalent to at least a UK 2.1) in Computer Science or relevant disciplines such as Mathematics and Engineering; a solid mathematical background as well as strong programming skills; experience in security research.

    The closing date for application is 30 April 2020.

    Interested candidates are encouraged to apply as early as possible. First, express your interest by sending your CV to Prof Feng Hao (feng.hao@warwick.ac.uk). If your background is found suitable, you will be directed to make a formal application. All formal applications will need to be made online through https://warwick.ac.uk/study/postgraduate/apply/research/.

    Further information about the research environment: The Department of Computer Science, University of Warwick is one of the leading CS departments in the UK. In the latest 2014 REF (Research Excellence Framework) assessment participated by all UK universities, Warwick Computer Science is ranked the 1st for research output, 2nd for research impact, and 2nd overall among 89 CS departments in the UK. The University of Warwick is consistently ranked among the top 10 universities in the UK. It is also known for its beautiful campus, friendly social environment, vivid student lives, and easy transport links to all major cities in the UK including London.

    Contact: Professor Feng Hao
    Last updated: 2020-03-29 posted on 2020-03-27

    Research Fellow / Postdoc
    Nanyang Technological University / Temasek Labs @ NTU
    We are looking for candidates for 1 Research Fellow / postdoc position (from fresh post-docs to senior research fellows, flexible contract duration) on symmetric-key cryptography and/or side-channel analysis. Candidates are expected to have a proven record of publications in top cryptography/security venues. Salaries are competitive and are determined according to the successful applicants accomplishments, experience and qualifications. Interested applicants should send their detailed CVs, cover letter and references to Prof. Thomas Peyrin (thomas.peyrin@ntu.edu.sg). Review of applications starts immediately and will continue until positions are filled.
    Contact: Thomas Peyrin (thomas.peyrin@ntu.edu.sg)
    Last updated: 2020-03-27 posted on 2020-03-26

    Post-Doc in Secure Multi-Party Computation
    UC Berkeley
    The Security & Crypto Group in the EECS Department at UC Berkeley welcomes inquiries for postdoctoral fellowships in the area of secure multi-party computation. Please send a CV to raluca.popa@berkeley.edu, and list at least three letter writers in the CV.
    Contact: raluca.popa@berkeley.edu
    Last updated: 2020-03-19 posted on 2020-03-19

    Cryptographer
    SHIELD Crypto Systems, Toronto, Canada
    Responsibilities include but are not limited to conducting research in the areas of homomorphic encryption, post-quantum cryptography, privacy-preserving mechanisms applied to machine learning, and security proofs, and building software prototypes to demonstrate the feasibility of technical solutions. The ideal candidate will initiate and organize the design, development, execution, implementation, documentation and feasibility studies of scientific research projects to fuel SHIELD’s growth in secure computing and cloud product concepts and new business opportunities. They will also pioneer substantial new knowledge of state-of-the-art principles and theories, contribute to scientific literature and conferences, and participate in the development of intellectual property. Required Abilities: 1) Highly competent in interpersonal communication. 2) A self-starter with initiative and a strong drive to identify and resolve technical issues. 3) Able to clearly explain complex concepts and take the lead in team decision-making. Qualifications: 1) PhD in cryptography. 2) One or more publications on cryptography in a top-tier, peer-reviewed conference/journal. 3) Deep expertise in the state-of-the-art of partially-, somewhat-, and fully homomorphic encryption; experience implementing prototypes is a strong asset. 4) Thorough understanding of lattice-based cryptography, including the underlying security problems, parameter selection, implementation, and side-channel resistance. 5) Skill in developing software prototypes in any of the following programming languages: C++, C, Python, Go or Rust. Preferred Qualifications: 1) Familiarity with other post-quantum cryptography families (e.g. hash-based signatures, code-based, isogeny or multivariate quadratic cryptography). 2) Familiarity with the application of privacy-preserving cryptographic techniques to machine learning. 3) Familiarity with highly regulated industries, such as banking, government, and/or health care. For immediate consideration, please submit your CV/resume and transcripts to careers(at)shieldcrypto.com and include “Cryptographer” in the subject line.
    Contact: Alhassan Khedr (CTO)
    Last updated: 2020-03-18 posted on 2020-03-17

    Senior Cryptographic Researcher - Single assignment
    Australian Payments Network, Sydney, Australia
    The PCI Standards Council (PCI SCSC) was founded in 2006 by American Express, Discover, JCB International, MasterCard and Visa Inc. who share equally in governance and execution of the organisation’s work. Its stated aim is to bring payments industry stakeholders together to develop and drive adoption of data security standards and resources for safe payments worldwide. PCI SSC mandates in the PIN Security Requirements and Testing Procedures: V3 2018 that to achieve “Control Objective 5: Keys are used in a manner that prevents or detects their unauthorised usage”, that “Encrypted symmetric keys must be managed in structures called key blocks. The key usage must be cryptographically bound to the key using accepted methods.” This is PIN Security Requirement 18-3, which further details three acceptable methods of implementing this requirement but also states that these methods are not an exhaustive list. The Australian payments industry does not use key blocks to manage the symmetric keys used as PIN Encrypting Keys (PEK). The question of which other methods are acceptable has been raised, which has resulted in a PCI FAQ. The latest version of which is in the publicly available document PCI PTS PIN Security Requirements, Technical FQAs V3, February 2020, FAQ 27, and requires an independent expert to assess the equivalency of other methods. PCI has also produced several blogs on the case for key blocks and two Informational Supplements, PCI PTS PIN: Cryptographic Key Blocks June 2017 and PCI PIN Security Requirement: PIN Security Requirement 18-3 Key Blocks: June 2019. AusPayNet is seeking to engage an independent expert, who meets the requirements set out by PCI in the PIN Security FAQ 27. This expert must assess the Australian PEK key management methodologies and determine if they provide equivalent levels of protection that prevent or detect their unauthorised usage, as compared to key blocks. AusPayNet is seeking to have the work completed in Q2 2020. For more information or to provide a copy of your CV and some indicative costs.
    Contact: Arthur Van Der Merwe - avande22@myune.edu.au
    Last updated: 2020-03-18 posted on 2020-03-11

    Three Ph.D. positions (post-quantum cryptography hardware, fault detection, and cryptanalysis)
    Villanova University, Department of Electrical and Computer Engineering
    1. Overall introduction. There are three Ph.D. position openings (full scholarship, tuition & very competitive stipend) at Dr. Jiafeng Harvest Xie's Security & Cryptography (SAC) Lab for the Fall of 2020, located at the Department of Electrical and Computer Engineering of Villanova University (PA, USA).

    2. Research area. Post quantum cryptography hardware, fault detection/attack, and cryptanalysis.

    3. Qualification. Preferred to have research experience in the areas of cryptographic engineering, fault detection, cryptanalysis, and VLSI design. Students from electrical/computer engineering, computer science, and cryptography (applied mathematics) or other related majors are WARMLY welcome! Programming skills such as HDL, C++, Python will be more favorable.

    4. Application process. Interested students can directly send the CV/resume to Dr. Jiafeng Harvest Xie's email: jiafeng.xie@villanova.edu.

    5. Application information. The detailed application requirement is available at https://www1.villanova.edu/villanova/engineering/grad/admission/departmentalRequirements.html

    6. Additional information. Villanova University is a private research university located in Radnor Township, a suburb northwest of Philadelphia, Pennsylvania. U.S. News & World Report ranks Villanova as tied for the 46th best National University in the U.S. for 2020.

    7. PI introduction. Dr. Jiafeng Harvest Xie is currently an Assistant Professor at the Department of Electrical and Computer Engineering of Villanova University. His research interests include cryptographic engineering, hardware security, and VLSI digital design. He is the Best Paper Awardee of IEEE HOST 2019. He is also the Associate Editor for Microelectronics Journal, IEEE Access, and IEEE Trans. Circuits and Systems II.

    Contact: Dr. Jiafeng Harvest Xie, email: jiafeng.xie@villanova.edu
    Last updated: 2020-03-18 posted on 2020-03-10

    Post-doc, Assistant/Associate/Full Professor
    Shanghai Jiao Tong University
    The School of Cyber Science and Engineering (formerly known as the School of Information Security Engineering) of Shanghai Jiao Tong University was founded in October 2000. It was the first school-level training base for high-level information security professionals in China and was jointly established by the Ministry of Education of China, the Ministry of Science and Technology of China, and the Shanghai Municipal People’s Government. The undergraduate and postgraduate students of the school mainly come from the top 100 key high schools and 985/double first-class universities in China. The school is ranked among the best cyberspace security nationwide every year. The school has a solid foundation and strength in the field of academic research and technological innovation on cyberspace security. The school is committed to building a world-class academic research center, cultivating the talents of the country and society. The school is in great demand of a number of world renowned professors, outstanding young researchers, full-time research fellows and post-doctors. The school now has about 20 positions available at the rank of tenure-track Assistant Professors, tenure-track Associate Professors, or tenured Full Professors in theory and practice of cyberspace security. Applicants should have (a) a doctoral degree in Computer Science, Electronic Engineering, Communication, Mathematics or Statistics; (b) an established track record in research and scholarship; (c) expertise in the cryptographic and security research areas; and (d) a demonstrated commitment to excellence in teaching. The school will provide highly competitive remuneration packages and assist applicants to apply for various national, provincial and ministerial level talent programs such as “1000 Youth Talents Program”, Shanghai “Oriental Scholar Program”,etc. We will also assist on employment of spouses, schooling for children and medical care.
    Contact: Chaoping Xing, emial: xingcp@sjtu.edu.cn Linjie Li, email: lilinjie@sjtu.edu.cn
    Last updated: 2020-03-10 posted on 2020-03-09

    Postdoc
    University of Edinburgh
    A postdoctoral positions related to privacy-enhancing cryptography in distributed ledgers. Strong applicants in other areas of cryptography, or security & privacy might also be considered. Candidates should have a PhD in cryptography, or a security & privacy related field.
    Contact: Please apply with a cover letter and updated curriculum vitae to Markulf Kohlweiss, mkohlwei@ed.uk.ac. The position will be available until filled; only short-listed candidates will be notified.
    Last updated: 2020-03-10 posted on 2020-03-04

    20 Research Positions in Cryptography and Blockchain (all levels)
    Beijing Intitute of Mathematical Sciences and Aplications, Beijing, China
    BIMSA

    Beijing Institute of Mathematical Sciences and Applications (BIMSA) is a new research institution to be established and lead by Professor Shing-Tung Yau, a Fields medalist of 1982. Its location is in the Yanqi Lake area of Beijing where APEC 2014 was hosted. It was expected to launch by the end of March 2020.

    Program

    Advanced Cryptography and Blockchain Program will be one of the many research groups of BIMSA. It will be focused on:

    • zero knowledge proofs (zk-SNARKs etc.)
    • fully homomorphic encryption
    • secure multiparty computation
    • related cryptographic schemes
    • blockchain

    with a combination of theoretical studies and practical implementations.

    Positions

    We have 20 open positions on all levels, with competitive compensation packages:

    • Distinguished Research Professor
    • Research Professor
    • Associate Research Professor
    • Assistant Research Professor (tenure-track)
    • Visiting Research Professor
    • Research Fellowship (postdoc)

    We intend to build a strong and highly international team, participating in the mainstream of academic studies and industrial innovations worldwide.

    For further information, please check the following links:

    http://ymsc.tsinghua.edu.cn/en/content/show/91-275.html

    https://www.mathjobs.org/jobs/jobs/14633

    https://www.linkedin.com/feed/update/urn:li:activity:6634985279591718912/

    Contact: Prof. Kevin Mo, cryptogroup.bimsa@outlook.com
    Last updated: 2020-03-05 posted on 2020-02-26

    PhD & Postdoc Positions in Cryptography and Privacy
    Hasso-Plattner-Institute, University of Potsdam, Germany

    The Cybersecurity - Identity Management group at the Hasso-Plattner-Institute (HPI), University of Potsdam is seeking to fill several PhD and PostDoc positions in the area of cryptography and privacy.

    Your future tasks
    • Development of provably secure cryptographic protocols for real-world problems. Topics of interest include (but are not limited to):
      • Distributed identity management
      • Privacy-enhancing technologies
      • Foundations and solutions for real-world cryptography
    • Publish and present results at top-tier international conferences
    • Participate in teaching activities
    Your skills
    • Master's degree (or PhD for postdoctoral position) in Computer Science, Mathematics, or a related area by the time of appointment
    • Profound knowledge in the areas of cryptography and IT security (for postdoctoral candidates proven in the form of publications in these areas)
    • Excellent English language skills
    What we offer
    • Collaborative work environment in a newly established research group
    • Outstanding setting to conduct top academic research with strong connections to industry
    • Working at the HPI campus in Potsdam-Babelsberg (S-Bahn station Griebnitzsee) near to Berlin

    We look forward to your application including two references, motivation letter and copies of relevant diplomas and certificates. Please submit your application documents (only as PDF) via email.

    Contact: Anja Lehman, email: anja.lehmann (at) hpi.de
    Last updated: 2020-02-21 posted on 2020-02-21

    Post-Doc
    University of Clermont-Auvergne, France
    Constraint Programming for Cryptanalysis of Symmetric Encryption Schemes
    • Location: LIMOS, Clermont-Ferrand, France
    • Salary: 2000€
    • Duration: 1 year
    • Keywords: Cryptanalysis symmetric, constraint programming, SAT solving, ILP.
    • Starting date: As soon as possible, when we have a good candidate; at least before October 2020.
    Your Profile
    • A PhD in Computer Science, Applied Mathematics, Cryptography or related field.
    • Competitive research record in symmetric cryptography or in constraint programming.
    • Commitment, team working and a critical mind.
    • Good written and verbal communication skills in English are essential.

    This post-doc is founded by the ANR project Decrypt started in January 2019.

    Transforming a theoretical cryptanalysis into a SAT problem or into a set of linear constraints could be a hard and time-consuming task. Our aim is to use constraint programming (CP) to simplify the way the symmetric key attacks are modeled and thus to overpass existing cryptanalytic results. Preliminary studies are really encouraging.

    Goal

    The main goal is to identify schemes and attacks for which it is possible to use off-the-shelf CP, SAT or ILP approaches. To achieve this goal, the work will be divided into the following tasks.

    1. Study symmetric encryption schemes and identify for several schemes the different components that are used in the scheme design.
    2. Design CP, SAT, and ILP models for cryptanalytic problems on selected schemes. We will mainly focus on the following attacks: cube attacks, conditional cube attacks with division property, (related-key) differential and linear cryptanalysis, word-based division property / integral distinguisher.
    3. Experimentally evaluate CP, SAT, and ILP solvers on the models designed in previous tasks, and compare these solvers with existing dedicated cryptanalysis approaches. Design of a tool to automate this task is one of the goals of the project.
    Contact: Pascal Lafourcade pascal.Lafourcade@uca.fr
    Last updated: 2020-02-21 posted on 2020-02-20

    Ph.D. student
    Taiyuan University of Technology (TYUT), China

    2 PhD positions are provided in College of Big Data, Taiyuan University of Technology (TYUT), China. The research topics include but not limited to: blockchain, IoT security, data security, and applied cryptography.

    Taiyuan University of Technology (TYUT), which was one of the first three national universities in China, was established in 1902. TYUT now has 30960 undergraduates, 7017 postgraduates and 762 doctoral students.

    Scholarship for graduates from TYUT: tuition fees will be waived, and the monthly living allowance will be provided. Scholarship and admission details can be found in the pdf file from this link: http://ciee.tyut.edu.cn/info/1016/3205.htm

    Application deadline: open until the positions are filled. All successful candidates are expected to start in September 2020.

    Interested applicants are advised to email the following documents to huangxin@tyut.edu.cn. (1) CV, (2) Reference letters, (3) Personal statement, (4) School transcripts, (5) Publications if possible.

    Contact: Prof. Xin Huang, Email: huangxin@tyut.edu.cn
    Last updated: 2020-02-18 posted on 2020-02-17

    Researcher - Homomorphic Encryption
    Zama - Paris, France

    About

    Our mission at Zama is to protect people’s privacy by preventing data breaches and surveillance.

    Our first product is a deep learning framework that enables fast and accurate inference over encrypted data, without any changes to the neural network architecture.

    We believe privacy-enabling technologies should benefit the widest possible community of developers and security researchers, which is why everything we create will be published and open-sourced.

    Zama is founded by Pascal Paillier and Rand Hindi


    Responsibilities

  • discovering new cryptographic techniques to compute on encrypted data
  • working with the engineering and product teams to implement your research into our products
  • design robust benchmarks to test your research and its implementation
  • review the latest published research, and inform the team on potential new applications or changes to our approach
  • work with the entire team to define the research and product roadmaps
  • publishing papers, filing patents and presenting your work at academic conferences

  • Requirements

  • PhD in cryptography or equivalent
  • deep knowledge of homomorphic encryption
  • optionally knowledge of machine learning
  • be based in or willing to relocate to Paris, France
  • passionate about privacy and open science
  • Contact: hello@zama.ai
    Last updated: 2020-02-03 posted on 2020-02-02

    Post-Doc in Applied Cryptography/Cryptographic Protocols
    TU Darmstadt, Germany

    The Cryptography and Privacy Engineering Group (ENCRYPTO) at Technische Universität Darmstadt offers a position for a Postdoctoral Researcher in the project “Privacy-preserving Services on The Internet” (PSOTI) funded via an ERC Starting Grant. We develop techniques and tools for protecting privacy in applications.

    Job Description
    The fully funded position is for up to 2.5 years with starting date as soon as possible. In our project, we will build privacy-preserving services on the Internet. This includes protocols for privately outsourcing, searching and processing data among untrusted service providers using secure multi-party computation, and building a scalable secure multi-party computation framework. You will co-advise PhD students, be involved in the project management, do research, build prototype implementations, and publish the results at top venues in IT security / applied cryptography. We provide an open and international working environment for excellent research in a sociable team. TU Darmstadt is ranked as a top university for IT security and cryptography in Europe and computer science in Germany. The position is based in the “City of Science” Darmstadt, which is very international and livable, and well-connected in the Rhine-Main area around Frankfurt.

    Your Profile
    • You have a completed PhD degree (or equivalent) from a top university in IT security, computer science, applied mathematics, electrical engineering, or a similar area.
    • Publications at top venues for IT security/applied cryptography (e.g., S&P, CCS, NDSS, USENIX SEC, EUROCRYPT), ideally on cryptographic protocols and secure computation, are required.
    • Experience in software development, project management, and supervising students is needed.
    • You are self-motivated, reliable, creative, able to discuss/write/present scientific results in English, and can conduct excellent research on challenging scientific problems with practical relevance.
    Application deadline: None; applications will be accepted until the position is filled.
    Contact: Thomas Schneider (schneider@encrypto.cs.tu-darmstadt.de)
    Last updated: 2020-06-17 posted on 2020-01-20