International Association for Cryptologic Research

Open Positions in Cryptology

IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at https://www.iacr.org/jobs/. To advertise a job opportunities, please submit your job here.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


École polytechnique, Palaiseau, France
One year Post-Doc

Context

Safran Identity and Security and the computer science department of École polytechnique will conduct a study on the manipulation of centrally issued documents on blockchains.

Object of the study

There already exist various protocols designed for manipulating sensitive documents on blockchains, from straightforward ones (hashes), to advanced protocols (ZeroCash).

Objectives

The objective is to sort out the various proposition for anonymising transactions or data on blockchains, and to design a new one relevant to our application domain. Since the application domain is concerned with documents issued by a trusted third party (a government in case of a passport), our application domain may not be well fitted by existing approaches. Some software developments may be conducted.

Profile

The candidate should have either a rather good knowledge of a few advanced cryptographic protocols, or have a very good understanding of bitcoin (or ethereum) and in particular its programmable features (smart contracts, OP_RETURN).

The candidate will spend 20% of his research time within Safran Identity and Security, (Issy-les-Moulineaux), and 40% in the computer science department of École polytechnique (Palaiseau), within INRIA project-team Grace.

Safran Identity and Security

Safran Identity & Security is a global leader in security and identity solutions, deploying solutions in more than 100 countries, and employing more than 8,700 people in 57 countries. Its solutions manage identities, secure payments and transactions and safeguard privacy, for an increasingly digital and connected world.

École polytechnique

École Polytechnique is a leading French institute which combines top-level research, academics, and innovation at the cutting-edge of science and technology. Its curriculum promotes a culture of excellence  with a strong emphasis on science, anchored in humanist traditions.

Contact: Daniel Augot, INRIA senior researcher, Daniel.Augot (at) inria.fr

More Information: https://team.inria.fr/grace/

Closing Date for Applications: 2016-12-31



IMDEA Software Institute, Madrid, Spain
4 Postdocs and 1 PhD

The IMDEA Software Institute (Madrid, Spain) invites applications for one PhD position in the area of Cryptography and four Postdoc positions in the areas of Cryptography, Anonymity, Privacy, Programming Languages, Verification, and Side-channel Attacks.

The positions are based in Madrid, Spain where the IMDEA Software Institute is situated. Salaries are internationally competitive and include attractive conditions such as access to an excellent public healthcare system. The working language at the institute is English.

PhD applicants should have completed, or be close to completing, a Masters degree in computer science, mathematics or a related discipline. The successful PhD applicant will do research in cryptography. Knowledge of cryptography (in particular public key cryptography and provable security) is required, and proven experience in the form of theses or published papers will be considered positively. The application requires: curriculum vitae, a motivation letter, and names of 3 persons that can provide reference about you and your work. For further enquiries on the PhD position, please contact Dario Fiore.

Postdoc applicants should have already completed, or be close to completing, a PhD in computer science, mathematics, or a related discipline, and should have an excellent research track record. The application requires: curriculum vitae, a research statement, and names of 3 persons that can provide reference about you and your work. The postdoctoral positions are available from September 2016 for the duration of up to two years.

Applicants interested in the position should send an email to the faculty members they would like to work with, and submit the application documents at https://careers.imdea.org/software/. Review of applications starts immediately until the positions are filled.

Contact: For enquiries about the positions, please contact:

Gilles Barthe gilles.barthe (at) imdea.org

Dario Fiore, dario.fiore (at) imdea.org

Boris Koepf, boris.koepf (at) imdea.org

Carmela Troncoso, carmela.troncoso (at) imdea.org

To apply: https://careers.imdea.org/software/

More Information: https://software.imdea.org/open_positions.html

Closing Date for Applications: 2016-12-31



NTT Secure Platform Laboratories, Tokyo, Japan
Post-Doc

Post-Doc Position in Cryptography, NTT Labs, Tokyo, Japan.

A postdoctoral research position in cryptography is available in NTT Secure Platform Laboratories, Tokyo, Japan. The position is initially for one year, and could be extended up to three years on year-by-year basis.

Candidates must hold a PhD in mathematics or computer science, and publications in major conferences related to cryptography. The research topics include foundation and applications in public-key cryptography. Interest in two-party / multi-party computation is an advantage.

Applications (CV, list of publications, and at least two letters of recommendations with contact details) and requests for more information should be directed to all of:

Saho Uchida (Secretary) uchida.saho (at) lab.ntt.co.jp ,

Koutarou Suzuki (Senior Researcher) suzuki.koutarou (at) lab.ntt.co.jp , and

Kazumaro Aoki (Research Group Leader) aoki.kazumaro (at) lab.ntt.co.jp .

Closing date: October 1st, 2016.

Preferred starting date: January-March, 2017.

Closing Date for Applications: 2016-10-01



University of Luxembourg
Doctoral candidate (PhD student) in the field of Cryptography (M/F)

The University of Luxembourg invites applications for a doctoral candidate (PhD student) in the field of cryptography.

The PhD student will be a member of the Computer Science and Communications Research Unit (CSC) research unit within the Faculty of Science, Technology and Communication at the University of Luxembourg.

He/she will work under supervision of Prof. Dr. Jean-Sebastien Coron on one of the following topics :

* Fully Homomorphic encryption and multilinear maps

* Side-channel attacks and countermeasures

The candidate must have a master’s degree or diploma in computer science or mathematics. We offer:

* Personal work space at the University

* Highly competitive salary

* Dynamic and multicultural environment.

For further information please contact:

Jean-Sebastien Coron: jean-sebastien.coron - at - uni.lu

To apply:

http://emea3.mrted.ly/1503l

Closing Date for Applications: 2016-09-15



Center for IT-Security, Privacy, and Accountability, Saarland University, Saarbrücken, Germany
Faculty position (Full Professor, W3)

Faculty position (Full Professor, W3) for Computer Science, with a focus on "IT Security, Privacy, and Cryptography"

CISPA, the Center for IT-Security, Privacy, and Accountability at Saarland University in Germany is searching for excellent applicants with a strong international standing from all areas of IT Security, Privacy, and Cryptography.

Applicants are expected to display outstanding scientific research abilities, management skills, as well as excellent teaching skills and a strong dedication towards teaching. The scientific qualification should be especially proven by publications at the leading international IT-Security Conferences. University courses for Master’s studies and at the Graduate School are taught in English. The chosen applicant is expected to participate actively in the development of CISPA.

Contact: Prof. Dr. Michael Backes

Full Professor at Saarland University

Director of the Center for IT-Security, Privacy, and Accountability

Campus E 9 1, 66123 Saarbrücken, Germany

Email: backes (at) cispa.saarland

Phone: +49 681 302-3249

More Information: https://www.cispa.saarland/education/careers/faculty-W1107/

Closing Date for Applications: 2016-08-24



Hong Kong Applied Science and Technology Research Institute Company Limited
Senior Engineer/Engineer (Cyber-Security Assessment)

Hong Kong Applied Science and Technology Research Institute (ASTRI) was founded by the Government of the Hong Kong Special Administrative Region in 2000 with the mission of enhancing Hong Kong’s competitiveness in technology-based industries through applied research

Job Responsibilities

•Conduct research on advanced ethical hacking, penetration testing, reverse engineering.

•Conduct assessment on network infrastructure, web and mobile security.

•Assisting on IT security enforcement and enhancement.

•Design secure application testing approaches, integrate quality assurance testings with security functionalities.

•Candidate with strong programming background will also be involved in security tool/signature development.

•Design and implement preventive security controls, application code review and analysis, code scanning and testing tools, web application scanning and penetration tests.

•Manage vendor and service provider on security tools and technologies project engagement and delivery.

Qualification/Required Experience & Skills

•Bachelor’s degree or above in Computer Science, Electrical Engineering or other relevant disciplines with a minimum of 5 years of experience in security assessment, less experience will also be considered for the Engineer level.

•Experience in financial industry is preferred but not mandatory.

•Demonstrate wide working knowledge of application security.

•Experience in application development life cycle, application testing and code scanning, with exposure in penetration test, finding exploits, vulnerabilities, unauthorized access, or other malicious activities in computer systems.

•Proficient in English, spoken and written.

•High integrity and professional work practice.

•Appreciation of people and cultures of different countries.

Contact: charlenechoo (at) astri.org

More Information: http://www.astri.org/careers/work-at-astri/jobs/senior-engineerengineer-cyber-security-assessment-4/

Closing Date for Applications: 2016-08-15



Hong Kong Applied Science and Technology Research Institite Company Limited
Principal Engineer/Senior Engineer/Engineer (Cyber Security)

Hong Kong Applied Science and Technology Research Institute (ASTRI) was founded by the Government of the Hong Kong Special Administrative Region in 2000 with the mission of enhancing Hong Kong’s competitiveness in technology-based industries through applied research

Job Responsibilities

•Research on latest security threat and cloud computing security.

•Develop and implement secure software systems.

•Develop cryptographic, encryption technologies, and mobile security solutions.

•Develop and implement cyber-threat intelligence and defense technologies.

•Be able to perform security investigation on cyber security and e-commerce systems.

•Conduct R&D in various areas which include but not limited to software, network, distributed systems, database, reverse engineering, malware analysis and mobile security.

Requirements

•Bachelor’s degree in Computer Science, Electrical Engineering or other relevant discipline with 6 years relevant experience. Master’s degree with 3+ years’ experience, or PhD holder with less experience. Candidates with less experience will be considered as Engineer.

•Solid experience in software and system development (C/C++, C#, Java, Python, Android, iPhone or Java Script).

•Experience in hands-on R&D projects, especially on software systems.

•Experience in planning, organizing, leading and implementing novel R&D projects, especially on information security and data analytics related areas.

•Preferably with certificates or formal training in information security or with experience in security assessment, but not a must.

•Experience in well-known data analysis challenge or ACM competition is a big plus.

•Experience in financial technologies such as algorithm trading, blockchain, etc. is a big plus.

•Good team player and passionate about producing quality software and enhancing user experience.

•Good interpersonal communication and presentation skills.

•Good command of both written and spoken English and Chinese.

Contact: charlenechoo (at) astri.org

More Information: http://www.astri.org/careers/work-at-astri/jobs/principal-engineer-senior-engineer-engineer-cyber-security/

Closing Date for Applications: 2016-08-15



Friedrich-Alexander-University, Nuermberg
Postdoc

The chair for cryptography at the Friedrich-Alexander-University in Nuremberg has an opening for an excellent and highly motivated Postdocs. Possible research interests of our group include (but are not limited to) Cryptographic protocols, secure two/multi-party computation, verifiable computation, functional signatures, cryptography based on hardware assumptions, cryptocurrencies, and foundations. We investigate these topics both from a theoretical and applied perspective.

Postdocs applicants are expected to have a PhD in cryptography or related areas, excellence in research proven for example by publications in IACR conferences and workshops CRYPTO, EUROCRYPT, ASIACRYPT, TCC, PKC,... or IT security venues like IEEE S&P, ACM CCS, NDSS, USENIX Security,….

Postdoc applicants should contact Dominique Schröder at bewerbungen-inf13 (at) lists.cs.fau.de and send the common application material in a single PDF file (i.e., CV, names of three references, a brief statement of research interests and experience.)

Starting date is negotiable. We are offering an internationally competitive salary. Review of applications starts immediately until the position is filled.

Contact: Dominique Schröder

Old website: www.ca.cs.uni-saarland.de

Closing Date for Applications: 2016-08-31



Yale University, Electrical Engineering
Post-Doc, hardware security

The Computer Architecture and Security Laboratory in the Electrical Engineering department at Yale University has an opening for a researcher to be involved with exciting work on computer architecture and hardware security, focusing on FPGA prototyping. We are looking for motivated candidates with experience in:

* FPGAs and Verilog or VHDL programming

* Altera hardware and IP cores knowledge is desired, but not required

* Cryptography

Contact: Jakub Szefer

More Information: http://caslab.eng.yale.edu/joinourteam

Closing Date for Applications: 2016-12-31



McMaster University, Hamilton, Ontario, Canada
Post doctorate fellow

The Department of Computing and Software at McMaster University in Hamilton, Ontario, Canada, invites applications for a 27-month postdoctoral researcher position in the area of post-quantum cryptography under the supervision of Dr. Douglas Stebila, to begin October 2016.

The successful applicant will have strong experience in one or more forms of post-quantum cryptography (lattice-based, code-based, isogenies, multivariate quadratic, or hash-based signatures). Applicants with either theoretical skills or practical implementation skills are welcome. Applicants must be cleared to graduate from their PhD program by the commencement of the position.

This research is part of a project whose overall goal is to develop practical post-quantum cryptography for the Internet and other applications, and is funded by an NSERC Discovery Accelerator Supplement award.

The researcher will be expected to teach one undergraduate course in each of the two years of the contract, and will have the opportunity to participate in the co-supervision of Masters or PhD students. There is also the potential to participate in industry collaborations.

McMaster University is one of Canada's top universities, ranked 4th in Canada and 96th in the world in the 2015 Academic Ranking of World Universities. Hamilton is Canada's 9th largest city and is located in the Greater Toronto Area, less than an hour to downtown Toronto by public transit. Hamilton is located along the Niagara escarpment, with more than 100 waterfalls in the city limits, and lots of outdoor activities in the many nearby parks and conservation areas.

Applications should include a CV, names of three references, and a brief statement of research interests and experience, and must be submitted online (http://www.workingatmcmaster.ca/careers/: Job ID # 9483).

Contact: Dr. Douglas Stebila (stebilad (at) mcmaster.ca)

More Information: http://www.workingatmcmaster.ca/careers/

Closing Date for Applications: 2016-08-25



Hongik University, Korea
Post-Doc

Post-doctoral fellow position in Department of Computer and Information Communications Engineering at Hongik University in the field of information security including cryptography for at least two year appointment. Applicants should have their Ph.D degrees within five years as of June 30, 2016.

Please email with subject ‘Postdoc position’ statement of research, CV, recommendation letters or referees, and copies of 3 most significant publications to sohwang (at) hongik.ac.kr

Contact: Professor Seong Oun Hwang at sohwang (at) hongik.ac.kr

More Information: http://shinan.hongik.ac.kr/~sohwang/index_e.htm

Closing Date for Applications: 2016-08-12



Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany
Ph.D. position (structured Ph.D.), 3 years

Research Training Group “UbiCrypt – Cryptography in Ubiquitous Computing”

The Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than €4 million to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for a candidate with outstanding Master/Diplom in the fields of computer science, electrical engineering, mathematics or related areas.

The research training group will study problems which are fundamental for securing the Internet of Things. The research is structured in three levels: cryptographic primitives, device and system level. The research topics range from cryptographic foundations such as fully homomorphic encryption for privacy in cloud computing, over security for medical implants to internet security solutions involving new national ID cards. A central goal of the doctoral training is an interdisciplinary and structured education at the highest scientific level. Establishing networks to top internationally research groups is part of the training.

A group of internationally renowned researchers together with excellent funding provides an extremely interesting scientific environment. The HGI is known for its good working atmosphere.

- Start: earliest possible

- Competitive salary (TV-L 13)

- Application: Send your documents by August 7, 2016, to grako (at) hgi.rub.de

- Required Documents: CV, certificates, transcript (Master or Diplom), motivation for applying (1 page), names of at least two people who can provide reference letters (email addresses are sufficient)

Further information: www.ubicrypt.org

More Information: http://www.ubicrypt.hgi.rub.de/index.html.en

Closing Date for Applications: 2016-08-07



Technische Universität Darmstadt, Germany
Two Positions of Full Professorships (W3) Cybersecurity

We are looking for an experienced researcher with excellent scientific credentials, international visibility through publications and projects and substantial experience in the acquisition of external research funding. In particular, we are looking for a person with a distinguished research profile in cybersecurity, e.g. in one of the following research areas: Cryptography, Formal Foundations of IT-Security, Network Security, Security of Complex Software Systems, Security of Embedded Systems.

Contact: Informal enquiries by email may be addressed to Professor Johannes Buchmann: buchmann (at) cdc.informatik.tu-darmstadt.de

More Information: https://www.tu-darmstadt.de/karriere_planen/allgemeineausschreibung/stellen_details_201153.en.jsp

Closing Date for Applications: 2016-08-31



Technische Universität Darmstadt, Germany
Research Assistants (PhD or Postdoc)

The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of

Research Assistants in Cryptography and Complexity Theory

both on doctoral and postdoctoral level, in the group of Professor Marc Fischlin. The positions are funded through various research projects, all in the area of complexity-based cryptography. These are: SecOBig for secure computation on Big Data, CROSSING about signature schemes supporting special operations, and CRISP about secure channels. More information about the projects and our research is available under www.cryptoplexity.de.

The starting date is immediate. The initial funding for the positions is for approximately two years, but the contract should be renewable, based upon availability of funding. Candidates are expected to perform scientific research in the areas of the projects, and to contribute to the teaching, research, and administrative tasks of the group.

Requirements: Master’s degree (or equivalent) in Computer Science, Mathematics, or a similar discipline; extensive knowledge in the areas of cryptography and IT security, for postdoctoral candidates proven in the form of publications in these areas; fluent English language skills; experience in IT system administration is welcome

Applications should include: a curriculum vitae, including references; copies of relevant diplomas and certificates; copies of 3 selected publications (for postdoctoral candidates) or, alternatively, a research statement.

The application data should be bundled into a single PDF file. Applications and enquires should be sent to: jobs (at) cryptoplexity.de. Applications should be received no later than September 30th, 2016, but review of applications will begin immediately on a rolling basis, and the positions may be filled earlier.

Contact: jobs (at) cryptoplexity.de

More Information: http://www.cryptoplexity.de

Closing Date for Applications: 2016-09-30



University College London
Research Associate (Post-Doc)

We welcome applications for a position as postdoctoral researcher in cryptography. The successful candidate will work with Sarah Meiklejohn, George Danezis and Jens Groth on zero-knowledge proofs and privacy enhancement of distributed ledgers. The post has a flexible starting date and an initial duration of 2 years. Candidates must have (or be about to receive) a PhD.

University College London is one of Europe's highest ranked universities and recognized by the EPSRC and GCHQ as an Academic Centre of Excellence in Cyber Security Research. The Department of Computer Science is ranked as the best in the UK and is located at UCL's main campus in the centre of London.

Contact: Informal enquiries can be sent to Jens at j.groth AT ucl.ac.uk

More Information: http://www.cs.ucl.ac.uk/staff/J.Groth/openings.html

Closing Date for Applications: 2016-08-05



University of Barcelona
Tenure-track associate professor in Computer Science

Tenure-track associate professor position in Computer Science, offered by the University of Barcelona (Dept. of Mathematics and Computer Science) within the Serra Húnter Programme (http://serrahunter.gencat.cat/en/index.html).

Description

The Serra Húnter Programme (SHP) will offer 71 contracts in Catalan public universities (Spain). Tenure-track associate professor: this is the introductory category to a teaching career, and a fixed-term contract is given. The contract is full-time and for a period of up to no more than five years. In order to be hired as such, one must hold a doctoral qualification and have a favourable report from the Catalan University Quality Assurance Agency.

Nr of positions available : 1

Research Fields: Computer science

Career Stage: Early stage researcher or 0-4 yrs (Post graduate)

Research Profiles:

First Stage Researcher (R1)

Recognised Researcher (R2)

Benefits:

Successful candidates will be hired by a Catalan university, and they are expected to cooperate with existing research groups or to develop new lines of research, complementary to those already in place. Salaries will be set according to Catalan university regulations. However, subject to negotiation, a salary supplement may be considered for those candidates with outstanding scientific experience, or start-up grants may be awarded in those cases where it is deemed appropriate.

Type of Contract: Temporary

Status: Full-time

Working Hours (hours per week: 37,5

Company/Institute: University of Barcelona

Country: SPAIN

State/Province: Barcelona

Postal Code: 08007

Street: Gran Via de les Corts Catalanes, 585

Contact: Serra Húnter Programme

Via Laietana, 2

08005 - Barcelona

Barcelona - SPAIN

email serrahunter (at) gencat.cat

http://serrahunter.gencat.cat/en/index.html

More Information: http://serrahunter.gencat.cat/en

Closing Date for Applications: 2016-09-15



Rovira i Virgili University
Associate Professor in Computer Security

Associate professor position in the field of Computer Security, offered by the Universitat Rovira i Virgili (Dept. Computer Engineering and Mathematics) within the Serra Húnter Programme (http://serrahunter.gencat.cat/en/index.html)

Description:

The Serra Húnter Programme (SHP) will offer 71 contracts in Catalan public universities (Spain). Associate professor: Implies proven ability to teach and undertake research. This is the first of the upper-level categories under permanent contract. In order to be hired as such, one must hold a doctoral qualification, three years of accredited teaching and research activity, and an accreditation in research from the Catalan University Quality Assurance Agency.

Nr of positions available : 1

Research Fields: Computer science - Other

Career Stage: Experienced researcher or 4-10 yrs (Post-Doc)

Research Profiles: Established Researcher (R3)and Leading Researcher (R4)

Benefits: Successful candidates will be hired by a Catalan university, and they are expected to cooperate with existing research groups or to develop new lines of research, complementary to those already in place. Salaries will be set according to Catalan university regulations. However, subject to negotiation, a salary supplement may be considered for those candidates with outstanding scientific experience, or start-up grants may be awarded in those cases where it is deemed appropriate.

Other job details

Type of Contract: Permanent

Status: Full-time

Working Hours (hours per week or free text): 37,5

Company/Institute: Universitat Rovira i Virgili

Country: SPAIN

City: Tarragona

Postal Code: 43003

Street: C. de l'Escorxador, s/n

Contact: Serra Húnter Programme

Via Laietana, 2

08005 - Barcelona

SPAIN

More Information: http://serrahunter.gencat.cat/en

Closing Date for Applications: 2016-09-15



University College London
PhD studentship in Privacy Preserving Continuous Authentication

Funded studentship for an EU or UK student in Privacy Preserving Continuous Authentication. Supervised Dr Steven Murdoch in the Information Security Group at University College London, in collaboration with VASCO Data Security.

Authentication technology plays a critical role in securing access to online services, such as banking, email and social networking. Session authentication schemes establish the identity of the user only at the beginning of the session so are vulnerable to attacks which tamper with communications after the authenticated session has been established. Transaction authentication schemes defend against such attacks by performing an additional authentication step at critical parts of the session, but are unpopular with users due to repeated authentication. Continuous authentication schemes, in contrast, verify user identity and intent throughout the session. So far, such schemes have had limited use in practice due to two primary weaknesses of existing approaches: privacy concerns and risk of false positives/false negatives.

This project aims to address these limitations by designing and evaluating new approaches for continuous authentication, based on a solid theoretical underpinning so as to give a high degree of confidence that the resulting decisions match expectations and requirements. Furthermore the project will focus on ways to preserve user privacy by processing behavioural measurements on the user’s computer such that sensitive information is not sent to the online service. The evaluation to be performed will consider the false-positive/false-negative rates, privacy impact, user acceptance and costs of deployment and operation.

The successful applicant will have their fees paid in full at the home/EU rate at UCL and receive a tax-free stipend at standard EPSRC rates. The project is to start in January 2017.

Please note that due to the funding provider of this project we are unable to offer this studentship to applicants who are categorised as overseas fee status.

Contact: Submit applications online using the PRiSM (the UCL application system). Contact Dr Steven Murdoch (s.murdoch (at) ucl.ac.uk) for queries about the position

More Information: https://www.prism.ucl.ac.uk/#!/?project=185

Closing Date for Applications: 2016-08-22



Institute of Networks and Security, Johannes Kepler University Linz, Austria
Post-Doc

The Institute of Networks and Security (INS) at Johannes Kepler University (JKU) in Linz, Austria, is looking for a full-time post-doc (or, in exceptional cases, PhD candidate) researcher to extend the current team starting with 1. September 2016 for a duration of up to 6 years.

Main research topics are clusterered in two strategic areas: digital identity (including smart cards and NFC, secure execution environments, cryptographic signatures and revocation protocols, scalable communication between provers and verifiers on a global scale, user interaction, etc.) and secure code (formal modeling and verification, code generation, source code annotations, compiler and runtime based verification, virtualization, hardware support for secure execution, etc.). Previous experience in either (or even both) of these areas is not strictly required, but helpful.

INS (together with the research center on user-friendly secure mobile environments) currently hosts 14 staff members and supervises a number of external PhD and Master's students. Applicants are expected to integrate with the team and co-operate on research projects, but are free to develop their own research focus. Teaching duties currently involve introductory low-level systems programming and networking with the option to offer advanced courses on specific research areas. Although some courses are primarily tought in German, exceptions for teaching in English are possible.

The Austrian University collective contract currently grants €3.546,00 per month (with 2 extra payments amounting to 14 monthly payments per year) before taxes. Organizational support for relocation is available. Interested applicants should send their resume and relevant proofs of qualification via email to office (at) ins.jku.at until 31. July 2016 with decisions expected within the first two weeks of August. Funding is open from 1. September, but later starting dates (until November) are possible.

Contact: Rene Mayrhofer, Head of Institute, rm (at) ins.jku.at

More Information: https://ins.jku.at/news/ins-job-posting

Closing Date for Applications: 2016-07-31



Ministry of Justice -Digital & Technology - London
Senior Security Engineer

We are seeking experienced security engineers for penetration-testing and consulting on digital products in an agile environment.

A successful candidate will work within several multi-disciplinary agile teams to deliver a high-quality product.

Everyone in this team will be responsible for quality, however this role will have a stronger focus on continuously improving and applying security vulnerability and penetration testing in line with continues integration:

https://www.gov.uk/service-manual/operations/penetration-testing.html

You will be required to challenge and propose changes to existing processes where they do not contribute to the rapid delivery of a secure service.

Essential Skills:

• Ability to work closely with development teams to ensure secure coding is baked in to web applications and architecture

• Ability to carry application and infrastructure vulnerability and penetration testing

• Understanding of virtualisation and cloud technologies

• Ability to build automated testing to align with continuous integration

• Understanding of open source technologies, including web development frameworks and infrastructure.

• Security Testing Tools, both manual and automated

• Open Web Application Security Project (OWASP)

Desirable skills

• CREST or CHECK certifications (team leader or team member)

• Certified Ethical Hacker (CEH)

• CISSP or similar familiarity with security architecture

• Worked in Agile environments

• Physical Security

• Social Engineering

• Static program analysis

• Fuzz testing/fuzzing

Key Focus Areas:

• Applying security vulnerability and penetration testing on Digital products developed with Agile methodologies and continuous integration

• Consult with teams to ensure security is built in at all stages of a product's lifecycle.

Contact: Dom Tomkins, Head of Specialist Recruitment recruitment (at) digital.justice.gov.uk

More Information: https://www.civilservicejobs.service.gov.uk/csr/index.cgi?SID=c2VhcmNoX3NsaWNlX2N1cnJlbnQ9MSZjc291cmNlPWNzcXNlYXJjaCZ1c2

Closing Date for Applications: 2016-07-15



Cyber Security Practice - United Arab Emirates
Crypto Developer

This is an excellent opportunity to join a Cyber Security practice based in the United Arab Emirates (UAE) who is experiencing enormous growth.

They are currently recruiting some of the world’s top Cyber experts and are seeking candidates for the following roles:

Crypto Developer (Multiple roles) - Must have experience in Elliptic Curve Cryptography (ECC) and ideally some experience in commercial cryptography. PhD Mathematics is preferred.

Please note these are permanent roles which require the successful candidates to be based in the United Arab Emirates. Assistance with relocation will be provided.

On offer is an attractive TAX FREE expatriate package, the opportunity to learn from some of the most highly qualified, well renowned Cyber figures in the business and genuine career opportunities.

To apply for this role please forward a copy of your CV in English to hilary (at) talentboutique.ae.

Closing Date for Applications: 2016-09-29



New Jersey Institute of Technology (NJIT), metro New York City, USA
Two positions: Post-Doc and Research Professor (Lattice Crypto Implementation and Application)

The Cybersecurity Research Center at the New Jersey Institute of Technology (NJIT) invites applications for a Postdoctoral Research Associate position and a Research Professor position in the areas of Lattice Encryption Implementation, Encrypted Program Obfuscation and Application.

Successful applicants are expected to pursue research towards developing open-source implementations of lattice encryption. Strong software engineering skills and C++11 expertise are required. Demonstrated success writing high quality software is essential. Experience with lattice encryption is required. Experience with industry-standard software engineering methods, including unit testing is very helpful. Experience with hardware design, noise sampling, secure communication systems and related technologies are helpful but not required. The candidates are expected to have excellent verbal and written skills in English

We expect the position to be available immediately for one year and to be renewable, based on mutual interest and availability of funding. Interested applicants should submit their CV and the names of at least three references by applying as soon as possible at:

njit.jobs/applicants/Central?quickFind=54616

njit.jobs/applicants/Central?quickFind=55268

Applications will be reviewed on a rolling basis until the positions are filled.

The Department of Computer Science at NJIT includes 27 tenured/tenure track professors and is rapidly expanding, supported by the university`s `2020 Vision` strategic plan. Sources of research funding include DARPA, IARPA, NSA, NSF, NIH, DHS, DOE, ARL, and ONR to name a few. Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.

Contact: Kurt Rohloff

Director, Cybersecurity Research Center

rohloff (at) njit.edu

More Information: http://centers.njit.edu/cybersecurity/

Closing Date for Applications: 2016-09-01



Graz University of Technology
1 Postdoc and 1 PhD student

The postdoc and PhD position will be funded by the ERC project SOPHIA, which starts September 1st, 2016. The project focuses on securing software execution on IoT devices not only against network attacks, but also against physical side-channel and fault attacks. The project combines research on system security architectures (hardware and software), side-channel/fault attacks, cryptography, fault tolerant design as well as formal methods. For the open positions we are in particular looking for postdocs with experience and PhD students with interest in at least one of the following fields:

  • Side-channel and fault attacks
  • Operating system security
  • Software isolation techniques
  • Control-flow integrity
  • Memory security
  • Software testing
  • Formal methods
  • Code analysis and compilers

In case you are interested in joining our team, please send your application by email to Stefan Mangard.

Applications should include a curriculum vitae, a statement of motivation, a transcript of records as well as names and email addresses of two persons that can provide references. Please send all attachments as PDFs. We are looking forward to your application.

The open postions are available in the Secure Systems Group, which is a team of about 10 researches. In total, Graz University of Technology employs about 60 researchers in the area of information security. More information on our research topics and our team can be found at http://www.iaik.tugraz.at/sesys.

Contact: Stefan Mangard

More Information: http://www.iaik.tugraz.at/content/research/sesys/jobs/

Closing Date for Applications: 2016-08-31



University of Luxembourg
Post-Doc

The research will be conducted under the supervision of Prof P Y A Ryan, head of the APSIA (Applied Security and Information Assurance) research group, http://wwwde.uni.lu/snt/research/apsia.

APSIA specializes in the mathematical foundations of information assurance: the mathematical modelling and analysis of information flows, the design and analysis of cryptographic primitives and protocols (both classical and quantum), secure verifiable voting systems, and anonymous marking systems and game-theoretic analysis of non-interference and coercion-resistance. The group has expertise in both the symbolic (formal methods) and the computational (“provable security”) styles of analysis and is investigating the links and synergies between them. The group has also established itself as a leading centre for the socio-technical aspects of security.

The topic lies both in Authenticated Key Exchange (AKE) and Quantum Key Distribution (QKD). Currently, complexity-theoretic definitions of security for AKEs are abundant but their relations are poorly understood, and the advent of QKD – in which both complexity theoretic and quantum mechanisms are intertwined - is further complicating matters. The research challenge is twofold: 1) to aid in finding fundamental definitions of security for AKE and 2) to develop a rigorous framework for reasoning about the composition of classical and quantum mechanisms, and in particular to examine to what extent definitions for AKE can be adapted to the QKD case.

Contact: Dr Jean Lancrenon, jean.lancrenon (at) uni.lu or Prof Dr Peter Y A Ryan peter.ryan (at) uni.lu

More Information: http://emea3.mrted.ly/13lls

Closing Date for Applications: 2016-07-12



University of Twente, The Netherlands
Assistant Professor in Systems Security

The University of Twente is seeking applications from excellent candidates in Computer Science, with a convincing research and education track record in Systems Security, broadly conceived, in any one or more of the following areas:

- Operating systems security and/or hardware security;

- Distributed systems security and/or cloud computing security;

- Mobile systems security and/or web security.

We offer a challenging full-time position in an inspiring multidisciplinary and international environment. The successful candidate will be employed for the duration of 3 years as an Assistant Professor at the chair of Services, Cyber Security, and Safety (SCS). The salary, depending on your experience and qualifications, will range from € 3.400,-- to € 4.654,-- gross per month. In addition, the University of Twente offers attractive employment conditions (for example 8% holiday allowance and 8,3% end-of-year bonus), excellent support for research and facilities for professional and personal development.

Applications should include a letter of motivation (including a short research and education statement), a detailed curriculum vitae, a list of publications and three references (including at least one international reference).

Contact: Questions regarding this position can be addressed to Prof. Dr. Roel Wieringa, chairman of Services, Cyber Security and Safety (r.j.wieringa (at) utwente.nl, +31 (0)53 489 4189), or to Dr. Andreas Peter, in the same group (a.peter (at) utwente.nl, +31 (0)53 489 2918).

More Information: https://www.utwente.nl/en/organization/careers/vacancies/!/vacature/662159

Closing Date for Applications: 2016-08-05



Aarhus University, Denmark
PhD Student

The Cryptography and Security group of Aarhus University has an opening for a PhD student in the area of cryptographic protocols (secure two/multi party computation, zero-knowledge, advanced encryption schemes, etc.) under the supervision of Associate Professor Claudio Orlandi. The PhD position is financed by a "Sapere Aude" starting grant (Danish Council for Independent Research).

Applicants with (or about to complete) a master in computer science, computer engineering, or math are welcome to apply by contacting me asap.

All applications will be processed by the Graduate School of Science and Technology of Aarhus University (follow the link for more information).

The next deadlines for application are

- August 1st (start after November 1st).

- November 1st (start after February 1st).

Contact: Claudio Orlandi, orlandi AT cs au dk

More Information: http://talent.au.dk/phd/scienceandtechnology/

Closing Date for Applications: 2016-11-01



Drexel University Cybersecurity Institute
Staff Scientist/Post-Doctoral Scholar

The Drexel University Cybersecurity Institute invites applications for a postdoctoral scholar or research staff scientist with expertise in cybersecurity.

The individual will be an integral part of the highly interdisciplinary team of more than fifteen tenure and tenure- track faculty across the Drexel University campus actively engaged in cybersecurity research. S/he will have the opportunity to work with leading scholars in areas such as i) malware detection, classification, and mitigation, ii) anomaly detection, iii) active user authentication, iv) wireless channel and wireless network security, v) media forensics and anti-?forensics, vi) privacy, anonymity, and stylometry, vii) hardware and electronic security, viii) social networking threat analysis, and others. The successful candidate will have a publication record in cybersecurity and related fields, and a demonstrated ability to lead the submission of interdisciplinary cybersecurity research proposals to government funding agencies, such as the National Science Foundation (NSF) or the various agencies of the Department of Defense (DoD).

Recent Ph.D. in Electrical and Computer Engineering or Computer Science or other closely related discipline. Strong background in any research area of cyber security. Experience in proposal authoring and capture of new business and research opportunities.

The researcher will conduct high quality research in cybersecurity, prepare and submit related grant proposals, and have the opportunity to teach in related areas.

Enter requisition # 7507 at DrexelJobs.com

Contact: Steven Weber, Ph.D.

Director

Drexel Cybersecurity Institute

More Information: https://www.drexeljobs.com

Closing Date for Applications: 2016-12-01



iTrust@SUTD
Research Assistant

Research Assistant in iTrust@SUTD

One research assistant position to work on the system implementation smart-grid, and fog computing security.

Qualification and skills:

  • Candidates should have a B.S/B-Tech or M.S/ M.Tech or M.E degree

  • Android and Java programming

  • Matlab programming

  • Sound knowledge in Networking (especially in wireless communication)

  • Strong programming experience

  • Background on some networking simulators (like NS2).

  • Background on Wireless Security and Cryptography is preferable

  • The initial appointment will be for 1 year but it can be extended depending on the availability of funding and the candidate's performance. These positions come with attractive salary and benefits.

    How to apply:

    Interested candidates kindly send their CV to Dr. Prosanta Gope (gope_prosanta (at) sutd.edu.sg) or Dr. Jemin Lee (email: jmnlee (at) ieee.org). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.

    Closing Date for Applications: 2016-07-31



    Singapore University of Technology and Design
    Research Assistant

    Research Assistant in iTrust@SUTD

    One research assistant position to work on the system implementation of D2D communication Security.

    Qualification and skills:

    - Candidates should have a B.S. or M.E. degree

    - Android and Java programming

    - Networking programming, i.e., device-to-device (D2D) or peer-to-peer (P2P) protocols

    - Strong programming experience

    - Device or service discovery protocols programming is preferable

    - Background on Wireless Security and Cryptography is prefereable

    The initial appointment will be for 1 year but it can be extended depending on the availability of funding and the candidate's performance. These positions come with attractive salary and benefits.

    How to apply:

    Interested candidates kindly send their CV to Dr. Jemin Lee (email: jmnlee (at) ieee.org). Initial screening of applications will begin immediately and the position will remain open until filled. Only shortlist will be notified.

    About iTrust@SUTD

    iTrust is a multidisciplinary research centre located at the Singapore University of Technology and Design (SUTD), established collaboratively by SUTD and the Ministry of Defence, Singapore (MINDEF). iTrust researchers focus on the development of advanced tools and methodologies to ensure security and safety of current and future Cyber Physical Systems, Enterprise security and Internet of Things. The Singapore University of Technology and Design (SUTD) is established in collaboration with Massachusetts Institute of Technology (MIT) to advance knowledge and nurture technically grounded leaders and innovators to serve social needs.

    Closing Date for Applications: 2016-08-31



    University of Glasgow, Republic Polytechnic Singapore
    Research Staff (Cyber Security)

    Responsibilities:

    We are looking for a capable and responsible individual to work on a R&D project in cyber security.

    The successful candidate will be placed on a two-year contract and will play an active role in designing and developing a security solution that provides protection at the communication layer against tampering of energy usage in the smart metering infrastructure. The candidate will also work closely with our collaborators in developing the security libraries for end-to-end communication security.

    Requirements:

    • Relevant qualifications Computer Science, Engineering or Applied Mathematics, with strong interest in applied cryptography, secure efficient cryptographic implementations. Fresh graduates are welcome to apply.

    • Knowledge in hashing, discrete logarithm and elliptic curve cryptography is a plus.

    • Experience in networking, embedded system development and integration.

    • Ability to conduct high-quality research with excellent analytical, technical and problem solving skills.

    • Possess good oral, technical writing, presentation skills along with a high degree of self-motivation and ability to work effectively in a team environment.

    Contact: david_leong (at) rp.edu.sg.

    More Information: http://www.rp.edu.sg/careers.aspx

    Closing Date for Applications: 2016-09-25



    Cryptography, Security, and Privacy Research Group, Koç University, Istanbul, Turkey
    Ph.D. / M.Sc. Scholarships & Post-Doctoral Researcher Positions

    Description: Cryptography, Security & Privacy Research Group at Koç University has multiple openings at every level. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc.

    • For more information about our group and projects, visit

      https://crypto.ku.edu.tr

    • For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit

      https://gsse.ku.edu.tr/en/admissions/application-process/

      Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.

      For Ph.D. applicants from China and Hong Kong, we have the prestigious Fung scholarship:

      https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong

    • For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü directly, including full CV, sample publications, a research proposal, and 3 reference letters sent directly by the referees.

      http://home.ku.edu.tr/~akupcu

    Late applications will be accepted, though early applications will be given precedence. Ph.D. / M.Sc. application deadline is June 12, 2016. Post-doctoral researcher application deadline is end of summer.

    Contact: gsse (at) ku.edu.tr

    More Information: https://gradapp.ku.edu.tr/login.php

    Closing Date for Applications: 2016-08-31



    International Max Planck Research School for Computer Science, Saarbrücken
    PhD positions

    The International Max Planck Research School for Computer Science (IMPRS-CS) is a graduate program jointly run by the Max Planck Institute for Informatics, the Max Planck Institute for Software Systems and Saarland University.

    The IMPRS-CS offers a PhD program upon successful completion of which students receive a Doctoral Degree in Computer Science from Saarland University. The program is open to students who hold or are about to receive a research-oriented Master's degree in Computer Science (or an equivalent degree). Successful candidates will typically have ranked at or near the top of their classes, have already engaged in research and published their results, and be highly proficient in written and spoken English.

    Admitted students receive a support contract that covers all living expenses and tuition fees. They enjoy a research-oriented education with close supervision by world-renowned scientists in a competitive, yet collaborative, environment rich in interaction with other students, post-docs, and scientists.

    Applications are accepted all year round; the current round closes on July 31st, 2016.

    Further information, including instructions on how to apply, can be found here: http://www.imprs-cs.de

    Contact: Jennifer Gerling, IMPRS-CS Coordinator

    E-Mail: imprs (at) mpi-inf.mpg.de

    Phone: +49 681 9325 1800

    Closing Date for Applications: 2016-07-31



    Cyber Security Practice - United Arab Emirates
    Crypto Expert

    This is an excellent opportunity to join a Cyber Security practice experiencing rapid growth in the United Arab Emirates.

    They are currently seeking experienced Crypto Experts with the following knowledge to join their team:

    - Proficient in AES algorithm design.

    - Expert in block and stream cipher, key management, hybrid approach, hashing.

    - Knowledge in substitution, permutation, confusion & diffusion mechanism.

    - Cryptanalysis: Differential, Linear, Side channel attack, Plain & Cipher text etc,.

    - Knowledge in crypto events, such as, Caesar competition.

    - History of different symmetric key algorithms.

    - Mathematics degree is preferred.

    - Should be ready to start design algorithm as soon as join.

    On offer is an attractive TAX FREE expatriate package, the opportunity to learn from some of the most highly qualified in the business and genuine career opportunities.

    Contact: Hilary (at) talentboutique.ae

    Closing Date for Applications: 2016-08-19



    Institute for Infocomm Research, Singapore
    Research Scientist on Cyber-Physical Security

    We are looking for research scientists with expertise on cyber-physical security. The candidates should have PhD in infocomm security with track record of strong R&D capability (at least 2 publications at top security conferences - http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking-history.html, in the past 3 years), be able to perform deep system-level investigations of security mechanisms, be a good team player and have the potential to be a team leader, and also have good presentation and communication skills. The candidates are expected to work closely with industry partners, create valuable intellectual properties, and produce project deliverables in time.

    Interested candidates please send CV to Jianying Zhou. Fresh PhD is welcome to apply. Review of applications will begin immediately and will continue until the positions are filled. Only short-listed candidates will be contacted for interview.

    Contact: Dr. Jianying Zhou, Dept Head, Infocomm Security, Institute for Infocomm Research. Email: jyzhou@i2r.a-star.edu.sg

    More Information: http://icsd.i2r.a-star.edu.sg/

    Closing Date for Applications: 2016-07-31



    Florida Atlantic University
    Tenure-track Assistant Professor in Cryptology

    The Department of Mathematical Sciences at Florida Atlantic University invites applications for a tenure-track position at the assistant professor level, starting in January 2017. FAU is home to The Center for Cryptology and Information Security, which is dedicated to original, cutting-edge research in cryptology and information security and to education and training of research students and information technology professionals. FAU is recognized as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research (CAE-R) for academic years 2014-2019.

    Research areas of particular interest for this position include, but are not limited to, mathematical foundations of public key cryptography, post-quantum cryptography, computational algebra, and algorithmic number theory.

    Applicants must possess a Ph.D. in Mathematics or a closely related field. Candidates in all areas of cryptology and information security will be considered.

    For additional information, please contact us by email to mathsearch (at) fau.edu. This position is open until filled and may close without prior notice. Priority consideration will be given to applications received by August 13, 2016. To be considered for the position, all applicants must apply and complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at: https://jobs.fau.edu. Please submit a cover letter, vita, copy of your transcript, research statement and a teaching statement through this website.

    In addition, please arrange to have three letters of recommendation sent by first class mail to: Chair of the Search Committee, Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431 or by email to mathsearch (at) fau.edu.

    A background check will be required for the candidate selected for this position.

    Florida Atlantic University is an Equal Opportunity/Affirmative Action Institution. Individuals with disabilities, requiring accommodation, please call 561-297-3057, 711.

    Contact: Search Committee Chair, Department of Mathematical Sciences, 777 Glades RD, Boca Raton, FL 33431

    Email: mathsearch (at) fau.edu

    Phone: (561) 297-3340

    Fax: (561) 297-2436

    More Information: https://jobs.fau.edu

    Closing Date for Applications: 2016-08-13



    Gran Sasso Science Institute
    10 Ph.D. students

    The Gran Sasso Science Institute, a recently established international PhD School and a Center for Advanced Studies in L'Aquila (ITALY), offers 10 fully funded PhD positions in Computer Science (CS) in the area of Distributed Systems and Computing including Cryptography and Security.

    For more info, see http://www.gssi.infn.it/phd/

    Contact: Giuseppe Persiano (giuper (at) gmail.com) or any member of the Institute

    Closing Date for Applications: 2016-09-01



    New Jersey Institute of Technology, Newark, USA
    Postdoctoral opening (security of cloud storage systems)

    The Cybersecurity Research Center at the New Jersey Institute of Technology (NJIT) invites applications for a Postdoctoral Research Associate position in the area of Security of Storage Systems and Applied Cryptography.

    The Postdoctoral Research Associate is expected to pursue research towards establishing a framework that provides strong integrity, availability and reliability guarantees for data outsourced at cloud storage providers. Familiarity with cloud storage systems and applied cryptography is preferred.

    The candidates are expected to:

    - have completed their PhD degree in Computer Science or closely related areas,

    - have adequate cybersecurity/applied cryptography research experience demonstrated through a good publication record, and

    - have excellent verbal and written skills in English

    We expect the position to be available immediately for one year and to be renewable, based on mutual interest and availability of funding.

    Interested applicants should submit their CV and the names of at least two references by applying as soon as possible at https://njit.jobs/applicants/Central?quickFind=55066. Applications will be reviewed on a rolling basis until the position is filled.

    Work environment and location:

    Details about the center's research activities can be found at:

    http://centers.njit.edu/cybersecurity/.

    The Department of Computer Science at NJIT includes 27 tenured/tenure track professors and is rapidly expanding, supported by the university's "2020 Vision" strategic plan. Sources of research funding include DARPA, NSF, NIH, DHS, DOE, ARL, and ONR to name a few. Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.

    Contact: Prof. Reza Curtmola

    More Information: https://njit.jobs/applicants/Central?quickFind=55066

    Closing Date for Applications: 2016-06-30



    IRISA, Rennes, France
    Ph.D. student

    Ph.D. offer

    Looking for a Ph.D. thesis that combines computer security and mathematics? IRISA (https://www.irisa.fr/en), the computer science laboratory of Rennes in France, seeks to hire an outstanding doctoral student to perform research in the field of formal modeling and analysis of security. The position is within the project entitled Attack-Defense Trees for Computer Security: Formal Modeling of Preventive and Reactive Countermeasures. A detailed description of the thesis topic is available at http://people.irisa.fr/Barbara.Kordy/vacancies.php and at http://people.irisa.fr/Barbara.Kordy/vacancies/PhD_16.pdf

    Candidate profile

    The candidate is expected to have

    • A Master degree in computer science or mathematics;

    • A proven interest in formal methods and formal modeling;
    • Excellent written and oral English skills.

    Background in computer security will be a plus. Knowledge of French is not required.

    Application

    Applications should be written in English and include the following documents

    • Motivation letter clearly explaining the candidate's interest in the proposed topic and his/her fit to the position;

    • Curriculum Vitae (including contact information, education and work experience, short description of the master thesis, list of publications, etc.);
    • Transcript of grades from all university-level courses taken;
    • Contact information for 2 referees.

    Applications will be considered on a rolling basis until the position is filled. Documents should be submitted by e-mail to dr. Barbara Kordy (barbara.kordy (at) irisa.fr).

    Contact: Barbara Kordy

    barbara.kordy (at) irisa.fr

    More Information: http://people.irisa.fr/Barbara.Kordy/vacancies.php

    Closing Date for Applications: 2016-10-30



    Queensland University of Technology
    PhD Scholarship, Control System Security

    This scholarship is to work on the High Performance Control System Security research project. High performance control systems are used in many security-critical applications such as car control systems, unmanned aerial vehicles (UAV), autonomous vehicles and critical-infrastructure systems. Most solutions suffer from security and safety flaws, which can be attributed to a lack of proper authentication, confidentiality and availability.

    You'll investigate security in a particular control system (such as UAV) or perhaps a cluster of systems that exhibits similar design characteristics. This research is likely to relate to a generic key management protocols to implement authentication and confidentiality. Another possible research avenue is software defined networking and its impact on availability or how it can be used to mitigate denial of service (DoS) attacks.

    Contact: Professor Josef Pieprzyk

    More Information: https://www.qut.edu.au/study/fees-and-scholarships/scholarships-and-prizes/control-system-security-scholarship

    Closing Date for Applications: 2016-08-01



    University of Bergen, Norway
    Ph.D. student

    The Department of Informatics (www.uib.no/en/ii) has a vacancy for a PhD position within cryptography. The position is for a fixed-term period of 3 years, starting as soon as possible in 2016, and funded by the project “Modern Methods and Tools for Theoretical and Applied Cryptology” (CryptoWorld), awarded by the Research Council of Norway.

    About the Department:

    The Department has 6 research groups, Algorithms, Bioinformatics, Optimization, Programming Theory, Reliable Communication and Visualization. The Department is ranked first in Norway with respect to the quality of its research by the Research Council of Norway. For more information visit our Web pages: http://www.uib.no/en/ii

    About the project/work tasks:

    • Focus is on mathematical methods of cryptography, in particular Elliptic Curve Cryptography and algebraic attacks.

    • Develop new methods of algebraic cryptanalysis and apply them to modern cryptographic primitives.

    • Advance theoretical understanding of the complexity of Elliptic Curve Discrete Logarithm Problem.

    The fellowship position is for a fixed term of 3 years. Closing date for application: 30 June 2016

    Contact: Professor Tor Helleseth, Tor.Helleseth (at) uib.no / phone (+47) 55 58 41 60,

    Professor Igor Semaev, igor (at) uib.no / phone (+47) 55 58 4279

    More Information: https://www.jobbnorge.no/en/available-jobs/job/126236/phd-position-in-cryptography?p=1&reset=1

    Closing Date for Applications: 2016-06-30



    IBM Research - Zurich, Switzerland
    Post-Docs and PhD Students

    The cryptography and privacy group of IBM Research - Zurich in Switzerland is looking for highly motivated Post-Docs and PhD students in the area of provably secure cryptography, in particular privacy-enhancing cryptographic protocols and public key cryptography.

    Candidates will perform scientific research in the areas mentioned above under the direct guidance of the permanent researchers in our team. Their main task will consist of publishing at respected academic conferences and journals. They will occasionally implement prototypes of cryptographic schemes developped.

    Post-Doc candidates must have a PhD degree in cryptography. All candidates must be fluent in spoken and written English; knowledge of German is not required.

    PhD student candidates must have a Master degree or equivalent in computer science, mathematics, electrical engineering, or related disciplines. Knowledge of cryptography (in particular public key cryptography) is required, proven experience in the form of theses or published papers is a strong asset.

    IBM Research - Zurich offers a stimulating international research environment among experts in computer science, physics, and mathematics. The laboratory is located in Rüschlikon, Switzerland, at 10km from the city of Zurich and on the coast of Lake Zurich. A competitive salary will be offered, adjusted to the high local living standards.

    The positions will remain open until suitable candidates have been hired.

    Contact: Interested candidates should send a CV and motivation letter to Jan Camenisch jca(at)zurich.ibm.com

    More Information: http://www.zurich.ibm.com/security/

    Closing Date for Applications: 2016-10-01



    University of Surrey, UK
    PhD Studentship in IoT Security & Privacy

    We are looking for an excellent, motivated, self-driven doctoral student to work in the exciting area of Internet of things (IoT) security and privacy focusing on developing new, smarter, and more agile security approaches. The PhD student will join the Secure Systems group (http://www.surrey.ac.uk/cs/research/) for three years, working in the area of secure and privacy-preserving communication and execution of the core IoT end-points including resource-constrained embedded devices, mobile phones (in the context of mobile sensing applications) and vehicles.

    The PhD student is expected to hold at least an upper second class honours degree and preferably a Master's degree in CS, EE, Information Security or similar discipline. Basic knowledge of computer networking, network and embedded systems security is required, with some background in cryptography and native code based systems.

    The position is funded for three years and is intended to start in July 2016 or as soon as possible thereafter.

    Contact: Thanassis Giannetsos

    Lecturer in Secure Systems

    Department of Computer Science

    University of Surrey

    GU2 7XH

    Email:a.giannetsos (at) surrey.ac.uk

    More Information: http://www.surrey.ac.uk/projects/phd-student-position-iot-security-and-privacy

    Closing Date for Applications: 2016-06-20



    Grace team, INRIA Saclay et Ecole polytechnique, Palaiseau, Paris greater area, France
    Post-Doc

    Post Quantum Secure Multi-Party computation

    INRIA is participating in the European H2020 PQCRYPTO project, http://pqcrypto.eu.org , whose aim is to recommend cryptographic primitives still secure after the potential advent of the quantum computer.

    INRIA team Grace is involved in the topic"advanced applications", like searchable encryption, homomorphic encryption, secure multi-party computation, and has to deliver recommendations.

    Besides the EU project PQCRYPTO, Grace wants to invest and put efforts in the topic of information theoretically secure multi-party computation (MPC).

    Also, Grace would like to investigate how multi-party computation is useful in the context of blockchains.

    Mission

    The mission is to support project-team Grace in his growing involvement in (information theoretically) secure multi-party computation.

    While the team masters mathematical and algorithmic aspects underlying secret sharing schemes relevant to information theoretically secure MPC (coding theory, algebraic function fields over finite fields), the team's knowledge of the MPC security models (simulation, universal composition) needs to be strenghtened. In particular, it is not clear how a powerful quantum adversary may affect these models.

    The second part of the mission would be to help distinguishing between general purpose MPC and decidated MPC, for main applications.

    The position may be extended for a second year.

    Job description

    Within H2020 PQCRYPTO, the applicant will be in charge, with the team leader and European researchers, of delivering the final recommendations. He will help the project participants to elaborate a plan and guidelines for these recommendations. He will also interfere with specialists in quantum computing, to assess the security models of MPC schemes in presence of a quantum adversary.

    Profile

    The candidate should have the done a PhD thesis in the topic of MPC computation, and know well the security models underlying the topic, with all their subtleties.

    Contact: Daniel Augot

    batiment Alan Turing

    1 rue d'Estienne d'Orves

    campus de l'Ecole polytechnique

    Palaiseau

    France

    More Information: http://bit.ly/24HTRc6

    Closing Date for Applications: 2016-07-31



    Chalmers University of Technology, Sweden
    Fully Funded PhD Student position in Cryptography

    We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography. The position is for five years at the Department of Computer Science and Engineering. The PhD student will join Katerina Mitrokotsa’s group and will be funded by a project funded by the Swedish research council focusing on security and privacy issues in resource constrained devices.

    The PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography.

    The position is fully funded for up to five years. The call for expressions of interest will remain open until a suitable candidate is appointed.

    Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.

    Contact: Katerina Mitrokotsa

    Associate Professor

    Chalmers University of Technology

    Department of Computer Science and Engineering

    Chalmers University of Technology

    More Information: http://www.chalmers.se/en/about-chalmers/vacancies/?rmpage=job&rmjob=4044

    Closing Date for Applications: 2016-05-31



    Input Output HK (IOHK), Japan and Remote
    Cryptographic Researcher

    About IOHK

    IOHK is a company developing new cryptocurrencies and related applications. The goals of IOHK Research, our research division, are to advance the science behind cryptocurrencies and to attest the security of our products by careful analysis of their underlying protocols. Our team at IOHK Research focuses on the analysis of protocol specifications and on theoretical research while programming and implementation are handled by a separate team. At IOHK Research you will be responsible for investigating current cryptocurrencies, formalising security models, proposing new techniques, constructing new schemes and analysing their security.

    We want the results of our research to impact both our products and the community, so we highly encourage our researchers to collaborate with other institutions and to publish papers in top conferences and journals. Moreover, we intend to open source most of our software, which will be developed based on techniques investigated by the IOHK Research team. We offer a flexible work style with a chance to work in a very dynamic team with talented people from all around the world, including partners from academia and the open source community.

    Full-time Positions in Japan and Remote Part-time Positions

    We are currently looking for talented cryptographers to join our team in Japan in full-time positions. We also offer part-time positions to outstanding students who are interested in joining our team while working remotely from their current locations. Knowledge specific to cryptocurrencies is not mandatory at the start, as the candidate is expected to spend 1-2 months developing it.

    Requirements

  • Master’s degree or above with a focus on cryptography.
  • Strong background in theoretical or practical aspects of cryptographic protocols.
  • A good record of peer-reviewed publications in relevant conferences and journals.
  • This call does not have a definite closing date. You are welcome to apply at any moment.

    Contact: Please send your CV to recruitment (at) iohk.io

    More Information: https://iohk.io/careers/

    Closing Date for Applications: 2016-12-31



    ENS de Lyon, France
    Post-Doc

    At least one and maybe several post-doc positions on lattices (e.g., lattice-based crypto, cryptanalysis, algorithms), for up to 2.5 years.

    Interested applicants should provide a detailed resume and references.

    Contact: Damien Stehle (damien.stehle (at) ens-lyon.fr)

    Closing Date for Applications: 2016-06-30



    AET Europe, Netherlands
    Applied Cryptographer / PKI developer

    Passionate about PKI, algorithms, ciphers and security systems to encrypt sensitive information? We have a vacancy for a code maker/breaker, the professional who ensures that data regarding finance, health, national security and other important worlds are hidden from hungry hackers...

    You will be working on software for mobile platforms, mobile devices like iOS, Android, Windows and connected devices. Your projects are designing and implementing cryptography in our software solutions that are resilient against real world attacks. This will include the analysis of cryptographic implementations embedded in AET’s solutions under evaluation. You will also provide technical expertise in applied cryptography.

    What you bring

    We’re looking for an Applied Cryptographer / PKI developer who is passionate (like us) about software development and not afraid to pioneer new approaches, techniques and technologies. The ideal candidate will have a passion for implementing solutions to complex security problems with a keen understanding of information security challenges and an up-to-date awareness of information security threats.

    You will need to have the following qualifications and experience:

    • Has a Bachelor or Master degree in IT, Math or other related degree,
    • Deep knowledge of applied cryptography and PKI,
    • Ability to combine market and technology topics to find technical solutions in complex environments.

    Other areas of knowledge and experience that would be considered key assets:

    • Programming languages: C/C++, Java,
    • An understanding of modern computer architectures and information technology architectures including cloud computing,
    • Platforms like iOS, Android, Windows or Linux,
    • Smart cards, sims and/or HSMs,

    If you are interested in this opportunity and feel that you have the relevant skills, qualifications and experience as a Applied Cryptographer / PKI developer please send your resume to hrm (at) aeteurope.com

    Contact: We can understand you want to know more about the job, your colleagues or the company of AET. Don’t hesitate to give us a call at +31 26 365 3350. Ask for Bert Smit, Development Manager.

    We are looking forward to getting to know you!

    More Information: https://www.aeteurope.com

    Closing Date for Applications: 2017-12-31



    University of Bristol
    Research Associate or Senior Research Associate in Cryptography

    Applications are invited for a Research Associate or Senior Research Associate position in the Cryptography group within the Department of Computer Science at the University of Bristol. The group has significant funding and we are usually looking to recruit research staff in the following areas:

    • Practical aspects of Multi-Party Computation and other areas related to computing on encrypted data.

    • Theoretical aspects of Multi-Party Computation.

    • Areas related to the evaluation of the security of cryptographic implementations.

    • Designing and implementing cryptography that is resilient against real world attacks.

    • Design and implementation of tools, including compilation techniques, that help improve security of cryptographic implementations.

    This is a “rolling advert” with a nominal close date only. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received.

    Contact: Nigel Smart (nigel (at) cs.bris.ac.uk)

    More Information: http://www.bris.ac.uk/jobs/find/list.html?keywords=cryptography

    Closing Date for Applications: 2016-12-31



    Cyber Security Practise - United Arab Emirates
    Crypto Experts

    This is an excellent opportunity to join a Cyber Security practise experiencing rapid growth in the United Arab Emirates. They are currently seeking experienced Crypto Experts with the following knowledge to join their team:

    • Proficient in AES algorithm design.
    • Expert in block and stream cipher, key management, hybrid approach, hashing.
    • Knowledge in substitution, permutation, confusion & diffusion mechanism.
    • Cryptanalysis: Differential, Linear, Side channel attack, Plain & Cipher text etc,.
    • Knowledge in crypto events, such as, Caesar competition.
    • History of different symmetric key algorithms.
    • Mathematics degree is preferred.
    • Should be ready to start design algorithm as soon as join.
    On offer is an attractive TAX FREE expatriate package, the opportunity to learn from some of the most highly qualified in the business and genuine career opportunities.

    Contact: Hilary (at) talentboutique.ae

    Closing Date for Applications: 2016-08-29



    Newcastle University
    Post-Doc

    Applications are invited for a Post-Doc post at the School of Computing Science, Newcastle University, UK. The post is funded by European Research Council (ERC), until end of Dec 2017. The project is on investigating "self-enforcing e-voting", but the candidate has the flexibility to work with a team of researchers on a diversified range of topics that concern real-world security, e.g., authenticated key exchange, BitCoin, NFC payment security, e-auction, e-passport and mobile sensor security.

    The successful applicant will join a vibrant and growing Secure and Resilient Systems (SRS) research group at the School of computing Science, Newcastle University. So far research works in the group have been largely driven by tackling real-world security problems, with some of the research outcomes adopted by international standards and deployed in large-scale commercial applications.

    About us: The School of Computing Science at Newcastle University is recognised as one of the fourteen Academic Centres of Excellence in Cyber Security Research (ACEs-CSR) in the UK. In the latest 2014 Research Excellence Framework (REF) assessment which included all UK universities, Newcastle University CS was ranked the 1st in the UK for its Research Impact.

    How to apply: follow the online application link below. To help speed up the process, please also send your CV and a brief cover letter to feng.hao (at) ncl.ac.uk.

    More Information: http://www.jobs.ac.uk/job/AUE162/d35883r-research-assistant-associate-e-voting/

    Closing Date for Applications: 2016-05-10



    Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
    Post Doc, Embedded System Security Group

    The main objective of the research in the Embedded System Security Group is to propose efficient and robust hardware architectures aimed at applied cryptography and telecom that are resistant to passive and active cryptographic attacks. Currently, the central theme of this research consists in designing architectures for secure embedded systems implemented in logic devices such as FPGAs and ASICs. More information on http://laboratoirehubertcurien.fr/spip.php?article213.

    For a new project which addresses the problem of secure and privacy in MPSoC architectures, we proposes a Post Doc position to work on security evaluation of heterogeneous MPSoC. We are looking for candidates with an outstanding Ph.D in hardware security and a strong publication record in this field. Strong knowledge in side channel attacks and countermeasures, digital system (VHDL, FPGA) design would be appreciated. Knowledge of French is not mandatory.

    The Post-Doc position will start in 2016 (flexible starting date), it is funded for 24 month.

    To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).

    Contact:

    Dr. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr

    Closing Date for Applications: 2016-06-15



    Guangzhou University, Guangzhou, China; The University of Hong Kong, Hong Kong
    Post-Doc

    The security group in Guangzhou University, is looking for 4-5 excellent Postdoc researchers and visiting scholars. The researchers will work on a security project with another research group in The University of Hong Kong. The research topics currently investigated in our group include

    • Security and Privacy in Big Data
    • Security in Cloud Computing
    • Applied Cryptography
    • Biometric security
    Applicants are expected to have a good publication record in security. For any interested applicants, please contact and send your CV to Jin Li directly (http://scholar.google.com/citations?user=7GDV2vUAAAAJ) and Siuming Yiu (http://www.cs.hku.hk/people/profile.jsp?teacher=smyiu). The postdoctoral position is for 2 years with possibilities of renewal. The applicant with faculty positions are also welcome. The starting date is immediate starting from June 1, 2016.

    Successful candidate(s) will receive a competitive salary (around 50,000 USD-60,000 USD/per year) as well as research funding around 25,000USD.

    Contact: Jin Li, jinli71 (at) gmail.com
    Siuming Yiu, smyiu (at) cs.hku.hk

    Closing Date for Applications: 2016-08-20



    Rochester Institute of Technology, Rochester, NY, USA
    Ph.D. Student in Cryptographic Engineering/Post-quantum Cryptography

    One Ph.D. position is available immediately for exceptional applicants. The research areas include cryptographic engineering, post-quantum cryptography, side-channel attacks, and ECC. Excellent background in VHDL/Verilog, FPGA/ASIC design, and mathematics of cryptology is desired. BS and MS degrees need to be in ECE.

    Please contact both Dr. Mehran Mozaffari Kermani (m.mozaffari (at) rit.edu) and Dr. Reza Azarderakhsh (rxaeec (at) rit.edu) and enclose your CV, statement of interest, and transcripts.

    Closing Date for Applications: 2016-05-31



    National Institute of Standards and Technology (NIST)
    Cryptographic Researcher

    The Computer Security Division, National Institute of Standards and Technology (NIST) seeks cryptographic researchers to join the team. We will consider candidates at various stages of their career, including new PhD graduates and experienced researchers.

    Particular areas of interest include, but are not limited to: Post-quantum cryptography, lightweight cryptography, security proofs of cryptosystems, cryptanalysis, secure protocols, hardware/software implementations, and cryptographic applications.

    For employment with NIST, the candidates must be US citizens. We also host guest researchers through the NIST Foreign Guest Researcher Program.

    Contact: Dr. Lily Chen (Lily dot Chen at NIST dot gov)

    Closing Date for Applications: 2016-08-31



    Qualcomm Incorporated - San, Diego, CA, USA
    Systems Security Architect - Standards Team

    Job Overview Systems Security Architect is responsible for working with R&D projects within QUALCOMM to research, design and develop the right security architecture and protocols for these projects and standardize them as needed. Ability to perform systems security or vulnerability analysis and design is a must. This position requires a strong understanding of the mobile systems architecture and protocols as defined by standards such as 3GPP, ETSI, IEEE, IETF. The successful candidate will demonstrate prior experience in one or more of these areas and a passion for architecting secure systems.

    Ability to work in groups as well as independently with minimal supervision is a must.

    This position requires some travel (up to 20% of the time). Travel may involve participating in standards meetings and/or interacting with QUALCOMM's customers/partners in the industry.

    Minimum Qualifications

    5+ years experience in one or more of the following areas :

    - Embedded platforms security (e.g., ARM TrustZone, TPM, smartcards)

    - Wireless communication systems and protocols (CDMA/UMTS/LTE, Bluetooth, 802.11)

    - Hardware / SoC security

    - Cryptography

    - Participation in standards organizations like IETF/3GPP/3GPP2

    Preferred Qualifications

    - Prior software development experience (C, C++, C#, Java, Windows, Linux) and knowledge of software vulnerabilities

    - OS architectures (e.g., Android, Linux, iOS)

    - IP security protocols (IPsec, SSL/TLS)/ Packet data network security

    - Multimedia systems security design (e.g.VoIP/IMS)

    - Web technologies or applications (e.g., HTTP, HTML5, XML)

    Education Requirements Required:

    Master's, Computer Engineering and/or Computer Networks & Systems and/or Computer Science and/or Electrical Engineering or equivalent experience

    Preferred:

    Doctorate, Computer Engineering and/or Computer Networks & Systems and/or Computer Science and/or Electrical Engineering or equivalent experience

    Contact: Vivian Smith, Staffing Specialist

    More Information: https://jobs.qualcomm.com/public/jobDetails.xhtml?requisitionId=1940091

    Closing Date for Applications: 2016-03-21



    Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey
    Ph.D. / M.Sc. Scholarships, PostDoc Positions, and Summer Internships

    Cryptography, Security & Privacy Research Group at Koç University has multiple openings at every level. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc.

    • For more information about our group and projects, visit https://crypto.ku.edu.tr
    • For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit https://gsse.ku.edu.tr/phd-computer-science-and-engineering

      Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.

      For applicants from China and Hong Kong, we have the prestigious Fung scholarship https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong
    • For summer internship opportunities (at both undergraduate and graduate level), visit http://kusrp.ku.edu.tr
    • For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü direcly, including full CV, sample publications, and a research proposal. http://home.ku.edu.tr/~akupcu
    Late applications will be accepted, though early applications will be given precedence.

    Contact: gsse (at) ku.edu.tr
    https://gsse.ku.edu.tr/phd-computer-science-and-engineering

    More Information: https://gsse.ku.edu.tr/phd-computer-science-and-engineering

    Closing Date for Applications: 2016-06-01



    University of Luxembourg
    PhD Student

    Ph.D. positions in information security (M/F)
    Ref: R-STR-5014-00B
    Fixed Term Contract 3 year (CDD) full-time (40 hrs/week)
    Probation: 6 months
    Number of positions: 2

    Your Role: The successful candidate will participate in the activities of the APSIA research group (http://apsia.uni.lu/) led by Prof. P. Y. A. Ryan. The group specializes in the mathematical foundations of information assurance.

    Research Context: The positions are within a national partnership project about the design and the analysis of security of communication protocols for the encrypted exchange and storage of information. Such activities are meant to make it possible to assess rigorously the security of the protocols developed as components of a 'Privacy by Default' product, and to instil security in the engineering processes from the design of the communication logic down to the implementation of the running code obtained by automatic translation. The analysis can be extended to ensure security to upper layers, including those interacting with the users.

    Duties: Under the direction of a senior scientist research and a professor, the candidates will carry research, write scientific papers, present research results at conferences, collaborate with research partners, and write and defend a Ph.D. thesis.

    Contact: Gabriele Lenzini, Peter Y A Ryan

    More Information: http://emea3.mrted.ly/z3hn

    Closing Date for Applications: 2016-03-31



    Indian Institute of Technology Kharagpur
    Post-Doc

    The Cryptography Research Team at Indian Institute of Technology Kharagpur (iitkgp.ac.in) invites strong PostDoc applications from highly motivated candidates working in the field of Cryptography. The candidate should be a PhD holder in Cryptography and/or related areas from a reputed institute. The candidate will be working in the Secured Embedded Architecture Laboratory http://cse.iitkgp.ac.in/resgrp/seal with a group of PhD students and faculty focused in the area of secured system design. The research will be aimed at developing efficient cryptographic protocols with applications in emerging fields such as Cloud computing and Internet of Things (IoT). Knowledge in public key, pairings, functional encryption, multi-party computation, and post-quantum cryptography topics is desirable. The candidate should have excellent publication track record in IACR conferences/workshops, as well as top journals (such as IEEE/ACM Transactions or IACR journals).

    The candidate will be expected to collaborate with and lead a team of excellent and highly motivated PhD candidates for implementation of the protocols. The protocols designed would be tested wrt. side channels by a separate team of research associates. The candidate is expected to work in conjunction with them and also disseminate the necessary knowledge among the group via suitable course material, tutorials and regular group talks. Good communication skills are hence desirable.

    The post-doc position will be partially funded under Information Security Education and Awareness Project, Ministry of Communication and Information Technology, Government of India. The candidate will be provided with a competitive salary (tax-free), along with highly subsidized housing, subsidized food in cafeteria, free healthcare at IIT hospital, travel support for international conferences, comprehensive funding for papers at top conferences like Crypto, performance based top up grants, and other perks and amenities.

    Contact: Prof Debdeep Mukhopadhyay, Indian Institute of Technology, debdeep.mukhopadhyay (at) gmail.com, debdeep (at) cse.iitkgp.ernet.in

    More Information: http://cse.iitkgp.ac.in/resgrp/seal

    Closing Date for Applications: 2016-05-01



    University of Waterloo, Canada
    Research Associate, Post-doctoral Fellow

    Research associate (or post-doctoral fellow) position in Department of Electrical and Computer Engineering at the University of Waterloo in the field of embedded hardware security (side channel analysis, fault injection, microprobing, reverse engineering) for one year appointment (second year dependent upon funding).

    The successful candidate must have a PhD in Electrical and Computer Engineering, Computer Science, Mathematics or a related discipline. In addition theoretical/practical experience in side channel analysis, fault injection, microprobing and/or reverse engineering is preferred.

    Please email with subject ‘RA position’ statement of research, CV, recommendation letters or referees, and copies of 3 most significant publications to cgebotys (at) uwaterloo.ca

    Contact: Contact: Professor Catherine H. Gebotys, cgebotys (at) uwaterloo.ca

    Closing Date for Applications: 2016-08-31



    Nanyang Technological University
    Research Scientists/Senior Research Scientists

    The cryptography group at Temasek Laboratories@Nanyang Technological University is looking for researchers on symmetric key cryptography and lightweight cryptography to fill up to 3 positions of (senior) research scientists from fresh postdocs to senior researchers. Supported by government research fundings, we concentrate on cutting-edge research, candidates are expected to have good publication record, especially those with conferences/workshops of IACR. Besides an active cryptography research group to work with, we also offer globally competitive salaries, including basic monthly salary and performance-based bonus, besides other allowances.

    Review of applications will begin immediately and will continue until all positions are filled. Only shortlisted candidates will be contacted for interview.

    Contact: Jian Guo, Principal Investigator. Email: guojian (at) ntu.edu.sg

    Closing Date for Applications: 2016-08-31



    [ IACR home page ] © IACR