International Association for Cryptologic Research

Open Positions in Cryptology

IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at https://www.iacr.org/jobs/. To advertise a job opportunities, please submit your job here.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


IBM Research - Zurich, Switzerland
Post-Docs and PhD Students

The cryptography and privacy group of IBM Research - Zurich in Switzerland is looking for highly motivated Post-Docs and PhD students in the area of provably secure cryptography, in particular privacy-enhancing cryptographic protocols and public key cryptography.

Candidates will perform scientific research in the areas mentioned above under the direct guidance of the permanent researchers in our team. Their main task will consist of publishing at respected academic conferences and journals. They will occasionally implement prototypes of cryptographic schemes developped.

Post-Doc candidates must have a PhD degree in cryptography. All candidates must be fluent in spoken and written English; knowledge of German is not required.

PhD student candidates must have a Master degree or equivalent in computer science, mathematics, electrical engineering, or related disciplines. Knowledge of cryptography (in particular public key cryptography) is required, proven experience in the form of theses or published papers is a strong asset.

IBM Research - Zurich offers a stimulating international research environment among experts in computer science, physics, and mathematics. The laboratory is located in Rüschlikon, Switzerland, at 10km from the city of Zurich and on the coast of Lake Zurich. A competitive salary will be offered, adjusted to the high local living standards.

The positions will remain open until suitable candidates have been hired.

Contact: Interested candidates should send a CV and motivation letter to Jan Camenisch jca(at)zurich.ibm.com

More Information: http://www.zurich.ibm.com/security/

Closing Date for Applications: 2016-10-01



University of Surrey, UK
PhD Studentship in IoT Security & Privacy

We are looking for an excellent, motivated, self-driven doctoral student to work in the exciting area of Internet of things (IoT) security and privacy focusing on developing new, smarter, and more agile security approaches. The PhD student will join the Secure Systems group (http://www.surrey.ac.uk/cs/research/) for three years, working in the area of secure and privacy-preserving communication and execution of the core IoT end-points including resource-constrained embedded devices, mobile phones (in the context of mobile sensing applications) and vehicles.

The PhD student is expected to hold at least an upper second class honours degree and preferably a Master's degree in CS, EE, Information Security or similar discipline. Basic knowledge of computer networking, network and embedded systems security is required, with some background in cryptography and native code based systems.

The position is funded for three years and is intended to start in July 2016 or as soon as possible thereafter.

Contact: Thanassis Giannetsos

Lecturer in Secure Systems

Department of Computer Science

University of Surrey

GU2 7XH

Email:a.giannetsos (at) surrey.ac.uk

More Information: http://www.surrey.ac.uk/projects/phd-student-position-iot-security-and-privacy

Closing Date for Applications: 2016-06-20



Ruhr-University Bochum, Horst Görtz Institute / UbiCrypt
Postdoc / Interdisciplinary Coordinator

Post-Doc DFG Research Training Group

UbiCrypt – Cryptography in Ubiquitous Computing

The Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than €4 million to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for candidates with an outstanding Ph.D. in the fields of computer science, electrical engineering, mathematics or related areas.

The research training group will study problems which are fundamental for securing the Internet of Things. The research is structured in three levels: cryptographic primitives, device and system level. The research topics range from cryptographic foundations such as fully homomorphic encryption for privacy in cloud computing, over security for medical implants to internet security solutions involving new national ID cards.

Beside the own research, the main task of the Post-Doc is to work with the UbiCrypt Ph.D. students, and to encourage collaboration between them. Thus, an interest in working with doctoral students and a broad interest in current research are required.

- Start: earliest possible (limitation: March 31, 2017)

- Competitive salary (TV-L 14)

- Application: Send your documents by June 1, 2016, to grako (at) hgi.rub.de

- Required documents: CV, certificates (Bachelor, Master/Diplom, Ph.D.), transcripts , motivation for applying (1 page), names of at least two people who can provide reference letters (email addresses are sufficient)

A group of internationally renowned researchers together with excellent funding provides an extremely interesting scientific environment. The HGI is known for its good working atmosphere.

More Information: http://www.ubicrypt.hgi.rub.de/index.html.de

Closing Date for Applications: 2016-06-01



Information Security Group, Royal Holloway, University of London
Lecturer in Information Security (= Assistant Prof in North America or Junior Prof in Europe)

Applications are invited for the post of Lecturer in the Information Security Group at Royal Holloway, University of London. Note that this position is roughly equivalent to a tenure-track Assistant Professor in North America or a Junior Professor in Europe.

Applications are invited from researchers whose interests are related to, or complement, current strengths of the ISG. We are particularly interested in applicants with outstanding research achievements and/or potential in relevant information/cyber security areas.

Applicants should have a Ph.D. in a relevant subject or equivalent, be a self-motivated researcher, and have a strong publication record. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security.

This is a full time and permanent post, with an intended start date of 1st September, 2016, although an earlier or slightly later start may be possible. This post is based in Egham, Surrey, where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.

Contact: For an informal discussion about the post, please contact Prof. Keith Mayes on keith.mayes (at) rhul.ac.uk.

The Human Resources Department can be contacted with queries by email at: recruitment (at) rhul.ac.uk.

More Information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0516-162

Closing Date for Applications: 2016-06-12



Information Security Group, Royal Holloway, University of London
Lecturer (teaching focussed) in Information Security; five year, full time

Applications are invited for the post of Lecturer (teaching focussed) in the Information Security Group at Royal Holloway, University of London.

The post holder will contribute to the creation and/or revision, delivery and assessment of postgraduate (MSc) and undergraduate teaching modules across a wide range of topics in the field of information/cyber security.

Applicants should have a Ph.D. in a relevant subject or equivalent and have a sound knowledge of information/cyber security. Applicants should be able to demonstrate an enthusiasm for teaching and communicating with diverse audiences, as well as show an awareness of contemporary issues relating to cyber security.

It should be noted that teaching post holders are permitted to spend 10% of their time following their research interests.

This is a five year teaching post, available from 1st September 2016. This post is based in Egham, Surrey, where the College is situated in a beautiful, leafy campus near to Windsor Great Park and within commuting distance from London.

Contact: For an informal discussion about the post, please contact Prof. Keith Mayes on keith.mayes (at) rhul.ac.uk .

The Human Resources Department can be contacted with queries by email at: recruitment (at) rhul.ac.uk.

More Information: https://jobs.royalholloway.ac.uk/vacancy.aspx?ref=0516-161

Closing Date for Applications: 2016-06-12



Hong Kong Applied Science and Technology Research Institute Company Limited
Senior Engineer/Software Engineer, Information Security,

•Develop and implement secure cloud computing and secure software systems.

•Develop cryptographic and encryption technologies.

•Develop mobile security solutions.

•Develop and implement cyber-threat intelligence and defense technologies.

•Perform security review and assessment on information security and e-commerce systems.

•Conduct R&D in various areas which include but not limited to software, network, distributed system, database, and mobile security.

•Conduct R&D in various areas which include but not limited to software, network, distributed system, database, and mobile security.

Requirements:

•Bachelor’s degree or above in Computer Science, Electrical Engineering or other relevant disciplines.

•More senior candidates with Master or PhD degree, or with minimum five years’ of experience in software development, i.e. design, implementation, test and documentation will be considered as Senior Engineer.

•Familiar with software development or testing, programming languages on C/C++/ObjC/Java/Javascript.

•Certificates or formal training in information security or with experience in security assessment is a plus, but not a necessity.

•Good knowledge of OS security and virtualization security, and implementation experience on the cloud an advantage.

•A team player with good analytical and communications skills.

•Good command of written and spoken English.

Contact: charlenech00 (at) astri.org

More Information: http://www.astri.org/careers/work-at-astri/jobs/senior-engineerssoftware-engineers-information-security-multiple-opening

Closing Date for Applications: 2016-05-30



Hong Kong Applied Science and Technology Research Institute Company Limited
Senior Engineer/Engineer, Cyber-Security Assessment

•Conduct research on advanced ethical hacking, penetration testing, reverse engineering.

•Conduct assessment on network infrastructure, web and mobile security.

•Assisting in IT security enforcement and enhancement.

•Design secure application testing approaches, integrate quality assurance testings with security functionalities.

•Candidate with strong programming background will also be involved in security tool/signature development.

•Design and implement preventive security controls, application code review and analysis, code scanning and testing tools, web application scanning and penetration tests.

•Manage vendor and service provider on security tools and technologies project engagement and delivery.

Requirements:

•Bachelor’s degree or above in Computer Science, Electrical Engineering or other relevant disciplines with a minimum of 5 years of experience in security assessment. Candidates with less experience will also be considered for the Engineer level.

•Experience in financial industry is preferred but not mandatory.

•Demonstrate wide working knowledge of application security.

•Experience in application development life cycle, application testing and code scanning, with exposure in penetration test, finding exploits, vulnerabilities, unauthorized access, or other malicious activities in computer systems.

•Proficient in English, spoken and written.

•High integrity and professional work practice.

•Appreciation of people and cultures of different countries.

Contact: charlenechoo (at) astri.org

More Information: http://www.astri.org/careers/work-at-astri/jobs/senior-engineerengineer-cyber-security-assessment-multiple-openings-8/

Closing Date for Applications: 2016-05-30



School of Computing and Information Technology, University of Wollongong, Australia
Lecturer

The School of Computing and Information Technology is seeking a full time permanent Lecturer (Level B) to provide development, teaching and research within the Bachelor of Computer Science (Digital Systems Security and Cyber Security majors) and the Master of Computer Science (Network Security major). The candidate is expected to be a research active in the area of cryptography and information security, and he/she is equipped with sufficient experience for teaching undergraduate and postgraduate studies.

UOW is a leading Australian university with a history of outstanding achievements in teaching and learning, research and community engagement. It is fundamentally committed to providing our diverse body of students with an engaging world class and internationally oriented learning experience. The University has also established a strong research profile and an outstanding record of achievement in research performance and intensity over the last decade.

The successful candidate will have a national reputation in cryptography or information security research field, innovative teaching experience, an established research profile and demonstrable commitment to positive change. You may be required to teach outside of standard business hours and offshore delivery.

To apply you must address the selection criteria which is located within the position description.

For further enquiries, please contact Head of School, Professor Willy Susilo on +61-2-4221-5535 or wsusilo (at) uow.edu.au

Contact: Professor Willy Susilo

More Information: http://uow.employment.com.au/dspJobView.cfm?jobID=2141

Closing Date for Applications: 2016-06-05



CableLabs - Louisville, CO
Software Cryptographic Researcher

CableLabs leads technology innovation, research, and development of cryptography in the broadband industry. We need a researcher to help us look at very hard cryptography problems this summer! Our goals are to foster awareness of the cable industry’s cryptographic needs, to foster research and development for cryptographic algorithm and implementation improvements, and to better understand cryptographic vulnerabilities specific to our industry. This will be a high paced activity and will allow the research to investigate a cryptographic problem of their choosing!

In addition to a resume or CV, the researcher must submit a research proposal inspired by a list of topics as described below. CableLabs will select the candidate based on the most compelling proposal supported by a resume or CV that demonstrates reason to believe the research can be completed.

The selected researcher will be provided an orientation and experts will be made available to help understand how their research applies to the cable industry. A mentor will support the researcher, but work must be conducted independently. All research must be original.

The key deliverable for this project is a final report and presentation at the completion of research in August. If suitable, we may have the researcher present this work at CableLab’s Summer Conference.

The work must be performed in Louisville, CO at CableLabs. A modest relocation allowance will be provided.

Contact: Please apply at the link provided

More Information: https://www.smartrecruiters.com/CableLabs/92180353-software-cryptographic-researcher

Closing Date for Applications: 2016-06-15



University of Surrey
Two new Research Fellow positions in Security at the University of Surrey

We have two new Research Fellow positions in the Secure Systems group within the Department of Computer Science. Surrey is a GCHQ recognised Academic Centre of Excellence for cybersecurity. One position is part of a newly funded EPSRC interdisciplinary project entitled “Improving customer experience while ensuring data privacy for intelligent mobility” and the other is expanding the group’s expertise in verification and trusted computing. Both projects will involve research collaborations with other academic organisations and industry. We would be pleased to hear from potential applicants.

Job Titles:

  • Research Fellow in Security: https://jobs.surrey.ac.uk/vacancy.aspx?ref=032316

  • Research Fellow in Secure Systems: https://jobs.surrey.ac.uk/vacancy.aspx?ref=032116

    Contact: Helen Treharne, Reader in Secure Systems

    More Information: https://jobs.surrey.ac.uk/Vacancies.aspx

    Closing Date for Applications: 2016-06-13



  • Grace team, INRIA Saclay et Ecole polytechnique, Palaiseau, Paris greater area, France
    Post-Doc

    Post Quantum Secure Multi-Party computation

    INRIA is participating in the European H2020 PQCRYPTO project, http://pqcrypto.eu.org , whose aim is to recommend cryptographic primitives still secure after the potential advent of the quantum computer.

    INRIA team Grace is involved in the topic"advanced applications", like searchable encryption, homomorphic encryption, secure multi-party computation, and has to deliver recommendations.

    Besides the EU project PQCRYPTO, Grace wants to invest and put efforts in the topic of information theoretically secure multi-party computation (MPC).

    Also, Grace would like to investigate how multi-party computation is useful in the context of blockchains.

    Mission

    The mission is to support project-team Grace in his growing involvement in (information theoretically) secure multi-party computation.

    While the team masters mathematical and algorithmic aspects underlying secret sharing schemes relevant to information theoretically secure MPC (coding theory, algebraic function fields over finite fields), the team's knowledge of the MPC security models (simulation, universal composition) needs to be strenghtened. In particular, it is not clear how a powerful quantum adversary may affect these models.

    The second part of the mission would be to help distinguishing between general purpose MPC and decidated MPC, for main applications.

    The position may be extended for a second year.

    Job description

    Within H2020 PQCRYPTO, the applicant will be in charge, with the team leader and European researchers, of delivering the final recommendations. He will help the project participants to elaborate a plan and guidelines for these recommendations. He will also interfere with specialists in quantum computing, to assess the security models of MPC schemes in presence of a quantum adversary.

    Profile

    The candidate should have the done a PhD thesis in the topic of MPC computation, and know well the security models underlying the topic, with all their subtleties.

    Contact: Daniel Augot

    batiment Alan Turing

    1 rue d'Estienne d'Orves

    campus de l'Ecole polytechnique

    Palaiseau

    France

    More Information: http://bit.ly/24HTRc6

    Closing Date for Applications: 2016-07-31



    Monash University, Australia
    Lecturer/Senior Lecturer Cyber Security

    The Faculty of Information Technology is looking for candidates to fill several positions as a Lecturer / Senior Lecturer – Cyber Security. As a successful candidate, you must have a demonstrated record of high-quality research in the cyber security area and the capability to establish and lead a high quality research team in this area, as well as demonstrated capacity to perform high-quality teaching in the Computer Science or Software Engineering areas. Your application should clearly show how this is the case.

    Your research expertise in one of the following research areas is pivotal to the success of this role:

    - security of advanced networking infrastructures (VNF, SDN, etc.)

    - cross-layer security (from physical layer up to applications, including meta-data)

    - secure roots of trust and trust management for IoT, critical infrastructures, virtualization

    - interdisciplinary cyber security

    - resilience of IT-based infrastructures

    - IoT with cyber security focus (automation, robotics, sensors/actuators, etc.)

    - software security

    - mobile security, Android, iOS

    - forensics, cyber-crime, forensic readiness.

    If you have an excellent record of scholarly, high quality, high impact publications in refereed journals and conferences in areas of cyber security, we urge you to apply.

    IMPORTANT: It is essential for your application to include a letter answering your suitability according to the key selection criteria (Please refer to "How to apply for Monash Jobs"). In addition, it would be helpful if your CV contains, for each high quality, high impact publication, a brief indication of its impact (in terms of citations) and of the quality of the venue. For the latter, please refer to the CORE conference and journal rankings www.core.edu.au/index.php

    For the former, please refer to Google Scholar, Scopus, or Thomson Reuters.

    This role is a full-time or part-time position; flexible working arrangements can be negotiated.

    Contact: Associate Professor Carsten Rudolph

    More Information: http://www.jobs-monash.jxt.net.au/academic-jobs/lecturer-senior-lecturer-cyber-secruity/625850

    Closing Date for Applications: 2016-05-29



    CableLabs
    Software Cryptographic Researcher

    The CableLabs Cryptographic Summer HARd Problems Program (C2SHARP) will bring in a small number of developing experts to consider cryptography and cryptanalysis as it relates to the cable industry. The goals will be to foster awareness of the cable industry’s cryptographic needs, to foster research and development for cryptographic algorithm and implementation improvements, and to better understand cryptographic vulnerabilities specific to our industry. Other topics of related to hard network or application security may be considered as well.

    The program will run for two months in Louisville, Colorado. Researchers will be paid as consultants for the duration of their project and will receive relocation compensation for their extended stay. Researchers are to submit their CV or resume and a brief research proposal outlining the problem they want to research, their method and approach, and modest resource requirements to conduct the work. While the format and structure of proposals is left to the imagination of candidates, Dr. Karen Kelsky describes an excellent approach to compiling research proposals on her blog at http://theprofessorisin.com/2011/07/05/dr-karens-foolproof-grant-template/. The program will culminate with presentations to a panel at a special session at the CableLabs Summer Conference where findings will be presented.

    Accepted proposals will be notified in early June. Participants will be given two to three weeks to arrive in Louisville and will be provided an orientation and experts to help you understand how your research applies to the cable industry. A mentor will support the researcher, but work must be conducted independently. All research will be novel; reworking previously conducted research is not acceptable.

    Contact: Steve Goeringer

    More Information: https://www.smartrecruiters.com/CableLabs/92009588-software-cryptographic-researcher

    Closing Date for Applications: 2016-08-31



    Chalmers University of Technology, Sweden
    Fully Funded PhD Student position in Cryptography

    We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography. The position is for five years at the Department of Computer Science and Engineering. The PhD student will join Katerina Mitrokotsa’s group and will be funded by a project funded by the Swedish research council focusing on security and privacy issues in resource constrained devices.

    The PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography.

    The position is fully funded for up to five years. The call for expressions of interest will remain open until a suitable candidate is appointed.

    Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.

    Contact: Katerina Mitrokotsa

    Associate Professor

    Chalmers University of Technology

    Department of Computer Science and Engineering

    Chalmers University of Technology

    More Information: http://www.chalmers.se/en/about-chalmers/vacancies/?rmpage=job&rmjob=4044

    Closing Date for Applications: 2016-05-31



    Input Output HK (IOHK), Japan and Remote
    Cryptographic Researcher

    About IOHK

    IOHK is a company developing new cryptocurrencies and related applications. The goals of IOHK Research, our research division, are to advance the science behind cryptocurrencies and to attest the security of our products by careful analysis of their underlying protocols. Our team at IOHK Research focuses on the analysis of protocol specifications and on theoretical research while programming and implementation are handled by a separate team. At IOHK Research you will be responsible for investigating current cryptocurrencies, formalising security models, proposing new techniques, constructing new schemes and analysing their security.

    We want the results of our research to impact both our products and the community, so we highly encourage our researchers to collaborate with other institutions and to publish papers in top conferences and journals. Moreover, we intend to open source most of our software, which will be developed based on techniques investigated by the IOHK Research team. We offer a flexible work style with a chance to work in a very dynamic team with talented people from all around the world, including partners from academia and the open source community.

    Full-time Positions in Japan and Remote Part-time Positions

    We are currently looking for talented cryptographers to join our team in Japan in full-time positions. We also offer part-time positions to outstanding students who are interested in joining our team while working remotely from their current locations. Knowledge specific to cryptocurrencies is not mandatory at the start, as the candidate is expected to spend 1-2 months developing it.

    Requirements

  • Master’s degree or above with a focus on cryptography.
  • Strong background in theoretical or practical aspects of cryptographic protocols.
  • A good record of peer-reviewed publications in relevant conferences and journals.
  • This call does not have a definite closing date. You are welcome to apply at any moment.

    Contact: Please send your CV to recruitment (at) iohk.io

    More Information: https://iohk.io/careers/

    Closing Date for Applications: 2016-12-31



    ENS de Lyon, France
    Post-Doc

    At least one and maybe several post-doc positions on lattices (e.g., lattice-based crypto, cryptanalysis, algorithms), for up to 2.5 years.

    Interested applicants should provide a detailed resume and references.

    Contact: Damien Stehle (damien.stehle (at) ens-lyon.fr)

    Closing Date for Applications: 2016-06-30



    University of Luxembourg, SnT/Cryptolux
    Ph.D. student in FinCrypto, PETs, SymCrypto

    The successful candidates will join a strong and motivated research team lead by Prof. Alex Biryukov in order to carry out research towards a PhD on one of the following topic:

    • Financial Cryptography (security of distributed ledgers, smart contracts, mobile payments)
    • Privacy Enhancing Technology (Tor-like networks, privacy for blockchain, code obfuscation)
    • Symmetric Cryptography (cryptanalysis and design, lightweight crypto protocols)

    Contact: Prof. Alex Biryukov (e-mail: name dot family name (at) uni.lu)

    More Information: https://goo.gl/f0CGnb

    Closing Date for Applications: 2016-06-01



    AET Europe, Netherlands
    Applied Cryptographer / PKI developer

    Passionate about PKI, algorithms, ciphers and security systems to encrypt sensitive information? We have a vacancy for a code maker/breaker, the professional who ensures that data regarding finance, health, national security and other important worlds are hidden from hungry hackers...

    You will be working on software for mobile platforms, mobile devices like iOS, Android, Windows and connected devices. Your projects are designing and implementing cryptography in our software solutions that are resilient against real world attacks. This will include the analysis of cryptographic implementations embedded in AET’s solutions under evaluation. You will also provide technical expertise in applied cryptography.

    What you bring

    We’re looking for an Applied Cryptographer / PKI developer who is passionate (like us) about software development and not afraid to pioneer new approaches, techniques and technologies. The ideal candidate will have a passion for implementing solutions to complex security problems with a keen understanding of information security challenges and an up-to-date awareness of information security threats.

    You will need to have the following qualifications and experience:

    • Has a Bachelor or Master degree in IT, Math or other related degree,
    • Deep knowledge of applied cryptography and PKI,
    • Ability to combine market and technology topics to find technical solutions in complex environments.

    Other areas of knowledge and experience that would be considered key assets:

    • Programming languages: C/C++, Java,
    • An understanding of modern computer architectures and information technology architectures including cloud computing,
    • Platforms like iOS, Android, Windows or Linux,
    • Smart cards, sims and/or HSMs,

    If you are interested in this opportunity and feel that you have the relevant skills, qualifications and experience as a Applied Cryptographer / PKI developer please send your resume to hrm (at) aeteurope.com

    Contact: We can understand you want to know more about the job, your colleagues or the company of AET. Don’t hesitate to give us a call at +31 26 365 3350. Ask for Bert Smit, Development Manager.

    We are looking forward to getting to know you!

    More Information: https://www.aeteurope.com

    Closing Date for Applications: 2017-12-31



    AIT Austrian Institute of Technology, Vienna, Austria
    Scientist or Post-Doc Position

    We are looking for a research scientist or post-doc in cryptography to work on novel cryptographic concepts for emerging ICT domains (e.g. cloud computing or cyber physical systems). Ideally you have experience in fields like modern public-key cryptography, distributed cryptography, privacy enhancing technologies, or multi-party computation. You will be involved in EU research projects and advance/improve cryptography for secure and privacy preserving cloud based systems. Ideally you have also experience in software development and prototyping.

    Further infos:

    • Direct job posting: http://www.ait.ac.at/fileadmin/inserate/Jobs/Science/Scientist_for_Applied_Crypthography.pdf
    • AIT Digital Safety & Security Department: http://www.ait.ac.at/departments/digital-safety-security

    Contact:

    • Thomas Loruenser, Department Digital Safety & Security, AIT Austrian Institute of Technology, or
    • Maria Leonhard-Maurer, Head of Human Resources, E-Mail: maria.leonhard-maurer (at) ait.ac.at

    More Information: http://www.ait.ac.at/fileadmin/inserate/Jobs/Science/Scientist_for_Applied_Crypthography.pdf

    Closing Date for Applications: 2016-06-30



    Universitat Pompeu Fabra, Barcelona, Spain
    PhD student

    Applications are invited for a PhD position in the field of cryptography at the Department of Information and Communication Technologies at Universitat Pompeu Fabra in Barcelona, Spain, to be co-supervised by Dr. Vanesa Daza and Dr. Carla Ràfols. The successful applicant will do research in theoretical cryptography, more specifically in the design of secure cryptographic protocols. He/she will be funded by the Spanish Government through the FPI program (Formación de Personal Investigador). The starting date will be around Oct. 2016.

    The candidate should hold or be about to receive a master's degree by Oct. 2016 in computer science, mathematics or a related area.

    Applications should start with a a short motivation letter, include a full CV, a copy of grade transcript(s) of completed studies and one name of reference.

    To apply or request further information, please contact cryptophdapplications (at) upf.edu. Review of applications will start immediately until the position is filled.

    Contact: cryptophdapplications (at) upf.edu

    Closing Date for Applications: 2016-06-15



    Nanyang Technological University
    Post-Doc

    Coding and Cryptography Research Group at Nanyang Technological University is currently looking for two postdoctoral fellows to work on the design, the analysis, and the implementation of Homomorphic Encryption and lattice-based/coded-based cryptography.

    Applicants should have a Ph.D. in a relevant subject or equivalent, have a strong publication record and interest of the areas. The position is initially for 10 months to one year. Review of applications will begin immediately until the positions have been filled. Applicants should send the CV to Prof Wang Huaxiong directly.

    Contact: Prof Wang Huaxiong

    hxwang (at) ntu.edu.sg

    Closing Date for Applications: 2016-07-29



    University of Bristol
    Research Associate or Senior Research Associate in Cryptography

    Applications are invited for a Research Associate or Senior Research Associate position in the Cryptography group within the Department of Computer Science at the University of Bristol. The group has significant funding and we are usually looking to recruit research staff in the following areas:

    • Practical aspects of Multi-Party Computation and other areas related to computing on encrypted data.

    • Theoretical aspects of Multi-Party Computation.

    • Areas related to the evaluation of the security of cryptographic implementations.

    • Designing and implementing cryptography that is resilient against real world attacks.

    • Design and implementation of tools, including compilation techniques, that help improve security of cryptographic implementations.

    This is a “rolling advert” with a nominal close date only. Applications are welcome at any time and the timing of the selection process will be dependent on the applications received.

    Contact: Nigel Smart (nigel (at) cs.bris.ac.uk)

    More Information: http://www.bris.ac.uk/jobs/find/list.html?keywords=cryptography

    Closing Date for Applications: 2016-12-31



    Cyber Security Practise - United Arab Emirates
    Crypto Experts

    This is an excellent opportunity to join a Cyber Security practise experiencing rapid growth in the United Arab Emirates. They are currently seeking experienced Crypto Experts with the following knowledge to join their team:

    • Proficient in AES algorithm design.
    • Expert in block and stream cipher, key management, hybrid approach, hashing.
    • Knowledge in substitution, permutation, confusion & diffusion mechanism.
    • Cryptanalysis: Differential, Linear, Side channel attack, Plain & Cipher text etc,.
    • Knowledge in crypto events, such as, Caesar competition.
    • History of different symmetric key algorithms.
    • Mathematics degree is preferred.
    • Should be ready to start design algorithm as soon as join.
    On offer is an attractive TAX FREE expatriate package, the opportunity to learn from some of the most highly qualified in the business and genuine career opportunities.

    Contact: Hilary (at) talentboutique.ae

    Closing Date for Applications: 2016-08-29



    Newcastle University
    Post-Doc

    Applications are invited for a Post-Doc post at the School of Computing Science, Newcastle University, UK. The post is funded by European Research Council (ERC), until end of Dec 2017. The project is on investigating "self-enforcing e-voting", but the candidate has the flexibility to work with a team of researchers on a diversified range of topics that concern real-world security, e.g., authenticated key exchange, BitCoin, NFC payment security, e-auction, e-passport and mobile sensor security.

    The successful applicant will join a vibrant and growing Secure and Resilient Systems (SRS) research group at the School of computing Science, Newcastle University. So far research works in the group have been largely driven by tackling real-world security problems, with some of the research outcomes adopted by international standards and deployed in large-scale commercial applications.

    About us: The School of Computing Science at Newcastle University is recognised as one of the fourteen Academic Centres of Excellence in Cyber Security Research (ACEs-CSR) in the UK. In the latest 2014 Research Excellence Framework (REF) assessment which included all UK universities, Newcastle University CS was ranked the 1st in the UK for its Research Impact.

    How to apply: follow the online application link below. To help speed up the process, please also send your CV and a brief cover letter to feng.hao (at) ncl.ac.uk.

    More Information: http://www.jobs.ac.uk/job/AUE162/d35883r-research-assistant-associate-e-voting/

    Closing Date for Applications: 2016-05-10



    Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
    Post Doc, Embedded System Security Group

    The main objective of the research in the Embedded System Security Group is to propose efficient and robust hardware architectures aimed at applied cryptography and telecom that are resistant to passive and active cryptographic attacks. Currently, the central theme of this research consists in designing architectures for secure embedded systems implemented in logic devices such as FPGAs and ASICs. More information on http://laboratoirehubertcurien.fr/spip.php?article213.

    For a new project which addresses the problem of secure and privacy in MPSoC architectures, we proposes a Post Doc position to work on security evaluation of heterogeneous MPSoC. We are looking for candidates with an outstanding Ph.D in hardware security and a strong publication record in this field. Strong knowledge in side channel attacks and countermeasures, digital system (VHDL, FPGA) design would be appreciated. Knowledge of French is not mandatory.

    The Post-Doc position will start in 2016 (flexible starting date), it is funded for 24 month.

    To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).

    Contact:

    Dr. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr

    Closing Date for Applications: 2016-06-15



    Chalmers University of Technology, Sweden
    Fully Funded PhD Student position

    We are looking for an excellent, motivated, self-driven doctoral student to work in the area of information security and cryptography. The position is for five years at the Department of Computer Science and Engineering. The PhD student will join Katerina Mitrokotsa’s group and will be funded by a project funded by the Swedish research council focusing on security and privacy issues in resource constrained devices.

    The PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography.

    The position is fully funded for up to five years. The call for expressions of interest will remain open until a suitable candidate is appointed.

    For any inquiries or to apply for the position, submit a full research curriculum-vitae (cv), names of two references, and a research statement to Prof. Katerina Mitrokotsa (aikmitr@ chalmers.se) clearly indicating the position sought.

    Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.

    Contact: Katerina Mitrokotsa

    Associate Professor

    Chalmers University of Technology

    Department of Computer Science and Engineering

    Göteborg, Sweden

    Closing Date for Applications: 2016-05-15



    UK or France
    Senior Security Analyst (Open Platform)

    Due to continued growth and development, we are looking for a Security Analyst, specialising in Open Platform products. You will be working for a global leading security lab, reviewing and analysing customers software, looking for potential security flaws.

    The successful candidate will have significant experience with Open Platform products and is expected to take full responsibility for performing security evaluation tasks on the customers’ products. This will be completed through code review, vulnerability analysis, test planning and interpretation of test results. The evaluation tests are mainly carried out on embedded products, particularly payment devices, such as smart cards, POS terminals and mobile payment devices. A formal report will be expected for the customer, and the Senior Security Analyst is normally the technical coordinator for the entire project.

    The ideal candidate will be particularly experienced in C, Java, assembly languages, GlobalPlatform and EMV standards, and perhaps have a background in cryptography or data security.

    Contact: Dom Gooch - dominic.gooch (at) solagroup.com / 02032067564

    Closing Date for Applications: 2016-06-06



    UK or France
    Senior Security Analyst (Native Code)

    Due to continued growth and development, we are looking for a Security Analyst (specialising in Native, or Closed Platform products). You will be working for a global leading security lab, reviewing and analysing customers software, looking for potential security flaws.

    The successful candidate will have significant experience with native code based products (C and Assembly) and is expected to take full responsibility for performing security evaluation tasks on the customers’ products. This will be completed through code review, vulnerability analysis, test planning and interpretation of test results. The evaluation tests are mainly carried out on embedded products, particularly payment devices, such as smart cards, POS terminals and mobile payment devices. A formal report will be expected for the customer, and the Senior Security Analyst is normally the technical coordinator for the entire project.

    The ideal candidate will be particularly experienced in C, Java, assembly languages and EMV standards, perhaps with a background in data security and cryptography.

    Contact: Dom Gooch - dominic.gooch (at) solagroup.com / 02032067564

    Closing Date for Applications: 2016-06-06



    Guangzhou University, Guangzhou, China; The University of Hong Kong, Hong Kong
    Post-Doc

    The security group in Guangzhou University, is looking for 4-5 excellent Postdoc researchers and visiting scholars. The researchers will work on a security project with another research group in The University of Hong Kong. The research topics currently investigated in our group include

    • Security and Privacy in Big Data
    • Security in Cloud Computing
    • Applied Cryptography
    • Biometric security
    Applicants are expected to have a good publication record in security. For any interested applicants, please contact and send your CV to Jin Li directly (http://scholar.google.com/citations?user=7GDV2vUAAAAJ) and Siuming Yiu (http://www.cs.hku.hk/people/profile.jsp?teacher=smyiu). The postdoctoral position is for 2 years with possibilities of renewal. The applicant with faculty positions are also welcome. The starting date is immediate starting from June 1, 2016.

    Successful candidate(s) will receive a competitive salary (around 50,000 USD-60,000 USD/per year) as well as research funding around 25,000USD.

    Contact: Jin Li, jinli71 (at) gmail.com
    Siuming Yiu, smyiu (at) cs.hku.hk

    Closing Date for Applications: 2016-08-20



    CryptoExperts, Paris, France
    Post-Doc Researcher

    CryptoExperts (www.cryptoexperts.com) is looking for an excellent postdoctoral fellow to work on the design, the analysis, and the implementation of Homomorphic Encryption and lattice-based cryptography.

    In this position, the candidate will be primarily involved in two projects on homomorphic encryption: HEAT (a H2020 project) and CryptoComp (a French project). The focus of these projects is to produce a step change on the practical as well as theoretical aspects of homomorphic encryption. Challenging industrial use-cases will allow to ground the research in practical issues. The candidate will be able to carry research according to its research interests (theoretical and/or practical), and will be offered multiple travel opportunities and interactions with scientists all over Europe. Participation to open-source libraries on homomorphic encryption and proof-of-concept demonstrators will be expected.

    Applicants should have a Ph.D. in a relevant subject or equivalent, have a strong publication record and interest in practical protocols. Implementation and coding experience are required.

    The position is fully funded for two years (with a flexible starting date). Review of applications will begin immediately until the position has been filled. Knowledge of French is _not_ mandatory. To apply, please send by e-mail the following documents:

    - Curriculum vitae with publication list

    - Reference letters

    Contact: Pascal Paillier, jobs (at) cryptoexperts.com

    More Information: https://www.cryptoexperts.com/people/#jobs

    Closing Date for Applications: 2016-06-30



    Rochester Institute of Technology, Rochester, NY, USA
    Ph.D. Student in Cryptographic Engineering/Post-quantum Cryptography

    One Ph.D. position is available immediately for exceptional applicants. The research areas include cryptographic engineering, post-quantum cryptography, side-channel attacks, and ECC. Excellent background in VHDL/Verilog, FPGA/ASIC design, and mathematics of cryptology is desired. BS and MS degrees need to be in ECE.

    Please contact both Dr. Mehran Mozaffari Kermani (m.mozaffari (at) rit.edu) and Dr. Reza Azarderakhsh (rxaeec (at) rit.edu) and enclose your CV, statement of interest, and transcripts.

    Closing Date for Applications: 2016-05-31



    National Institute of Standards and Technology (NIST)
    Cryptographic Researcher

    The Computer Security Division, National Institute of Standards and Technology (NIST) seeks cryptographic researchers to join the team. We will consider candidates at various stages of their career, including new PhD graduates and experienced researchers.

    Particular areas of interest include, but are not limited to: Post-quantum cryptography, lightweight cryptography, security proofs of cryptosystems, cryptanalysis, secure protocols, hardware/software implementations, and cryptographic applications.

    For employment with NIST, the candidates must be US citizens. We also host guest researchers through the NIST Foreign Guest Researcher Program.

    Contact: Dr. Lily Chen (Lily dot Chen at NIST dot gov)

    Closing Date for Applications: 2016-08-31



    Universite Libre de Bruxelles
    Post-Doc position

    Université Libre de Bruxelles, Computer Science Department
    Post-doc Position in Cloud Security

    Applications are invited for a two-years Post-Doc position to work on the analysis and the design of secure protocols for cloud environments.

    Candidates are expected to publish papers in well-known security related conferences and journals and should:

    • Hold a PhD degree in Computer Science, Mathematics or related fields
    • Have solid background on computer security and cryptography
    • Have a good publication record
    • Demonstrate an excellent level of spoken and written English. Knowledge of French is a plus.
    Due to the particular nature of the funding, the position is only available for a non-Belgian citizen in a situation of international mobility, i.e. the candidate should not have spent more than 24 months in Belgium over the last 3 years.

    Applications must include:
    • a curriculum vitae, including a list of publications
    • copies of diplomas
    • two (or more) references

    Contact: Applications can be send by email to Prof. Olivier Markowitch, olivier.markowitch (at) ulb.ac.be

    More Information: http://qualsec.ulb.ac.be/research/post-doc/

    Closing Date for Applications: 2016-04-10



    Qualcomm Incorporated - San, Diego, CA, USA
    Systems Security Architect - Standards Team

    Job Overview Systems Security Architect is responsible for working with R&D projects within QUALCOMM to research, design and develop the right security architecture and protocols for these projects and standardize them as needed. Ability to perform systems security or vulnerability analysis and design is a must. This position requires a strong understanding of the mobile systems architecture and protocols as defined by standards such as 3GPP, ETSI, IEEE, IETF. The successful candidate will demonstrate prior experience in one or more of these areas and a passion for architecting secure systems.

    Ability to work in groups as well as independently with minimal supervision is a must.

    This position requires some travel (up to 20% of the time). Travel may involve participating in standards meetings and/or interacting with QUALCOMM's customers/partners in the industry.

    Minimum Qualifications

    5+ years experience in one or more of the following areas :

    - Embedded platforms security (e.g., ARM TrustZone, TPM, smartcards)

    - Wireless communication systems and protocols (CDMA/UMTS/LTE, Bluetooth, 802.11)

    - Hardware / SoC security

    - Cryptography

    - Participation in standards organizations like IETF/3GPP/3GPP2

    Preferred Qualifications

    - Prior software development experience (C, C++, C#, Java, Windows, Linux) and knowledge of software vulnerabilities

    - OS architectures (e.g., Android, Linux, iOS)

    - IP security protocols (IPsec, SSL/TLS)/ Packet data network security

    - Multimedia systems security design (e.g.VoIP/IMS)

    - Web technologies or applications (e.g., HTTP, HTML5, XML)

    Education Requirements Required:

    Master's, Computer Engineering and/or Computer Networks & Systems and/or Computer Science and/or Electrical Engineering or equivalent experience

    Preferred:

    Doctorate, Computer Engineering and/or Computer Networks & Systems and/or Computer Science and/or Electrical Engineering or equivalent experience

    Contact: Vivian Smith, Staffing Specialist

    More Information: https://jobs.qualcomm.com/public/jobDetails.xhtml?requisitionId=1940091

    Closing Date for Applications: 2016-03-21



    IMDEA Software Institute
    Ph.D. student in Privacy

    Applications are open for a PhD position in the field of privacy enhancing technologies with the Security Group of IMDEA Software Institute (http://software.imdea.org/). The successful applicant can start from April 2016.

    Candidates should either have graduated in Computer Science, Engineering, Mathematics or a related MSc course. A good engineering mathematics background and a strong interest in Security and Privacy is necessary. Inquisitiveness, commitment, and a critical attitude is expected. The working language at the institute is English, and candidates can be of any nationality.

    The successful applicant will work under the supervision of Dr. Carmela Troncoso on the design and evaluation of privacy-preserving systems. The project will tackle the definition of privacy metrics, the development of techniques to compute them and their integration in the design and engineering of privacy enhancing technologies.

    The IMDEA Software Institute is based in Madrid, Spain. The typical duration of a PhD grant at the IMDEA Software Institute is between 3 and 5 years and salaries are internationally competitive, including attractive conditions such as access to an excellent public healthcare system.

    Applicants interested in the position should send an email to Carmela Troncoso and submit the application documents at https://careers.imdea.org/software/. Review of applications starts immediately until the position is filled. The application requires:

    • Curriculum Vitae
    • Motivation letter describing at least one research question you would like to work on
    • Names (and e-mail) of 3 persons that can provide references about you and your work

    For any question send Carmela Troncoso an email

    Contact: Informal enquiries can be sent to Carmela Troncoso at carmela.troncoso AT imdea.org

    More Information: https://software.imdea.org/~carmela.troncoso/openpositions.html

    Closing Date for Applications: 2016-07-31



    Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turke
    Ph.D. / M.Sc. Scholarships, PostDoc Positions, and Summer Internships

    Cryptography, Security & Privacy Research Group at Koç University has multiple openings at every level. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc.

    • For more information about our group and projects, visit

      https://crypto.ku.edu.tr

    • For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit

      https://gsse.ku.edu.tr/en/academics/computer-science-and-engineering/program-overview/

      Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.

      For Ph.D. applicants from China and Hong Kong, we have the prestigious Fung scholarship:

      https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong

    • For summer internship opportunities (at both undergraduate and graduate level), visit

      http://kusrp.ku.edu.tr

    • For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü directly, including full CV, sample publications, a research proposal, and 3 reference letters sent directly by the referees.

      http://home.ku.edu.tr/~akupcu

    Late applications will be accepted, though early applications will be given precedence.

    Contact: gsse (at) ku.edu.tr

    https://gsse.ku.edu.tr/phd-computer-science-and-engineering

    More Information: https://gsse.ku.edu.tr/en/academics/computer-science-and-engineering/program-overview/

    Closing Date for Applications: 2016-06-12



    PACE, Nanyang Technological University, Singapore
    Research Scientist

    The Physical Analysis and Cryptographic Engineering (PACE), Temasek Laboratories @ Nanyang Technological University, Singapore invites strong applications from highly motivated to fulfill research scientist position, in the area of hardware security. Candidates should have already completed, or be close to completing a PhD degree in mathematics, computer science, electrical engineering, or related disciplines, with strong track record in R&D (publications in international journals and conferences.)

    The candidate will perform the research on hardware design/analysis of cryptosystems in FPGA/ASIC/Microcontrollers, with prime focus on PKC/PQC. The underlying work will involve design, analysis and lab. testing in equal parts.

    The initial contract will be one year with strong possibilities of further extensions. Supported by government research fundings, we concentrate on cutting-edge research, candidates are expected to have good publication record, especially those with conferences/workshops of IACR. Besides an active group to work with, we also offer globally competitive salaries, including basic monthly salary and performance-based bonus, besides other allowances.

    Only shortlisted candidates will be contacted for interview.

    Contact: Shivam Bhasin, Co Principal Investigator. Email: sbhasin (at) ntu.edu.sg

    Closing Date for Applications: 2016-06-30



    Cryptography, Security, and Privacy Research Group, Koç University, ?stanbul, Turkey
    Ph.D. / M.Sc. Scholarships, PostDoc Positions, and Summer Internships

    Cryptography, Security & Privacy Research Group at Koç University has multiple openings at every level. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc.

    • For more information about our group and projects, visit https://crypto.ku.edu.tr
    • For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit https://gsse.ku.edu.tr/phd-computer-science-and-engineering

      Note that we do NOT accept Ph.D./M.Sc. applications via email. All applications must be completed online with all the required documents.

      For applicants from China and Hong Kong, we have the prestigious Fung scholarship https://crypto.ku.edu.tr/fung_phd_scholarship_for_china_hong_kong
    • For summer internship opportunities (at both undergraduate and graduate level), visit http://kusrp.ku.edu.tr
    • For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü direcly, including full CV, sample publications, and a research proposal. http://home.ku.edu.tr/~akupcu
    Late applications will be accepted, though early applications will be given precedence.

    Contact: gsse (at) ku.edu.tr
    https://gsse.ku.edu.tr/phd-computer-science-and-engineering

    More Information: https://gsse.ku.edu.tr/phd-computer-science-and-engineering

    Closing Date for Applications: 2016-06-01



    CloudFlare, Inc. / San Francisco
    Cryptography Engineer

    We are looking for a seasoned cryptography engineer for a development role in the Technology group. This role focuses on the implementation of cutting-edge cryptographic protocols for use at web scale in CloudFlare’s systems.

    Candidates will have extensive experience in implementing real-world cryptographic protocols such as TLS. Substantial contributions to cryptographic software such as OpenSSL are preferred. Experience in Go, C, and assembly are required. Cryptography Engineers are expected to be familiar with the nuances of implementing public-key cryptography (PKI), side-channel attacks, padding oracles, constant-time implementations, and have deep domain knowledge.

    Requirements

    • B.S. or M.S. Computer Science or related field, or equivalent experience
    • Experience building security in a fast-paced, web-scale environment
    • Advance knowledge of networking protocols - TCP/IP, DNS, SMTP, BGP etc.
    • In-depth knowledge of authentication protocols, applied cryptography, PKI and SSL/TLS
    • Proficiency in these languages - Go, C, and x86/amd64 assembly
    • Knowledge of the latest attack trends, tools and the threat landscape
    • Proven track record of independently driving security projects in a fast-paced environment
    • Excellent communication skills on both technical and non-technical issues
    Bonus Points:
    • Substantial contributions to cryptography software such as OpenSSL
    • Experience with high throughput/low latency real-time systems and/or content delivery networks

    Contact: https://careers.jobscore.com/careers/cloudflare/jobs/cryptography-engineer-c0wW9i590r5BqSeMg-44q7

    More Information: https://careers.jobscore.com/careers/cloudflare/jobs/cryptography-engineer-c0wW9i590r5BqSeMg-44q7

    Closing Date for Applications: 2016-06-15



    Eindhoven University of Technology. The Netherlands.
    Ph.D. student

    In electronic devices there is a trend to implement ever more functionality in software instead of hardware. Software has the advantage of being less costly, more scalable, easier to personalize, and easier to update. This trend exists also for security-sensitive functionality. For instance, payment schemes are increasingly implemented in software running on the host CPU of a mobile phone instead of in secured hardware.

    A critical question now becomes how to hide secret data and algorithms in software that is running on a fully open platform. The challenge here is that an attacker should be assumed to have full access to and full control over the execution environment. This question is particular relevant for cryptographic keys. For hardware implementations, the protection of keys is a well-studied topic, and evaluation labs are well able to judge the security level of an implementation. For software, however, the evaluation of such solutions, called white-box implementations, is still in its infancy and evaluation labs are not yet able to rate their security level.

    This project aims to improve our knowledge of white-box cryptography and white-box attacks to the point where certification of software security becomes meaningful.

    We are looking for a candidate who meets the following requirements:

    • Master degree in Computer Science, Mathematics, or another closely related discipline;
    • an interest in computer security and cryptography
    • knowledge of side-channel attacks on protected hardware (e.g. DPA, Fault injection) is a plus
    • ability to work in a team, cooperate with industrial partners
    • fluent in spoken and written English

    Contact: prof.dr.ir. W.P.A.J. Michiels , email: w.p.a.j.michiels (at) tue.nl

    More Information: http://jobs.tue.nl/nl/vacature/phd-student-for-the-cowbois-project-256116.html

    Closing Date for Applications: 2016-04-17



    University of Luxembourg
    PhD Student

    Ph.D. positions in information security (M/F)
    Ref: R-STR-5014-00B
    Fixed Term Contract 3 year (CDD) full-time (40 hrs/week)
    Probation: 6 months
    Number of positions: 2

    Your Role: The successful candidate will participate in the activities of the APSIA research group (http://apsia.uni.lu/) led by Prof. P. Y. A. Ryan. The group specializes in the mathematical foundations of information assurance.

    Research Context: The positions are within a national partnership project about the design and the analysis of security of communication protocols for the encrypted exchange and storage of information. Such activities are meant to make it possible to assess rigorously the security of the protocols developed as components of a 'Privacy by Default' product, and to instil security in the engineering processes from the design of the communication logic down to the implementation of the running code obtained by automatic translation. The analysis can be extended to ensure security to upper layers, including those interacting with the users.

    Duties: Under the direction of a senior scientist research and a professor, the candidates will carry research, write scientific papers, present research results at conferences, collaborate with research partners, and write and defend a Ph.D. thesis.

    Contact: Gabriele Lenzini, Peter Y A Ryan

    More Information: http://emea3.mrted.ly/z3hn

    Closing Date for Applications: 2016-03-31



    Boston University, MIT, Northeastern, and UConn
    Postdoctoral researcher

    The Modular Approach to Cloud Security (MACS) is an NSF Frontier project that is building information systems with meaningful multi-layered security guarantees. It is a multi-institution research project with 13 PIs at four universities: Boston University, MIT, Northeastern, and the University of Connecticut.

    The MACS team are looking for excellent postdoctoral fellows in the following areas:

    • Cryptography: theoretical and applied
    • Database security
    • Hardware security
    • High performance computing
    • Network security
    • Security modeling and analysis
    • Virtualization and operating system security

    Preference will be given to candidates with expertise and interest in multiple areas. Fellows will work closely with multiple PIs on the MACS team and will be affiliated with all four host universities.

    Candidates should send their CV, research statement, and list of references to macs-postdoc (at) cs.bu.edu

    Contact: Mayank Varia, MACS director, macs-postdoc (at) cs.bu.edu

    More Information: http://www.bu.edu/macs

    Closing Date for Applications: 2016-06-30



    Indian Institute of Technology Kharagpur
    Post-Doc

    The Cryptography Research Team at Indian Institute of Technology Kharagpur (iitkgp.ac.in) invites strong PostDoc applications from highly motivated candidates working in the field of Cryptography. The candidate should be a PhD holder in Cryptography and/or related areas from a reputed institute. The candidate will be working in the Secured Embedded Architecture Laboratory http://cse.iitkgp.ac.in/resgrp/seal with a group of PhD students and faculty focused in the area of secured system design. The research will be aimed at developing efficient cryptographic protocols with applications in emerging fields such as Cloud computing and Internet of Things (IoT). Knowledge in public key, pairings, functional encryption, multi-party computation, and post-quantum cryptography topics is desirable. The candidate should have excellent publication track record in IACR conferences/workshops, as well as top journals (such as IEEE/ACM Transactions or IACR journals).

    The candidate will be expected to collaborate with and lead a team of excellent and highly motivated PhD candidates for implementation of the protocols. The protocols designed would be tested wrt. side channels by a separate team of research associates. The candidate is expected to work in conjunction with them and also disseminate the necessary knowledge among the group via suitable course material, tutorials and regular group talks. Good communication skills are hence desirable.

    The post-doc position will be partially funded under Information Security Education and Awareness Project, Ministry of Communication and Information Technology, Government of India. The candidate will be provided with a competitive salary (tax-free), along with highly subsidized housing, subsidized food in cafeteria, free healthcare at IIT hospital, travel support for international conferences, comprehensive funding for papers at top conferences like Crypto, performance based top up grants, and other perks and amenities.

    Contact: Prof Debdeep Mukhopadhyay, Indian Institute of Technology, debdeep.mukhopadhyay (at) gmail.com, debdeep (at) cse.iitkgp.ernet.in

    More Information: http://cse.iitkgp.ac.in/resgrp/seal

    Closing Date for Applications: 2016-05-01



    University of Michigan, Ann Arbor
    Postdoctoral researcher

    I am seeking a postdoctoral researcher to work in the cryptography group at U Michigan from Fall 2016, preferably in lattice-based cryptography or related topics.

    Contact: Chris Peikert, cpeikert (at) umich.edu

    Closing Date for Applications: 2016-05-31



    University of Waterloo, Canada
    Research Associate, Post-doctoral Fellow

    Research associate (or post-doctoral fellow) position in Department of Electrical and Computer Engineering at the University of Waterloo in the field of embedded hardware security (side channel analysis, fault injection, microprobing, reverse engineering) for one year appointment (second year dependent upon funding).

    The successful candidate must have a PhD in Electrical and Computer Engineering, Computer Science, Mathematics or a related discipline. In addition theoretical/practical experience in side channel analysis, fault injection, microprobing and/or reverse engineering is preferred.

    Please email with subject ‘RA position’ statement of research, CV, recommendation letters or referees, and copies of 3 most significant publications to cgebotys (at) uwaterloo.ca

    Contact: Contact: Professor Catherine H. Gebotys, cgebotys (at) uwaterloo.ca

    Closing Date for Applications: 2016-08-31



    Microsoft Research, Redmond, Washington
    Post-doctoral Researcher and Researcher positions

    The Cryptography Research group at Microsoft Research in Redmond seeks outstanding applicants for Post-doctoral Researcher and Researcher positions in all areas of cryptography. Post-doctoral positions start in summer 2016 and are for a term of 2 years. Required qualifications include a PhD in computer science or mathematics and experience in cryptography research.

    Particular areas of interest include: Secure Multi-party Computation, Searchable Encryption, and Homomorphic Encryption. Areas of interest in mathematics include lattice-based cryptography, cyclotomic number fields, code-based cryptography, post-quantum cryptography, factoring, discrete log, algorithmic number theory. Interest in practical protocols, and implementation and coding experience are required.

    Review of applications will begin immediately.

    Contact: Kristin Lauter, Research Manager
    E-Mail: klauter (at) microsoft.com

    More Information: http://research.microsoft.com/en-us/people/klauter/default.aspx

    Closing Date for Applications: 2016-03-01



    Ruhr University Bochum
    Ph.D. student in Side-Channel Analysis

    The chair of Embedded Security at Horst Görtz Institute for IT-Security (HGI) at Ruhr-University Bochum (Germany) has openings for Ph.D. positions. We are looking for outstanding candidates with strong background in Electrical/Computer Engineering, and/or Cryptography.

    The vacancy is within the Nano-Scale Side-Channel Analysis project funded by DFG, the German Research Foundation. The available Ph.D. position is fully funded for three years.

    The focus of the project is on practical as well as theoretical side-channel analysis of CMOS ASIC cryptographic devices. Applicants are required to have completed (or be close to completing) a Master or Diploma with excellent grades in Computer/Electrical Engineering, Computer Science, or closely related areas. In addition to the usual computer and electrical engineering background, the candidate is expected to be able to deal with hardware designs, e.g., VHDL/verilog, which is essential for the project.

    Please send your application via e-mail as a single pdf containing a CV, copies of transcripts and certificates, and (if possible) names of references. Review of the applications will start immediately until the position has been filled.

    Send your applications to emsec+apply (at) rub (dot) de

    Starting date: earliest possible

    Founded in 2001, the Horst Görtz Institute at Ruhr-University Bochum is a leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst Görtz Institute has 15 professors and over 80 PhD students.

    Contact: Amir Moradi, amir (dot) moradi (at) rub (dot) de

    Closing Date for Applications: 2016-02-15



    Florida Atlantic University
    Tenure-track Assistant Professor in Cryptology

    The Department of Mathematical Sciences at Florida Atlantic University invites applications for a tenure-track position at the assistant professor level, starting in August 2016. FAU is home to The Center for Cryptology and Information Security, which is dedicated to original, cutting-edge research in cryptology and information security and to education and training of research students and information technology professionals. FAU is recognized as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research (CAE-R) for academic years 2014-2019.

    Research areas of particular interest for this position include, but are not limited to, mathematical foundations of public key cryptography, post-quantum cryptography, computational algebra, and algorithmic number theory.

    Applicants must possess a Ph.D. in Mathematics or a closely related field. Candidates in all areas of cryptology and information security will be considered.

    For additional information, please contact us by email to mathsearch (at) fau.edu. This position is open until filled and may close without prior notice. Priority consideration will be given to applications received by January 31, 2016. To be considered for the position, all applicants must apply and complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at: https://jobs.fau.edu. Please submit a cover letter, vita, copy of your transcript, research statement and a teaching statement through this website.

    In addition, please arrange to have three letters of recommendation sent by first class mail to: Chair of the Search Committee, Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431 or by email to mathsearch (at) fau.edu.

    A background check will be required for the candidate selected for this position.

    Florida Atlantic University is an Equal Opportunity/Affirmative Action Institution. Individuals with disabilities, requiring accommodation, please call 561-297-3057. 711

    Contact: Search Committee Chair, Department of Mathematical Sciences, 777 Glades RD, Boca Raton, FL 33431
    Email: mathsearch (at) fau.edu
    Phone: (561) 297-3340
    Fax: (561) 297-2436

    More Information: https://jobs.fau.edu

    Closing Date for Applications: 2016-01-31



    Department of Computer Science: University of Bristol
    Lecturer/Senior Lecturer Computer Science

    The Department of Computer Science is seeking to appoint 2 Lecturers or Senior-Lecturers in up to two of the following areas:

    • Human-computer interaction and interaction design.
    • Programming languages (language design and implementation).
    • Software verification and validation.
    • Algorithms in the context of large-scale data.
    At least one of the two successful candidates will have significant expertise in cyber-security aspects of one of the above areas and will be expected to help shape the development of cyber-security teaching in our degree programmes.

    More Information: http://www.bristol.ac.uk/jobs/find/details.html?nPostingID=4087&nPostingTargetID=14995&option=28&sort=DESC&respnr=1&ID=Q

    Closing Date for Applications: 2016-01-24



    Florida Atlantic University
    Tenure-track Assistant Professor in Cryptology

    The Department of Mathematical Sciences at Florida Atlantic University invites applications for a tenure-track position at the assistant professor level, starting in August 2016. FAU is home to The Center for Cryptology and Information Security, which is dedicated to original, cutting-edge research in cryptology and information security and to education and training of research students and information technology professionals. FAU is recognized as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research (CAE-R) for academic years 2014-2019.

    Research areas of particular interest for this position include, but are not limited to, mathematical foundations of public key cryptography, post-quantum cryptography, computational algebra, and algorithmic number theory.

    Applicants must possess a Ph.D. in Mathematics or a closely related field. Candidates in all areas of cryptology and information security will be considered.

    For additional information, please contact us by email to mathsearch (at) fau.edu. This position is open until filled and may close without prior notice. Priority consideration will be given to applications received by January 31, 2016. To be considered for the position, all applicants must apply and complete the Faculty, Administrative, Managerial & Professional Position Application form available online through the Office of Human Resources at: https://jobs.fau.edu. Please submit a cover letter, vita, copy of your transcript, research statement and a teaching statement through this website.

    In addition, please arrange to have three letters of recommendation sent by first class mail to: Chair of the Search Committee, Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Rd., Boca Raton, FL 33431 or by email to mathsearch (at) fau.edu.

    A background check will be required for the candidate selected for this position.

    Florida Atlantic University is an Equal Opportunity/Equal Access Institution.

    Contact: Search Committee Chair, Department of Mathematical Sciences, 777 Glades RD, Boca Raton, FL 33431
    Email: mathsearch (at) fau.edu
    Phone: (561) 297-3340
    Fax: (561) 297-2436

    More Information: https://jobs.fau.edu

    Closing Date for Applications: 2016-01-31



    CWI Amsterdam, The Netherlands
    Post-Doc in Lattice-Based Cryptography

    The CWI Cryptology Group is looking for a post-doc with a very strong research record in the area of lattice-based cryptography (design and/or cryptanalysis). The position is opened in connection with a fundamental, practise-oriented research project that will start early 2016 and that is carried out in collaboration with an industrial partner. The duration of the initial contract is one year, with possible extension. To apply, submit a CV with a cover-letter by email to the addresses listed below.

    Contact:

    Ronald Cramer (Head of the CWI Cryptology Group & Professor, Math Inst, Leiden U.) and Leo Ducas (Scientific Staff Member, CWI Cryptology Group).

    Email: {cramer,ducas}@cwi.nl

    Closing Date for Applications: 2016-02-29



    Technische Universität Darmstadt, Germany
    Ph.D. student

    The Engineering Cryptographic Protocols (ENCRYPTO) Group at TU Darmstadt is looking for a doctoral student in Engineering Scalable Cryptographic Protocols.

    Our group was established within the two main research centers for IT security in Darmstadt, the European Center for Security and Privacy by Design (EC SPRIDE) and the Center for Advanced Security Research Darmstadt (CASED). We develop new methods and tools to optimize and automatically generate cryptographic protocols. See http://encrypto.de for details.

    The candidate will do cutting-edge research on privacy-preserving protocols that scale to real-world problem sizes, in particular for protocols such as secure multi-party computation, private set intersection or private information retrieval.

    The candidate is expected to have a completed Master (or equivalent) degree with excellent grades in IT security, computer science, electrical engineering, mathematics, or a closely related field. Solid knowledge in IT security, applied cryptography, efficient algorithms and programming skills are required. Additional knowledge in cryptographic protocols, parallel computing, compiler construction, programming languages, and software engineering is a plus.

    Review of applications starts immediately until the position is filled.

    Please consult the webpage given below for more details and how to apply.

    Contact: Thomas Schneider

    More Information: http://encrypto.de/jobs/ENCRYPTO2015.pdf



    Nanyang Technological University
    Research Scientists/Senior Research Scientists

    The cryptography group at Temasek Laboratories@Nanyang Technological University is looking for researchers on symmetric key cryptography and lightweight cryptography to fill up to 3 positions of (senior) research scientists from fresh postdocs to senior researchers. Supported by government research fundings, we concentrate on cutting-edge research, candidates are expected to have good publication record, especially those with conferences/workshops of IACR. Besides an active cryptography research group to work with, we also offer globally competitive salaries, including basic monthly salary and performance-based bonus, besides other allowances.

    Review of applications will begin immediately and will continue until all positions are filled. Only shortlisted candidates will be contacted for interview.

    Contact: Jian Guo, Principal Investigator. Email: guojian (at) ntu.edu.sg

    Closing Date for Applications: 2016-08-31



    [ IACR home page ] © IACR