Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The post-docs will be working on formalizing and applying formal reasoning to real-world security problems and trust issues. The research topics will include: security protocols, security modeling, formal methods for security, socio-technical aspects of security, risk management, privacy, verification, etc. The positions will be partially funded by the national research project STAST: Socio-Technical analysis of Security and Trust, which aims to develop strategies and tools to detect and prevent attacks involving human, physical and digital elements.
Koç University has a beautiful campus in the middle of a forest, with a nice view of the Black Sea and the Bosporus, and is close to the ?stanbul city center.
For more information about our group and projects, visit
For applying online, and questions about the application-process, visit
For summer internship opportunities, visit
For questions, contact Asst. Prof. Alptekin Küpçü
Job Description: Responsible for secure design, development and operation of Intel\\\'s hardware and software products and services. Responsibilities may include threat assessment, design of security components, vulnerability assessment. Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks. Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal process. Maintains substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literate and conferences. May participate in development or intellectual property. Require thorough knowledge of security practices, procedures and capabilities in order to perform non-repetitive, analytical work.
You should possess a Master of Science degree in an Engineering discipline with at least two years of related experience. Additional qualifications include (you should possess many if not all of the following):
- Knowledge of security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
- Demonstrated expertise with computer architecture
- Creation of test plans and test content for validating platform and system components
- Ability to work in a less structure start-up type environment
- Strong oral and written communication skills with demonstrated attention to detail and results orientation
- x86 and C programming skills
Good to have
- Knowledge of Intel\\\'s CPU and/or chipset architecture
Candidates with a Master\\\'s degree in Computer Science, Computer Engineering, Mathematics, Telecom Engineering or similar are sought. Starting date: beginning of the fall semester 2013 (september or october, depending on the candidate).
Selected candidates will be expected to do a Ph.D. thesis in security, privacy or cryptography with the CRISES group-UNESCO Chair in Data Privacy. More info on the group can be found at
and more info on the Chair
can be found at http://unescoprivacychair.urv.cat