PhD student and Postdoc positions, Laboratory of Algorithmics, Cryptography and Security (LACS), University of Luxembourg
The research group LACS/Cryptolux has 2 Ph.D. student and 1 postdoctoral positions in cryptography and IT security. Applicants with interest in the following areas are particularly welcome to apply:
- Cryptanalysis and design of block, stream ciphers, hash functions and MACs
- Anonymity and privacy
- Side-channel attacks and countermeasures
- Algorithmic aspects of cryptography and security
- Practical IT security, white hat hacking
For Ph.D. position master diploma in CS or applied mathematics with outstanding grades is required. Please send a letter explaining your interests and your CV+photo and transcript of grades. For the postdoctoral position please add at least three names of references that can be contacted for recommendations. Postdoctoral position is for two years with possibility of extension. We offer competitive salary and international working environment.
Funded PhD + Database architect position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France
We are seeking for a candidate (ideally fresh out of MSc in computer science) for preparing a fully funded PhD in database security and database optimization algorithms.
While no prior knowledge of cryptography as such is required, the candidate must have a solid knowledge of database theory, be creative and inventive and have good coding skills.
Funded PhD + Hardware designer position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France
We are seeking for a candidate (ideally fresh out of MSc in electronic design) for preparing a fully funded PhD in microprocessor design with an emphasis on security. While no prior knowledge of cryptography as such is required, the candidate must have a solid knowledge of HDL design (e.g. VHDL or Verilog) with an ideal prior experience in FPGA prototyping or microprocessor customization.
For administrative reasons priority will be given to EU nationals.
Ph.D. student, Université Jean Monnet - Saint-Etienne - France
A PhD position will be available at the Hubert Curien Laboratory, Saint-Etienne, in Secure hardware implementations of code-based cryptosystems. With a 3 years duration, the PhD is expected to start by the end of summer 2012. The PhD student will conduct his research in the two following fields:
This research will be funded by the French Ministry of Higher Education and Research (MENRT). The PhD student must have a strong background in cryptography and at least a basic knowledge in digital hardware design. The research will be conducted in the Hubert Curien Laboratory in a close collaboration with the CASED (Center for Advanced Security Research Darmstadt) in Germany.
- code-based public-key and private-key cryptography,
- secure implementations of cryptosystems with respect to side-channel analysis and countermeasures.
Applications are welcome from university graduates in mathematics, computer science, electronics, micro-electronics or information security. Successful applicants must show outstanding grades and have finished their master thesis on a topic related to the mentioned research areas. Applications can be sent by email to Pierre-Louis Cayrel (pierre.louis.cayrel (at) univ-st-etienne.fr) and Viktor Fischer (fischer (at) univ-st-etienne.fr) in one PDF document, containing a CV, a copy of academic transcripts, a short statement of motivation (incl. description of prior activities in the relevant areas), and one reference letter or a letter of recommendation. Applications will be processed until the position is filled.
Post-doctoral Researchers , Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK
Applications are invited for post-doctoral researchers to contribute to the research activity of the data security systems research group within the Centre for Secure Information Technology (CSIT: www.csit.qub.ac.uk) at Queen’s University Belfast. Two positions are available: one to conduct research into physical unclonable functions (PUFs) – investigate new PUF constructions, design, implement and test new PUF hardware architectures, investigate PUF-based authentication protocols; and one to carry out research into cyber-security modelling software technologies, techniques and visualisation to facilitate formal verification, design, simulation and mathematical proof of security models, architectures, protocols and algorithms.
Applicants must hold a 2.1 Honours Degree (or equivalent) in Electrical and Electronic Engineering/Computer Science/Mathematics or a related discipline and hold, or be about to obtain, a PhD in a relevant subject.