Research Scientists in Cryptography, Temasek Laboraories, National University of Singapore, Singapore
Temasek Laboratories at National University of Singapore, Singapore is seeking highly motivated professionals interested in conducting research in the area of cryptography.
Applicants are expect to have a PhD degree in Mathematics/Computer Science/Engineering and a strong background and experience in one or two of the following areas : stream ciphers, pseudorandom number generator, public-key cryptography.
Preferred candidates are expected to be proficient in C/C++ language, a team worker and able to conduct independent research.
Review of applications will start immediately and continue until positions are filled.
For application information, please visit http://www.temasek-lab.nus.edu.sg/career/career.php. Interested candidates can contact Dr Tan Chik How tsltch (at) nus.edu.sg.
PhD Position in Public-Key Cryptography, Interdisciplinary Centre for Security, Reliability and Trust (SnT)
The research group APSIA in SnT is searching for a strong Ph.D. candidate to work on designing new cryptographic tools related to identity-based cryptography, attribute-based cryptography, private matching, and searchable encryption.
The candidate needs to have obtained a masters degree in Computer Science or Applied Mathematics with outstanding grades. Knowledge on provable security and public-key cryptography is an advantage.
The PhD thesis needs to be written in English and will be awarded by the University of Luxembourg.
Please apply via the link provided below.
Gaetan Bisson: Endomorphism Rings in Cryptography
Name: Gaetan Bisson
Topic: Endomorphism Rings in Cryptography
\r\nModern communications heavily rely on cryptography to ensure data integrity and privacy. Over the past two decades, very efficient, secure, and featureful cryptographic schemes have been built on top of abelian varieties defined over finite fields. This thesis contributes to several computational aspects of ordinary abelian varieties related to their endomorphism ring structure.\r\n\r\nThis structure plays a crucial role in the construction of abelian varieties with desirable properties. For instance, pairings have recently enabled many advanced cryptographic primitives; generating abelian varieties endowed with efficient pairings requires selecting suitable endomorphism rings, and we show that more such rings can be used than expected.\r\n\r\nWe also address the inverse problem, that of computing the endomorphism ring of a prescribed abelian variety, which has several applications of its own. Prior state-of-the-art methods could only solve this problem in exponential time, and we design several algorithms of subexponential complexity for solving it in the ordinary case.\r\n\r\nFor elliptic curves, our algorithms are very effective and we demonstrate their practicality by solving large problems that were previously intractable. Additionally, we rigorously bound the complexity of our main algorithm assuming solely the extended Riemann hypothesis. As an alternative to one of our subroutines, we also consider a generalization of the subset sum problem in finite groups, and show how it can be solved using little memory.\r\n\r\nFinally, we generalize our method to higher-dimensional abelian varieties, for which we rely on further heuristic assumptions. Practically speaking, we develop a library enabling the computation of isogenies between abelian varieties; using this important building block in our main algorithm, we apply our generalized method to compute several illustrative and record examples.[...]
Research Scientists (System Security), A*STAR, Data Storage Institute, Singapore
Research Scientist positions are available in the Storage Security Research group. We are seeking highly motivated applicants to be involved in research and development of large scale storage security solutions including access control policies, data security and privacy. Research topics include but not necessary limited to file system security, memory encryption, and privacy preserving security controls. Candidates are expected to have thorough understanding of the state-of-the-art research in this field, and with breadth of knowledge of the current issues and recent technology advancements.
- A demonstrated potential to excel in collaborative research spanning multiple research areas
- Strong understanding of operating systems design and implementation
- Demonstrated skills of C/C++, and programming under Linux
- Experience in developing prototypes in a research environment
- Highly self-motivated and willing to learn new technology
- PhD in Computer Science or Computer Engineering
Applications including a cover letter and CV can be sent through email to Mi_Mi_AUNG@dsi.a-star.edu.sg
apply online at
About Us: The Institute maintains a strong research program with significant funding from the major federal research agencies and private industry. The Institute has a diverse full-time Researcher of 200+, with approximately 100 undergraduates and post graduate students.
Qualifications Fellows (DFG - Research Training Group), Horst Görtz Institute for IT-Security
The Horst Görtz Institute (HGI) at Ruhr-University Bochum is one of Europe’s leading research centers in IT security. The DFG, or German Research Foundation, awarded more than 4 million euro to the HGI for the establishment of the interdisciplinary research training group “New Challenges for Cryptography in Ubiquitous Computing”. We are looking for candidates with outstanding bachelor`s degree in the fields of electrical engineering, computer science, mathematics or related areas (begin of doctoral studies post-B.?Sc.).
The research training group will study problems which are fundamental for securing the Internet of Things. A central goal of the doctoral training is an interdisciplinary and structured education at the highest scientific level. Establishing networks to internationally top ranking research groups is part of the training.
The Ruhr-University Bochum supports women‘s career development. Applications from women are thus explicitly welcome. In those areas in which women are underrepresented they will be considered preferentially according to the regulations of the „Landesgleichstellungsgesetz” if their abilities, aptitude and professional performance are equal with those of the fellow applicants unless reasons concerning the person of a fellow applicant are predominant.
In case of equal qualification, applications of severely disabled persons or persons that are regarded as being on a par with severely disabled persons according to § 2 Abs. 3 SGB IX will be considered prefer