International Association for Cryptologic Research

Open Positions in Cryptology

IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at https://www.iacr.org/jobs/. To advertise a job opportunities, please submit your job here.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


Tampere University of Technology, Finland
Assistant / Associate Professor (Tenure Track)

Applications are invited for a tenure track position in the broad area of cyber security technologies. The focus can be in software security, hardware security, critical systems security or network security. Candidates considered for this tenure track position are expected to have research experience in one or more of the aforementioned areas.

Today, security is an essential ingredient of all information systems. Due to the complexity of the systems, and flaws in the design of the present-day Internet and the web, as well as weaknesses in the development methodologies, software design and tools, large-scale systems face risks due to cyber criminals and other malicious actors. The security related research in the laboratory currently includes topics in side-channel analysis, vulnerabilities in open-source software, security issues in IoT and SDN and network security in general.

The successful candidate aims to excel in:

  • scientific research
  • conducting and developing education in the field.

The candidate is expected to:

  • acquire external competitive funding
  • participate in the activities of the global scientific community as well as locally
  • interact with society and industry.

Contact: Miia Haikonen miia.haikonen(at)tut.fi

More Information: https://careers.fi/tty/careers.cgi?action=view&job_id=1182&lang=uk#.WU5NOydLc8o

Closing Date for Applications: 2017-08-28



IMDEA Software Institute, Madrid, Spain
Postdoctoral researcher in Cryptography

The IMDEA Software Institute invites applications for a postdoctoral position in the area of Cryptography. The successful candidate will join the cryptography group to do research in the analysis and design of provably-secure cryptographic protocols (in particular, possible subjects are zero-knowledge proofs, electronic voting protocols, secure outsourcing).

The position is based in Madrid, Spain, where the IMDEA Software Institute is situated. Salaries are internationally competitive and include attractive conditions such as access to an excellent public healthcare system. The working language at the institute is English.

Applicants should have already completed, or be close to completing, a PhD in computer science, mathematics, or a related discipline. Applicants should have an excellent research track record demonstrated by publications at major cryptography/security venues, and should have significant experience in the design of cryptographic protocols and provable security. The application requires, among other document, a CV, a research statement, and the names of 3 persons that can provide references about you and your work.

The postdoctoral position is for one year. The starting date is negotiable but not later than January 2018.

Applicants interested in the position should send an email to Dario Fiore and submit the application documents at https://careers.imdea.org/software/. Applications are accepted until the position is filled.

Contact: For enquiries about the position, please contact:

Dario Fiore dario.fiore (at) imdea.org

Closing Date for Applications: 2017-11-30



Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
Post Doc in Applied Mathematics

The main objective of the research in the Embedded System Security Group is to propose efficient and robust hardware architectures aimed at applied cryptography and telecom that are resistant to passive and active cryptographic attacks. More information on https://laboratoirehubertcurien.univ-st-etienne.fr/en/teams/secure-embedded-systems-hardware-architectures.html.

For a new project which addresses the problem of the security of True Random Number Generator (TRNG). We are looking for candidates with an outstanding Ph.D in applied mathematics and a strong publication record in this field. The main topic of the post-doc is to work on stochastic modeling of TRNG. Knowledge of French is not mandatory.

The Post-Doc position will start in September or October 2017 (flexible starting date), it is funded for 12 month.

To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).

Contact: Dr. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr

Closing Date for Applications: 2017-07-14



Université de Rennes 1/IRISA Rennes
Post-Doc

The EMSEC research team (https://www.irisa.fr/emsec/) and Pierre-Alain Fouque (http://www.di.ens.fr/~fouque/) are looking for a post-doc on real-world security and cryptography, in particular applied to TLS 1.3. This research is funded by the Agence Nationale de Recherche (ANR) for the SafeTLS project (safetls.gforge.inria.fr).

We are looking for a motivated researcher with a good publication record and an interest in real-world cryptography. More particularly we require:

  • a basic knowledge of Authenticated Key-Exchange protocols (AKE)

  • an understanding of the TLS protocol
  • expertise in computational security models and proofs
  • knowledge of TLS 1.3 (optional, but a strong plus)
  • knowledge of TLS implementations (a strong plus)

The successful candidate is expected to contribute in high-level research, and to work together with the SafeTLS partners (http://safetls.gforge.inria.fr/consortium.html) towards attaining the ambitious goals of the SafeTLS project (http://safetls.gforge.inria.fr/aims.html). We are an international team and will require no knowledge of French.

A successful candidate will be hired for a two-year research contract, hosted by the Université de Rennes 1 (https://international.univ-rennes1.fr/) at the IRISA research center in Rennes, France (https://www.irisa.fr/en). Situated at 2 hours (by express train) from Paris, Rennes is an important research center in cryptography and security, and a strong partner in the Pôle d’Excellence Cybersécurité (PEC) in France -- which attracts competitive and very-high level research in all areas of security and cryptography.

Candidates are invited to apply as soon as possible. Applications will be reviewed as soon as they are received and until the position is filled. For any additional information, please contact Pierre-Alain Fouque pa.fouque (at) gmail.com or Cristina Onete, cristina.onete (at) gmail.com

Contact: Pierre-Alain Fouque, pa.fouque (at) gmail.com

Cristina Onete, cristina.onete (at) gmail.com

More Information: https://www.irisa.fr/emsec

Closing Date for Applications: 2017-09-01



Unviversity of Bergen
Ph. D. students

The University of Bergen in Norway is currently seeking candidates for four open positions as Ph.D. students. The advertised field of research for the positions is computer security, but we are particularly interested in good candidates in cryptography.

Contact: Håvard Raddum, Section Leader, Simula@UiB, email: haavardr (at) simula.no

or

Tor Helleseth, Professor, Dept. of Informatics, email: Tor.Helleseth (at) ii.uib.no

More Information: https://www.jobbnorge.no/en/available-jobs/job/139151/phd-position-in-computer-security-4-positions

Closing Date for Applications: 2017-07-01



Virginia Tech
Post-Doctoral Scholar in Energy-Efficient Cryptography

The Hardware Security group at Virginia Tech has an open position for a post-doctoral scholar in energy-efficient cryptography, in support of recent new projects. The Internet of Things needs a huge amount of tiny computers, and many of them will be powered in a sustainable manner, such as through harvested energy sources. The project objective is to investigate and demonstrate how such energy-constrained devices can support secure and full Internet connectivity.

We are looking for a candidate with the following qualifications.

  • Solid background in cryptographic engineering, covering protocols and algorithms.
  • Experience with development of embedded software and/or hardware, including toolchain and design methodology.
  • Effective communicator and team leader for a group of PhD students.
  • Experience with energy harvesting technologies, intermittently powered computers and design across the hardware/software interface is a plus.

The Hardware Security group at Virginia Tech covers design, optimization and tamper-resistant implementation of cryptographic protocols and related applications. Recent projects include a fault-resistant microprocessor ASIC, side-channel resistant software synthesis, and novel primitives for hardware security.

To apply send your CV to the contact below. Include your publication list, a statement of research interest and objectives, and contact information for two references. Applications will be reviewed on an ongoing basis until the position is filled.

Contact: Prof. Patrick Schaumont (schaum (at) vt.edu)

More Information: http://rijndael.ece.vt.edu/schaum

Closing Date for Applications: 2017-09-30



Cryptography, Security, and Privacy Research Group, Koç University, Istanbul, Turkey
Ph.D. / M.Sc. Scholarships, PostDoc Positions

Cryptography, Security & Privacy Research Group at Koç University has multiple openings at every level. All accepted applicants will receive competitive scholarships including tuition waiver, housing, monthly stipend, computer, travel support, etc.

  • For more information about joining our group and scholarship opportunities, visit

    https://crypto.ku.edu.tr/join

  • For applying online, and questions about the application-process for M.Sc. and Ph.D. positions, visit

    https://gsse.ku.edu.tr/en/admissions/application-requirements/

    All applications must be completed online with all the required documents. Deadline is end of June.

  • For postdoctoral researcher positions, contact Asst. Prof. Alptekin Küpçü directly, including full CV, sample publications, a research proposal, and 2-3 reference letters sent directly by the referees. Application and starting dates are flexible.

    http://home.ku.edu.tr/~akupcu

Contact: gsse (at) ku.edu.tr

More Information: https://crypto.ku.edu.tr/

Closing Date for Applications: 2017-08-31



NXP Semiconductors
Cryptography / Security Architect

Do you have a PhD/Master in Cryptography, Security, Software Engineering, Electronics, or Mathematics? We are currently looking for both a software and hardware security architect to extend our growing crypto and security teams for our office in Leuven (Belgium), Eindhoven (Netherlands), Hamburg (Germany) or Gratkorn (Austria).

Software Security Engineer is responsible for

• Design of embedded software security architectures

• Risk and threats analysis of security systems

• Support the various HW and SW development teams of NXP with security reference designs

• End-to-end security architecture

• Root cause analysis of security defects and creation of counter measures

• Specification and design of innovative security concepts (whitebox cryptography, secure virtual machines, code obfuscators)

Hardware Security Engineer is responsible for

• Detailed implementation reviews

• Definition of security mechanisms in hardware, firmware, protocols, etc.

• Security requirements management by definition and linking of security mechanisms to functional requirements

• Detailed attack modeling and security mechanism specification for hardware and software blocks

• Root cause analysis of security defects

• Planning coordination and execution of pre-silicon vulnerability analysis

See for more information:

https://nxp.wd3.myworkdayjobs.com/en-US/careers/job/Hamburg/Hardware-Security-Architect--m-f-_R-10002704

https://nxp.wd3.myworkdayjobs.com/en-US/careers/job/Hamburg/Software-Security-Architect--m-f-_R-10002703

About us

NXP Semiconductors enables secure connections and infrastructure for a smarter world, advancing solutions that make lives easier, better and safer. As the world leader in secure connectivity solutions for embedded applications, we are driving innovation in the secure connected vehicle, end-to-end security & privacy and smart connected solutions markets.

Contact: Joppe Bos, Cryptographer, joppe.bos (at) nxp.com

Closing Date for Applications: 2017-12-31



NYUAD-Center for Cyber Security
Post Doctoral Position in Cryptography ( Hardware & Software)-Multiple Positions

Goals and Responsibilities

The goal of this research project is to provide a wider analysis of the existing cryptologic designs and their constructions in order to provide the possibility of new approaches to the designs and analysis of cryptographic components. The conducted research will be in the context of symmetric cryptology and secure hardware implementations. A particular focus will be on the design and analysis of symmetric-key primitives and components.

Required Qualifications

Candidates should have a Ph.D. degree or equivalent experience. Candidates should have a background in symmetric cryptology, hardware cryptology, hardware security or related areas. The following is a list of essential skills for the considered post: Circuit Analysis and Design, Cryptographic Hardware Design (Reconfigurable Hardware, random number generation, lightweight cryptographic design, ALTERA hardware, FPGAs and Verilog VHDL programming), and Cryptographic Design and Cryptanalysis

Terms of employment

The period of employment is one to two years from the initiation of the contract. This is extendable to additional year based on performance. The potential start date is August 2017. The location of the post is Center for Cyber Security in NYU Abu Dhabi.

Application Process

Submissions will be accepted through our online application no later than July 15, 2017. Please visit our website at https://apply.interfolio.com/37893 for instructions and information on how to apply. Please fill in the online application form, and attach all your materials in English. This includes a cover letter, research statement, curriculum vitae, diploma (an official translation into English), a list of publications and three letters of reference. Applicants will be prompted to enter the names and email addresses of three referees. Each referee will be contacted to upload his or her reference letter. Applications and enclosures received beyond the stated deadline will not be considered.

Contact: Hoda A.Alkhezaimi

More Information: https://apply.interfolio.com/37893

Closing Date for Applications: 2017-08-15



RESCUE ETN Project
15 PhD Student positions: Challenges of Reliability, Security and Quality in Nanoelectronic System

A new H2020 MSCA ITN project RESCUE has 15 Early-Stage Researcher / PhD Student positions open at eight partner institutions.

An innovative European training network RESCUE is to take on the key interdependent challenges in nanoelectronic systems design - reliability, security and quality.

• Application deadline: June 30, 2017

• Recruitment starts in September/October 2017

• Full-time employment contracts at the selected RESCUE host institution for 36 month.

More details http://rescue-etn.eu/

RESCUE Consortium

- Tallinn University of Technology, EE (Maksim Jenihhin)

- BTU Cottbus-Senftenberg, DE (H.T. Vierhaus)

- Delft University of Technology, NL (Said Hamdioui)

- Politecnico di Torino, IT (Matteo Sonza Reorda)

- Cadence Design Systems GmbH, DE (Anton Klotz)

- IROC Technologies, FR (Dan Alexandrescu)

- Intrinsic-ID B.V., NL (Georgios Selimis)

- IHP - Innovations for High Performance Microelectronics GmbH, DE (Milos Krstic)

- Robert Bosch GmbH, DE - Partner Organization (Herve Seudie)

More Information: http://rescue-etn.eu/vacancies

Closing Date for Applications: 2017-06-30



Universiry of Abertay Dundee, Scotland
Deep Learning Intrusion Detection System for the Internet of Things

Abertay University

Abertay was the first university in the world to offer degrees Ethical Hacking, and the University continues to be recognised as an international leader in its field. The University has long-established professional links with the United Kingdom thriving cybersecurity community. Abertay University is also home to the largest Student run Cyber-Security Conference in the United-Kingdom

Project Description

The Internet of Things (IoT) is expected to become a transformative technology that offers end-users the capability of sensing, actuating and improved communications. This will lead to significant improvements for Vehicular technologies, Health, Manufacturing (Industry 3.0), Farming, Energy Management, etc.

Computational intelligence approaches, examples of which include evolutionary computation, immune-inspired approaches, and swarm intelligence, are employed to develop scalable machine learning Intrusion Detection Systems.

In this project we will build and expand on existing research activities on Intrusion Detection within the Security Research Group and the Machine Learning Group at Abertay University and would aim to identify security risks in IoT networks and develop a machine learning (Deep Learning, Generative Adversarial Networks) methods for their mitigation.

The ideal student would have an interest in Wireless communications protocols, Linux configuration, and GPU Programming (CUDA) as well as

* A strong background in computing and mathematics (an understanding of machine learning is highly desirable).

* An ability to programme in a high-level computing language (such as Python, C or C++) and/or experience with Matlab (or similar).

*An interest in Security and Privacy applications and research (a background in Security is desirable, but not essential).

*Good numerical and verbal communication skills.

Applicants are encouraged to contact Dr Xavier Bellekens for advice on developing a proposal prior to submitting it.

Contact: Dr Xavier Bellekens (x.bellekens [AT] abertay.ac.uk )

More Information: http://www.xavierbellekens.com/PhDApplication

Closing Date for Applications: 2017-07-10



CISPA, Saarbrücken, Germany
Tenure-track and tenured faculty positions

Applications are invited for tenure-track and tenured faculty positions in all areas related to cybersecurity, privacy, and cryptography.

A doctoral degree in computer science or related areas and an outstanding research track record are required. Applicants are expected to pursue an internationally visible research agenda and to build up their research team. Candidates for senior positions must be internationally accomplished scientists.

The cybersecurity research center CISPA, currently in the founding process to join the German Helmholtz Association as a new member, provides a unique work environment that offers the advantages of a university department and a research laboratory alike: Faculty will be offered highly competitive research salaries and institutional funding; they enjoy academic freedom, and build and lead their team of PhD students and postdocs; they attract additional third-party funds, supervise doctoral theses, and are granted the opportunity to teach graduate and undergraduate courses. CISPA moreover offers outstanding technical infrastructure and administrative support.

CISPA is located in Saarbrücken, in the tri-border area of Germany, France, and Luxembourg. We maintain an international and diverse work environment and seek applications from outstanding researchers worldwide. The working language is English.

All applicants are strongly encouraged to submit their complete application by June 30, 2017 for full consideration. However, applications will continue to be accepted until July 15, 2017. For more information and details on how to apply, please see here:

https://www.cispa.saarland/jobs/faculty/

CISPA values diversity and is committed to equality. We provide special support for dual-career couples. Female researchers are encouraged to apply.

Contact: Prof. Michael Backes

eMail: backes (at) cispa.saarland

More Information: https://www.cispa.saarland/jobs/faculty/

Closing Date for Applications: 2017-07-15



University of Luxembourg
Three PhD positions in Security and Privacy

The University of Luxembourg seeks to hire three outstanding PhD candidates at the Computer Science and Communications Research Unit. The positions are part of the FNR PRIDE doctoral training programme on Security and Privacy for System Protection. The University offers highly competitive salaries and is an equal opportunity employer. You will work in an exciting international environment and will have the opportunity to participate in the development of a dynamic and growing centre.

Successful candidates will participate in the activities of the Security and Trust of Software Systems (SaToSS) research group led by Prof. Dr. Sjouke Mauw. The group is focused on formalising and applying formal reasoning to real-world security problems and trust issues. We offer three different research projects:

- Multi-party Authentication Protocols. Further information and submission guidelines can be found at: https://goo.gl/yqPo6q

- Adaptive Cyber-defenses. Further information and submission guidelines can be found at: https://goo.gl/FlMo5E

- Security and Privacy in Social Networks. Further information and submission guidelines can be found at: https://goo.gl/TpZ3S7

Applicants can apply to more than one research project. Each application will be considered on receipt, therefore applying before the deadline is encouraged.

Contact: Prof. Sjouke Mauw

Université du Luxembourg

Faculté des Sciences, de la Technologie et de la Communication (FSTC)

Maison du Nombre

6, avenue de la Fonte

L-4364 Esch-sur-Alzette

Telephone: (+352) 466 644 5480

Email: sjouke.mauw (at) uni.lu

Closing Date for Applications: 2017-08-31



IRISA, Rennes, France
Post-Doc

We are looking for Research Fellow (Post-Doc), to join our group.

The applicants should have background and be interested in working on different aspects of lattice based cryptography, in particular on:

- security proofs for lattice-based schemes,

- building and implementing lattice-based constructions,

- fully homomorphic encryption,

- cryptanalysis.

The research will take place in the Embedded Security and Cryptography (EMSEC) team, within the IRISA computer science institute located in Rennes, France.

To apply please send your detailed CV (with publication list) and names of at least two people who can provide reference letters (e-mail).

The positions has flexible starting date. Review of applications will start immediately until the positions are filled.

Contact: Adeline Roux-Langlois, Adeline.Roux-Langlois (at) irisa.fr and Pierre-Alain Fouque, Pierre-Alain.Fouque (at) irisa.fr

Closing Date for Applications: 2017-12-31



University of Oxford
Ph.D. student

Applications are invited for a 3.5 year D Phil (PhD) Studentships in Post-Quantum Cryptography, funded by the UK Government.

The D.Phil. studentship will start on 1 October 2017, and will be based at the Mathematical Institute. The studentship is fully funded, and includes standard stipends and College and University fees at the Home rate. The studentship is attached to St Hughs College (http://www.st-hughs.ox.ac.uk/).

Many cryptographic protocols that are used today rely on the difficulty of either factoring or some discrete logarithm problem. However due to Shor’s algorithms, these protocols will become completely unsecure once a large-scale quantum computer is built. Given recent advances in that direction, the UK government is supporting research on new cryptographic protocols that can resist attacks by quantum computers, and the DPhil student will work in this context.

The project will aim at developing post-quantum cryptographic protocols and at studying their security with respect to both classical and quantum computers. The D Phil student will be part of the Oxford Cryptography Group and they will work under the supervision of Dr Christophe Petit (http://people.maths.ox.ac.uk/petit/) and of Professor Cas Cremers (https://www.cs.ox.ac.uk/people/cas.cremers/). Information on the Cryptography Group can be found at www.maths.ox.ac.uk/groups/cryptography.

Candidates must have an excellent background in mathematics, computer science or physics and the ability and willingness to work on inter-disciplinary research projects. Acquaintance with cryptography concepts and/or quantum algorithms as well as some programming skills will be considered as strong assets. The students will also be expected to spend a few weeks at Cheltenham every year. Candidates must therefore be able to obtain a DV security clearance prior to starting their D Phil; in particular they must be UK citizens.

Applications should be made online following the link below. They will be reviewed as they arrive, until the position is filled with a suitable candidate.

Contact: christophe.petit (at) maths.ox.ac.uk

More Information: https://evision.ox.ac.uk/urd/sits.urd/run/siw_ipp_lgn.login?process=siw_ipp_app_crs

Closing Date for Applications: 2017-10-01



University of Luxembourg
Ph.D. student

The successful candidate will join the CRYPTOLUX group led by Prof. Alex Biryukov. He/she will contribute to a research project on future directions in symmetric cryptography, cryptanalysis and in particular on ultra-lightweight encryption schemes for the Internet of Things.

Contact: Prof. Alex Biryukov

More Information: https://www.cryptolux.org/index.php/Home#PhD_in_Applied_Cryptography.2C_the_PRIDE_project

Closing Date for Applications: 2017-07-30



EPFL, Lausanne, Switzerland, Europe
Security/Privacy Software Engineer

The engineer will work on subjects such as

- Next generation blockchain and distributed ledger technologies with applications - to cryptocurrencies and beyond.

- Large-scale, low-latency anonymous messaging and blogging.

- Tracking-resistant WiFi and peer-to-peer ad-hoc networking.

- User-friendly, privacy- and security-hardened operating systems.

- Systematic defenses against side-channel and fingerprinting attacks.

Contact: Bryan Ford, Associate Professor, bryan.ford (at) epfl.ch

Angela Devenoge, Secretary, angela.devenoge (at) epfl.ch

Linus Gasser, Computer Scientist, linus.gasser (at) epfl.ch

More Information: http://dedis.epfl.ch

Closing Date for Applications: 2017-07-31



Singapore University of Technology and Design (SUTD)
PhD interns on cyber-physical system security

Singapore University of Technology and Design (SUTD) is a young university established in collaboration with MIT. Cyber security is one of its most important areas and grows very fast with rich research funding. SUTD is the proud host of world-class testbeds in cyber-physical systems (CPS) including testbeds for Secure Water Treatment (SWaT), Water Distribution (WADI), Electric Power and Intelligent Control (EPIC), and IoT.

I am looking for PhD interns on cyber-physical system security (IoT, autonomous vehicle, power grid, and water treatment etc.), especially on the topics such as 1) Lightweight and low-latency crypto algorithms for CPS devices, 2) Resilient authentication of devices and data in CPS, 3) Advanced SCADA firewall to filter more sophisticated attacking packets in CPS, 4) Big data based threat analytics for detection of both known and unknown threats, 5) Attack mitigation to increase the resilience of CPS. The attachment will be at least 3 months. Allowance will be provided for local expenses.

Interested candidates please send your CV with a research statement to Prof. Jianying Zhou.

Contact: jianying_zhou (at) sutd.edu.sg

More Information: http://jianying.space/

Closing Date for Applications: 2017-06-30



University of Wollongong, Australia
Lecturer in Cyber Security (3 years term)

School of Computing and Information Technology (SCIT) is one of six Schools within the Faculty of Engineering and Information Sciences at the University of Wollongong. It delivers a full range of quality courses, both onshore and offshore (Dubai, Singapore, Malaysia, China, Hong Kong), ranging from undergraduate Bachelor’s degrees, through Coursework and Research Masters to PhD programs. Current research foci are Computer Security, Intelligent Systems, Software Engineering, Big Data, Multimedia Information Processing, Information Technology and Information Systems. SCIT has strong R&D links with industry, actively participates in several Co-operative Research Centres.

 

This position will be expected to provide development, teaching and research within the Bachelor of Computer Science with Cyber Security major. As well as to teach and coordinate subjects within the School at both undergraduate and postgraduate levels, and contribute to research in the areas of Cyber Security, information security and cryptology.

 

You will be prompted to respond to the selection criteria as part of the online application process, based on the position description below. You will be able to save your application at any time and submit at a later date if required, you will only be able to do this before the closing date of the position.

 

For further information about this position, please contact Professor Willy Susilo on + 61 2 4221 5535.

 

Contact: Professor Willy Susilo (wsusilo at uow dot edu dot au)

More Information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=170476&tz=GMT%2B10%3A00

Closing Date for Applications: 2017-07-09



University of Wollongong, Australia
Lecturer/Senior Lecturer in Security (tenure track)

School of Computing and Information Technology (SCIT) is one of six Schools within the Faculty of Engineering and Information Sciences at the University of Wollongong. It delivers a full range of quality courses, both onshore and offshore (Dubai, Singapore, Malaysia, China, Hong Kong), ranging from undergraduate Bachelor’s degrees, through Coursework and Research Masters to PhD programs. Current research foci are Computer Security, Cyber Security, Intelligent Systems, Software Engineering, Big Data, Multimedia Information Processing, and Information Systems. SCIT has strong R&D links with industry, actively participates in several Co-operative Research Centres.

 

This position is expected to provide development, teaching and research within the Bachelor of Computer Science with Digital Systems Security and Master in Computer Science with major in Network and Information Security. As well as teach and coordinate subjects within the School at both undergraduate and postgraduate levels, and contribute to research in the areas of Digital Systems Security. In particular, the position will require the Lecturer/Senior Lecturer to predominantly teach and be located at the Liverpool campus.

 

You will be prompted to respond to the selection criteria as part of the online application process, based on the position description below. You will be able to save your application at any time and submit at a later date if required, you will only be able to do this before the closing date of the position.

 

For further information about this position, please contact Professor Willy Susilo on + 61 2 4221 5535.

Contact: Prof. Willy Susilo

More Information: https://uowjobs.taleo.net/careersection/in/jobdetail.ftl?job=170477&tz=GMT%2B10%3A00

Closing Date for Applications: 2017-07-30



Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
Post Doc in Hardware Security

The main objective of the research in the Embedded System Security Group is to propose efficient and robust hardware architectures aimed at applied cryptography and telecom that are resistant to passive and active cryptographic attacks. Currently, the central theme of this research consists in designing architectures for secure embedded systems implemented in logic devices such as FPGAs and ASICs.

More information on https://laboratoirehubertcurien.univ-st-etienne.fr/en/teams/secure-embedded-systems-hardware-architectures.html.

For a new project which addresses the problem of the security of TRNG against fault injection attack. We are looking for candidates with an outstanding Ph.D in hardware security and a strong publication record in this field. Strong knowledge in fault injection attacks with laser, and VLSI design would be appreciated. Knowledge of French is not mandatory.

The Post-Doc position will start in September or October 2017, it is funded for 34 month.

To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).

Contact: Prof. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr

Closing Date for Applications: 2017-06-30



Laboratoire Hubert Curien, University of Lyon, Saint-Etienne, France
Post Doc in Embedded System Security

The main objective of the research in the Embedded System Security Group is to propose efficient and robust hardware architectures aimed at applied cryptography and telecom that are resistant to passive and active cryptographic attacks. Currently, the central theme of this research consists in designing architectures for secure embedded systems implemented in logic devices such as FPGAs and ASICs.

More information on https://laboratoirehubertcurien.univ-st-etienne.fr/en/teams/secure-embedded-systems-hardware-architectures.html.

For a new project which addresses the problem of secure and privacy in MPSoC architectures, we proposes a Post Doc position to work on security evaluation of heterogeneous MPSoC. We are looking for candidates with an outstanding Ph.D in hardware security and a strong publication record in this field. Strong knowledge in side channel attacks and countermeasures, digital system (VHDL, FPGA) design would be appreciated. Knowledge of French is not mandatory.

The Post-Doc position will start in September or October 2017 (flexible starting date), it is funded for 13 month.

To apply please send your detailed CV (with publication list), motivation for applying (1 page) and names of at least two people who can provide reference letters (e-mail).

Contact: Prof. Lilian BOSSUET lilian.bossuet(at)univ-st-etienne.fr

Closing Date for Applications: 2017-06-30



Singapore University of Technology and Design, established in collaboration with MIT, USA
Post-Doc in Information and Network Security

We are looking for a Post-Doc, to join our group.

Candidates for Post-Doc should have completed (or close to completing) a PhD in computer science, mathematics, or a related discipline with solid publication record. He/she should have solid experience in any of the following areas:

1. Public Key/Private key Cryptography and Provable Security.

2. Information and Network Security.

3.Privacy and Authentication

Successful candidates are expected to contribute to one of the following topics:

- Security in Decentralized application

- IoT Security

- network security

The candidate must have strong publication list (At least one top journal paper with high impact factor in IEEE/ACM Transactions)

The post has a flexible starting date. The initial appointment will be for one year, with a strong possibility for further appointment.

Review of applications will start immediately until the positions are filled.

Contact: How to apply:

Interested candidates kindly send their CV to Dr. Jemin Lee (email: jmnlee (at) ieee.org) and cc Dr. Prosanta Gope (email: gope_prosanta (at) sutd.edu.sg). Initial screening of applications

will begin immediately and the position will remain open until

filled. Only shortlist will be notified.

Closing Date for Applications: 2017-07-31



Imperial College London
PhD. student, postdoc

The Department of Computing is a leading department of Computer Science among U.K. Universities, and has consistently been awarded the highest research rating. In the 2014 REF assessment, The Department was ranked third (1st in the Research Intensity table published by The Times Higher Education), and was rated as Excellent in the previous national assessment of teaching quality.

Applications are invited for a PhD student broadly interested in the topics of security, privacy, and compilers. Dr. Livshits’ research involves a broad range of topics in application security, privacy, program analysis, general software reliability, and bug finding. Some of the prior work in recent years was in areas as diverse as malware detection and building augmented reality systems. A wide range of specific projects is available, although prospective students are expected to come up with some of the topics they are excited about.

To apply for this position, you will need to have a strong background in at least one of the following areas: security, privacy, compilers, program analysis, programming languages, or operating systems. You will also need some experience in building and working with large software systems and tools. This experience can come from either your academic projects or through working in the industry; candidates with a strong industrial background are encouraged to apply.

Applicants should have a Distinction/First class grade Master’s degree in Computer Science or a related field, and good communication and technical writing skills. The position is fully funded, covering tuition fees, travel funds and a stipend/bursary. The position is available to both EU and overseas students.

Contact: Dr. Ben Livshits (livshits (at) ic.ac.uk)

https://www.doc.ic.ac.uk/~livshits/

More Information: http://www.imperial.ac.uk/computing/prospective-students/courses/phd/scholarships/security-privacy-compilers/

Closing Date for Applications: 2017-12-31



Department of Computing, The Hong Kong Polytechnic University, Hong Kong
Research Fellow (Post-Doc), Research Associate, Research Asssitant, PhD student (several positions)

We are looking for Research Fellow (Post-Doc), Research Associate, Research Assistant, PhD student (several positions) to join our group.

Candidates for research fellow/associate should have completed (or close to completing) a PhD in computer science, mathematics, or a related discipline. Research assistant are expected to have an honours degree or an equivalent qualification. Applicants should have solid experience in any of the following areas:

1. public key cryptography and provable security.

2. system and network security

3. software engineering

Successful candidates are expected to contribute to one of the following topics:

- applications of blockchain technology

- lattice-based cryptography

- mobile security

- network security

The post has a flexible starting date. The initial appointment will be for 12 months, with a strong possibility for further appointment.

Applicants for PhD studentship should possess:

- a bachelor degree in computer science with good programming skills; or

- a bachelor degree in mathematics with strong interest in cryptography.

Review of applications will start immediately until the positions are filled.

Contact: Contact: Daniel Xiapu Luo (http://www4.comp.polyu.edu.hk/~csxluo) (csxluo at comp dot polyu dot edu dot hk)

Man Ho Allen Au (http://www4.comp.polyu.edu.hk/~csallen/) (csallen at comp dot polyu dot edu dot hk)

Closing Date for Applications: 2017-11-01



Commissariat à l'énergie Atomique, LIST, Université Paris-Saclay
Ph. D. student

Over the last few years, a new breed of machines have appeared in the quantum computing landscape, the so-called analog quantum computers of which the machines presently sold by the Canadian company D-Wave are the first instances. From an abstract point of view, such a machine may be seen as an oracle specialized in the resolution of an NP-hard optimization problem (of the spin-glass type) with an algorithm analogous to the well-known simulated annealing but with a quantum speedup (the precise characterization of which still being an open question). If the theory of quantum annealing is now relatively well understood by the physics community, the extent to which D-Wave machines implements it properly is still the subject of some controversy within that community. Still, quantum annealing machines do exists today at a non-trivial scale (between 500 and 1000 bits of internal state) and their technological path towards larger scales is much clearer than for their digital cousins. Furthermore, it is presently considered that a quantum annealing machines with an internal state between 6 to 10 kbits would be competitive with the most powerful classical computers for solving optimization problems. In this context, the present thesis aims at investigating polynomial transformation paths from some NP problems (not necessarily NP-hard and which selection will be done as part of the thesis work) towards the reference problem of the annealing machine. Thus, the main objective of this thesis is to develop a better understanding of the theoretical performances of these machines, as well as a first return on experience if access to a D-Wave machine (via an institution owning such a machine) is possible. Depending on the candidate profile, the subject will bend more towards either physical aspects, computational complexity theory aspects or more applicative aspects (operations research, cryptanalysis notably).

Contact: Renaud Sirdey

More Information: http://www-instn.cea.fr/

Closing Date for Applications: 2017-12-31



International Max Planck Research School for Computer Science, Saarbrücken, Germany
PhD positions

The International Max Planck Research School for Computer Science (IMPRS-CS) is a graduate program jointly run by the Max Planck Institute for Informatics, the Max Planck Institute for Software Systems and Saarland University.

The IMPRS-CS offers a PhD program upon successful completion of which students receive a Doctoral Degree in Computer Science from Saarland University. The program is open to students who hold or are about to receive a research-oriented Masters degree in Computer Science (or an equivalent degree). Successful candidates will typically have ranked at or near the top of their classes, have already engaged in research and published their results, and be highly proficient in written and spoken English.

Admitted students receive a support contract that covers all living expenses and tuition fees. They enjoy a research-oriented education with close supervision by world-renowned scientists in a competitive, yet collaborative, environment rich in interaction with other students, post-docs, and scientists.

Applications are accepted all year round; the current round closes on July 15th, 2017.

Further information, including instructions on how to apply, can be found here: http://www.imprs-cs.de

,

Contact: Jennifer Gerling, IMPRS-CS Coordinator

E-Mail: imprs (at) mpi-inf.mpg.de

Phone: +49 681 9325 1800

More Information: http://www.imprs-cs.de

Closing Date for Applications: 2017-07-15



Onboard Security, Wilmington, MA, USA
Automotive security researcher

Do you have a PhD degree in Computer Science with specialization in Network / Cybersecurity? Are you interested in breaking into the rapidly-growing automotive security market?

OnBoard Security, formerly the Embedded Security division of Security Innovation, is the leader in automotive cybersecurity and we are looking for a Researcher to work on exciting projects.

Position Overview

OnBoard Security delivers world-class research and consulting services in secure communications, network security architecture, PKI, and security for connected vehicles. You will support research projects on a variety of security and privacy topics relating to connected and automated vehicles. You will also help us out in our Connected Vehicle Security consulting business.

Required Qualifications

  • PhD degree in Computer Science (specialization in network security is a plus) or 5 years in industry, including work in a research-aligned environment

  • Publications in top-tier conferences (please attach your best publication to your application)

  • Experience with simulation tools (e.g. VEINS)

  • Good communication skills

About us

We can’t name all the customers we’ve worked with, but recent specific projects have included being technical editor of IEEE Std 1609.2, the standard for all communications security for connected vehicle; and serving as security lead for the New York City Connected Vehicle Pilot, shaping all aspects of application, communication and configuration security for an upcoming 8,000 vehicle deployment on the streets of New York. Our security middleware was selected by GM for inclusion in the MY 2017 Cadillac CTS, the first car to have DSRC installed for sale to the general public. On the research side, we are working on topics ranging from cryptography (e.g. Garbled Circuits) to network and system security (e.g. misbehavior detection) and privacy (e.g. pseudonym system).

OnBoard Security is an equal opportunity employer.

Contact: Jonathan Petit, Senior Director of Research

jobs (at) onboardsecurity.com

More Information: http://www.onboardsecurity.com

Closing Date for Applications: 2017-08-01



Cloudflare
Cryptography Engineer

About Us

At Cloudflare, we have our eyes set on an ambitious goal: to help build a better Internet. Today, Cloudflare runs one of the world’s largest distributed networks that powers more than 1.5 trillion pageviews each month across 5 million Internet properties. More than 10 percent of all global Internet requests flow through Cloudflare’s network. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code.

About the Department

We are looking for a seasoned cryptography engineer for a development role in the Technology group. This role focuses on the implementation of cutting-edge cryptographic protocols for use at web scale in CloudFlare’s systems.

Candidates will have extensive experience in implementing real-world cryptographic protocols such as TLS. Substantial contributions to cryptographic software such as OpenSSL are preferred. Experience in Go, C, and assembly are required. Cryptography Engineers are expected to be familiar with the nuances of implementing public-key cryptography (PKI), side-channel attacks, padding oracles, constant-time implementations, and have deep domain knowledge.

Requirements

B.S. or M.S. Computer Science or related field, or equivalent experience

Experience building security in a fast-paced, web-scale environment

Advance knowledge of networking protocols - TCP/IP, DNS, SMTP, BGP etc.

In-depth knowledge of authentication protocols, applied cryptography, PKI and SSL/TLS

Proficiency in these languages - Go, C, and x86/amd64 assembly

Knowledge of the latest attack trends, tools and the threat landscape

Proven track record of independently driving security projects in a fast-paced environment

Excellent communication skills on both technical and non-technical issues

Bonus Points

Substantial contributions to cryptography software such as OpenSSL

Experience with high throughput/low latency real-time systems and/or content delivery networks

Contact: Ed Burns

ed (at) cloudflare.com

More Information: https://boards.greenhouse.io/cloudflare/jobs/634967#.WQuUsVPyumk

Closing Date for Applications: 2017-10-01



Institute of Information Security, University of Stuttgart, Germany
Ph.D. and Post-Doc Positions

The Institute of Information Security at University of Stuttgart offers several

Ph.D. and Postdoc Positions

in the fields

- System and Web Security,

- Services and Cloud Computing Security,

- Cryptography, e.g., in the context of electronic voting, and

- Formal Methods in Security.

The positions are available immediately and paid according to the German public salary scale TVL-E13 or TVL-E14, depending on the candidate’s qualification. Appointment periods follow the German Wissenschaftszeitvertragsgesetz (WissZeitVg).

The Institute for Information Security offers a creative international environment for top-level international and creative research in Germany’s high-tech region.

The successful candidate should have a Master’s degree or a Ph.D. (or should be very close to completion thereof) in Computer Science, Mathematics, Information Security, or a related field. We value strong analytical skills. Knowledge in one of the mentioned fields is an asset. Since some teaching is done in German, knowledge of German is required for positions that involve teaching.

The deadline for applications is

May 28th, 2017.

However, late applications will be considered until the positions are filled.

Contact: Prof. Ralf Küsters

ralf.kuesters (at) sec.uni-stuttgart.de

https://sec.informatik.uni-stuttgart.de

More Information: https://sec.informatik.uni-stuttgart.de/jobopenings

Closing Date for Applications: 2017-05-28



CEA Tech
Post-Doc: Security analysis of automatically inserted software protections against physical attacks

Organisation

CEA Tech is the CEA’s technology research unit. In 2013, CEA Tech opened regional branch offices with one in South of France close to the Cadarache center. Based in Provence, the Secure Systems and Architectures (SAS) research team is located at Gardanne within the campus of the CMP (Center of Microelectronic of Provence) near a cluster of academic and industrial partners. Its research interest is mostly in the design and test of secure integrated circuits.

Job

The post-doctoral position (12 months) is financed by the PROSECCO project (ANR) that aims at developing tools that will automatically insert protections against side-channel and fault attacks in the compilation flow and formally prove the functional equivalence and the robustness of the protected software. The consortium is composed of the LIP6 (Univ. Paris 6) and the CEA.

The post-doc work will be focus on the security analysis of the code generated with the Prosecco flow according to different use cases (verify pin, AES, bootloader) and different threats (SCA, FA). This analysis will be conducted with state-of-the-art side channel and fault injection benches. Some intermediate security evaluations will also be conducted with "low cost" equipment setups. This work will imply a close interaction with the other teams. The retained candidate will bring to other tasks of the project a central expertise about physical attacks and countermeasures.

Applicant Profile

PhD in microelectronic, computer science or a related field with a focus on hardware security and physical attacks (SCA and/or FA).

Knowledges and experiences in some or all of the following fields will be an asset during the position: Hardware security, Physical attacks and countermeasures, Cryptography, Microprocessors, Software and compilation

Good programming practice. Written and spoken English.

A brief description of the PhD thesis, a publication list and some recommendations should be included to your application.

Job location : Gardanne (Fr)

Start date : 01/09/2017, (to be discussed)

Contact:

Pierre-Alain Moellic

pierre-alain.moellic (at) cea.fr

Closing Date for Applications: 2017-09-01



University of Westminster, Department of Computer Science
Research Associate in Cloud Security (PostDoc)

The Cyber Security (CSec) research group and the Centre for Parallel Computing (CPC) at the University of Westminster are looking for one Research Associate in Cloud Security to carry out research within the EU funded H2020 COLA (Cloud Orchestration at the Level of Application) project. COLA will define and provide a reference implementation of a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of cloud applications. The successful candidate will carry out tasks in relation to the design and development of novel secure and privacy-preserving cloud orchestration solutions, specifically targeting and supporting application developers. In addition to that, the successful candidate will be also expected to contribute in writing project deliverables and research papers related to the project.

We expect candidates to have a strong research background in network security and/or applied cryptography. Proven research in areas such as trusted computing, cloud security, safety verification, security verification, data privacy, cyber-physical and internet of things security and cloud or mobile security will be considered as a plus.

The primary objective of the Cyber Security Research Group at the University of Westminster is to bring together expertise in education, research and practice in the field of information security and privacy. The group members conduct research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. To this end, we welcome applications from candidates whose research areas complement the existing research of the group.

  • Job reference number: 50046999
  • Salary: £33,387 to £38,489 per annum
  • Contract: Fixed Term until June 2019
  • Closing date: 16th May 2017
  • Interviews are likely to be held on: 31st of May 2017

Contact: For an informal discussion contact Dr Antonis Michalas (a.michalas (at) westminster.ac.uk) or Dr Tamas Kiss (T.Kiss (at) westminster.ac.uk).

More Information: http://tinyurl.com/hdawr6e

Closing Date for Applications: 2017-05-16



University of Tartu
Researcher positions (postdoc) in Verification of Quantum Cryptography

At the Quantum Cryptography Group, University of Tartu, we have two open postdoc positions on Verification of Quantum Cryptography.

We are starting a project in which we will develop methods for the verification of proofs in quantum cryptography. Similar to what the EasyCrypt tool does in classical cryptography. The scope of the project covers everything from the logical foundations, through the development of tools, to the verification of real quantum protocols.

The ideal candidate would have experience in:

  • Semantics
  • Theorem proving
  • Verification of classical cryptography
  • Quantum cryptography
  • Quantum computation / communication

Of course, expertise in all those areas is very rare, so candidates who are strong in some of those areas and are interested in the others are encouraged to apply!

Please contact Dominique Unruh if you have more questions about the project, the required background, Estonia, the position itself, or the application process.

The salary range is 30000-36000 Euro per year (depending on experience), which is highly competitive in Estonia due to low costs of living and low income tax rate (20%), pension contributions and health insurance are covered by the employer.

The position is for three years, September 1, 2017 till August 31, 2020. The starting date and duration can be negotiated (in both directions).

For application instructions, see the link below.

Contact: Dominique Unruh
Professor of Information Security
Department of Computer Science
University of Tartu
unruh (at) ut.ee

More Information: http://crypto.cs.ut.ee/Main/PostdocInVerificationOfQuantumCryptography

Closing Date for Applications: 2017-06-01



Evernym, Utah
Cryptographic Engineer

Role

Use elliptic curve cryptography, digital signatures, and commitments in an established codebase to help the world securely interact in a way that preserves privacy.

Write code in python and possibly a system language or two (C, Rust, Go) that invokes c-callable crypto libraries to exchange anonymous credentials (see http://www.research.ibm.com/labs/zurich/idemix/ and https://www.microsoft.com/en-us/research/project/u-prove/) and build zero-knowledge proofs. Integrate with technologies like zkSNARKS and Ethereum.

Build byzantine fault tolerant protocols for distributed consensus.

Work on specific federal government contracts.*

Requirements

Master’s degree or PhD in cryptography or a closely related field--or active enrollment in such a program.

At least 5 years of experience with software engineering

Familiarity with applied cryptography, cryptanalysis, and similar topics; the stronger the math background, the better. Familiarity with networking and cryptocurrencies. Good competence as a coder (python preferred, but strengths in other languages may be considered). Comfort on Linux (though we also work on Mac and Windows).

Flexibility to work with remote colleagues in different time zones.

Strongly preferred: Ability to work in our Utah office (Lehi/American Fork). Some remote work possible.

This is a regular full-time position.

*Federal Government project requires US Citizenship.

Contact: Steve Tolman

careers (at) evernym.com

Closing Date for Applications: 2017-07-04



University College London
PhD studentship

The rise of decentralized networks, such as Tor and cryptocurrencies like Bitcoin, has enabled numerous applications, and these technologies offer the potential to enable many more. One could also argue, however, that they have enabled new types of crime. For example, the number of underground markets selling drugs and other illicit goods, such as Silk Road, has grown enormously after the introduction of Bitcoin (and they also rely on the use of Tor). Attacks such as ransomware also seem to some extent impossible to carry out without the use of these technologies.

In order to remove any regulatory obstacles to the adoption of the positive applications of these technologies, it is therefore important to address these negative applications and convince regulators they can be dealt with appropriately. To achieve this, we will develop (1) new heuristics for identifying relationships in a cryptocurrency ecosystem; (2) tools for collecting and analyzing data from underground markets; and (3) new techniques to ensure that honest users continue to maintain their privacy. Eventually, these will all be incorporated into a microservice architecture that provides a forensic tool.

This project is funded by an EU H2020 grant, and will be carried out with partners across Europe. The ideal candidate will have a strong degree in Computer Science, Mathematics, or a related MSc course, and some proficiency with cryptography, machine learning, and/or data analytics.

Contact: Sarah Meiklejohn

More Information: https://www.prism.ucl.ac.uk/#!/?project=229

Closing Date for Applications: 2017-06-01



University of Luxembourg
Post-Doc in a project FDISC on Applied Crypto

Fixed Term Contract 2 years (CDD), full-time 40 hrs/week Start day: July 2017 or later upon agreement.

The successful candidate will join the CryptoLUX group led by Prof. Alex Biryukov. He or she will contribute to a research project on future directions in symmetric cryptography in the areas of:

  • Lightweight block ciphers and hash functions
  • Side-channel attacks on symmetric cryptosystems and countermeasures
  • Design and security analysis of blockchain technologies
  • Proof-of-work schemes for use in digital currencies or denial-of-service prevention

The University offers a two-year employment contract which may be extended up to five years.

Contact: Alex Biryukov

More Information: https://www.cryptolux.org

Closing Date for Applications: 2017-06-30



Karlsruhe Institute of Technology, Germany
Postdoc

We are looking for a postdoctoral researcher in theoretical cryptography. The research focus will be the development and analysis of classical and new cryptographic building blocks (such as public-key encryption or obfuscation).

The research will take place in the cryptography and security group at KIT. The research position will be multi-year and fully funded, with a starting date as soon as possible (negotiable). There is no closing date; applications will be considered until the position is filled.

For more information about the position, contact Dennis (dot) Hofheinz (at) kit (dot) edu. Your application should include a CV, and at least two references.



Karlsruhe Institute of Technology, Germany
PhD student

We are looking for a PhD student in theoretical cryptography. The research focus will be the development and analysis of classical and new cryptographic building blocks (such as public-key encryption and obfuscation).

The research will take place in the cryptography and security group at KIT. The research position will be multi-year and fully funded, with a starting date as soon as possible (negotiable). There is no closing date; applications will be considered until the position is filled.

For more information about the position, contact Dennis (dot) Hofheinz (at) kit (dot) edu. Your application should include a CV, and a letter of motivation.



Radboud University Nijmegen
post-doc - decentralised idm using attribute-based credentials and distributed ledgers

As a postdoctoral researcher, you will join the European research project DECODE (DEcentralised Citizens Owned Data Ecosystem) that aims to develop distributed architectures for decentralised data governance. You will conduct research on decentralised identity and reputation management using attribute-based credentials and distributed ledgers. You will communicate your findings through papers in peer-reviewed research journals and at international conferences. You will also be involved in training and teaching PhD and BSc/MSc students.

Contact: Jaap-Henk Hoepman (associate professor), jhh (at) cs.ru.nl

More Information: http://www.ru.nl/werken/details/details_vacature_0/?recid=596939

Closing Date for Applications: 2017-04-02



Royal Holloway, University of London, UK
PhD studentships

PhD studentships in the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London

The Centre for Doctoral Training in Cyber Security at Royal Holloway is now recruiting for the 2017/18 cohort, with a number of fully-funded PhD studentships to be awarded to qualified and eligible candidates, to start their post-graduate studies in cyber security in October 2017.

The four-year CDT programme is a mix of training and research activities, leading to a PhD thesis in cyber security. Possible research topics include the design and analysis of cryptographic algorithms and protocols; the design of security services for embedded systems; business information systems, telecommunication networks and critical infrastructure security; detection and analysis of malware; geopolitics of security; and the study of economics, psychology, design theory and sociology in the context of cyber security.

The CDT studentships provide an unparalleled opportunity for outstanding candidates to undertake research and training in a discipline that is both intellectually demanding and of wide applicability.

The CDT in Cyber Security, established in 2013, has currently 37 PhD students divided into four cohorts, working on topics ranging from embedded security to cybercrime, from cryptography to geopolitics of security, from software security to cyber economics.

CDT studentships cover college fees plus an annual stipend of £20,296, for four years. We welcome applications from candidates with undergraduate and masters' qualifications in a wide range of disciplines, including, but not limited to, mathematics, computer science, engineering, geography, economics and sociology. Funding is provided by the EPSRC, so full studentships are available to UK residents only. Closing date for receiving applications is 30 April 2017.

Please visit Royal Holloway's CDT in Cyber Security webpage (https://www.royalholloway.ac.uk/isg/cybersecuritycdt/home.aspx) to learn more about its PhD programme, funding eligibility, and how to apply.

Contact: Professor Carlos Cid

Director, CDT in Cyber Security at Royal Holloway, University of London

cybersecuritycdt (at) royalholloway.ac.uk

More Information: https://www.royalholloway.ac.uk/isg/prospectivestudents/cdtstudentships/cdt-studentships-in-cyber-security.aspx

Closing Date for Applications: 2017-06-30



University of Westminster, Department of Computer Science
Research Associate in Cloud Security

The Cyber Security (CSec) research group and the Centre for Parallel Computing (CPC) at the University of Westminster are looking for one Research Associate in Cloud Security to carry out research within the EU funded H2020 COLA (Cloud Orchestration at the Level of Application) project. COLA will define and provide a reference implementation of a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of cloud applications. The successful candidate will carry out tasks in relation to the design and development of novel secure and privacy-preserving cloud orchestration solutions, specifically targeting and supporting application developers. In addition to that, the successful candidate will be also expected to contribute in writing project deliverables and research papers related to the project.

We expect candidates to have a strong research background in network security and/or applied cryptography. Proven research in areas such as trusted computing, cloud security, safety verification, security verification, data privacy, cyber-physical and internet of things security and cloud or mobile security will be considered as a plus.

The primary objective of the Cyber Security Research Group at the University of Westminster is to bring together expertise in education, research and practice in the field of information security and privacy. The group members conduct research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. To this end, we welcome applications from candidates whose research areas complement the existing research of the group.

  • Job reference number: 50046999
  • Salary: £33,387 to £38,489 per annum
  • Contract: Fixed Term until June 2019
  • Closing date: 10th March 2017
  • Interviews are likely to be held on: 22nd March 2017

Contact: For an informal discussion contact Dr Antonis Michalas (a.michalas (at) westminster.ac.uk) or Dr Tamas Kiss (T.Kiss (at) westminster.ac.uk).

More Information: https://tinyurl.com/hdawr6e

Closing Date for Applications: 2017-03-10



Singapore University of Technology and Design
Post-Doc in Information and Network Security

We are looking for Research Fellow (Post-Doc), to join our group.

Candidates for research fellow/associate should have completed (or close to completing) a PhD in computer science, mathematics, or a related discipline with solid publication record. He/she should have solid experience in any of the following areas:

1. Public Key/Private key Cryptography and Provable Security.

2. Information and Network Security.

3.Privacy and Authentication

Successful candidates are expected to contribute to one of the following topics:

- Security in Decentralized application

- IoT Security

- network security

The post has a flexible starting date. The initial appointment will be for one year, with a strong possibility for further appointment.

Review of applications will start immediately until the positions are filled.

Contact: How to apply:

Interested candidates kindly send their CV to Dr. Prosanta Gope (email: gope_prosanta (at) sutd.edu.sg) or Dr. Jemin Lee (email: jmnlee (at) ieee.org). Initial screening of applications

will begin immediately and the position will remain open until

filled. Only shortlist will be notified.

Closing Date for Applications: 2017-04-25

Closing Date for Applications: 2017-04-25



Department of Computing, The Hong Kong Polytechnic University, Hong Kong
Research Fellow (Post-Doc), Research Associate, PhD student (several positions)

We are looking for Research Fellow (Post-Doc), Research Associate, PhD student (several positions) to join our group.

Candidates for research fellow/associate should have completed (or close to completing) a PhD in computer science, mathematics, or a related discipline. He/she should have solid experience in any of the following areas:

1. public key cryptography and provable security.

2. system and network security

3. software engineering

Successful candidates are expected to contribute to one of the following topics:

- applications of blockchain technology

- lattice-based cryptography

- mobile security

- network security

The post has a flexible starting date. The initial appointment will be for 12 months, with a strong possibility for further appointment.

Applicants for PhD studentship should possess:

- a bachelor degree in computer science with good programming skills; or

- a bachelor degree in mathematics with strong interest in cryptography.

Review of applications will start immediately until the positions are filled.

Contact: Daniel Xiapu Luo (http://www4.comp.polyu.edu.hk/~csxluo) (csxluo at comp dot polyu dot edu dot hk)

Man Ho Allen Au (http://www4.comp.polyu.edu.hk/~csallen/) (csallen at comp dot polyu dot edu dot hk)

Closing Date for Applications: 2017-06-30



University of Bristol
PostDoc Positions in Multi-Party Computation (University of Bristol)

Description: We are looking for Post-Docs to work on theory, implementation and applications of MPC. We are looking for different individuals to contribute to each of these three areas. The positions are multi-year, and you will be working in a vibrant group working on trying to make MPC a reality; with strong links with both other research groups, and industrial applications.

Contact: Nigel Smart

More Information: http://www.bristol.ac.uk/jobs/find/details.html?nPostingID=5521&nPostingTargetID=20779&option=28&sort=DESC

Closing Date for Applications: 2017-12-31



University of Luxembourg
Post-Doc in Real World Cryptography

The Cryptolux team of the University of Luxembourg is offering a 30 months Post-doc position in Applied aka Real World Cryptography. The candidate should have expertise and a strong publication record in one (or several) of the following areas:

- Applied symmetric cryptography

- Crypto-currencies, blockchains, financial cryptography

- Privacy enhancing technologies

The position is available from the 1-February 2017. Applications (CV+motivation)will be considered upon receipt, therefore applying before the deadline is encouraged. We offer exciting international research environment and competitive salary.

Contact: Alex Biryukov

More Information: https://www.cryptolux.org

Closing Date for Applications: 2017-06-30



NXP Semiconductors, Hamburg, Germany
PhD student

NXP Semiconductors is looking for an excellent, motivated, self-driven doctoral student to work in the area of side-channel evaluation on embedded devices.

The PhD position is for three years and will be located in Hamburg (Germany) within the Innovation Center for Cryptography and Security of NXP and it will be supervised at the academic level by Pr. François-Xavier Standaert (Université Catholique de Louvain). It will be funded by the REASSURE European research project focusing on improving the efficiency of security evaluations with respect to side-channel analysis.

Education and Requirements

--------------------

- A Master degree in computer science, security or mathematics

- A proven interest in cryptography and side-channel analysis

- Excellent communication and presentation skills on tactical as well as executive level (internally and externally)

- Strong analytical skills

- Team player

- Fluent in spoken and written English

Background in cryptography and embedded security will be a plus. Knowledge of German is not required.

Applications will be considered on a rolling basis until the position is filled.

Contact: Vincent Verneuil

More Information: https://nxp.wd3.myworkdayjobs.com/careers/job/Hamburg/PhD-student-in-Side-Channel-Analysis--m-f-_R-10001468-1



Cyber Security Consulting - Abu Dhabi, UAE
Theoretical Cryptanalysis Experts

We are a fast-growing cyber-security consulting company based in UAE. With a team of 250+ experts from around the world, we provide services and solutions that are changing the cyber security landscape. Working with us means collaborating with enthusiastic professionals who are passionate about technology and creating next-gen cyber security solutions.

We are looking for an expert who has good familiarity with standards (SPs, CAVP, FIPS 140-2, CMVP, etc.). The incumbent must have expertise in design of end-to-end secure protocols with PFS and validation using mathematical proofs and test vectors. Expertise in existing network protocols (e.g., TLS, OpenSSL) and knowledge of inherent vulnerabilities, cryptographic security analysis and security proofs covering: Symmetric crypto and Modes of Operation (state of art block ciphers , Rijndael variants, stream ciphers, etc.), Public Key Crypto / PKI (RSA, ECC, ECDSA, ECDH, etc.), Hashing Algorithms, Random Number Generation Algorithms, etc. Must have expertise in theoretical cryptanalysis techniques: Based on underlying mathematics of asymmetric ciphers (IF, DL, EC schemes)

We offer a tax-free package and an opportunity to live in an advanced city with easy access to the rest of the world.

For more information on the role and the organisation, please send your resume to itjobsuae16 (at) gmail (dot) com

Closing Date for Applications: 2017-09-30



[ IACR home page ] © IACR