Open Positions in Cryptology
Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.
Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.
This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.
Assistant or Associate Professor in Computer Science
University of Birmingham, School of Computer Science, Birmingham, United Kingdom
We are recruiting for several open positions within the School of Computer Science, including in the area of Cybersecurity, and specifically in (applied) cryptography, implementation security, hardware security, and embedded security. Birmingham's School of Computer Science is ranked 3rd in the UK for research output (according to the national REF exercise).
The role offers opportunities to contribute to teaching as well as pursue their own research agenda. This is a permanent position. For more information, please contact Prof. Elisabeth Oswald. The advert closes at the end of September.
Link to apply: https://www.jobs.ac.uk/job/DOI907/assistant-or-associate-professor-in-computer-science-research-and-education
Last updated: 2025-09-09 posted on 2025-09-09
Tenure Track Professor of Cybersecurity and AI (m/f/d
Graz University of Technology, Austria
Examples of such intersections include:
- All research areas related to the Security, Privacy, and Safety of systems that include or that are based on Machine Learning, Federated Learning, or Generative AI
- All research areas where Machine Learning or Artificial Intelligence is applied to achieve Security, Privacy, or Safety
The new professor will complement the existing strengths in the department and will build an internationally visible group. For this purpose, the position includes a competitive starting package. The sucessful candidate will be an engaged teacher in the Computer Science programs at the Bachelor’s, Master’s, and PhD level, and will actively participate in academic self-administration. At Graz University of Technology, undergraduate and graduate courses in Computer Science are taught in English.
Please send your application via this link:
https://jobs.tugraz.at/en/jobs/6fa9b0bd-0997-c19d-73dc-683fe309b114/apply
https://jobs.tugraz.at/en/jobs/6fa9b0bd-0997-c19d-73dc-683fe309b114
Last updated: 2025-09-09 posted on 2025-09-08
Assistant Professor
Florida Atlantic University, Department of Mathematics and Statistics; Boca Raton, Florida, USA
Strong candidates in all areas of cryptology will be considered. Preference will be given to candidates with several broad areas of interest in the mathematics of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely related area. Responsibilities for this position will be research, teaching, and professional service. The successful candidate is expected to apply for and secure external research funding, and actively participate in interdisciplinary programs.
The Department of Mathematics & Statistics is a collegial and research-active department demonstrating excellence in teaching, research, and service. We are home to 26 tenure-track or tenured faculty members, 18 faculty members in non-tenure-track positions, and more than 40 graduate teaching/research assistants from diverse backgrounds. Our department has an established national and international reputation for research innovation through our Center for Cryptology and Information Security (CCIS). FAU is also recognized as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research (CAE-R) since 2019. More information about the department can be found at: http://www.math.fau.edu/
Review of applications will begin November 1, 2025, and will continue until the position is filled.
Minimum Qualifications: Candidates must possess an earned doctorate in mathematics or a closely related discipline at the time of application. Postdoctoral experience is preferred. Candidates should have a strong publication record commensurate with their experience, demonstrated potential for establishing programs of extramurally funded and independent research, and a clear promise of excellent instructional capacity. Candidates should be able to foster and create educational opportunities where all student populations thrive.
Last updated: 2025-09-09 posted on 2025-09-05
Fully Funded PhD Positions in Cryptography and Security
University College Cork, Ireland
The PhD students will focus on one of the following topics:
- Quantum Safe Lightweight Cryptography, under the supervision of Dr. Paolo Palmieri
- Security & Protection of AI Algorithms, under the supervision of Dr. Krishnendu Guha
The successful applicant will receive a stipend of €25,000 per year for up to four years (subject to successful annual progress reviews) and an annual contribution towards tuition fees. As part of the project, a travel budget is available to present at international conferences. The hired PhDs will be part of the CyberUnite team, and will also have the opportunity to work with the extensive network of national and international research collaborations of the Security Group.
Deadline: September 15
Recruited students will be expected to start in January 2026.
Last updated: 2025-09-09 posted on 2025-09-03
Associate Professor or Assistant Professor
Kanazawa University, Faculty of Electrical, Information and Communication Engineering, Japan
- Start of employment: February 1st, 2026 or any early possible date afterwards.
- Deadline for application: September 12th, 2025
- Employment status:
- A full-time associate professor (tenured) or
- A full-time assistant professor (non-tenured, 5-year term)* * the employment period may be renewed depending on performance
.
Last updated: 2025-09-03 posted on 2025-09-02
PhD on Symmetric Cryptography over Prime Fields and Integer Rings
Eindhoven University of Technology (TU/e)
We are currently looking for an outstanding candidate for a 4-year PhD researcher position in the area of symmetric-key cryptography. The successful candidate will work under the supervision of Dr. Lorenzo Grassi, towards a PhD degree from the Eindhoven University of Technology.
The research topics will focus on
- design dedicated symmetric-key primitives operating over prime fields and/or integer rings, that can provide efficient solutions for rising applications of practical importance such as Format Preserving Encryption, Multi-Party Computation, Homomorphic Encryption, and Zero-Knowledge;
- analyze the security of those symmetric-key primitives, with the goals to improve the current cryptanalytic results, and to develop new innovative security arguments.
(The implementation of those schemes will *not* be part of the PhD.)
We are looking for a candidate who has recently completed, or is about to complete, a master's degree in cryptography, mathematics, computer sciences, or a closely related field. The master's degree must have been awarded, with good results, before starting the PhD. The candidate must be highly motivated and be able to demonstrate their potential for conducting original research in cryptography.
The vacancy is open until a suitable candidate has been found. Applications will be screened continuously, and we will conclude the recruitment as soon as we find the right candidate. The starting date is negotiable (not before March 2026).
Interested and qualified candidates should apply at https://www.tue.nl/en/working-at-tue/vacancy-overview/phd-on-symmetric-cryptography-over-prime-fields-and-integer-rings?_gl=1*sdu9b*_up*MQ..*_ga*MTI2MTQxMjkxNy4xNzU2NDQ5ODI3*_ga_JN37M497TT*czE3NTY0NDk4MjYkbzEkZzAkdDE3NTY0NDk4MjYkajYwJGwwJGgw
(Important: Do *not* send your application via email!)
Last updated: 2025-09-03 posted on 2025-08-29
Assistant Professor/Associate Professor (Tenure Track/ Tenured) in Post-Quantum Cryptography (PQC)
Nanyang Technological University, Singapore
Last updated: 2025-09-03 posted on 2025-08-29
Cryptographic Engineer - Partner Chains
Input-Output Group - remote
IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally.
About Partner Chains: IOG’s Partner chains Tribe is an innovation project built using Substrate. It aims to simplify blockchain deployment, operation and interoperability by combining modular technology with proven security, liquidity, and reliability. Partner Chains empowers developers and validators to create optimized blockchains without network or technology stack lock-in, fostering a new era of interoperable and scalable solutions.
As a Cryptographic Engineer you will contribute to the design, implementation, and integration of secure cryptographic protocols across Partner Chain initiatives. This role bridges applied research and engineering, focusing on translating cutting-edge cryptographic designs into robust, production-grade systems. The cryptography engineer will collaborate closely with researchers, protocol designers, software architects, product managers, and QA teams to ensure cryptographic correctness, performance, and system alignment. A strong emphasis is placed on high assurance coding, cryptographic soundness, and practical deployment readiness.
Who you are:Last updated: 2025-09-03 posted on 2025-08-27
Internship on the Lattice Estimator
King's College London
Eamonn Postlethwaite and Martin Albrecht are looking to hire an intern for four months to work on the Lattice Estimator. The internship will be based at King’s College London and is funded by a gift from Zama. We are ideally looking for someone in a PhD programme also working on lattice cryptanalysis who is happy to interrupt their studies for a few months to help us improve the estimator. We’re offering a salary of roughly £4,400 per month before tax.
This would involve reviewing and closing tickets, reviewing the literature for what is currently missing from the estimator to add it and reviewing the code already there for correctness.
If you’re interested, please get in touch to discuss this position. We are somewhat flexible on timing.
Last updated: 2025-09-03 posted on 2025-08-27
Senior Math Libraries Engineer, Post Quantum Cryptography
NVIDIA; Santa Clara, CA or Remote, US
What you will be doing:
- Develop and optimize scalable high-performance cryptographic primitives, algorithms, and building blocks on the latest GPU hardware architectures.
- Emphasize robust long-term software architectures and designs that effectively utilize many generations of hardware.
- Work closely with internal teams (product management, engineering) and external partners to understand feature and performance requirements and deliver timely cuPQC releases.
- PhD or MSc degree in Applied Mathematics, Computer Science, or a related science or engineering field is preferred (or equivalent experience).
- 5+ years of experience designing and developing software for cryptography in low-latency or high-throughput environments.
- Strong mathematical foundations.
- Advanced C++ skills, including modern design paradigms (e.g., template meta-programming, SFINAE, RAII, constexpr, etc.).
- Strong collaboration, communication, and documentation habits.
- Experience developing libraries consumed by many users.
- Experience with CUDA C++ and GPU computing.
- Programming skills with contemporary automation setups for both building software (e.g., CMake) and testing (e.g., CI/CD, sanitizers).
- Strong understanding of mathematical foundations and algorithms used in cryptography, including but not limited to finite field arithmetic, lattice-based cryptography, and cryptographic hash functions.
Last updated: 2025-09-03 posted on 2025-08-26
Postdoc Position in Lattice-Based Cryptography
King's College London
We are recruiting a postdoc to work with us on “practical advanced post-quantum cryptography from lattices”.
Here “advanced” does not mean Functional Encryption or Indistinguishability Obfuscation, but OPRFs, Blind Signatures, Updatable Public-Key Encryption, even NIKE (sadly!).
We are quite flexible on what background applicants bring to the table
- Do you like breaking newfangled (and not so newfangled) lattice assumptions?
- Do you like to build constructions from those assumptions?
- Do you like to reduce lattice problems to each other?
- Do you think we can apply tricks from iO or FE to less fancy protocols?
All of that is in scope. If in doubt, drop us an e-mail and we can discuss.
Last updated: 2025-09-03 posted on 2025-08-25
Lecturer in Cyber Security
University of Surrey, UK
The School of Computer Science and Electronic Engineeringis seeking to recruit a full-time lecturer in Cyber Security to expand our team of dynamic and highly skilled security faculty and researchers. This post is part of a strategic investment of six academic posts across the School in the areas of Cyber Security, AI, Robotics, and Satellite Communications.
The Surrey Centre for Cyber Security (SCCS), within the School, has an international reputation in cyber security and resilience research excellence in applied and post-quantum cryptography, security verification and analysis, security and privacy, distributed systems, and networked systems. SCCS is recognised by the National Cyber Security Centre as an Academic Centre of Excellence for Cyber Security Research (ACE-CSR) and as an Academic Centre of Excellence for Cyber Security Education (ACE-CSE). Its research was also a core contributor to Surrey’s 7th position in the UK for REF2021 outputs within Computer Science. Surrey was recognised as Cyber University of the Year 2023 at the National Cyber Awards and is again shortlisted for 2025.
This post sits within the Surrey Centre for Cyber Security and this role encourages applications in the areas of systems security, web security, cyber-physical systems, cyber resilience, ethical hacking, and machine learning for security. We welcome research with applications across diverse domains, particularly communications, space, banking, and autonomous systems. Candidates with practical security experience and skills will complement our existing strengths in cryptography and formal verification.
Last updated: 2025-09-03 posted on 2025-08-21
Cryptography Expert with Math and Programming Background
ATSEC Information Security Corporation, Austin, TX
atsec is looking for cryptography experts to join our team in Austin, TX as product-oriented information security analysts. These positions may be at an entry, senior or principal level, depending on your applicable work experience and skill sets.
- As an analyst, you are expected to:
- Learn and use security concepts and techniques such as entropy, access control, authentication, auditing, side-channel analysis, etc.
- Become fluent in security standards such as FIPS 140 and Common Criteria
- Master and serve as an authority in technical domains such as cryptography, network protocols/security, hardware security, software engineering, database, mobile devices, virtualization and operating systems
- Apply your knowledge and talents to scrutinize the security architecture, implementation, and deployment of a variety of cutting-edge IT products
- Support atsec customers in security related areas and become, or continue to be, a recognized industry expert in your field
Qualifications:
Candidates possessing a solid understanding of cryptography and its use in data protection will have an advantage in our hiring process.
- This position does requires the following:
- A degree in Mathematics or Electric Engineering with Computer Science emphasis or vice versa (equivalent experience may be acceptable)
- Knowledge of cryptographic algorithms, and the mathematical concepts behind them
- Strong programming and code analysis skills
- Familiarity with Unix-based command line environments (e.g., Linux)
- Knowledge of network protocols (e.g., TLS/SSL, SSH, IPsec, IKE, SRTP, SNMP)
- Knowledge of information security (e.g., authentication, access control, network security)
- Strong technical report writing skills
- Team player who can work independently
- Eagerness to delve into technical subjects
- Enthusiasm, good customer interface skills, positive attitude, strong communication skills (written and verbal), and effective teamwork and technical collaboration skills
- The flexibility to travel
Last updated: 2025-08-21 posted on 2025-08-20
Funded Ph.D. Student
University of South Florida, Tampa, Florida
The required expertise includes:
- Master’s in Computer Engineering or Computer Science with hardware background (do not contact if you have not obtained a Master’s degree, this position is not for direct Bachelor’s to Ph.D.)
- Solid background in cryptographic engineering and theory of cryptography
- Solid HDL and FPGA/ARM expertise
- Outstanding English (if English tests are taken) to be eligible for funding
- Motivation to work beyond the expectations from an average Ph.D. student and publish in top tier venues Please closely observe the admission requirement details before emailing.
We are looking for motivated, talented, and hardworking applicants who have background and are interested in working on different aspects of Cryptographic Engineering with emphasis on hardware/software implementation, and side-channel attacks.
Please send email me your updated CV (including list of publications, language test marks, and references), transcripts for B.Sc. and M.Sc., and a statement of interest to: mehran2 (at) usf.edu as soon as possible. NOTE: The successful candidate will be asked to apply formally very soon to the college, so all the material has to be ready. We do not require GRE.
Research Webpage: https://cse.usf.edu/~mehran2/
Last updated: 2025-08-21 posted on 2025-08-20
Fully Funded 3-Year PhD Fellowship — Information Theory & Cryptography at DTU Electro
DTU Electro, DTU, Denmark
Last updated: 2025-08-21 posted on 2025-08-14
Lecturer/Senior Lecturer Computer Security
University of Canterbury, Department of Computer Science and Software Engineering; Christchurch, NZ
We invite applications for a Lecturer/Senior Lecturer position in Cybersecurity. The level of appointment will depend on the successful candidate's relevant experience.
We welcome applications from candidates conducting cutting-edge research in any area of cybersecurity. Areas of interest include, but are not limited to: adversarial machine learning, post-quantum cryptography, privacy-enhancing technologies, software and supply chain security, secure systems and memory-safe languages, cloud and virtualization security, human-centred and usable security, and the security implications of AI systems. We are particularly interested in candidates whose work addresses emerging threats, combines theory and practice, or takes an interdisciplinary approach to security and privacy.
You will contribute to teaching in core cybersecurity and computer networking subjects, as well as being encouraged to develop a strong, externally funded research programme, supervise undergraduate and postgraduate students, and collaborate with other academics in the department's teaching and research activities. The appointee will be expected to develop links with and contribute to the wider computer science and/or software engineering profession at local, national and international levels.
More information on eligibility criteria and how to apply here: https://jobs.canterbury.ac.nz/jobdetails/ajid/TFkG9/Lecturer-Senior-Lecturer-Computer-Security,26437
We do not accept applications by email, however, we are happy to answer any queries at WorkatUC@canterbury.ac.nz.
For further information specifically about the role, please contact: Ben Adams, benjamin.adams@canterbury.ac.nz.
Last updated: 2025-08-21 posted on 2025-08-13
Faculty positions (NSFC Excellent Young Scholars Fund (Overseas) )
Shandong University, School of Cyber Science & Technology; Qingdao, China
Shandong University (SDU) stands as a prestigious beacon of academic excellence in China, renowned for its rich history, diverse academic programs, and commitment to fostering innovation and leadership. The School of Cyber Science and Technology (CST) has a faculty devoted to high-level research and teaching, led by Prof. Wang Xiaoyun, an academician of the Chinese Academy of Sciences.
About NSFC Excellent Young Scholars Fund (Overseas)The fund aims to encourage talented overseas scholars who have demonstrated notable accomplishments in natural science, engineering technology, and other fields, to return to or join China for employment. For more detailed information, please refer to: "https://www.nsfc.gov.cn/publish/portal0/tab434/info95371.htm" (in Chinese).
Eligibility- Applicants must be born on or after January 1, 1985, and have a doctoral degree.
- During the period after obtaining the doctoral degree and prior to September 15, 2025, the applicant should generally have obtained a formal teaching or research position in renowned overseas universities, scientific research institutions, or corporate R&D units, and have worked for no less than 36 consecutive months. The time limit can be relaxed as appropriate for those who obtained their doctoral degree overseas.
SDU encourages global young talents to apply in the following (and related) research areas:
- Cryptography
- Cybersecurity
- AI Security
- Theoretical CS
- Computer Architecture and Trustworthy Systems
- Information and Coding Theory
For successful applicants, the following benefits are provided:
- Position: Appointed to a tenured professor position.
- Funding: Substantial research funding.
- Salaries: Competitive salaries and comprehensive benefits package, Opportunities for career advancement and professional growth within dynamic and supportive academic environment
For any inquiries or further information, please contact Prof. Sihuang Hu:
- Email: husihuang@sdu.edu.cn
- WeChat: sihuanghu
Last updated: 2025-08-11 posted on 2025-08-03
Tenure-Track/Tenured Positions
East China Normal University, School of Cryptology; Shanghai, China
East China Normal University (ECNU) locates in Shanghai, China, and is one of the first institutions in China to conduct education and research in cryptography and cybersecurity.
The School of Cryptology at ECNU was founded in November 2024 and is now seeking candidates for tenure-track (associate professor) and tenured (full/chair professor) positions in all areas of cryptography and cybersecurity, including: public-key cryptography, symmetric-key cryptography, cryptanalysis, multi-party computation, zero-knowledge proof, fully homomorphic encryption, obfuscation, applied cryptography, blockchain, AI security, system security, etc. Preference will be given to applicants with publications in top-tier venues such as FOCS, STOC, CRYPTO, EUROCRYPT, ASIACRYPT, CCS, S&P.
We will offer a competitive package including attractive salary, housing and relocation allowances, research startup funding, and support for children's education.
To apply, please send brief CV to mmxy@sc.ecnu.edu.cn (Mrs. Zhang).
Last updated: 2025-08-01 posted on 2025-08-01
Research Associate (Post-Doc)
Indian Institute of Information Technology Design & Manufacturing Kurnool (IIITDM Kurnool), India
Last updated: 2025-08-01 posted on 2025-07-31
Faculty Positions in Post-Quantum Cryptography
Xi’an Jiaotong-Liverpool University, Suzhou, China
Topics of Interests
• Post-Quantum Cryptography
• Multi-Party Computation
• Zero-Knowledge Proofs
• Fully Homomorphic Encryption
Faculty Positions
Multiple faculty positions are open at all ranks: Professor, Associate Professor, and Assistant Professor. The positions are on three-year contract which is renewable and will be converted to long-term contract when renewed again after six-year service. Positions will remain open until filled.
What we offer:
• Opportunities to work in an excellent research environment and collaborate with global leaders in post-quantum cryptography, and with top financial institutions and industry partners.
• Internationally competitive salary and benefits such as housing allowance, travel allowance, education allowance, relocation support etc.
• Adequate research funds, and university’s supports to apply for national, provincial and municipal talent programs.
Requirements:
• Ph.D. in Computer Science, Mathematics, Cryptography, or closely related areas.
• Proven track record of research excellence in post-quantum cryptography or a closely related area.
• Demonstrated excellence in teaching and supervision of undergraduate/graduate students/post-docs.
How to Apply
Submit your application via: https://career15.sapsf.cn/sfcareer/jobreqcareer?jobId=4087&company=xjtlu.
Including,
• Cover letter
• Curriculum Vitae (CV)
• Three academic reference letters (two for research and one for teaching)
For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn.
Last updated: 2025-08-01 posted on 2025-07-30
Postdoc in Post-Quantum Cryptography
Xi’an Jiaotong-Liverpool University
PQC-X maintains an internationally collaborative research environment and strong partnerships with leading scholars and top institutions worldwide, including:
• Prof. Johannes Buchmann (Fellow of the German Academy of Sciences)
• Prof. Tsuyoshi Takagi (University of Tokyo)
• Financial institutions, e.g., the Jiangsu Province Financial Society, China Construction Bank, and the Financial Research Institute of the People’s Bank of China
*About Prof. Jintai Ding
Prof. Jintai Ding is a globally recognized leader in post-quantum cryptography and currently the Dean of School of Mathematics and Physics at Xi’an Jiaotong-Liverpool University (XJTLU). He was one of the principal designers of ML-KEM (FIPS 203), the only quantum-resistant key establishment standard selected by the US National Institute of Standards and Technology (NIST). He is also the inventor and patent holder of the first quantum key exchange, which was among the two patents licensed to NIST for ML-KEM.
Prior to joining XJTLU, Prof. Ding was Full Professor in Tsinghua University; and the Distinguished Taft Professor in the University of Cincinnati for more than 20 years. Prof. Ding received his PhD from Yale University.
How to Apply
Submit your application via the Univiersity Website.
Including,
• Cover letter
• Curriculum Vitae (CV)
• Three academic reference letters (two for research and one for teaching)
For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn
Last updated: 2025-08-01 posted on 2025-07-30
PQC ASIC Engineer
Logiicdev Gmbh, Graz, Austria
Last updated: 2025-07-26 posted on 2025-07-26
Research professor hardware security
KU LEUVEN, Electrical Engineering, research group COSIC
This position is an 'open BOFZAP' position and requires a support letter from the host. Pre-application deadline is September 1, 2025.
link to COSIC: https://esat.kuleuven.be/cosic
link to the lab: https://www.esat.kuleuven.be/cosic/security-evaluations-lab/
Last updated: 2025-07-22 posted on 2025-07-18
Fully-funded PhD Students
Stevens Institute of Technology; Hoboken, NJ, USA
The Department of Computer Science at Stevens Institute of Technology near New York City is seeking applicants for PhD Student positions in the area of theoretical and applied cryptography. Stevens Computer Science is a rapidly expanding department, and we are looking for talented researchers to join. Successful applicants are expected to participate in a rigorous research program on topics such as encrypted data structures, provable security, and cryptography for AI.
Research:Successful applicants will join the cryptography researchers at Stevens and, specifically, work with Prof. Alex Hoover (https://axhoover.com/about) on projects including topics such as:
- Private Information Retrieval (PIR)
- Encrypted data structures (e.g., ORAM, Structured Encryption)
- Cryptography for AI (e.g., Watermarking)
We have an active group of students, postdoctoral researchers, and faculty. New students will collaborate with current researchers and students at Stevens, as well as with other faculty members active in the area of cryptography.
How to apply:Applicants must have a BS degree in Computer Science or a closely related field. An MS degree is not required, and students can start in the fall or spring semester. All PhD students are fully funded, including their tuition and stipend. Interested applicants should submit an application on Steven's website (https://www.stevens.edu/academics/graduate-study/phd-application-process) and email a CV and short bio to the contact below.
Last updated: 2025-07-22 posted on 2025-07-16
Assistant Professor in Cyber Security
University of Amsterdam
What are you going to do?
You will conduct research in the “Challenges in Cyber Security” project, one of the few projects receiving funding in the prestigious NWO Gravitation program. In cooperation with researchers from TU Eindhoven, Radboud University, VU Amsterdam, and CWI, you will work on the grand challenges of cybersecurity in areas such as cryptography, software security, or physical security. Besides cutting-edge research, you will also contribute to education – for example, in the top-rated Security and Network Engineering MSc program – and other activities, including acquisition and management of funded research projects, supervision of PhD students, and supervision of BSc/MSc graduation projects.
Application deadline: 15 September 2025
Last updated: 2025-07-22 posted on 2025-07-16
Cryptographic Engineer - IOE: Cardano, Japan Based applicants only
Input-Output Global
IOG, is a technology company focused on blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability.
What the role involves:
As a Cryptography Engineer you'll contribute to design, implementation, & integration of secure cryptographic protocols across Cardano-related initiatives, such as Cardano Core Cryptographic Primitives, Mithril, ALBA, Leios etc. This role bridges applied research & engineering, focusing on translating cutting-edge cryptographic designs into robust, production-grade systems. The cryptography engineer will collaborate closely with researchers, protocol designers, architects, product managers, & QA teams to ensure cryptographic correctness, performance, and system alignment.
Last updated: 2025-07-13 posted on 2025-07-11
PhD Student in 5G and Next Generation Communication Security
University of Sheffield
Last updated: 2025-07-03 posted on 2025-07-03
Quantum Cybersecurity Engineer
LuxQuantum, Esch-sur-Alzette, Luxembourg
Company Overview
We’re LuxQuantum, a dynamic startup tackling the exciting and complex challenges in quantum cybersecurity. Our goal is to build innovative solutions that address interoperability bottlenecks in quantum communications by seamlessly integrating quantum key distribution (QKD) and post-quantum cryptography (PQC). We’re looking for someone to join our small team—not just as a colleague but as a friend—to help lead this mission.
We’re more than a company; we’re a team of innovators, learners, and dreamers. If you want to explore cutting-edge technology with people who genuinely enjoy working together, we’d love to meet you!
Role Overview
As a Quantum Cybersecurity Engineer, you’ll play a key role in developing solutions to tackle interoperability issues in quantum cybersecurity. Think of yourself as both a problem-solver and a collaborator, directly contributing to the creation of leading-edge quantum cybersecurity solutions in an environment where every voice matters.
Last updated: 2025-07-03 posted on 2025-07-01
Post-Doc, Assistant Professor, Associate Professor, Full Professor
Cryptography Theory and Technology Research Laboratory of Institute of Information Engineering, CAS
We are seeking excellent researchers to join the Cryptography Theory and Technology Research Laboratory at IIE. Applicants are encouraged to apply to work on one of the following areas:
- Post-Quantum Cryptography
- Fully Homomorphic Encryption
- Zero-Knowledge Proof
- Symmetric-Key Cryptography
Positions at PostDoc, Assistant/Associate/Full Professor levels are available. Initial appointments are normally made on a fixed-term contract. Subsequent contract renewal, promotion and tenure all follow standard practices.
Application Materials Required:
- Curriculum Vitae
- 1-5 Representative publications
- Research statement
Review of applications will begin July 1, 2025 and continue until positions are filled.
Last updated: 2025-07-01 posted on 2025-07-01
MS and PhD Positions in Applied Cryptography and ML/AI Security
National Sun Yat-sen University, Department of Computer Science and Engineering; Kaohsiung, Taiwan
Responsibilities: Apart from academic work, students must be involved in several activities in a group or individually, such as (not limited to):
Requirements: (02 MS and 02 PhD positions)
Apart from the university's basic admission policies (https://cse.nsysu.edu.tw/?Lang=en), students are desired to have the following key requirements:
Scholarship:
What students can expect:
Submit your detailed CV by August 30, 2025.
Application Deadline: September 30, 2025
Last updated: 2025-06-30 posted on 2025-06-30
Post-doc / research engineer
CEA-List, France (Saclay or Grenoble)
[1] S. Tollec et al. μArchiIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023
[2] S. Tollec et al.. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. TCHES 2024
Objectives
Your main missions will be:
- To design and extend our pre-silicon methodology and associated tools to support different secured processors. In particular, leverage the specificities of the countermeasures embedded by such secured processors to speedup analysis techniques, but also integrate in our methodology and tools post-synthesis netlist level analyses of hardware architectures.
- To participate to a project-scale experimental evaluation aiming to fill the gap between pre-silicon tools and post-silicon security evaluations.
Location Saclay (Paris area) or Grenoble.
Requirements PhD or a Masters’s Degree in Electronics or Computer Science. Excellent interpersonal and communication skills, and a solid background in any of the following fields is expected: computer architecture, programming languages, formal methods, cyber-security. Knowledge or French (spoken or written) is not required but may be helpful on a day-to-day basis.
Application Please send the following documents: CV, cover letter (in French or English), transcrpit of records
Last updated: 2025-06-18 posted on 2025-06-16
Phd student
COSIC, KU Leuven
Job Description : The position is funded by Flemish Research Funds (FWO). The PhD candidate will work in collaboration with the research group of Prof. Amir Moradi from University of Darmstadt. The research program is defined in a joint research project jointly funded by FWO (Belgium) and DFG (Germany). The title of the project is MatSec – Maturing Physical Security Models in Realistic Scenarios. The PIs of the project in COSIC are Dr. Svetla Nikova and Prof. Vincent Rijmen.
Security models for side-channel analysis and combined attacks for HW implementations exist, but they often make unrealistic assumptions or are inaccurate in modeling physical effects. This results in countermeasures that are either overdesigned, unnecessarily increasing the costs, or still vulnerable to attacks when deployed. The main objective of this project is to provide security models that accurately abstract attacks against cryptographically secured physical devices and that allow for the creation of efficient countermeasures on hardware guaranteeing security in practice.
We are looking for people to work on the following topics: (1) Realistic side-channel models capturing the circuit’s real behavior and achieving a balance between security and efficiency and providing improved countermeasures. (2) Security models and randomness generation: to develop procedures for constructing masked HW/SW implementations with low randomness requirements (3) Combined security models extending known fault/combined adversaries.
Specific Skills Required: For the PhD position: The candidates should hold a master’s degree in Engineering, Mathematics or Computer Science with very good grades, very good knowledge and experience with programing with C/C++ and Verilog/VHDL. Preferably to have passed courses in Cryptography and/or Computer Security.
Last updated: 2025-06-18 posted on 2025-06-16
Research Fellow – Quantum / Post-Quantum
Input Output Group (IOG)
Who we are: IOG is a technology company focused on blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include the Cardano blockchain, as well as other products in the areas of decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain and Web3 technology globally.
What the role involves: As a Research Fellow at IOG, you will be responsible for conducting high-quality research, combining your well-developed research skills with a passion for collaborating in innovative research projects. We are looking for someone who is interested in blockchain technologies specifically to conduct research on post-quantum cryptographic solutions for enhancing the security and scalability of decentralized ledger technologies, and potentially harnessing quantum computation to develop novel, future-proof cryptographic protocols. You will join our team of research fellows contributing directly to our diverse development efforts.
Further information: For additional information as well as submitting your application, follow the link in the ad title.
Last updated: 2025-06-15 posted on 2025-06-13
Two Phd Studebnt Positon isn Hardware Secueity and Poast Quantom Cryptogrpahy
University of Idaho
Last updated: 2025-06-09 posted on 2025-06-08
Fully-Funded Ph.D. students
Illinois Institute of Technology, Department of Computer Science; Chicago, USA
I will join the Department of Computer Science at Illinois Tech as a tenure-track Assistant Professor in Fall 2025. My research focuses on Applied Cryptography, especially advancing cryptography to solve security and privacy issues in existing as well as emerging real-world applications. Please see (https://yanxue820.github.io) for more details about me.
I'm hiring 2-3 Ph.D. students starting in spring/fall 2026 with the following research areas:- Secure Multi-Party Computation (MPC): MPC is a crucial technique to enhance data collaborations while protecting sensitive information. Our research provides highly efficient MPC solutions for real-world application scenarios (such as healthcare, risk management, biorecognition, etc).
- Blockchain: We build foundational infrastructures to ensure security and privacy in blockchain ecosystems. Our research addresses critical challenges, such as resource-constrained users, data confidentiality and verifiability, decentralized services, etc.
- Intersection between Cryptography and Machine Learning: We advance and accelerate cryptography techniques to protect the data/model security and privacy in machine learning. Conversely, we leverage machine learning techniques to assist in proving the security of cryptographic protocols.
- Fully-funded Ph.D. students (Spring/Fall 2026) passionate about research
- Bachelor's or Master's degree in CS, Math, or related disciplines
- Solid programming/mathematical skills and/or a background in cryptographic research or study
- Curious and eager to explore new ideas and technologies
- CV or resume
- Academic transcripts (unofficial is okay)
- Brief statement of research interest (informal is okay)
Last updated: 2025-05-23 posted on 2025-05-22
PhD and Post-Doc in Post-Quantum Cryptography
Monash University; Melbourne, Australia
Topics of interest
- Zero-knowledge proof (ZKP)
- SNARKs
- Lattice-based cryptography
- Fully-homomorphic encryption (FHE)
- Some combination of the above
Why join Monash?
Monash University is among the leading universities in Australia and is located in Melbourne, one of the most liveable cities in the world. See more at: https://mfesgin.github.io/supervision/
PhD Position
Applicants should have (or be expected to complete in the next 6 months) a masters or honours equivalent degree in mathematics, computer science, cryptography, engineering or closely related areas. Some research experience in cryptography is required.Apply by filling out the following form: https://docs.google.com/forms/d/e/1FAIpQLSetFZLvDNug5SzzE-iH97P9TGzFGkZB-ly_EBGOrAYe3zUYBw/viewform
PostDoc Position
Applicants should have (or be expected to complete in the next 6 months) a PhD in mathematics, computer science, cryptography, engineering or closely related areas. Research experience in at least one of lattice-based cryptography, zero-knowledge proofs, or FHE is required.Apply by filling out the following form: https://docs.google.com/forms/d/e/1FAIpQLSf8T2xlMbtKB6B7Lqn_VvV1-PpRzQrcl2Xe8oRnNZQVHqiPSg/viewform
Last updated: 2025-05-23 posted on 2025-05-22
Ph.D. and Post-doc Positions at DGIST Crypto Group
DGIST, Daegu, South Korea
PhD applicants should have a strong background in cryptography, mathematics, theoretical computer science, or related areas. Postdoc applicants should have a proven publication record in established venues in cryptography or security (e.g., IACR conferences/journals, CCS, USENIX Security, IEEE S&P). Salary will be determined according to DGIST's internal regulations and the applicant’s experience, with top-level compensation guaranteed based on qualifications and achievements. The position will remain open until filled.
About DGIST: DGIST is a rapidly growing institution with strong global recognition. DGIST ranked 33rd in the world and 1st among new universities in the Times Higher Education (THE) Emerging University Rankings. It recently placed 7th globally in research power in its first QS World University Rankings participation and ranked 12th in THE’s World University Rankings for small universities (under 5,000 students).
Last updated: 2025-05-23 posted on 2025-05-21
Full PhD scholarship
University of Southern Queensland, Australia.
Requirements: Bachelor or Master degree holder in a field relevant to Artificial Intelligence or Cyber Security, preferably with publications track records.
If interested, please send you CV (with publication/s listed) to Zhaohui.Tang@unisq.edu.au .
Last updated: 2025-05-15 posted on 2025-05-15
Post-Doctoral Researcher Position at the Cryptography, Security & Privacy Research Group
Koç University, İstanbul, Türkiye
Your duties include performing research on cryptography, security, and privacy in line with our research group's focus, as well as directing graduate and undergraduate students in their research and teaching. The project funding is related to applied cryptography focusing on privacy-preserving and adversarial machine learning.
Applicants are expected to have already obtained their Ph.D. degrees in Computer Science or related discipline with a thesis topic related to the duties above.
For more information about joining our group and projects, visit
https://crypto.ku.edu.tr/
Submit your application via email including
- full CV,
- transcripts of all universities attended,
- 1-3 sample publications where you are the main author,
- a detailed research proposal,
- 2-3 reference letters sent directly by the referees.
Application deadline is 31 July 2025 and position start date is 1 September 2025.
https://member.acm.org/~kupcu
Last updated: 2025-05-12 posted on 2025-05-09
Researcher (PhD student or Post-Doc)
University of Klagenfurt; Klagenfurt, Austria
We are seeking to recruit a researcher for an interdisciplinary project on notions of "explainability" in the context of side channel evaluations (considering technical approaches used in both FIPS style as well as CC style evaluations).
The project will run up to three years. It will require a mix of technical skills (we wish to propose and evaluate novel approaches to gather evidence for/against security of implementations given access to side channels) as well as an interest in developing social science research methodologies (we plan to engage with evaluation labs but also vendors to research useful notions of "explainable leakage").
The project will be co-supervised by Prof. Elisabeth Oswald and Prof. Katharina Kinder-Kurlanda; both situated in the interdisciplinary Digital Age Research Centre at the University of Klagenfurt (Austria).
We seek applicants with a mathematical/technical background. For applicants wishing to pursue a PhD, we expect that they have done a MSc/Bsc thesis on side channels/faults with a practical focus. For applicants who already possess a PhD, we expect a strong track record in applied cryptography with some publications in the area of side channels/faults in top venues.
The post holder will be expected to work in Klagenfurt (Austria), and to be able to do short term visits to evaluation labs/vendors throughout Europe.
In order to apply, please send a short CV, including your scientific outputs (e.g. papers, talks, seminars, open source artefacts, etc.), as a single pdf file to Elisabeth.Oswald@aau.at. If you have questions, or wish to discuss informally, please contact Elisabeth Oswald.
We will review applications as they arrive and invite potentially suitable candidates for an online interview as soon as possible, with the intention to fill the post once a suitable candidate has been identified.
Last updated: 2025-05-02 posted on 2025-04-30
Researcher/s, Developer or Post Doc
China Telecom Overseas Talent Recruitment Program
Job Description: 1) Lead or participate in technical research and applications for data privacy, data security, cryptography and data circulation system, including performance upgrades for the multi-privacy-preserving computing platform, software-hardware integration architecture design, trusted data circulation infrastructure development and real-world industrial applications. 2) Drive R&D of privacy-preserving technologies for LLM in distributed scenarios, including cross-domain secure training/fine-tuning/inference methods, and promote industry-leading security solutions. 3) Participate in planning and capability building for data element infrastructure, aligning with strategies to formulate technical roadmap and implement projects. 4) The positions are available immediately until filled, and the working location can be Beijing or Shanghai.
Basic Requirements: 1. Specialization: Cryptography, data security and privacy, artificial intelligence, cybersecurity, computer software development, etc. 2. Age: Under 35 years old. 3. Education: Ph.D. or Post Doc. 4. Experience: 3 years of overseas work experience (negotiable) with globally renowned employers.
Technical Requirements: 1. Expertise in cryptography, federated learning, LLM and data security/privacy, or software-hardware integration. Candidates must meet at least one of: a) Proficiency in deep learning/ML/NLP fundamentals, with experience in LLMs, distributed training security, frameworks (TensorFlow/PyTorch). b) In-depth understanding of applied cryptography, including but are not limited to the following sub-areas: secure multi-party computation, lattice-based cryptography, cryptography and its application in AI. 2. PhD or postdoctoral experience from renowned institutions or enterprises. Familiarity with applied cryptography domains (MPC, lattice-based cryptography, post-quantum crypto, homomorphic encryption, etc.), with ≥3 publications in top journals/conferences.
Last updated: 2025-04-15 posted on 2025-04-15
PhD and Postdoc on Hardware Security
Technische Universität Darmstadt, Germany
• Side-channel analysis attacks
• Fault-injection attacks
• Countermeasures against physical attacks
PhD candidates should have an M.Sc. degree in IT-Security, Electrical Engineering, Computer Engineering, Computer Science, or Applied Mathematics with excellent grades. Being familiar with cryptography concepts and low-level programming is a must. Knowing a hardware design language, e.g., VHDL/verilog, is a plus.
Postdoc applicants should habe a proven track record by having published their research result in venues known in cryptography, IT security, and hardware security (e.g., IACR venues, ccs, usenix security, IEEE S&P).
In order to apply, please send your CV, transcripts of records (both BSc and MSc) in a single pdf file to amir.moradi@tu-darmstadt.de
Review of applications starts immediately until the positions are filled.
Last updated: 2025-04-15 posted on 2025-04-08
Post-docs on the Provable Security of Symmetric Cryptography
Xiamen University, Xiamen, China
Located in Xiamen, which is one of China’s top ten livable cities, Xiamen University is generally acknowledged as one of the most beautiful universities in China. It has been perennially regarded as one of the top academic institutions in Southern China. With its lovely campus, profound cultural foundation, and great research atmosphere, Xiamen University provides an ideal environment for academic research and professional development.
Xiamen University is now seeking candidates to fill two post-doc positions on the provable security of symmetric-key cryptography, with a tentative duration of 2 years. Potential research topics include, but are not limited to, the following directions:
- Authenticated encryption and message authentication codes with new security features, e.g., leakage-resistance, key-committing, high security.
- Provable security and generic attacks of hash functions.
- Security analysis and proofs of more general modes of operation in real-world applications/standards.
Candidates with proven records of publications in established venues in cryptography/security are encouraged to apply. Candidates are invited to send a resume and motivation letter to Dr. Yaobin Shen (yaobin.shen [at] xmu.edu.cn).
Last updated: 2025-04-07 posted on 2025-04-06
Research Assistant (UI/UX Engineer)
The Research Centre for Blockchain Technology(RCBT), The Hong Kong Polytechnic University, Hong Kong
Key Responsibilities:
- Design and implement user interfaces for web and mobile applications
- Create wire frames, prototypes, and user flows
- Conduct user research and usability testing
- Collaborate with product managers and researchers
- Develop and maintain design systems
- Optimize user journeys and experiences
- Create responsive designs for multiple platforms
- Perform any other duties as assigned by the project leader, the Head of Unit or their delegates
- Bachelor's degree in Design, Computer Science, or related field
- 3+ years experience in UI/UX design
- Proficient in design tools: Figma, Adobe XD, Sketch
- Experience with prototyping tools
- Knowledge of HTML, CSS, and basic JavaScript
- Portfolio demonstrating UI/UX projects
- Strong understanding of user-centered design principles
- Experience with responsive design
- Experience with web3 or blockchain products
- Knowledge of user research methodologies
- Familiarity with agile development processes
- Experience with motion design/Adobe After Effects
- Understanding of accessibility standards
Last updated: 2025-03-30 posted on 2025-03-29
Research Assistant (Junior Full Stack Developer)
The Research Centre for Blockchain Technology(RCBT), The Hong Kong Polytechnic University, Hong Kong
Key Responsibilities:
- Develop and maintain web applications using modern frameworks
- Write clean, maintainable, and efficient code
- Work on both frontend and backend development tasks
- Collaborate with senior researchers and product teams
- Participate in code reviews and technical discussions
- Assist in database design and management
- Debug and fix software issues
- Perform any other duties as assigned by the project leader, the Head of Unit or their delegates
- Bachelor's degree in Computer Science, Engineering, or related field
- Knowledge of JavaScript/TypeScript
- Experience with frontend frameworks (React.js, Vue.js)
- Basic understanding of backend development (Node.js, Java, or Python)
- Familiarity with HTML5, CSS3
- Basic knowledge of SQL databases
- Version control with Git
- Experience with REST APIs
- Understanding of web security principles
- Knowledge of cloud services (AWS, Azure, or GCP)
- Basic understanding of CI/CD pipelines
- Experience with agile development methodology
Last updated: 2025-03-30 posted on 2025-03-29
Researcher/s, and Developer
University of Southern Queensland, Australia - work can be done remotely within Australia.
Expectations: to produce top-tier journal paper/s in the field of Privacy-preserving Machine Learning.
Position 2 : A casual developer with the following skill set required, for a few hundred hours (the exact number of hours is negotiable and depends on the availability of the candidate):
1. Swift (for a task specifically for iOS), and
2. Java (for Android app development), and
3. TensorFlow.js (for a specific task), and
4. Java or PHP or C# (for web page development), and
5. HTML and CSS and JavaScript (for UI design).
Expectations : to continue with some existing development work by polishing and finalizing the mobile app development.
Note : The successful candidates for both the positions above must be physically based in Australia with working rights in Australia when the work is being done.
Zhaohui.Tang@unisq.edu.au
Last updated: 2025-03-25 posted on 2025-03-23