International Association for Cryptologic Research

International Association
for Cryptologic Research

Open Positions in Cryptology

Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.


Junior Researcher / PhD Student
Brandenburg University of Technology Cottbus-Senftenberg, chair of IT Security; Cottbus, Germany,

Tasks:

  • Active research in the area of intrusion detection systems (IDS) for critical infrastructures, secure cyber-physical systems, and artificial intelligence / machine learning for traffic analysis
  • Implementation and evaluation of new algorithms and methods
  • Cooperation and knowledge transfer with industrial partners
  • Publication of scientific results
  • Assistance with teaching

The employment takes place with the goal of doctoral graduation (obtaining a PhD degree).

Requirements:

  • Master’s degree (or equivalent) in Computer Science or related disciplines
  • Strong interest in IT security and/or networking and distributed systems
  • Knowledge of at least one programming language (C++, Java, etc.) and one scripting language (Perl, Python, etc.) or strong willingness to quickly learn new programming languages
  • Linux/Unix skills
  • Knowledge of data mining, machine learning, statistics and result visualization concepts is of advantage
  • Excellent working knowledge of English; German is of advantage
  • Excellent communication skills

For more information about the vacant position please contact Prof. A. Panchenko (E-Mail: itsec-jobs.informatik@lists.b-tu.de). We value diversity and therefore welcome all applications – regardless of gender, nationality, ethnic and social background, religion/belief, disability, age, sexual orientation, and identity. The BTU Cottbus-Senftenberg strives for a balanced gender relation in all employee groups. Applicants with disabilities will be given preferential treatment if they are equally qualified.

Applications containing the following documents:

  • A detailed Curriculum Vitae
  • Transcript of records from your Master studies
  • An electronic version of your Master thesis, if possible should be sent in a single PDF file as soon as possible, but not later than 07.09.2025 at itsec-jobs.informatik@lists.b-tu.de
  • Contact: Prof. Andriy Panchenko (E-Mail: itsec-jobs.informatik@lists.b-tu.de)
    Last updated: 2025-08-11 posted on 2025-08-08

    Faculty positions (NSFC Excellent Young Scholars Fund (Overseas) )
    Shandong University, School of Cyber Science & Technology; Qingdao, China

    Shandong University (SDU) stands as a prestigious beacon of academic excellence in China, renowned for its rich history, diverse academic programs, and commitment to fostering innovation and leadership. The School of Cyber Science and Technology (CST) has a faculty devoted to high-level research and teaching, led by Prof. Wang Xiaoyun, an academician of the Chinese Academy of Sciences.

    About NSFC Excellent Young Scholars Fund (Overseas)

    The fund aims to encourage talented overseas scholars who have demonstrated notable accomplishments in natural science, engineering technology, and other fields, to return to or join China for employment. For more detailed information, please refer to: "https://www.nsfc.gov.cn/publish/portal0/tab434/info95371.htm" (in Chinese).

    Eligibility
    • Applicants must be born on or after January 1, 1985, and have a doctoral degree.
    • During the period after obtaining the doctoral degree and prior to September 15, 2025, the applicant should generally have obtained a formal teaching or research position in renowned overseas universities, scientific research institutions, or corporate R&D units, and have worked for no less than 36 consecutive months. The time limit can be relaxed as appropriate for those who obtained their doctoral degree overseas.
    Research Areas

    SDU encourages global young talents to apply in the following (and related) research areas:

    • Cryptography
    • Cybersecurity
    • AI Security
    • Theoretical CS
    • Computer Architecture and Trustworthy Systems
    • Information and Coding Theory
    Benefits

    For successful applicants, the following benefits are provided:

    • Position: Appointed to a tenured professor position.
    • Funding: Substantial research funding.
    • Salaries: Competitive salaries and comprehensive benefits package, Opportunities for career advancement and professional growth within dynamic and supportive academic environment
    Contact:

    For any inquiries or further information, please contact Prof. Sihuang Hu:

    • Email: husihuang@sdu.edu.cn
    • WeChat: sihuanghu

    • Last updated: 2025-08-11 posted on 2025-08-03

    Tenure-Track/Tenured Positions
    East China Normal University, School of Cryptology; Shanghai, China

    East China Normal University (ECNU) locates in Shanghai, China, and is one of the first institutions in China to conduct education and research in cryptography and cybersecurity.

    The School of Cryptology at ECNU was founded in November 2024 and is now seeking candidates for tenure-track (associate professor) and tenured (full/chair professor) positions in all areas of cryptography and cybersecurity, including: public-key cryptography, symmetric-key cryptography, cryptanalysis, multi-party computation, zero-knowledge proof, fully homomorphic encryption, obfuscation, applied cryptography, blockchain, AI security, system security, etc. Preference will be given to applicants with publications in top-tier venues such as FOCS, STOC, CRYPTO, EUROCRYPT, ASIACRYPT, CCS, S&P.

    We will offer a competitive package including attractive salary, housing and relocation allowances, research startup funding, and support for children's education.

    To apply, please send brief CV to mmxy@sc.ecnu.edu.cn (Mrs. Zhang).

    Contact: Mrs. Zhang (mmxy@sc.ecnu.edu.cn)
    Last updated: 2025-08-01 posted on 2025-08-01

    Research Associate (Post-Doc)
    Indian Institute of Information Technology Design & Manufacturing Kurnool (IIITDM Kurnool), India
    The cryptography research group in the Department of Computer Science and Engineering, IIITDM Kurnool, invites applications from Indian Nationals for the following position under a project funded by IBITF. 1. Research Associate (2 Positions) Salary: 1st Year - (Rs. 58000, 2nd Year - Rs. 63800, 3rd Year - Rs.66700) + HRA* * as per the institute's norm. "Qualifications": Ph.D. in a relevant area, preferably in Computer Science or Mathematics or relevant area, with a strong background in Cryptography and Mathematics. "Desired qualification": Good academic record and knowledge in public key cryptography, especially in Lattice-based Cryptography, Applied cryptography. "How to apply": Please send me your application form (https://files.iiitk.ac.in/uploads/recruitment/2025/project/DASH-IBITH-RA-Recruitment_0725_app.docx) along with all the enclosures (CV, all educational certificates, GATE/CSIR-NET/NBHM score card, and any other relevant documents) as a single .pdf file through Email with the subject “RA Application for Digital Cash Solution on CBDC Project”. It is a rolling advertisement; however, the first deadline is *20th August 2025*. Email: kabaleesh@iiitk.ac.in
    Contact: Dr. R. Kabaleeshwaran
    Last updated: 2025-08-01 posted on 2025-07-31

    Faculty Positions in Post-Quantum Cryptography
    Xi’an Jiaotong-Liverpool University, Suzhou, China
    The Post-Quantum Cryptography Migration Interdisciplinary Lab (PQC-X) at XJTLU has multiple openings for faculty positions. We are seeking excellent researchers in design, analysis, implementation and/or application aspects of the following areas, and will offer internationally competitive salary packages for successful candidates.

    Topics of Interests

    • Post-Quantum Cryptography

    • Multi-Party Computation

    • Zero-Knowledge Proofs

    • Fully Homomorphic Encryption

    Faculty Positions

    Multiple faculty positions are open at all ranks: Professor, Associate Professor, and Assistant Professor. The positions are on three-year contract which is renewable and will be converted to long-term contract when renewed again after six-year service. Positions will remain open until filled.

    What we offer:

    • Opportunities to work in an excellent research environment and collaborate with global leaders in post-quantum cryptography, and with top financial institutions and industry partners.

    • Internationally competitive salary and benefits such as housing allowance, travel allowance, education allowance, relocation support etc.

    • Adequate research funds, and university’s supports to apply for national, provincial and municipal talent programs.

    Requirements:

    • Ph.D. in Computer Science, Mathematics, Cryptography, or closely related areas.

    • Proven track record of research excellence in post-quantum cryptography or a closely related area.

    • Demonstrated excellence in teaching and supervision of undergraduate/graduate students/post-docs.

    How to Apply

    Submit your application via: https://career15.sapsf.cn/sfcareer/jobreqcareer?jobId=4087&company=xjtlu.

    Including,

    • Cover letter

    • Curriculum Vitae (CV)

    • Three academic reference letters (two for research and one for teaching)

    For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn.

    Contact: Mingwei.Sun@xjtlu.edu.cn
    Last updated: 2025-08-01 posted on 2025-07-30

    Postdoc in Post-Quantum Cryptography
    Xi’an Jiaotong-Liverpool University
    The Post-Quantum Cryptography Migration Interdisciplinary Lab (PQC-X) is a newly founded lab at XJTLU, led by Prof. Jintai DING*, a globally recognized leader in Post-quantum Cryptography. With the initial CNY22 million funding by the University, PQC-X aims to establish a world-class research lab with focus on conducting world-leading research in post-quantum cryptography, advancing key technologies in post-quantum migration and facilitating their industry transfer, and fostering the development of high-level talents in this field. PQC-X is expanding to a team of 9 faculty, 9 postdoctoral researchers, and 12 doctoral students.

    PQC-X maintains an internationally collaborative research environment and strong partnerships with leading scholars and top institutions worldwide, including:

    • Prof. Johannes Buchmann (Fellow of the German Academy of Sciences)

    • Prof. Tsuyoshi Takagi (University of Tokyo)

    • Financial institutions, e.g., the Jiangsu Province Financial Society, China Construction Bank, and the Financial Research Institute of the People’s Bank of China

    *About Prof. Jintai Ding

    Prof. Jintai Ding is a globally recognized leader in post-quantum cryptography and currently the Dean of School of Mathematics and Physics at Xi’an Jiaotong-Liverpool University (XJTLU). He was one of the principal designers of ML-KEM (FIPS 203), the only quantum-resistant key establishment standard selected by the US National Institute of Standards and Technology (NIST). He is also the inventor and patent holder of the first quantum key exchange, which was among the two patents licensed to NIST for ML-KEM.

    Prior to joining XJTLU, Prof. Ding was Full Professor in Tsinghua University; and the Distinguished Taft Professor in the University of Cincinnati for more than 20 years. Prof. Ding received his PhD from Yale University.

    How to Apply

    Submit your application via the Univiersity Website.

    Including,

    • Cover letter

    • Curriculum Vitae (CV)

    • Three academic reference letters (two for research and one for teaching)

    For Inquiries, you can contact HR: Ye.Lan@xjtlu.edu.cn

    Contact: Mingwei.sun@xjtlu.edu.cn
    Last updated: 2025-08-01 posted on 2025-07-30

    PhD position
    Brandenburg University of Technology, Chair of IT Security
    The Young Investigator Group “COSYS - Control Systems and Cyber Security Lab” at the Chair of IT Security at the Brandenburg University of Technology Cottbus-Senftenberg has an open PhD position in the following areas:
    • AI-based Network Attack Detection and Simulation.
    • AI-enabled Penetration Testing.
    • Privacy-Enhancing Technologies in Cyber-Physical Systems.
    The available position is funded as 100% TV-L E13 tariff in Germany and initially limited until 31.07.2026, with possibility for extension. Candidates must hold a Master’s degree or equivalent in Computer Science or related disciplines, or be close to completing it. If you are interested, please send your CV, transcript of records from your Master studies, and an electronic version of your Master's thesis (if possible), as a single pdf file. Applications will be reviewed until the position is filled.
    Contact: Ivan Pryvalov (ivan.pryvalov@b-tu.de)
    Last updated: 2025-08-01 posted on 2025-07-29

    PQC ASIC Engineer
    Logiicdev Gmbh, Graz, Austria
    Are you passionate about semiconductors and ready to shape your future? Join Logiicdev—a leader in state-of-the-art technology. We’re committed to improving lives through innovation and empowering our team from chip-level to full systems. This is a full-time, flexible role for a post-quantum cryptographic/PQC ASIC Engineer located in Graz. As a PQC ASIC Engineer, you will design and implement post-quantum cryptographic algorithms, focusing on secure, quantum-resistant hardware. Responsibilities include algorithm development, logic and RTL/HDL design, and hardware implementation to ensure robust cryptosystems against quantum computing threats.
    Contact: MSc Deepak V Katkoria
    Last updated: 2025-07-26 posted on 2025-07-26

    Post-doc
    Aalto University, Finland

    We (Chris Brzuska and Russell Lai) are looking for postdocs interested in working with us on topics including but not limited to:

    • Lattice-based cryptography, with special focus on the design, application, and analysis of structured/hinted lattice assumptions
    • Succinct/zero-knowledge/batch proof and argument systems, functional commitments
    • Advanced (e.g. homomorphic, attribute-based, functional, laconic) encryption and (e.g. ring, group, threshold, blind) signature schemes
    • Time-based cryptography (e.g. time-lock puzzle, verifiable delay function, proof of sequential work)
    • Fine-grained cryptography (e.g. against bounded-space-time adversaries)
    • Lower bounds and impossibility results
    • Key exchange and secure messaging protocols and their formal verification

    This is part of Helsinki Institute for Information Technology (HIIT)'s joint call for Research Fellow and Postdoctoral Fellow. For more details about the position, and for the instructions of how to apply, please refer to https://www.hiit.fi/hiit-postdoctoral-and-research-fellow-positions/.

    Contact: Chris Brzuska and Russell Lai
    Last updated: 2025-07-26 posted on 2025-07-22

    Research professor hardware security
    KU LEUVEN, Electrical Engineering, research group COSIC
    COSIC, an internationally renowned research group, provides broad expertise in digital security and strives for innovative cyber security solutions. Join this team as a research professor in hardware security. COSIC owns and operates an advanced electronics security evaluation lab, available to the team.
    This position is an 'open BOFZAP' position and requires a support letter from the host. Pre-application deadline is September 1, 2025.

    link to COSIC: https://esat.kuleuven.be/cosic
    link to the lab: https://www.esat.kuleuven.be/cosic/security-evaluations-lab/
    Contact: Ingrid Verbauwhede
    Last updated: 2025-07-22 posted on 2025-07-18

    Open positions at Simula UiB for Postdoctoral Fellow in PQC and PhD student in STAP Cryptanalysis
    Simula UiB AS, Bergen, Norway

    Postdoc in PQC: Some new standards have been established already, but a lot of work is still needed for a successful migration, ranging from a wider portfolio of post-quantum secure primitives (both in functionality and footprint), increased confidence in the underlying assumptions through advanced cryptanalysis, improved implementations with high assurance (e.g. against microarchitectural or side-channel attacks), and integration of primitives in wider protocols and products. The successful applicant will be able to explore and contribute to these exciting research and development questions, with an opportunity to set their own research agenda. (Application deadline 15 August)

    PhD Position: Do you want to contribute to making our increasingly digitised world safer by diving into the exciting field of cryptographic analysis? This research topic aims to build confidence in the cryptography we all rely on in our daily lives. The successful applicant will have the opportunity to explore and contribute to groundbreaking research in the cryptanalysis of novel symmetric encryption algorithms designed for advanced protocols, so-called STAPs. (Application deadline 1 September)

    Read more on both open positions here:

      https://www.simula.no/careers/job-openings/postdoctoral-fellow-in-post-quantum-cryptography https://www.simula.no/careers/job-openings/phd-position-in-stap-cryptanalysis
    Contact: bergen@simula.no
    Last updated: 2025-07-22 posted on 2025-07-17

    Fully-funded PhD Students
    Stevens Institute of Technology; Hoboken, NJ, USA

    The Department of Computer Science at Stevens Institute of Technology near New York City is seeking applicants for PhD Student positions in the area of theoretical and applied cryptography. Stevens Computer Science is a rapidly expanding department, and we are looking for talented researchers to join. Successful applicants are expected to participate in a rigorous research program on topics such as encrypted data structures, provable security, and cryptography for AI.

    Research:

    Successful applicants will join the cryptography researchers at Stevens and, specifically, work with Prof. Alex Hoover (https://axhoover.com/about) on projects including topics such as:

    • Private Information Retrieval (PIR)
    • Encrypted data structures (e.g., ORAM, Structured Encryption)
    • Cryptography for AI (e.g., Watermarking)

    We have an active group of students, postdoctoral researchers, and faculty. New students will collaborate with current researchers and students at Stevens, as well as with other faculty members active in the area of cryptography.

    How to apply:

    Applicants must have a BS degree in Computer Science or a closely related field. An MS degree is not required, and students can start in the fall or spring semester. All PhD students are fully funded, including their tuition and stipend. Interested applicants should submit an application on Steven's website (https://www.stevens.edu/academics/graduate-study/phd-application-process) and email a CV and short bio to the contact below.

    Contact: Alex Hoover (ahoover@stevens.edu)
    Last updated: 2025-07-22 posted on 2025-07-16

    Assistant Professor in Cyber Security
    University of Amsterdam
    Do you like solving challenges in cyber security? Do you want to become part of a growing team of cybersecurity researchers at the University of Amsterdam whose research contributes to securing our digital world? The Informatics Institute is looking for a new assistant professor in cyber security. You will be able to hire a PhD student as part of the startup-package.

    What are you going to do?
    You will conduct research in the “Challenges in Cyber Security” project, one of the few projects receiving funding in the prestigious NWO Gravitation program. In cooperation with researchers from TU Eindhoven, Radboud University, VU Amsterdam, and CWI, you will work on the grand challenges of cybersecurity in areas such as cryptography, software security, or physical security. Besides cutting-edge research, you will also contribute to education – for example, in the top-rated Security and Network Engineering MSc program – and other activities, including acquisition and management of funded research projects, supervision of PhD students, and supervision of BSc/MSc graduation projects.

    Application deadline: 15 September 2025

    Contact: Christian Schaffner
    Last updated: 2025-07-22 posted on 2025-07-16

    Cryptographic Engineer - IOE: Cardano, Japan Based applicants only
    Input-Output Global

    IOG, is a technology company focused on blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability.

    What the role involves:

    As a Cryptography Engineer you'll contribute to design, implementation, & integration of secure cryptographic protocols across Cardano-related initiatives, such as Cardano Core Cryptographic Primitives, Mithril, ALBA, Leios etc. This role bridges applied research & engineering, focusing on translating cutting-edge cryptographic designs into robust, production-grade systems. The cryptography engineer will collaborate closely with researchers, protocol designers, architects, product managers, & QA teams to ensure cryptographic correctness, performance, and system alignment.

  • Work both independently & in collaboration with distributed teams across multiple time zones, showing initiative and ownership over tasks
  • Design & implement crypto constructions, i.e digital signatures, zero-knowledge proofs, accumulators, commitment schemes
  • Work independently on software development tasks, demonstrating proactive problem-solving skills.
  • Develop & maintain cryptographic libraries (primarily in Rust and Haskell, occasionally in C) with an emphasis on safety, performance, clarity, and auditability
  • Translate cryptographic concepts from academic research into well-structured, reliable implementations that will be used in production systems
  • Contribute to cryptographic design discussions, parameter tuning, & performance benchmarking, particularly for elliptic curve and zk-based constructions
  • Analyze & validate protocol security, ensuring soundness, liveness, and resistance to practical adversaries Write and maintain clear documentation, including developer guides and internal design notes
  • Troubleshoot, debug, and optimize cryptographic code and its interactions with broader systems
  • While the role is remote, applicants must be located in Japan only

    Contact: Marios Nicolaides
    Last updated: 2025-07-13 posted on 2025-07-11

    PhD Student in 5G and Next Generation Communication Security
    University of Sheffield
    We are offering a Ph.D. Opportunities at the University of Sheffield, UK. The candidates will have opportunities to work in Sheffield (UK). Requirements for Ph.D. Position • Completed Master’s degree (or equivalent) at a top university in information security, computer science, applied mathematics, electrical engineering, or a similar area • Research experience (such as publishing papers as a first author in reputable venues) • Self-motivated, reliable, creative, can work in a team and want to do excellent research on challenging scientific problems with practical relevance. Desire to publish at top venues (CORE rank A*/A) for information security/applied cryptography (e.g., TDSC, TIFS, S&P, CCS, NDSS, USENIX SEC), ideally on security protocols and secure computation How to apply? Please send me your CV with detailed information. For the Postdoc position, please send three of your best papers. Contact: Dr Prosanta Gope (p.gope@sheffield.ac.uk) Closing date for applications: Contact: Dr Prosanta Gope (p.gope@sheffield.ac.uk)
    Contact: Dr. Prosanta Gope (p.gope@sheffield.ac.uk)
    Last updated: 2025-07-03 posted on 2025-07-03

    Quantum Cybersecurity Engineer
    LuxQuantum, Esch-sur-Alzette, Luxembourg

    Company Overview

    We’re LuxQuantum, a dynamic startup tackling the exciting and complex challenges in quantum cybersecurity. Our goal is to build innovative solutions that address interoperability bottlenecks in quantum communications by seamlessly integrating quantum key distribution (QKD) and post-quantum cryptography (PQC). We’re looking for someone to join our small team—not just as a colleague but as a friend—to help lead this mission.

    We’re more than a company; we’re a team of innovators, learners, and dreamers. If you want to explore cutting-edge technology with people who genuinely enjoy working together, we’d love to meet you!


    Role Overview

    As a Quantum Cybersecurity Engineer, you’ll play a key role in developing solutions to tackle interoperability issues in quantum cybersecurity. Think of yourself as both a problem-solver and a collaborator, directly contributing to the creation of leading-edge quantum cybersecurity solutions in an environment where every voice matters.


    Contact: contact@luxquantum.lu
    Last updated: 2025-07-03 posted on 2025-07-01

    Post-Doc, Assistant Professor, Associate Professor, Full Professor
    Cryptography Theory and Technology Research Laboratory of Institute of Information Engineering, CAS

    We are seeking excellent researchers to join the Cryptography Theory and Technology Research Laboratory at IIE. Applicants are encouraged to apply to work on one of the following areas:

    • Post-Quantum Cryptography
    • Fully Homomorphic Encryption
    • Zero-Knowledge Proof
    • Symmetric-Key Cryptography
    And we are open to considering other areas of cryptography.

    Positions at PostDoc, Assistant/Associate/Full Professor levels are available. Initial appointments are normally made on a fixed-term contract. Subsequent contract renewal, promotion and tenure all follow standard practices.

    Application Materials Required:

    1. Curriculum Vitae
    2. 1-5 Representative publications
    3. Research statement

    Review of applications will begin July 1, 2025 and continue until positions are filled.

    Contact: Xianhui Lu (luxianhui@iie.ac.cn); Yi Deng (deng@iie.ac.cn); Song Tian (tiansong@iie.ac.cn)
    Last updated: 2025-07-01 posted on 2025-07-01

    MS and PhD Positions in Applied Cryptography and ML/AI Security
    National Sun Yat-sen University, Department of Computer Science and Engineering; Kaohsiung, Taiwan
    Applications are invited for the MS and PhD positions at the Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan. The successful candidate will work at the Cryptology and Network Security Lab under the guidance of Dr. Arijit Karati on diverse topics in applied cryptology and network security.
  • Candidates for the applied cryptography domain must comprehend formal security analysis, secure coding, and effective security integration in the application domains.
  • Candidates for the ML/AI domain, must comprehend search/optimization algorithms, classification, regression, and other essential aspects, including backdoor attacks/data poisoning, model inversion, adversarial attack, and membership Inference.

    Responsibilities: Apart from academic work, students must be involved in several activities in a group or individually, such as (not limited to):
  • Design and implementation of safety protocol.
  • Assesment of the security and performance metric.
  • Research meeting with the supervisor.

    Requirements: (02 MS and 02 PhD positions)
    Apart from the university's basic admission policies (https://cse.nsysu.edu.tw/?Lang=en), students are desired to have the following key requirements:
  • Strong motivation on cryptography or AI security.
  • Knowledge of modern technology.
  • Knowledge of field-wise basic mathematics.
  • Knowledge of at least two programming languages, such as Python/Java/C/C++.
  • Master's thesis must match respective research fields. (for PhD positions)

    Scholarship:
  • Under the university policy.
  • Project funding (availability based on the performance of master's and Ph.D. students).

    What students can expect:
  • Cooperation from the supervisor and lab mates.
  • The rich culture in research and related activities.
  • Flexibility in communication, e.g., English.

    Submit your detailed CV by August 30, 2025.

    Application Deadline: September 30, 2025

  • Contact: Arijit Karati (arijit.karati@mail.cse.nsysu.edu.tw)
    Last updated: 2025-06-30 posted on 2025-06-30

    Post-doc position in applied cryptography
    National Sun Yat-sen University, Department of Computer Science and Engineering; Kaohsiung, Taiwan
    Applications are invited for the Post-doc position in applied cryptography and network security at the Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan. Applicants with expertise in at least one of the following areas are preferred: post-quantum cryptography, automotive security, developing novel cryptographic primitives and protocols, side-channel analysis, and machine-learning techniques for safety applications. Applicants require knowledge of formal security analysis, secure coding, and the practical integration of domain security into application domains.

    Essential Qualifications:
  • PhD degree in CSE/Mathematics/IT/electrical engineering with a specialization in Information/Network Security from a reputable Institution (preferably ranked within the QS WUR 500).
  • Outstanding track record of publications in Journals (preferably JCR-Q1 or prestigious IEEE journals) and security-related conferences.

    Application Deadline: 15-08-2025

  • Contact: Arijit Karati (arijit.karati@mail.cse.nsysu.edu.tw)
    Last updated: 2025-06-30 posted on 2025-06-30

    Post-doc / research engineer
    CEA-List, France (Saclay or Grenoble)
    Context Our team develops pre-silicon analysis tools to: 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security, for a given attacker model, of a system embedding hardware/software countermeasures against fault injections. These tools implement a methodology that has shown to be successful to find microarchitectural vulnerabilities and/or prove the robustness, for a given fault model, of various RISC-V based processors [1]. For instance, we have formally proven the security of OpenTitan's processor to single bit-flip injections [2].

    [1] S. Tollec et al. μArchiIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023

    [2] S. Tollec et al.. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. TCHES 2024

    Objectives

    Your main missions will be:

    - To design and extend our pre-silicon methodology and associated tools to support different secured processors. In particular, leverage the specificities of the countermeasures embedded by such secured processors to speedup analysis techniques, but also integrate in our methodology and tools post-synthesis netlist level analyses of hardware architectures.

    - To participate to a project-scale experimental evaluation aiming to fill the gap between pre-silicon tools and post-silicon security evaluations.

    Location Saclay (Paris area) or Grenoble.

    Requirements PhD or a Masters’s Degree in Electronics or Computer Science. Excellent interpersonal and communication skills, and a solid background in any of the following fields is expected: computer architecture, programming languages, formal methods, cyber-security. Knowledge or French (spoken or written) is not required but may be helpful on a day-to-day basis.

    Application Please send the following documents: CV, cover letter (in French or English), transcrpit of records

    Contact: Mathieu Jan (mathieu.jan@cea.fr) and Damien Couroussé (damien.courousse@cea.fr). Reviewing of applications will continue until the position is filled.
    Last updated: 2025-06-18 posted on 2025-06-16

    Phd student
    COSIC, KU Leuven
    COSIC is looking for a motivated researcher who fit into the following profile: PhD candidate to work on Hardware implementations secured against physical attacks.

    Job Description : The position is funded by Flemish Research Funds (FWO). The PhD candidate will work in collaboration with the research group of Prof. Amir Moradi from University of Darmstadt. The research program is defined in a joint research project jointly funded by FWO (Belgium) and DFG (Germany). The title of the project is MatSec – Maturing Physical Security Models in Realistic Scenarios. The PIs of the project in COSIC are Dr. Svetla Nikova and Prof. Vincent Rijmen.

    Security models for side-channel analysis and combined attacks for HW implementations exist, but they often make unrealistic assumptions or are inaccurate in modeling physical effects. This results in countermeasures that are either overdesigned, unnecessarily increasing the costs, or still vulnerable to attacks when deployed. The main objective of this project is to provide security models that accurately abstract attacks against cryptographically secured physical devices and that allow for the creation of efficient countermeasures on hardware guaranteeing security in practice.

    We are looking for people to work on the following topics: (1) Realistic side-channel models capturing the circuit’s real behavior and achieving a balance between security and efficiency and providing improved countermeasures. (2) Security models and randomness generation: to develop procedures for constructing masked HW/SW implementations with low randomness requirements (3) Combined security models extending known fault/combined adversaries.

    Specific Skills Required: For the PhD position: The candidates should hold a master’s degree in Engineering, Mathematics or Computer Science with very good grades, very good knowledge and experience with programing with C/C++ and Verilog/VHDL. Preferably to have passed courses in Cryptography and/or Computer Security.

    Contact: Dr. Svetla Nikova
    Last updated: 2025-06-18 posted on 2025-06-16

    Research Fellow – Quantum / Post-Quantum
    Input Output Group (IOG)

    Who we are: IOG is a technology company focused on blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include the Cardano blockchain, as well as other products in the areas of decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain and Web3 technology globally.

    What the role involves: As a Research Fellow at IOG, you will be responsible for conducting high-quality research, combining your well-developed research skills with a passion for collaborating in innovative research projects. We are looking for someone who is interested in blockchain technologies specifically to conduct research on post-quantum cryptographic solutions for enhancing the security and scalability of decentralized ledger technologies, and potentially harnessing quantum computation to develop novel, future-proof cryptographic protocols. You will join our team of research fellows contributing directly to our diverse development efforts.

    Further information: For additional information as well as submitting your application, follow the link in the ad title.

    Contact: Sheridan Williams, sheridan.williams@iohk.io (for general questions)
    Last updated: 2025-06-15 posted on 2025-06-13

    Tenure-Track in hardware security of embedded system
    Jean-Monnet University, Saint-Etienne, FRANCE
    The Jean-Monnet University (UJM) at Saint-Etienne in France is now seeking excellents candidates for tenure-track (Associate Professor) position starting in november 2025.

    This is a special position in France, as it is a first 5-year contract, and if the indicators are met the position automatically becomes that of a Full Professor. For 5 years, the person recruited is only required to carry out 64 hours of teaching per year, with dedicated financial resources. It's a research-oriented position in one of Europe's leading hardware security teams (the SESAM team at Laboratoire Hubert Curien).

    The objective of this position is to ensure the long-term security of embedded systems by developing countermeasure mechanisms that can defend against sophisticated attacks at the intersection of software and hardware, starting from the design phase. This will result in new protection concepts being proposed that take into account the evolving cyber threat and the complexity of attack paths that exploit vulnerabilities in both software and hardware.

    We are therefore looking for excellent candidates with at least 5 years' post-doctoral experience and an excellent list of scientific contributions and publications in the field of hardware security.

    Contact: Prof. Lilian BOSSUET - lilian.bossuet@univ-st-etienne.fr
    Last updated: 2025-06-15 posted on 2025-06-10

    Two Phd Studebnt Positon isn Hardware Secueity and Poast Quantom Cryptogrpahy
    University of Idaho
    I am currently looking for two motivated PhD students to join my research group. My lab will focus on trustworthy IC design, secure EDA, hardware Trojans, reverse engineering, circuit obfuscation, cryptographic accelerators, PUFs, TRNGs, and the use of LLMs, MPC, and ZKPs in hardware security. Ideal candidates should have a background in Electrical or Computer Engineering, Computer Science, or a related field, with experience or a strong interest in VLSI design, EDA tools, and hardware security concepts. Programming skills in Verilog, SystemVerilog, C++, and Python are highly valued. These fully funded positions offer access to advanced EDA tools, collaborative industry opportunities, and support for publishing at top-tier venues. To apply, please send your CV and academic transcripts to xaainulabideen@gmail.com. Feel free to reach out with any questions or to share this opportunity!
    Contact: Zain Ul Abideen
    Last updated: 2025-06-09 posted on 2025-06-08

    Fully-Funded Ph.D. students
    Illinois Institute of Technology, Department of Computer Science; Chicago, USA

    I will join the Department of Computer Science at Illinois Tech as a tenure-track Assistant Professor in Fall 2025. My research focuses on Applied Cryptography, especially advancing cryptography to solve security and privacy issues in existing as well as emerging real-world applications. Please see (https://yanxue820.github.io) for more details about me.

    I'm hiring 2-3 Ph.D. students starting in spring/fall 2026 with the following research areas:
    • Secure Multi-Party Computation (MPC): MPC is a crucial technique to enhance data collaborations while protecting sensitive information. Our research provides highly efficient MPC solutions for real-world application scenarios (such as healthcare, risk management, biorecognition, etc).
    • Blockchain: We build foundational infrastructures to ensure security and privacy in blockchain ecosystems. Our research addresses critical challenges, such as resource-constrained users, data confidentiality and verifiability, decentralized services, etc.
    • Intersection between Cryptography and Machine Learning: We advance and accelerate cryptography techniques to protect the data/model security and privacy in machine learning. Conversely, we leverage machine learning techniques to assist in proving the security of cryptographic protocols.
    Qualifications:
    • Fully-funded Ph.D. students (Spring/Fall 2026) passionate about research
    • Bachelor's or Master's degree in CS, Math, or related disciplines
    • Solid programming/mathematical skills and/or a background in cryptographic research or study
    • Curious and eager to explore new ideas and technologies
    Contact: Send the following to jiayanxue820@gmail.com:
    • CV or resume
    • Academic transcripts (unofficial is okay)
    • Brief statement of research interest (informal is okay)
    Please use the Email subject: Spring/Fall 2026 Application – Your Name – University

    Last updated: 2025-05-23 posted on 2025-05-22

    PhD and Post-Doc in Post-Quantum Cryptography
    Monash University; Melbourne, Australia
    The cybersecurity group at Monash Information Technology has openings for PhD and PostDoc positions, fully funded by an Australian Research Council (ARC) project. We are looking for candidates in design, analysis, implementation and/or application aspects of the following areas.

    Topics of interest

    • Zero-knowledge proof (ZKP)
    • SNARKs
    • Lattice-based cryptography
    • Fully-homomorphic encryption (FHE)
    • Some combination of the above
    The candidates will have the opportunity to work in an excellent research environment and collaborate with experts in cryptography and with CryptoLab industry partners.

    Why join Monash?

    Monash University is among the leading universities in Australia and is located in Melbourne, one of the most liveable cities in the world. See more at: https://mfesgin.github.io/supervision/

    PhD Position

    Applicants should have (or be expected to complete in the next 6 months) a masters or honours equivalent degree in mathematics, computer science, cryptography, engineering or closely related areas. Some research experience in cryptography is required.

    Apply by filling out the following form: https://docs.google.com/forms/d/e/1FAIpQLSetFZLvDNug5SzzE-iH97P9TGzFGkZB-ly_EBGOrAYe3zUYBw/viewform

    PostDoc Position

    Applicants should have (or be expected to complete in the next 6 months) a PhD in mathematics, computer science, cryptography, engineering or closely related areas. Research experience in at least one of lattice-based cryptography, zero-knowledge proofs, or FHE is required.

    Apply by filling out the following form: https://docs.google.com/forms/d/e/1FAIpQLSf8T2xlMbtKB6B7Lqn_VvV1-PpRzQrcl2Xe8oRnNZQVHqiPSg/viewform

    Contact: Muhammed Esgin
    Last updated: 2025-05-23 posted on 2025-05-22

    Ph.D. and Post-doc Positions at DGIST Crypto Group
    DGIST, Daegu, South Korea
    DGIST Crypto Group has multiple fully funded PhD and postdoc positions open in various areas of cryptography, including:
  • Post-Quantum Cryptography
  • Symmetric-Key Cryptography
  • Multi-Party Computation
  • Privacy-Enhancing Technologies such as Differential Privacy or Fully Homomorphic Encryption

    PhD applicants should have a strong background in cryptography, mathematics, theoretical computer science, or related areas. Postdoc applicants should have a proven publication record in established venues in cryptography or security (e.g., IACR conferences/journals, CCS, USENIX Security, IEEE S&P). Salary will be determined according to DGIST's internal regulations and the applicant’s experience, with top-level compensation guaranteed based on qualifications and achievements. The position will remain open until filled.

    About DGIST: DGIST is a rapidly growing institution with strong global recognition. DGIST ranked 33rd in the world and 1st among new universities in the Times Higher Education (THE) Emerging University Rankings. It recently placed 7th globally in research power in its first QS World University Rankings participation and ranked 12th in THE’s World University Rankings for small universities (under 5,000 students).

  • Contact: Contact: Youngsik Kim (ysk@dgist.ac.kr), Wonseok Choi (wonseok@dgist.ac.kr)
    Last updated: 2025-05-23 posted on 2025-05-21

    Full PhD scholarship
    University of Southern Queensland, Australia.
    Multiple full PhD scholarship positions are available at University of Southern Queensland, Australia, in the field of Artificial Intelligence (AI) Security, or Artificial Intelligence, or Cyber Security.

    Requirements: Bachelor or Master degree holder in a field relevant to Artificial Intelligence or Cyber Security, preferably with publications track records.

    If interested, please send you CV (with publication/s listed) to Zhaohui.Tang@unisq.edu.au .
    Contact: If interested, please send you CV (with publication/s listed) to the following email address: Zhaohui.Tang@unisq.edu.au .
    Last updated: 2025-05-15 posted on 2025-05-15

    Post-Doctoral Researcher Position at the Cryptography, Security & Privacy Research Group
    Koç University, İstanbul, Türkiye
    Cryptography, Security & Privacy Research Group at Koç University has one opening at the post-doctoral researcher level. Accepted applicants may receive competitive salary, housing (accommodation) support, health insurance, computer, travel support, and lunch meal card.

    Your duties include performing research on cryptography, security, and privacy in line with our research group's focus, as well as directing graduate and undergraduate students in their research and teaching. The project funding is related to applied cryptography focusing on privacy-preserving and adversarial machine learning.

    Applicants are expected to have already obtained their Ph.D. degrees in Computer Science or related discipline with a thesis topic related to the duties above.

    For more information about joining our group and projects, visit

    https://crypto.ku.edu.tr/

    Submit your application via email including
    • full CV,
    • transcripts of all universities attended,
    • 1-3 sample publications where you are the main author,
    • a detailed research proposal,
    • 2-3 reference letters sent directly by the referees.

    Application deadline is 31 July 2025 and position start date is 1 September 2025.

    Contact: Prof. Alptekin Küpçü
    https://member.acm.org/~kupcu

    Last updated: 2025-05-12 posted on 2025-05-09

    Researcher (PhD student or Post-Doc)
    University of Klagenfurt; Klagenfurt, Austria

    We are seeking to recruit a researcher for an interdisciplinary project on notions of "explainability" in the context of side channel evaluations (considering technical approaches used in both FIPS style as well as CC style evaluations).

    The project will run up to three years. It will require a mix of technical skills (we wish to propose and evaluate novel approaches to gather evidence for/against security of implementations given access to side channels) as well as an interest in developing social science research methodologies (we plan to engage with evaluation labs but also vendors to research useful notions of "explainable leakage").

    The project will be co-supervised by Prof. Elisabeth Oswald and Prof. Katharina Kinder-Kurlanda; both situated in the interdisciplinary Digital Age Research Centre at the University of Klagenfurt (Austria).

    We seek applicants with a mathematical/technical background. For applicants wishing to pursue a PhD, we expect that they have done a MSc/Bsc thesis on side channels/faults with a practical focus. For applicants who already possess a PhD, we expect a strong track record in applied cryptography with some publications in the area of side channels/faults in top venues.

    The post holder will be expected to work in Klagenfurt (Austria), and to be able to do short term visits to evaluation labs/vendors throughout Europe.

    In order to apply, please send a short CV, including your scientific outputs (e.g. papers, talks, seminars, open source artefacts, etc.), as a single pdf file to Elisabeth.Oswald@aau.at. If you have questions, or wish to discuss informally, please contact Elisabeth Oswald.

    We will review applications as they arrive and invite potentially suitable candidates for an online interview as soon as possible, with the intention to fill the post once a suitable candidate has been identified.

    Contact: Elisabeth Oswald (Elisabeth.Oswald AT aau.at)
    Last updated: 2025-05-02 posted on 2025-04-30

    Researcher/s, Developer or Post Doc
    China Telecom Overseas Talent Recruitment Program

    Job Description: 1) Lead or participate in technical research and applications for data privacy, data security, cryptography and data circulation system, including performance upgrades for the multi-privacy-preserving computing platform, software-hardware integration architecture design, trusted data circulation infrastructure development and real-world industrial applications. 2) Drive R&D of privacy-preserving technologies for LLM in distributed scenarios, including cross-domain secure training/fine-tuning/inference methods, and promote industry-leading security solutions. 3) Participate in planning and capability building for data element infrastructure, aligning with strategies to formulate technical roadmap and implement projects. 4) The positions are available immediately until filled, and the working location can be Beijing or Shanghai.

    Basic Requirements: 1. Specialization: Cryptography, data security and privacy, artificial intelligence, cybersecurity, computer software development, etc. 2. Age: Under 35 years old. 3. Education: Ph.D. or Post Doc. 4. Experience: 3 years of overseas work experience (negotiable) with globally renowned employers.

    Technical Requirements: 1. Expertise in cryptography, federated learning, LLM and data security/privacy, or software-hardware integration. Candidates must meet at least one of: a) Proficiency in deep learning/ML/NLP fundamentals, with experience in LLMs, distributed training security, frameworks (TensorFlow/PyTorch). b) In-depth understanding of applied cryptography, including but are not limited to the following sub-areas: secure multi-party computation, lattice-based cryptography, cryptography and its application in AI. 2. PhD or postdoctoral experience from renowned institutions or enterprises. Familiarity with applied cryptography domains (MPC, lattice-based cryptography, post-quantum crypto, homomorphic encryption, etc.), with ≥3 publications in top journals/conferences.

    Contact: Dr. He, 17316480416@189.cn
    Last updated: 2025-04-15 posted on 2025-04-15

    PhD and Postdoc on Hardware Security
    Technische Universität Darmstadt, Germany
    We are looking for outstanding and highly motivated PhD students (and Postdocs) to work on topics related to hardware security, including:

    • Side-channel analysis attacks

    • Fault-injection attacks

    • Countermeasures against physical attacks

    PhD candidates should have an M.Sc. degree in IT-Security, Electrical Engineering, Computer Engineering, Computer Science, or Applied Mathematics with excellent grades. Being familiar with cryptography concepts and low-level programming is a must. Knowing a hardware design language, e.g., VHDL/verilog, is a plus.

    Postdoc applicants should habe a proven track record by having published their research result in venues known in cryptography, IT security, and hardware security (e.g., IACR venues, ccs, usenix security, IEEE S&P).

    In order to apply, please send your CV, transcripts of records (both BSc and MSc) in a single pdf file to amir.moradi@tu-darmstadt.de

    Review of applications starts immediately until the positions are filled.

    Contact: Prof. Amir Moradi amir.moradi@tu-darmstadt.de
    Last updated: 2025-04-15 posted on 2025-04-08

    Post-docs on the Provable Security of Symmetric Cryptography
    Xiamen University, Xiamen, China

    Located in Xiamen, which is one of China’s top ten livable cities, Xiamen University is generally acknowledged as one of the most beautiful universities in China. It has been perennially regarded as one of the top academic institutions in Southern China. With its lovely campus, profound cultural foundation, and great research atmosphere, Xiamen University provides an ideal environment for academic research and professional development.

    Xiamen University is now seeking candidates to fill two post-doc positions on the provable security of symmetric-key cryptography, with a tentative duration of 2 years. Potential research topics include, but are not limited to, the following directions:

    • Authenticated encryption and message authentication codes with new security features, e.g., leakage-resistance, key-committing, high security.
    • Provable security and generic attacks of hash functions.
    • Security analysis and proofs of more general modes of operation in real-world applications/standards.

    Candidates with proven records of publications in established venues in cryptography/security are encouraged to apply. Candidates are invited to send a resume and motivation letter to Dr. Yaobin Shen (yaobin.shen [at] xmu.edu.cn).

    Contact: Dr. Yaobin Shen (yaobin.shen [at] xmu.edu.cn)
    Last updated: 2025-04-07 posted on 2025-04-06

    Research Assistant (UI/UX Engineer)
    The Research Centre for Blockchain Technology(RCBT), The Hong Kong Polytechnic University, Hong Kong
    We are seeking motivated and dedicated Research Assistant to join our team. The details are as follows:

    Key Responsibilities:
    • Design and implement user interfaces for web and mobile applications
    • Create wire frames, prototypes, and user flows
    • Conduct user research and usability testing
    • Collaborate with product managers and researchers
    • Develop and maintain design systems
    • Optimize user journeys and experiences
    • Create responsive designs for multiple platforms
    • Perform any other duties as assigned by the project leader, the Head of Unit or their delegates
    Technical Requirements:
    • Bachelor's degree in Design, Computer Science, or related field
    • 3+ years experience in UI/UX design
    • Proficient in design tools: Figma, Adobe XD, Sketch
    • Experience with prototyping tools
    • Knowledge of HTML, CSS, and basic JavaScript
    • Portfolio demonstrating UI/UX projects
    • Strong understanding of user-centered design principles
    • Experience with responsive design
    Preferred Skills:
    • Experience with web3 or blockchain products
    • Knowledge of user research methodologies
    • Familiarity with agile development processes
    • Experience with motion design/Adobe After Effects
    • Understanding of accessibility standards
    For more details and to apply, please visit: https://jobs.polyu.edu.hk/job_detail.php?job=250306003
    Contact: Elaine Chow (blockchain.rcbt@polyu.edu.hk)
    Last updated: 2025-03-30 posted on 2025-03-29

    Research Assistant (Junior Full Stack Developer)
    The Research Centre for Blockchain Technology(RCBT), The Hong Kong Polytechnic University, Hong Kong
    We are seeking motivated and dedicated Research Assistant to join our team. The details are as follows:

    Key Responsibilities:
    • Develop and maintain web applications using modern frameworks
    • Write clean, maintainable, and efficient code
    • Work on both frontend and backend development tasks
    • Collaborate with senior researchers and product teams
    • Participate in code reviews and technical discussions
    • Assist in database design and management
    • Debug and fix software issues
    • Perform any other duties as assigned by the project leader, the Head of Unit or their delegates
    Technical Requirements:
    • Bachelor's degree in Computer Science, Engineering, or related field
    • Knowledge of JavaScript/TypeScript
    • Experience with frontend frameworks (React.js, Vue.js)
    • Basic understanding of backend development (Node.js, Java, or Python)
    • Familiarity with HTML5, CSS3
    • Basic knowledge of SQL databases
    • Version control with Git
    Preferred Skills:
    • Experience with REST APIs
    • Understanding of web security principles
    • Knowledge of cloud services (AWS, Azure, or GCP)
    • Basic understanding of CI/CD pipelines
    • Experience with agile development methodology
    For more details and to apply, please visit: https://jobs.polyu.edu.hk/job_detail.php?job=250306002
    Contact: Elaine Chow (blockchain.rcbt@polyu.edu.hk)
    Last updated: 2025-03-30 posted on 2025-03-29

    Researcher/s, and Developer
    University of Southern Queensland, Australia - work can be done remotely within Australia.
    Position 1: One or two casual researchers in the field of Privacy-preserving Machine Learning, for a few hundred hours each (the exact number of hours is negotiable and depends on the availability of the candidate/s).
    Expectations: to produce top-tier journal paper/s in the field of Privacy-preserving Machine Learning.

    Position 2 : A casual developer with the following skill set required, for a few hundred hours (the exact number of hours is negotiable and depends on the availability of the candidate):
    1. Swift (for a task specifically for iOS), and
    2. Java (for Android app development), and
    3. TensorFlow.js (for a specific task), and
    4. Java or PHP or C# (for web page development), and
    5. HTML and CSS and JavaScript (for UI design).
    Expectations : to continue with some existing development work by polishing and finalizing the mobile app development.

    Note : The successful candidates for both the positions above must be physically based in Australia with working rights in Australia when the work is being done.
    Contact: Dr. Zhaohui (Linda) Tang at:
    Zhaohui.Tang@unisq.edu.au

    Last updated: 2025-03-25 posted on 2025-03-23

    Post-Doc
    UCSD Cryptography Group, Dept of Comp Sci & Eng, La Jolla, CA, USA

    Applications are sought for a post-doc position in the cryptography group (CSE Department, UCSD) with Mihir Bellare. Dates are flexible.

    Topics of interest include application-relevant theory of two-party computation that in particular continues work such as https://eprint.iacr.org/2024/1476, and provable security for symmetric cryptography, in particular authenticated encryption. Open to considering other topics as well.

    Needed background is experience in, and facility with, formal definitions and proofs in the provable-security style.

    Apply: To apply, please complete this Google form: https://docs.google.com/forms/d/1iOOKWI1kfU348b6Aw53FILEOu5qIDOnUoB9ngyK5wh8

    Contact: Mihir Bellare mbellare AT ucsd DOT edu
    Last updated: 2025-03-19 posted on 2025-03-18

    PhD on Symmetric Cryptography over Prime Fields and Integer Rings
    Eindhoven University of Technology (TU/e)
    Eindhoven University of Technology (TU/e) is among the top research universities in the Netherlands, specialized in engineering science and technology.

    We are currently looking for an outstanding candidate for a 4-year PhD researcher position in the area of symmetric-key cryptography. The successful candidate will work under the supervision of Dr. Lorenzo Grassi, towards a PhD degree from the Eindhoven University of Technology.

    The research topics will focus on
    • design and implementation of dedicated symmetric-key primitives operating over prime fields and/or integer rings, that can provide efficient solutions for rising applications of practical importance such as Format Preserving Encryption, Multi-Party Computation, Homomorphic Encryption, and Zero-Knowledge;
    • analyze the security of those symmetric-key primitives, with the goals to improve the current cryptanalytic results, and to develop new innovative security arguments.
    We are looking for a candidate who has recently completed, or is about to complete, a master's degree in cryptography, mathematics, computer sciences, or a closely related field. The master's degree must have been awarded, with good results, before their start in the PhD position. The candidate must be highly motivated and be able to demonstrate their potential for conducting original research in cryptography.

    The vacancy is open until a suitable candidate has been found. Applications will be screened continuously, and we will conclude the recruitment as soon as we find the right candidate. The starting date is negotiable.

    Interested and qualified candidates should apply at https://jobs.tue.nl/en/vacancy/phd-on-symmetric-cryptography-over-prime-fields-and-integer-rings-1152915.html
    Contact: Dr. Lorenzo Grassi (l.grassi@tue.nl)
    Last updated: 2025-03-15 posted on 2025-03-13

    Ph.D. student
    Télécom Paris, Paris, France
    As part of a collaborative project on data protection, we are recruiting a Ph.D. student to carry out research on advanced cryptography (e.g. homomorphic encryption, multiparty computation). Candidates should have a strong background in cryptography. The Ph.D. thesis must start before January 2026.
    Contact: Sébastien Canard (sebastien.canard@telecom-paris.fr), Qingju Wang (qingju.wang@telecom-paris.fr)
    Last updated: 2025-03-19 posted on 2025-02-26