Open Positions in Cryptology
Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.
Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.
This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.
Post-doctoral fellowship
University of St. Gallen, Switzerland
First Deadline: 10th of August. As a first selection stage a cv and research statement need to be sent to Prof. Mitrokotsa.
Last updated: 2022-08-05 posted on 2022-08-03
Principal Engineer
Qrypt
Last updated: 2022-08-05 posted on 2022-08-03
Applied Cryptography Research Engineer
Silence Laboratories, Singapore
We are looking for self-motivated and talented individuals to design best and ready to be deployed cryptographic protocols for decentralized authentication. You will work with a team of engineers, product managers, marketing managers, and salespeople from different backgrounds who are challenging the future of authentication in web3. You will play a crucial role in the code algorithm design team.
Join us to reinvent the future of cybersecurity through innovative mindset.
Responsibilities:
- Design and implement cryptographic protocols
- Optimize threshold signature schemes acorss platforms
- PhD or Masters in Applied Cryptography
- Familiarity with elliptic curve cryptography, signature schemes, zero-knowledge proofs, encryption, etc.
- Ability to understand and build new cryptographic primitives
- Proficient in a modern high level language Python, Ruby, or Go.
- Self-motivated & self-organized
- Experience with distributed systems and large scale engineering challenges.
- Experience in securing digital assets and cryptocurrencies
Last updated: 2022-08-05 posted on 2022-08-03
Lecturer/Senior Lecturer in Cryptography
University of Wollongong, Australia
Last updated: 2022-08-03 posted on 2022-08-02
FHE Researcher (Post-doc)
Okinawa Institute of Science and Technology Graduate University
- Conduct research on state-of-the-art FHE schemes.
- Conduct Research on new Verifiable Computation (VC) schemes applied to FHE
- Design and implementation of new FHE and VC schemes.
Skills required for the job
- Knowledge of fully homomorphic encryption
- Deep understanding of lattice-based cryptography
- Knowledge on Verifiable Computation schemes is advisable
- Experience in C desired, C++, Rust or Go relevant as well
- Familiarity with hardware languages is a plus
- Solid engineering practices and processes, such as development and testing methodology and documentation
- Quick learner, geared towards implementation
- Eager to develop new skills and willing to take ownership of projects
Ph.D. degree in Cryptography, Applied Cryptography, Cybersecurity, Mathematics, Computer Science or Engineering
Last updated: 2022-08-03 posted on 2022-08-01
MPC Researcher (Post-doc)
Okinawa Institute of Science and Technology Graduate University
- Conduct research on state-of-the-art secure Multi Party Computation.
- Work on MPC building blocks such as,
- Secret Sharing schemes
- FHE
- Garbled Circuits
- Design and implementation of building blocks to utilize privacy-preserving cryptographic techniques to cloud computing and machine learning applications.
Skills required for the job
- Knowledge on secure Multi Party Computation.
- Knowledge in some of the following is valuable:
- Secret Sharing schemes
- Garbled Circuits
- FHE schemes
- Zero-Knowledge proofs
- Experience in C desired, C++, Rust and Python relevant as well.
- Solid engineering practices and processes, such as development and testing methodology and documentation.
- Quick learner, geared towards implementation. Eager to develop new skills and willing to take ownership of projects.
- Knowledge on machine learning would be valuable.
Ph.D. degree in Cryptography, Applied Cryptography, Cybersecurity, Mathematics or Computer Science or Engineering
Last updated: 2022-08-03 posted on 2022-08-01
Post-Quantum Protocol expert (post-doc)
Okinawa Institute of Science and Technology Graduate University
- Work on security protocols based on post-quantum primitives such as Public Key Encryption, Key Encapsulation Mechanism, Key Exchange, and Digital Signatures schemes
- Analyze existing and propose new protocol designs, with special focus on post-quantum IPSec, VPNs, SSL, TLS, etc.
- Focus on protocols for lightweight environment
- Test and benchmark optimized and secure implementations of different protocols and study the impact on real life applications
- Investigate security properties and performance-security trade-offs
- Conduct research on new and/or state-of-the-art attacks
- Design and implementation of hybrid (post quantum – classical) solutions
- Knowledge on cryptography and cybersecurity, in particular a solid background in network security, especially protocol design and evaluation
- Excellent with C, C++, Python, (JAVA and Rust will be valuable as well)
- Hard and organized worker, quick learner, geared towards implementation. Eager to develop new skills and willing to take ownership of projects
- Ph.D. degree in Cryptography, Applied Cryptography, Cybersecurity, Mathematics or Computer Science or Engineering
Last updated: 2022-08-03 posted on 2022-08-01
Post-quantum Cryptography Expert (Post-doc)
Okinawa Institute of Science and Technology Graduate University
As a Post-Quantum Cryptography expert, you will
- Work on all aspects of post-quantum primitives such as Public Key Encryption, Key Encapsulation Mechanism, Key Exchange, and Digital Signatures schemes
- Analyze existing designs
- Propose new designs
- Work on optimized and secure implementations in software and/or hardware platforms
- Investigate security properties and performance-security trade-offs
- Study the impact on lightweight environment
- Conduct research on new and/or state-of-the-art attacks
- Participate to the review and evaluation of post-quantum schemes that are under NIST scrutiny for standardization
- Design and implementation of hybrid (post-quantum – classical) solutions
- Contribute to the development of cryptographic libraries and security frameworks
Skills required for the job
- Knowledge on cryptography and cybersecurity, in particular at least one among
- Solid mathematical background on either lattices, codes, or multivariate systems
- Solid programming skills either in software or hardware
- Solid background in network security, especially protocol design and evaluation
- Excellent with C, C++, Python, (JAVA and Rust will be valuable as well)
- Hard and organized worker, quick learner, geared towards implementation. Eager to develop new skills and willing to take ownership of projects
Qualifications
- Ph.D. degree in Cryptography, Applied Cryptography, Cybersecurity, Mathematics or Computer Science or Engineering
Last updated: 2022-08-03 posted on 2022-08-01
Lecturer - Tenure Track - Cyber Security
University of Wollongong, Australia
Last updated: 2022-07-29 posted on 2022-07-27
R&D Engineer (Cryptography)
SupraOracles
Required
- Masters in Computer Science with specialisation in Cryptography from a reputed university or Bachelors with extensive crypto experience - Software Development experience - Proficiency in programming languages especially in Rust
Desired
- Working experience with Elliptic curve cryptography / bilinear pairings / ZK proofs
For more information, please visit our website: https://supraoracles.com/
Last updated: 2022-07-29 posted on 2022-07-27
Junior Researcher / PhD Student
Brandenburg University of Technology
Tasks:
- Active research in the area of intrusion detection systems (IDS) for critical infrastructures, secure cyber-physical systems, and artificial intelligence / machine learning for traffic analysis
- Implementation and evaluation of new algorithms and methods
- Cooperation and knowledge transfer with industrial partners
- Publication of scientific results
- Assistance with teaching
Requirements:
- Master’s degree (or equivalent) in Computer Science or related disciplines
- Strong interest in IT security and/or networking and distributed systems
- Knowledge of at least one programming language (C++, Java, etc.) and one scripting language (Perl, Python, etc.) or strong willingness to quickly learn new programming languages
- Linux/Unix skills
- Knowledge of data mining, machine learning, statistics and result visualization concepts is of advantage
- Excellent working knowledge of English; German is of advantage
- Excellent communication skills
Applications containing the following documents:
- A detailed Curriculum Vitae
- Transcript of records from your Master studies
- An electronic version of your Master thesis, if possible should be sent in a single PDF file as soon as possible, but not later than 15.08.2022 at itsec-jobs.informatik@lists.b-tu.de
itsec-jobs.informatik@lists.b-tu.de
Last updated: 2022-07-29 posted on 2022-07-26
Research Fellows & Research Assistants
SUTD, Singapore
We are looking for postdocs / research fellows with expertise on cybersecurity in general and CPS security in particular. The candidates should have track record of strong R&D capability, with publications at leading security conferences. The candidates familiar with shipboard OT systems will be considered with the priority. Candidate working in the current position less than one year will not be considered (unless due to the end of contract). Fresh PhD graduates are welcome.
We are also looking for research assistants who should be 1) familiar with scripting languages like Python; 2) with knowledge on threat modelling and vulnerability assessment - to conduct vulnerability scan of the systems and analyse the threats; 3) familiar with tools like Wireshark, Metasploit, Ettercap, Nmap - to monitor network traffic, launch MITM attacks, scan for ports; 4) with hands on experience of Linux OS to execute commands and run scripts.
Only short-listed candidates will be contacted for interview. Successful candidates will be offered internationally competitive remuneration.
Interested candidates please send your CV to Prof. Jianying Zhou (http://jianying.space/).
Last updated: 2022-07-29 posted on 2022-07-26
Ph.D. Position in Cryptography
TU Darmstadt
Topics of particular interest include (but are not limited to):
- Leakage/tamper resilient cryptography
- Cryptography for blockchains and cryptocurrencies
- Multiparty computation & threshold cryptography
- Completed Master's degree (or equivalent) with excellent grades in computer science, mathematics or a similar area.
- Strong mathematical and/or algorithmic/theoretical CS background
- Good knowledge of cryptography. Knowledge in concepts of provable security is a plus.
- Fluent written and verbal communication skills in English
Review of applications starts immediately until the position is filled. For further information please visit: https://www.informatik.tu-darmstadt.de/cac/cac/index.en.jsp
Last updated: 2022-07-24 posted on 2022-07-22
PhD student Security & Trust - Connected, Cooperative, Automated Mobility
Huawei German Research Center, Munich
The ideal candidate would have background in probabilistic reasoning and logic or formal methods and understanding of security.
The position is connected to a new EU Project starting in September 2022 on Security and Trust in Connected, Cooperative, Automated Mobility (CCAM). The PhD candidate will be funded by the project and PhD topic will be connected directly to the research inside this project. Goal is to complete it in 3 years.
Research Topic
- Perform research and develop new solutions for Trust Management in the Next-Generation CCAM technologies.
- Contribute to new mechanisms for assessing dynamic trust relationship based on Zero Trust and Subjective Logic.
- Define a trust model and trust reasoning framework based on which involved entities can establish trust for cooperatively executing safety-critical functions.
- Contribute to the research and development of technologies in the upcoming domain of Connected, Cooperative and Automated Mobility (CCAM).
- Being involved in international initiatives including industry groups such as 5GAA, Gaia-X, DIF and Horizon Europe research projects.
- Completed master studies (or equivalent) in computer science, information technology, electrical engineering, or mathematics;
- Background in probabilistic reasoning and logic or formal methods
- Exposure and understanding of data protection and security development technologies;
- Good programming skill;
- Fluent in English;
Last updated: 2022-07-24 posted on 2022-07-22
Senior research associate and PhD positions in cryptography and quantum Information
Lucerne University of Applied Sciences and Arts
Candidates should have a strong background in IT security and cryptography and/or good software engineering skills; knowledge in quantum information is advantageous. Both junior and more senior candidates are considered. For junior candidates, there exists the possibility to combine the employment with enrollment in a study-programm towards a PhD or a Master of Science in Engineering (MSE).
Last updated: 2022-07-21 posted on 2022-07-21
Lecturer in Software Security
University of Surrey
This post offers an exciting opportunity for an appointment in the Secure Systems group. Suitable areas of expertise that complement and extend strengths of the group include (but are not limited to): software security, program analysis, formal verification of software/systems, practical system security, trusted systems, distributed systems, complex systems and networks, as well as the interface between security and machine learning.
Candidates to the post should have a PhD in a relevant subject or equivalent professional experience. An ability to secure research funding and produce high quality outputs and manage research projects and supervise research students is also required. It is expected that the post-holder will also contribute to high quality teaching in cyber security and fundamental topics in computer science at undergraduate and post-graduate level and to supervise undergraduate projects and dissertations.
The University and the Department specifically are committed to building a culturally diverse organisation and strongly encourages applications from female and minority candidates. The Department of Computer Science was awarded a Bronze Athena SWAN award, in recognition of our commitment to equality and diversity.
The University of Surrey is committed to providing an inclusive environment that offers equal opportunities for all. We place great value on diversity and are seeking to increase the diversity within our community. Therefore, we particularly encourage applications from under-represented groups, such as people from Black, Asian and minority ethnic groups and people with disabilities.
s.schneider@surrey.ac.uk
Last updated: 2022-07-21 posted on 2022-07-18
PhD positions in Applied Cryptography and Information Security (Fully funded)
University of St. Gallen, Switzerland
Research areas: Research areas include but are not limited to:
- Verifiable computation
- Secure Multi Party Computation
- Privacy-preserving authentication
- Cryptographic primitives
- Privacy-preserving biometric authentication
- A MSc degree in Computer Science, Applied Mathematics or a relevant field;
- Strong mathematical and algorithmic CS background;
- Excellent programming skills;
- Excellent written and verbal communication skills in English.
Starting date: By mutual agreement
Apply online: Send your cv, transcripts, motivation letter and research statement by email to Prof. Katerina Mitrokotsa
Last updated: 2022-08-04 posted on 2022-07-16
Post-Doc
Indian Institute of Technology Kharagpur
Lab websites:
1. http://cse.iitkgp.ac.in/resgrp/seal/
2. https://sites.google.com/view/hardware-and-cyber-physical-se/home?authuser=1
3. Youtube Channel: https://www.youtube.com/channel/UC-343QYYo1bhSGW1JLXDANA
Last updated: 2022-07-14 posted on 2022-07-14
Doctoral student positions
Ruhr-University Bochum and Max Planck Institute for Security and Privacy
- Security of smart contracts
- Formal verification of smart contracts
- Security of blockchain consensus protocols
- A Master’s degree or equivalent (or be close to completing one) in computer science, mathematics, or related fields.
- Outstanding candidates with a Bachelor’s degree will also be considered.
- Excellent communication/writing skills in English; knowledge of German is not required.
- An outstanding track record in classes related to IT security, cryptography, or formal methods/mathematics.
The positions are fully funded (100%) and paid according to the E-13 pay category. To apply, please send an email to both Dr. Schneidewind and Prof. Dr. Karame with the following documents in a single PDF:
- CV, including transcripts.
- A brief cover letter describing your research interests.
- Contact details of 2-3 potential references
Last updated: 2022-07-14 posted on 2022-07-13
Postdoctoral Researcher and Research Fellow positions in ICT (Cybersecurity, Cryptography, and More)
Helsinki Institute for Information Technology, Helsinki, Finland
The Helsinki Institute for Information Technology (HIIT) in cooperation with the Finnish Center for Artificial Intelligence (FCAI) invite applications for Postdoctoral Researchers for a term of two years with the possibility of a one year extension. HIIT offers a HIIT Postdoctoral Fellow position for two years, with the possibility of a one year extension. For more senior candidates, HIIT offers a HIIT Research Fellow position of three years, with the possibility of a two year extension. The length of the contract as well as the starting and ending dates are negotiable.
All excellent researchers in any area of ICT can be considered, but priority is given to candidates who support one (or more) of the HIIT strategic focus areas:
- Artificial Intelligence
- Computational Health
- Cybersecurity
- Data Science
- Foundations of Computing
Last updated: 2022-07-14 posted on 2022-07-12
Postdoctoral positions at CrIS Lab
Indian Institute of Science (IISc), Bangalore, India
The applicant is expected to have completed a PhD degree (recently) in Cryptography or a related subject with strong publication records. A background in theoretical aspects of secure multiparty computation and/or experience in coding for practical aspects of secure computation is expected. Postdoctoral fellows are expected to actively interact with PhD students and contribute to the lab's projects. The tenure of the position is for one year and can be extended further.
You can apply through and find further details regarding opportunities at CrIS here - https://www.csa.iisc.ac.in/~cris/opportunities.html
Last updated: 2022-07-14 posted on 2022-07-12
Research Assistantship (RA) position at CrIS Lab
Indian Institute of Science (IISc), Bangalore, India
This position is open for post-graduate (BTech/MSc/MS/MTech/Dual degree/Integrated Mtech) students interested in getting more research experience. Applicants who have credited a cryptography course in their home institute and/or who have worked on a related topic for their master's thesis are preferred.
You can apply through and find further details regarding opportunities at CrIS here - https://www.csa.iisc.ac.in/~cris/opportunities.html
Last updated: 2022-07-14 posted on 2022-07-12
Research Assistant / PhD Student or Postdoctoral Researcher
Chair of »Media Security« at Bauhaus-Universität Weimar
Research topics include:
- primitives for symmetric cryptosystems (block ciphers, hash functions, ...)
- algorithms for secret-key encryption, authentication, and authenticated encryption
- quantum algorithms and their application in attacks on symmetric cryptosystems
- hash-based signature schemes
- language-theoretic security methods for the secure communication protocols
perform research to further the research assistant's own scientific qualification, publish and present results at workshops and conferences, participate in teaching and the university's self-administration, supervise students, and assist with external funding proposals.
Hiring requirements:
- successfully completed university studies (diploma, master or equivalent) in computer science or a closely related field
- an excellent track record in classes related to cryptography or quantum algorithms, or in general excellent results in mathematics and theoretical computer science
- very good programming skills and very good knowledge of English, written and spoken
- willingness to imparting specialized knowledge to students, own familiarization with new research areas and to the presentation of scientific results at international conferences
- good knowledge of German is an advantage for carrying out teaching, but not required; also beneficial is experience with Linux, git, and LaTeX
Please send us your application with the usual documents (at least: cover letter, curriculum vitae, relevant degree certificates/grade overviews, research interests, if available: List of publications) and electronic contact details for at least two references by email (one PDF) or by post.
Deadline: August 31, 2022
Last updated: 2022-07-14 posted on 2022-07-12
PhD Position in Cryptography and Privacy Engineering
TU Darmstadt, Germany
Job description: You'll work in the collaborative research center CROSSING funded by the German Research Foundation (DFG). In our subproject E4 Compiler for Privacy-Preserving Protocols, we build compilers to automatically generate optimized secure multi-party computation protocols for privacy-preserving applications. See https://encrypto.de/CROSSING for details. You conduct research, implement prototypes, and publish&present the results at top venues. You'll participate in teaching and supervise thesis students & student assistants.
We offer: We demonstrate that privacy is efficiently protectable in real-world applications via cryptographic protocols. Our open and international working environment facilitates excellent research in a sociable team. TU Darmstadt is a top research university for IT security, cryptography and CS in Europe. Darmstadt is a very international, livable and well-connected city in the Rhine-Main area around Frankfurt. Knowledge of German is beneficial, but not required, and TU Darmstadt offers corresponding support.
Your profile:
- Completed Master's degree (or equivalent) at a top university with excellent grades in IT security, computer science, or a similar area.
- Extensive knowledge in applied cryptography/IT security and very good software development skills. Knowledge in cryptographic protocols (ideally MPC) is a plus.
- • Experience in hardware synthesis/compiler construction is beneficial.
- Self-motivated, reliable, creative, can work independently, and want to do excellent research.
- Our working language is English: able to discuss/write/present scientific results in English. German is beneficial but not required.
Last updated: 2022-07-14 posted on 2022-07-12
Senior MPC Researcher
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
Position: Senior MPC Researcher
Skills required for the job
Email: mehdi.messaoudi@tii.ae
Last updated: 2022-07-06 posted on 2022-07-06
Research Positions on Zero-Knowledge, Blockchain and MPC protocols
University of Edinburgh
Last updated: 2022-07-06 posted on 2022-07-04
Ph.D. student
Université Jean Monnet, Saint-Etienne, France
Université de Lyon, Université Jean Monnet, Saint-Etienne, France The Embedded System Security Group at University Jean Monnet (Saint-Etienne, France) is looking for motivated PhD students. We are looking for candidates to work on protection of implementation against physical attacks. This project aims to develop side-channel attacks and fault attacks against lightweight block-cipher and propose tailored countermeasures.
Your tasks:
Your profile:
Last updated: 2022-07-01 posted on 2022-07-01
Post-Doc
The Institute for Logic, Language and Computation, University of Amsterdam
Last updated: 2022-07-01 posted on 2022-06-30
Cryptanalyst - Constraint Solving
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Centre
Position: Cryptanalyst - Constraint Solving
Skills required for the job
Mehdi Messaoudi - Talent Acquisition Manager
Email: mehdi.messaoudi@tii.ae
Last updated: 2022-06-29 posted on 2022-06-28
Code-based Cryptanalysis Expert
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Centre
The position is in the asymmetric cryptanalysis team. The team currently consists of five senior researchers (post docs) and one PhD student. We cover a broad range of expertise in post-quantum cryptanalysis with experts on multivariate-, lattice-, and code-based systems. We are currently looking to support the team particularly on the coding side by a Code-based Cryptanalysis Expert.
Skills required for the job
Mehdi Messaoudi - Talent Acquisition Manager
Email: mehdi.messaoudi@tii.ae
Last updated: 2022-06-29 posted on 2022-06-28
PhD or Postdoc
CISPA Helmholtz Center for Information Security
Last updated: 2022-06-29 posted on 2022-06-27
PhD Positions
University of Tübingen, Department of Computer Science; Tübingen, Germany
Research Topics: Development and analysis of provably secure solutions for real-world problems. Topics of interest include (but are not limited to): privacy-enhancing technologies, privacy-preserving machine learning, efficient operations on encrypted data, processing of encrypted data in outsourced and untrusted environments, and TEE security and development.
Requirements: Master’s degree in Computer Science, Mathematics, or a related area by the time of appointment. Knowledge or interest in the areas of cryptography and machine learning.
Last updated: 2022-06-29 posted on 2022-06-27
1 year post-doc position offer
CRAN, LORIA, Nancy, France
Last updated: 2022-06-29 posted on 2022-06-27
PhD researcher
Graz University of Technology
We are looking for a full-time PhD researcher who will work on cryptographic hardware and software implementations. The researcher will be supervised by Dr. Sujoy Sinha Roy at IAIK, Graz University of Technology, Austria.
The Institute of Applied Information Processing and Communications (aka IAIK) is the largest university institute in Austria for research and education in security and privacy. It has been active in this field for more than 30 years and currently employs more than 60 researchers.
Responsibilities:
The PhD researcher will be working on Scientific research in the field of implementation and physical security aspects of novel cryptographic algorithms in the “Cryptographic Engineering” group within the “Secure Systems” area at IAIK.
Required Qualifications:
Please submit your application online: https://survey.tugraz.at/index.php/716487?lang=en
Last updated: 2022-06-22 posted on 2022-06-20
Assistant or Associate Professor in Computer Science - (FAC002415)
University of Houston Downtown
Last updated: 2022-06-22 posted on 2022-06-16
Postdoctoral in Quantum Cryptography
Mohammed VI Polytechnic University (UM6P), Benguerir. Morroco
Located at the heart of the future Green City of Benguerir, Mohammed VI Polytechnic University (UM6P), a higher education institution with an international standard, is established to serve Morocco and the African continent. Its vision is honed around research and innovation at the service of education and development. This unique nascent university, with its state-of-the-art campus and infrastructure, has woven a sound academic and research network, and its recruitment process is seeking high quality academics and professionals in order to boost its quality-oriented research environment in the metropolitan area of Marrakech.
The School of Computer and Communication Sciences at Mohammed VI Polytechnic University (UM6P), Benguerir, Morocco is currently looking for motivated and talented Postdoctoral researchers in the area of Pos-Quantum Cryptography. The successful candidates will primarily be working on the following topics (but not limited to):
- Quantum primitives such as PKE, KEM, KEX, and Digital Signatures
- Post quantum Zero Knowledge Proofs
- Design and implementation of hybrid solutions
- Attack on existing proposals
The ideal candidates should have a PhD degree in cryptography (or related field) from a leading university, and a proven record of publications in top cryptography/security/TCS venues.
We offer competitive salary (the net salary per month is 2000 USD), a budget for conference travel and research visit, and membership in a young and vibrant team with several international contacts (for more see: https://www.um6p.ma/en).
Submit your application via email including
- full CV,
- sample publications,
- a detailed research proposal,
- and 2-3 reference letters sent directly by the referees.
Applications will be considered until the position is filled.
Last updated: 2022-06-16 posted on 2022-06-16
Cryptography Post-Doc Positions
Hebrew University, Israel
Last updated: 2022-06-16 posted on 2022-06-15
Postdoc on blockchain consensus
Monash University
Last updated: 2022-06-16 posted on 2022-06-15
Cryptography / Cybersecurity Engineer
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Centre
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
Position: Cryptography / Cybersecurity Engineer
Skills required for the job
Qualifications
Mehdi Messaoudi - Talent Acquisition Manager
Email: mehdi.messaoudi@tii.ae
Last updated: 2022-06-22 posted on 2022-06-13
Post-Doc Research Fellows on Symmetric-Key Cryptography (Multiple Positions)
Nanyang Technological University, Singapore
- tool aided cryptanalysis, such as MILP, CP, STP, and SAT
- machine learning aided cryptanalysis and designs
- privacy-preserving friendly symmetric-key designs
- quantum cryptanalysis
- provable security
- cryptanalysis against SHA-2, SHA-3, and AES
- threshold cryptography
Last updated: 2022-06-13 posted on 2022-06-13
Young Researcher/PhD Student (fully funded)
University of Primorska
Last updated: 2022-06-13 posted on 2022-06-12
Post Quantum Cryptography Expert
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Center
In our connected digital world, secure and reliable cryptography is the foundation of digital information security and data integrity. We address the world’s most pressing cryptographic questions. Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
Position: Post Quantum Cryptography Expert
Skills required for the job
Qualifications
Mehdi Messaoudi - Talent Acquisition Manager
mehdi.messaoudi@tii.ae
Last updated: 2022-06-07 posted on 2022-06-07
PhD Scholarship in Post-Quantum Cryptography
University of Wollongong, Australia
Last updated: 2022-06-03 posted on 2022-06-02
Senior ASIC Design and Verification Engineer
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a publicly funded research institute, based in Abu Dhabi, United Arab Emirates. It is home to a diverse community of leading scientists, engineers, mathematicians, and researchers from across the globe, transforming problems and roadblocks into pioneering research and technology prototypes that help move society ahead.
Cryptography Research Centre
Our work covers post-quantum cryptography, lightweight cryptography, cloud encryption schemes, secure protocols, quantum cryptographic technologies and cryptanalysis.
Position: Senior ASIC Design and Verification Engineer
Skills required for the job
Mehdi Messaoudi - Talent Acquisition Manager
mehdi.messaoudi@tii.ae
Last updated: 2022-06-03 posted on 2022-06-02
Cryptography Intern (remote - globally)
Mysten Labs
Successful applicants will work closely with experts in both academia and industry including George Danezis, Konstantinos Chalkias, Foteini Baldimtsi, Alberto Sonnino, François Garillot, Sam Blackshear, Lefteris Kokoris-Kogias, while enjoying a high degree of ownership & autonomy in working conditions & task prioritization.
Ideal candidate expectations:
- PhD or PostDoc researcher - or - engineer in cryptography, software security or distributed systems.
- at least one publication in any of the top cryptography, privacy and security conferences, such as: CCS, S&P, CRYPTO, USENIX SECURITY, EUROCRYPT, ASIACRYPT, NDSS, FC, AsiaCCS, EUROS&P, PETS, CT-RSA, ESORICS etc.
- Understanding of fundamental cryptographic schemes & underlying math for any of the following: hash functions, finite field arithmetic, polynomials (FFT) & elliptic curves, bilinear pairings, threshold signatures.
- Experience implementing high-performance & parallelizable protocols in languages such as Rust, Go, Java, or C/C++, and Github portfolio or productionized implementation will be a plus.
Our team is 100% remote & we are hiring across the world. Here at Mysten Labs, you’ll be joining a world class team with tremendous growth potential. We raised our 1st funding round ($36m series A) from top Silicon Valley VCs led by Andreessen Horowitz (a16z) with participation from Redpoint, Lightspeed, Coinbase Ventures, Electric Capital, Standard Crypto, NFX, Slow Ventures, Scribble Ventures, Samsung Next, Lux Capital etc.
HOW TO APPLY: Applicants are invited to e-mail their CV (use title: Summer 2022 Cryptography Internship) to jobs@mystenlabs.com
Last updated: 2022-05-29 posted on 2022-05-29
Cryptography Engineer
JP Morgan Chase, various locations in US
We are looking for a cryptography engineer who will be part of the Blockchain Technology Security Group to build foundational services for JP Morgan distributed ledger technology initiatives. In this role, you will be designing and coding security components and applications. You will have the exciting challenge of working on cutting-edge technology and building enterprise solutions that cater to all the lines of business. You’ll work in a collaborative, trusting, thought-provoking environment—one that encourages diversity of thought and creative solutions that are in the best interests of our customers globally
Qualifications
- Experience as applied cryptographer
- Experience with OpenSSL /TLS API; threading and socket programming in Linux, HSMs, and PKCS #11
- Solid understanding of Linux OS with strong knowledge of object oriented programming; specifically high-level languages such as Java, Python, Go, and node.js, C, C++ and Bash
- Familiar/Experience building solutions for digital assets and distributed ledger technology (blockchain) with focus on algorithms and data structures
- Desirable: Experience with multi-party computation (MPC) & HSMs and custody crypto assets
Last updated: 2022-05-29 posted on 2022-05-27
Chair of Junior Professor
Telecom Paris, Institut Polytechnique de Paris
Last updated: 2022-05-29 posted on 2022-05-27
Post-Doctoral Researcher Position at the Cryptography, Security & Privacy Research Group
Koç University, İstanbul, Turkey
Your duties include performing research on cryptography, security, and privacy in line with our research group's focus, as well as directing graduate and undergraduate students in their research and teaching. The project funding is related to cryptography, game theory and mechanism design, and blockchain technologies.
Applicants are expected to have already obtained their Ph.D. degrees in Computer Science or related discipline with a thesis topic related to the duties above.
For more information about joining our group and projects, visit
https://crypto.ku.edu.tr/work-with-us/
Submit your application via email including
- full CV,
- transcripts of all universities attended,
- 1-3 sample publications where you are the main author,
- a detailed research proposal,
- 2-3 reference letters sent directly by the referees.
https://member.acm.org/~kupcu
Last updated: 2022-05-25 posted on 2022-05-23
Zero-Knowledge Cryptographer & Protocol Developer
Heliax (Anoma)
Last updated: 2022-05-25 posted on 2022-05-23
Research Cryptographer, FHE
Heliax (Anoma)
Last updated: 2022-05-25 posted on 2022-05-20
Multiple academic teaching positions (Lecturer/ Assistant Professor/ Associate Professor/ Professor)
Xiamen University Malaysia, Sepang, Malaysia
Xiamen University Malaysia is now seeking highly motivated, committed and qualified individuals for academic teaching positions in computer science and cyber security.
Candidates in any areas of computer science and cyber security are welcome to apply. Preferences will be given to candidates with expertise in, but not limited to, cyber security, mathematics, cryptology, network security, digital forensics. Applicants must possess a PhD degree in a related discipline.
Applicants with specific teaching and research interests in TWO OR MORE of the following areas are encouraged to apply:
- Calculus
- Linear Algebra
- Discrete Mathematics
- Probability and Statistics
- Design & Analysis of Algorithms
- Computer Composition
- Operating Systems
- Cyber Security
- Modern Cryptography
- Digital Forensics and Investigation
- Network Attack and Defence Technology
- Big Data Analytics
- Malware Analysis
- Cryptanalysis
- ARM Assembly Language
HOW TO APPLY
Applicants are invited to submit a digital application packet to: iftekhar.salam@xmu.edu.my
The subject line of your email must include: your name, relevant academic discipline, and the specific position for which you are applying for. All application packets must include the following attachments:
- Your detailed and current CV with publication (*Asterisk to indicate corresponding author, include Indexing & Quartile);
- Cover letter;
- Evidence of academic qualifications (Bachelor, Master & PhD Certificate; Bachelor, Master & PhD Transcripts and Professional Certificates);
- 3-5 Full-Text publications (if applicable);
- Teaching evaluation (if applicable);
- Two academic references (at least one of them is the applicant’s current/most recent employer).
Last updated: 2022-05-20 posted on 2022-05-19
Applied Cryptographer
Mysten Labs (mystenlabs.com)
This role gives the opportunity to work closely with a senior team of experts in theoretical computer science, cryptography, language & systems design, while enjoying a high degree of ownership & autonomy in working conditions & task prioritization. We regularly publish to conferences like CCS, S&P, CRYPTO, NDSS, FC, AsicCCS, PETS, CT-RSA, ESORICS, ACNS etc.
While the following guidelines reflect some of our thinking about a background we would like to see in a candidate, we are committed to diversity, & more surprising profiles with a good argument to fit & capability are encouraged to apply.
Our ideal candidate would have:
- 2+ years of experience in hands-on software engineering for cryptographic operations, such as signature schemes, accumulators, key management, data encryption & compression.
- Understanding of fundamental cryptographic algorithms & underlying math for any of the following: hash functions, finite field arithmetic, polynomials (FFT) & elliptic curves.
- Experience implementing high-performance & parallelizable protocols in languages such as Rust, Go, Java, or C/C++.
- Experience implementing ZKP circuits or proof systems (Groth16, Halo, Plonk, STARKs, Marlin) is considered a plus.
Our team is 100% remote & we are hiring across the world. Here at Mysten Labs, you’ll be joining a world class team with tremendous growth potential. We raised our 1st funding round ($36m series A) from top Silicon Valley VCs led by Andreessen Horowitz (a16z) with participation from Redpoint, Lightspeed, Coinbase Ventures, Electric Capital, Standard Crypto, NFX, Slow Ventures, Scribble Ventures, Samsung Next, Lux Capital & many other great funds & angels!
Last updated: 2022-05-10 posted on 2022-05-10
Cryptography Architect
PQShield
We are looking for a Cryptography Architect to join our team to help define the next generation of secure Hardware and Software implementations of Post Quantum Cryptography.
Responsibilities:Design, implement and analyse post quantum cryptographic algorithms including key exchange algorithms and digital signature schemes
- Investigate new and future algorithms, research potential implementations and optimisation for efficient implementation.
- Develop Architectural descriptions and models of PQ Cryptographic Algorithms
- Interface with the Engineering team, provide specifications for Micro-Architectural planning and implementation.
- Perform security analysis of Post Quantum and Classical Cryptography implementations
- Research and propose secure attack resistant (SCA, Fault) implementations of Post Quantum Algorithms.
- PhD or degree in Cryptography, Applied Cryptography, Mathematics or Computer Science
- 2+ years of work experience or research in the field of Post-Quantum Cryptography
- Knowledge of Secure Implementations of cryptography
- Knowledge of Side-channel analysis of cryptographic primitives
- Theoretical understanding of common side-channel countermeasures
- Programming skills , C/C++, Python, Mathematics tools
Last updated: 2022-05-09 posted on 2022-05-09
Cryptography Software Engineer at Apple
Apple
Last updated: 2022-05-04 posted on 2022-05-03
QPQ Applied Cryptologist
QPQ Global
What do we give you?
• A stimulating, Socratic intellectual environment.
• Hybrid office approach – we have been a distributed workforce from the start. This role is centred around our European axis, so we expect you to live within +/- 3 hours of CET. We get together a complete team every quarter, so you must be willing to travel and embrace being part of a diverse team drawn from many walks of life and cultures.
• Good salary, travel expense budget and many future opportunities to participate in the company’s growth.
• The mother of all intellectual challenges!
Responsibilities:
• implement and embed in products cryptographic protocols in the privacy space.
• Working with a multi-faceted team of practitioners on a set of blockchain-based privacy protocols interacting with the DeFi space and providing compliance with financial regulations.
• Focus on zero knowledge schemes which provide privacy and compliance.
Requirements:
• MSc or multi-year experience in cryptography or a closely related field.
• Knowledge of modern cryptographic primitives.
• Be able to productize protocols/schemes/algorithms in at least one relevant programming language (C++ or Rust desirable).
• General understanding of full-stack system architecture.
• Have a thorough approach and be committed to high quality output. Have prior research/code already published in the space.
- Excellent communication and collaboration skills.
Last updated: 2022-05-04 posted on 2022-05-03
Post-Doc
University of Warsaw
Last updated: 2022-05-04 posted on 2022-05-02
Postdoc in lattice-based cryptography
University of Bordeaux, France
- Lattice algorithms and cryptanalysis (shortest or closest vector problems, LWE, for rings, modules or lattices)
- Algebraic number theory and lattices (geometry of numbers, ideals in numbers fields, automorphic forms)
- Quantum algorithms for lattices (security proofs, cryptanalysis)
To apply, please send your CV, a motivation letter and names of at least two persons who can provide reference letters.
The CHARM project is a collaboration between four scientific intitutions in France and in the USA. Members in Bordeaux are: Bill Allombert, Karim Belabas, Aurel Page, Alice Pellet-Mary, and Benjamin Wesolowski.
Last updated: 2022-04-26 posted on 2022-04-25
PhD Student Positions - Cryptography/Security/Privacy/Blockchain-based Systems
University of Connecticut, Computer Science and Engineering Dept.
Scope: The positions provide a great opportunity to work on timely topics in cryptography (both theory and applied), systems security, and privacy. A large part of our lab research is around security and privacy for blockchains. We target real-world problems and aim to provide secure and practical solutions backed by rigorous foundations and efficient implementations/thorough performance testing. We are also interested in conceptual projects that contribute in bridging the gap between theory and practice of Cryptography. Students will gain experience in topics around multiparty computation, FHE, zero-knowledge proofs, cryptography from physical assumptions, and distributed systems security (mainly blockchain-based systems and privacy-preserving machine learning).
More information: For more information about our current and previous projects please check https://ghadaalmashaqbeh.github.io/research/
About UConn: UConn is R1 Research University in Storrs, CT. It is well connected to New York, Boston, and Providence areas, offering easy access to other top research institutions and lead-industrial companies for research, collaborations, and internship opportunities. The CSE department at UConn has a large and strong cybersecurity group, and it is ranked 18 among all USA computer science programs in Cryptography (based on csranking.org).
Get in touch: For interested students, please send your CV, an overview of current/previous research experiences and skills/related background, and transcripts to ghada@uconn.edu
Last updated: 2022-04-26 posted on 2022-04-23
Ph.D. student (several)
TalTech, Centre for HW Security; Tallinn, Estonia
Requirements: We are looking for motivated candidates with a strong background in circuit design. PhD candidates must have completed a Master's degree (or be about to complete). Previous expertise on Hardware Security/Cryptography is not required but is highly desirable. The candidates are expected to have the following core skills:
How to apply: Please submit your CV and transcripts to Prof. Pagliarini by email using the subject ‘PhD in Hardware Security’. Candidates with adequate backgrounds will be invited to interview over Skype. Applications are processed as they arrive. All positions have a tentative start date of September 2022. The nominal duration of a PhD degree is 4 years at TalTech. Salaries are approximately 1600 EUR/month (net), which allows for a comfortable standard of living in Tallinn.
Last updated: 2022-04-26 posted on 2022-04-20
Cryptography Software Engineer at Apple
Apple
Last updated: 2022-04-22 posted on 2022-04-18
Lecturer opening in applied cybersecurity
New Jersey Institute of Technology
Successful candidates must have an expert grasp of knowledge of Cybersecurity at all levels, with an emphasis on hands-on applied cybersecurity skills, either through a demonstrated record of teaching excellence, or through industrial experience. The successful candidate will also be involved in creating course content and materials with a focus on hands-on experiential and project-based learning. Strong written, oral and interpersonal skills are required in order to communicate effectively with students in person and online. The formal education and experience prerequisites may be waived at the university's discretion if the candidate can demonstrate to the satisfaction of the university an equivalent combination of education and experience specifically preparing the candidate for success in the position.
Interested applicants should submit their CV by applying as soon as possible at: https://njit.csod.com/ux/ats/careersite/1/home/requisition/3493?c=njit
Work environment and location:
The Computer Science department, part of the Ying Wu College of Computing, is the largest at NJIT, comprising one-tenth of the student population. It is also the largest computer science department among all research universities in the New York metropolitan area. Located in Northern New Jersey, within the greater New York Metropolitan area, NJIT is part of a vibrant ecosystem of research universities and corporate research centers.
Diversity is a core value of NJIT and we are committed to make diversity, equity and inclusion, part of everything we do.
Last updated: 2022-04-12 posted on 2022-04-12
PhD student
New Jersey Institute of Technology (NJIT), USA
Details: NJIT is a Rank 1 Research University, situated in New York Metropolitan area, and is about 7 miles away from the beautiful New York City. New York Metropolitan area is a key part of the US and is the hub of several major tech and research companies. The qualified candidates will have opportunities for research internships and joint projects with lead-industrial companies. The position is looking for highly motivated graduate students to explore, design, and implement algorithms for databases, secure computing, IoT, and blockchain.
Topics are as follows:
- Design and implementation of an end-to-end-secure database system using MPC or secret-sharing
- Algorithm development for side-channel attacks on MPC
Requirements: 1. Adequate knowledge of cryptographic techniques/algorithms, programming, and relational database systems 2. Knowledge of Java, SQL, and C/C++ 3. Familiarity with development tools for managing and building software projects, version control systems (Git), and testing tools (JUnit) 4. You must be an Undergraduate/Master student in computer science or a related field
Additional Information:
1. Starting date: As soon as possible 2. Please send your CV and other information (e.g., github account, sample projects, etc.) to: Shantanu Sharma (shantanu.sharma[AT]njit[DOT]edu) 3. Please write a few sentences in the email to introduce yourself and your interest in the position
Thank you and I look forward to hearing from you!
Last updated: 2022-04-11 posted on 2022-04-10
Principal Architect in Applied Cryptography (Special Projects)
Input Output Global - remote work opportunity
As a Principal Architect in Applied Cryptography at IOG, you must be an engineer, an architect, an applied cryptographer, and a leader - it’s a multifaceted role. You have the exciting challenge of working with bleeding-edge research and technology, always with a focus on the market's needs. You will be a leader of an exceptional team, working on everything from Post-Quantum prototypes to hand-optimization of existing primitives to completely new products. To support you on this challenge, we have software architects, product managers, project managers, formal methods specialists, and QA test engineers, with whom you must have high bandwidth communications.
Your mission
- Champion the applied cryptography team
- Captain end-to-end development and delivery of new products
- Spearhead prototyping of cryptographic products
- Translate research into rigorous engineering specifications and implementations
- Meticulously review cryptographic protocols and proposed primitives
- Contribute to industry standards and operational best practices
- Identify where the business needs to be next and get it there.
https://apply.workable.com/io-global/j/8D6CAEE7DD/
marios.nicolaides@iohk.io
Last updated: 2022-05-10 posted on 2022-04-05
Cryptography Engineer
Sunscreen; San Francisco, USA or remote
What you'll accomplish your 1st year here...
You...
We offer...
Last updated: 2022-04-07 posted on 2022-04-04
Postdoc
Eindhoven University of Technology, Department of Mathematics and Computer Science
The department of Mathematics and Computer Science at TU Eindhoven has a postdoc vacancy for theoretical work in CAT2. The research will concentrate on
- theory related to the Quantum Key Distribution testbed under development in Eindhoven;
- quantum cryptography beyond QKD, e.g. key recycling, unclonable encryption, unclonable credentials, quantum PUFs etc.
Last updated: 2022-03-31 posted on 2022-03-30
Permanent Researcher Positions in Cryptographic Protocols
Technology Innovation Institute (TII) - Abu Dhabi, UAE
Technology Innovation Institute (TII) is a recently-established publicly-funded research institute in Abu Dhabi (UAE). It is home to a diverse community of leading scientists and engineers from across the globe.
Job DescriptionWe are looking for permanent researchers to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main aim of the team is to conduct applied academic research in areas relating to cryptographic protocols, such as: TLS, QUIC, Tor, Key Exchange, Secure Channels, Cryptographic Primitives, Privacy Enhancing Technologies, MLS and Secure Messaging, Probabilistic Data Structures in Adversarial Environments, and Blockchain-Related Technologies. The nature of the research spans both theory and practice, covering aspects such as provable security, security models, efficient designs, implementation aspects, and attacks.
Applicants should have completed (or be close to completing) their PhD in a related area and preferably have postdoctoral research experience. Preference will be given to applicants with publications in top-tier venues such as CRYPTO, EUROCRYPT, ASIACRYPT, ACM CCS, IEEE S&P, and USENIX.
Required Skills:- Fluency in English (verbal and written) and an ability to communicate research effectively.
- Good problem-solving skills and an ability to conduct research independently.
- Good interpersonal and collaborative skills.
- Solid knowledge in cryptography.
- Strong background in Mathematics and/or Computer Science.
- Programming, Software Engineering, experience in implementing cryptographic primitives and attacks on real-world cryptosystems, reverse engineering of closed-source protocols.
- Experience in analyzing protocol standards and specifications.
- Vibrant working environment, flexible working conditions, and travel funding.
- Industry-competitive tax-free salary.
- Family-wide health insurance and children’s education allowance.
- Sunshine all year round.
- Contact Jean Paul Degabriele (jeanpaul.degabriele@tii.ae) for information relating to research and work environment.
- To apply send your CV to Mehdi Messaoudi (mehdi.messaoudi@tii.ae) - Talent Acquisition Manager.
Last updated: 2022-03-31 posted on 2022-03-29
Post-docs in the Cybsersecurity Group @ TU Delft (3 positions)
The Netherlands
- Lattice-based cryptography
- Privacy-preserving machine learning
- Privacy and applied cryptography
- Blockchain/smart contract security
- PhD in Computer Science, Information Security, Maths.
- Strongly related knowledge and backgrounds (e.g., research papers) of privacy-oriented cryptography (theory and/or practice).
- Professional in English (writing, speaking). Note Dutch is NOT required.
Last updated: 2022-03-23 posted on 2022-03-23
Hardware Security Researcher (Multiple positions)
Temasek Labs, Nanyang Technological University, Singapore
Candidates should ideally have already completed, or be close to completing a Master’s (with relevant experience) or PhD degree in mathematics, computer science, electrical engineering, or related disciplines, with track record in R&D (publications in international journals and conferences).
You will be joining a dynamic group performing research on embedded security. The research focus of the current roles are:
1. Hardware forensics with focus on vulnerability assessment in commercial and industrial devices.
2. Physical attack and countermeasures for novel cryptographic primitives
3. Micro-architectural attacks
This position is available from May 2022. TL offers competitive salary package plus other benefits.
Review of applications will start immediately until position is filled.
Interested candidates should send their detailed CVs, cover letter and references.
Last updated: 2022-03-23 posted on 2022-03-23
Security Engineer
STMicroelectronics
- Develop effective (security, latency, silicon area/code size costs), countermeasures against side-channel and fault attacks, by working in conjunction with SW and HW designers
- Contribute to the definition of effective post-quantum public key cryptographic implementations
- Deploy security expertise and help ST product divisions shape the right security solutions for their products (ICs).
- Stay on top of security needs and state-of-the-art evolution, anticipating/identifying solutions and partners, developing or making available the security competences and IPs that will be needed by the Company in a 3-5 years time frame.
- An extensive background in mathematics and public key cryptography
- Knowledge of state-of-the-art side-channel and fault attacks and related countermeasures
- Teamwork, networking, customer-orientation & communication skills
- Motivation for bridging research outcomes and product design
- Experience in embedded SW design or HW design is a plus
Last updated: 2022-03-23 posted on 2022-03-22
VP of Research
Dfns
Dfns is a cybersecurity company that builds custody* SaaS protocol for web3 apps. Think of it as a developer tool that provides secure cloud for crypto. Our mission is to bring serenity to DeFi by eliminating new blockchain risks and making crypto transactions easier, faster, more affordable, and compliant with existing regulations.
From fintechs to large banks to e-commerce sites, Dfns gives financial institutions and businesses the freedom to own and transfer crypto on a battle-designed security infrastructure. Our API is designed to offer best-in-class developer experience allowing any platform to deploy custodial wallets in a matter of days, with streamlined feature delivery and frequent security upgrades.
Founded in 2020 in Paris, Dfns is a startup incubated at Station F (awarded Future40), accelerated by Techstars and recognized DeepTech by the French Ministry of Economy. Our company is fully remote with offices in Paris, Amsterdam, New York, London, Stockholm, Sofia, and other cities.
Job Description
You will contribute to one of the most ambitious technology projects in crypto today: building a trustless custody infrastructure for the trillion-dollar digital asset industry.
You will join an amazing team of leaders (CTO, CISO, CPO) and experts (R&D Engineers, Cryptographers, Security Engineers) in a highly challenging and collaborative environment.
We are looking for a trailblazing VP of Research who can explore blockchain and ZK technology, generate new product ideas, and outline detailed R&D strategies. You will need to manage diverse teams spanning engineering and marketing, requiring both a strong technical background and excellent business skills. As an ideal candidate, you will have a keen eye for gaps in client product offerings and the innovative mindset to fill them. You’re a highly skilled cryptographer with a proven ability to strategize the full lifecycle of patent production—from conception through release.
Last updated: 2022-03-18 posted on 2022-03-17
Senior Cryptographer
Dfns
Dfns is a cybersecurity company that builds custody SaaS protocol for web3 apps. Think of it as a developer tool that provides secure cloud for crypto. Our mission is to bring serenity to DeFi by eliminating new blockchain risks and making crypto transactions easier, faster, more affordable, and compliant with existing regulations.
From fintechs to large banks to e-commerce sites, Dfns gives financial institutions and businesses the freedom to own and transfer crypto on a battle-designed security infrastructure. Our API is designed to offer best-in-class developer experience allowing any platform to deploy custodial wallets in a matter of days, with streamlined feature delivery and frequent security upgrades.
Founded in 2020 in Paris, Dfns is a startup incubated at Station F (awarded Future40), accelerated by Techstars and recognized DeepTech by the French Ministry of Economy. Our company is fully remote with offices in Paris, Amsterdam, New York, London, Stockholm, Sofia, and other cities.
Job Description
You will contribute to one of the most ambitious technology projects in crypto today: building a trustless custody infrastructure for the trillion-dollar digital asset industry.
You will join an amazing team of leaders (CTO, VP of Research, CISO) and experts (Software Engineers, R&D Engineers, Security Engineers) in a highly challenging and collaborative environment.
We are looking for a Senior Cryptographer to develop our crypto systems using algorithmic, asymmetric, zk proofs, thresholdized cryptography and other types of tools to encrypt sensitive data and protect it from hackers, misuse, and cybercrime.
As a Cryptographer, you will be laser-focused on finding ways to protect blockchain keys from being intercepted, decrypted, copied, altered, or deleted by unauthorized actors. You will need a deep understanding of cryptography, namely MPC and its related algorithms. You will also develop and apply various mathematical models to help find and thwart potential systems threats.
Last updated: 2022-03-18 posted on 2022-03-17
Research Scientist
Meta Financial Technologies
Last updated: 2022-03-18 posted on 2022-03-15
Postdoc and tenure-track professor in security, distributed Systems, applied crypto, or blockchains
Beijing Institute of Technology
Postdoc: Competitive salary. Housing/renting covered. The postdoc position is for two years and has flexible starting time. After two years, the candidates may be offered a tenure-track position at Beijing Institute of Technology.
Tenure-track professors: housing covered; salary is really competitive, can advise PhD students and postdocs; startup package included; etc.
Last updated: 2022-03-15 posted on 2022-03-15
Ph.D. student
Université de Lyon, Université Jean Monnet, Saint-Etienne, France
Your tasks:
Your profile:
If you are interested, please send an email including your detailed CV to vincent.grosso@univ-st-etienne.fr and pierre.louis.cayrel@univ-st-etienne.fr. Applications will be reviewed continuously until the position is filled.
Last updated: 2022-03-02 posted on 2022-03-02
Homomorphic Encryption Researcher
Zama, Paris, France
- discovering new cryptographic techniques to compute on encrypted data,
- working with the engineering and product teams to implement his/her/their research into our products,
- design robust tests and benchmarks to validate his/her/their research and its implementation,
- review the latest published research, and inform the team on potential new applications,
- work with the entire team to define the research and product roadmaps,
- publishing papers, filing patents and presenting his/her/their work at academic conferences.
Preferred experience. We are looking for different experience profiles for this position, from young researchers (right after the end of the PhD) to more senior ones. He/she/they should:
- have a PhD in cryptography or equivalent,
- have deep knowledge of homomorphic encryption,
- have (optionally) knowledge of LWE hardness and security,
- have (optionally) knowledge of machine learning,
- be passionate about privacy and open source software,
- have good written and oral communication skills.
Last updated: 2022-03-02 posted on 2022-02-27
Junior Cryptographer
QPQ
At QPQ, we are building the Internet of Economics, a new approach to a compliant and regulated financial systems infrastructure. Join a team of mathematicians, computer scientists, engineers and self-taught individuals. We give you
- A stimulating, Socratic intellectual environment. As Socratic implies, we want you to have a voice. We do not recruit brilliant people to put them in boxes, we recruit brilliant people so they can push the horizons even further
- Hybrid office approach – we have been a distributed workforce from the start. This role is centred around our European axis, so we expect you to live within +/- 2 hours of CET. We get together a complete team every quarter, so you must be willing to travel and embrace being part of a diverse team drawn from many walks of life and cultures
- Competitive salary, travel expense budget and many opportunities to participate in the company’s growth
Responsibilities:
- Perform research and engineering on cryptographic protocols
- Working with a multi-faceted team of practitioners on a set of blockchain-based privacy protocols interacting with the DeFi space and providing compliance with financial regulations
Requirements:
- Master or Ph.D. in cryptography or a closely related field
- Be able to prototype protocols/schemes/algorithms in at least one relevant programming language
- Have a thorough approach and be committed to high quality output
- Be eager to learn new topics and tools, proactive, self-driven approach and problem-solving mindset
- Good communication and collaboration skills
- Able to proactively identify which activities can benefit the project the most in the shortest period of time, communicate, and execute on their ideas without needing to be micromanaged
- Full-time availability with flexible working hours
- Nice to be familiar with blockchain, DeFi space and general understanding of full-stack system architecture
- Nice to have knowledge of zk proof systems
Last updated: 2022-02-25 posted on 2022-02-23
Senior Cryptographer
QPQ
• A stimulating, Socratic intellectual environment. As Socratic implies, we want you to have a voice. We do not recruit brilliant people to put them in boxes, we recruit brilliant people, so they can push the horizons even further
• Hybrid office approach. This role is centred around our European axis, so we expect you to live within +/- 2 hours of CET. We get together a complete team every quarter, so you must be willing to travel and embrace being part of a diverse team drawn from many walks of life and cultures
• Competitive salary, travel expense budget and many opportunities to participate in the company’s growth
Responsibilities:
- Perform research and engineering on cryptographic protocols;- Have a leading role in the cryptography team in defining and applying protocols
- Working with a multi-faceted team of practitioners on a set of blockchain-based privacy protocols interacting with the DeFi space and providing compliance with financial regulations
Requirements:
- Master or Ph.D./Multi-year working experience in cryptography or a closely related field
- Knowledge of modern cryptographic primitives
- Be able to prototype protocols/schemes/algorithms in at least one relevant programming language
- Be familiar with the blockchain and DeFi space
- General understanding of full-stack system architecture
- Have a thorough approach and be committed to high quality output. Have prior research/code already published in the space
- Excellent communication and collaboration skills
- Be eager to learn new topics and tools, proactive, self-driven approach and problem-solving mindset
- Able to proactively identify which activities can benefit the project the most in the shortest period of time, communicate, and execute on their ideas without needing to be micromanaged
- Full-time availability with flexible working hours
- Nice to have knowledge of modern, efficient zk-proofs
Last updated: 2022-02-25 posted on 2022-02-23
Embedded Crypto Expert
Qualcomm Sophia Antipolis (France)
Snapdragon processors are used in different types of devices ranging from mobile phones to televisions, cars, ultra-book laptops etc. Our processors are designed to meet security requirements ranging from content protection to enterprise security, using virtualization, HW security enclaves, factory key provisioning, and secure updates.
In this position you will perform the following tasks:
- Define HW crypto security requirements (functional, performance, security etc)
- Define HW/SW partitioning to address next challenges in cryptography such as PQC and Crypto Agility
- Define crypto and HW blocks that contribute to the overall SoC Security Architecture
- Design of mechanisms thwarting side channel attacks
- Monitor evaluation of crypto IP resistance and robustness
- Competitive analysis of security IPs and features
- Investigate future/roadmap security related technologies,
- Participation in academic conference and industrial/research security working groups.
- Cryptographic primitives, cryptographic protocols and their implementation
- Design of HW/SW security blocks such as HW cryptographic engines
- HW/SW threat analysis, security analysis or/and risk analysis
- Smart Card and secure HW technologies
- Security certifications: process and requirements.
- Academic and industry research (publications, conferences)
- Leadership & management background
- Excellent communication and teamwork skills are required
Last updated: 2022-02-16 posted on 2022-02-15