IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 March 2025
Simula UiB AS, Bergen, Norway
The successful applicant will have the opportunity to explore and contribute to groundbreaking research questions, for instance focusing on its efficient implementation and deployment. While specific research questions will be discussed with the successful applicant, they may include techniques such as fully homomorphic encryption (FHE), multi-party computation (MPC) and zero-knowledge protocols (ZK). This is not just an opportunity to develop and shape your own research project, but also to help shape the future of cryptography and privacy.
Simula UiB currently has 11 early career researchers working on a range of research problems in cryptography and information theory. We can offer a vibrant, stimulating, and inclusive working environment to successful candidates. The position is for three years, with a possible extension of one year.
Read more and apply here: https://www.simula.no/careers/job-openings/postdoctoral-fellow-in-privacy-enhancing-cryptography
Closing date for applications:
Contact:
Martijn Stam (martijn@simula.no)
or Simula UiB (bergen@simula.no)
University of Tübingen, Department of Computer Science;Tübingen, Germany
About the Project
We are seeking a highly motivated PhD candidate to join our DFG-funded project on privacy-preserving rare disease analysis. This interdisciplinary research initiative focuses on developing secure and efficient methods for variant filtering, prioritization, and rare-variant association studies.
Responsibilities
- Conduct research on secure algorithms and protocols for privacy-preserving analysis of genomic and clinical data.
- Develop and integrate methods for variant filtering, prioritization, and rare-variant association studies in a federated environment.
- Implement and evaluate methods as part of an open-source software framework for privacy-preserving rare variant analyses.
- Present findings in peer-reviewed publications and international conferences.
Requirements
- Master’s degree (or equivalent) in Computer Science, Bioinformatics, Mathematics, or a related field.
- Background or interest in cryptography (e.g., secure multi-party computation), machine learning (e.g., federated learning, data privacy), or bioinformatics (e.g., variant analysis).
- Solid programming skills in at least one language commonly used in research (Python, C/C++, Java, etc.).
- Strong analytical and problem-solving capabilities.
- Excellent communication and teamwork skills.
How to Apply
Please email a single PDF to [Contact Email Address] with:
- Cover Letter (your motivation and relevant experience)
- CV (academic background, technical skills, publications)
- Transcript(s) (BSc, MSc or equivalent)
- References(contact details)
Application Deadline: [30.04.2025]
Closing date for applications:
Contact: Dr. Mete Akgün
More information: https://mdppml.github.io/downloads/PhD_Student_in_Privacy_Preserving_Rare_Disease_Analysis.pdf
25 March 2025
Input Output Group
Who you are:
The internship is ideally intended for senior undergraduate/master students, PhD candidates, or early postdocs in one of the fields with relevance to blockchain systems, such as computer science, applied mathematics, cryptography, or economics. It is a perfect opportunity for an early-stage researcher to gain valuable research experience by collaborating with members of the IOG Research team on current challenges in blockchain technologies.
What the role involves:
The intern will work on an Internship Project that will be defined prior to the commencement of the internship, taking into account the intern’s scientific background and skillset, as well as the research priorities within IOG.
The work will be done under the guidance of a supervisor, who will be one of the members of IOG Research. Supervisors will contribute to defining the scope of the Internship Project, track the intern’s progress, provide guidance, and ensure that the work done is aligned with the broader research carried out at IOG Research.
The duration of the internship is up to 3 months and is primarily intended to take place during summer 2025, although other time periods may be considered.
Closing date for applications:
Contact: Sandro Coretti-Drayton
More information: https://apply.workable.com/io-global/j/0BC29938F1/
EPITA, EPITA Research Laboratory (LRE); Paris, Rennes or Toulouse, France
The LRE, https://www.lre.epita.fr, is attached to the "EDITE doctoral school" in Paris (Sorbonne University). It was evaluated by Hcéres in 2017-2018, and is currently being evaluated (wave 2024-2025). We are recruiting to strengthen the five LRE teams, in particular the Security and Systems team (https://www.lre.epita.fr/systems/), for the Paris, Rennes and Toulouse sites in the following areas:
- For the Paris site :
- Cryptography
- Post-quantum standards, protocols and primitives
- Automatic analysis
- Blockchain
- Learning detection and security
- Attack detection and analysis
- Security of learning models
- Software and hardware security
- Virology and malware analysis
- Reverse engineering at assembler and hardware level
- Systems
- Operating systems and kernels
- Cloud computing and virtualisation
- Embedded systems
- For the Rennes site:
- Static and dynamic analysis of malicious software
- Instrumentation and tools for analysis and monitoring
- For the Toulouse site:
- The dedicated job description for an HDR or ‘almost HDR’ profile is here: https://tinyurl.com/PosteEpitaToulouseHDR2025
Closing date for applications:
Contact: pierre.parrend@epita.fr; thierry.gerault@epita.fr
More information: https://tinyurl.com/PostesEpitaSECUSYST2025
University of Southern Queensland, Australia - work can be done remotely within Australia.
Expectations: to produce top-tier journal paper/s in the field of Privacy-preserving Machine Learning.
Position 2 : A casual developer with the following skill set required, for a few hundred hours (the exact number of hours is negotiable and depends on the availability of the candidate):
1. Swift (for a task specifically for iOS), and
2. Java (for Android app development), and
3. TensorFlow.js (for a specific task), and
4. Java or PHP or C# (for web page development), and
5. HTML and CSS and JavaScript (for UI design).
Expectations : to continue with some existing development work by polishing and finalizing the mobile app development.
Note : The successful candidates for both the positions above must be physically based in Australia with working rights in Australia when the work is being done.
Closing date for applications:
Contact: Dr. Zhaohui (Linda) Tang at:
Zhaohui.Tang@unisq.edu.au
University of Tartu
The postdoctoral researcher should have a strong track record in areas related to the design and analysis of efficient zero-knowledge proofs. We expect the candidate to have published a few papers at IACR conferences or venues of equivalent renown. The Ph.D student must have an MSc or equivalent by this spring, a strong mathematics and/or theoretical computer science background, and an existing cryptography background. We welcome all exceptional candidates. We especially welcome candidates with a background in PQ zk-SNARKs (hash-based or lattice-based) or applications like zkML; in the case of the Ph.D student, we interpret it as a background either in coding theory, lattice-based cryptography, or machine learning.
T apply for the positions, submit a letter of motivation (clearly stating why this project and the applicant are a good match), a full research CV, names of two references, and a research statement (obligatory for the postdoctoral researcher), clearly indicating the sought position (postdoc or Ph.D student).
The postdoc position starts on August 1, 2025, or later and lasts 2-4 years, depending on the candidate and negotiations. The Ph.D. position starts on September 1, 2025, and lasts four years. The candidates may later seek further employment, but this is not guaranteed in advance. Application deadline: 25.04.2025.
Closing date for applications:
Contact: Helger Lipmaa Professor of Cryptography, Head of Chair
https://kodu.ut.ee/~lipmaa/
helger dot lipmaa at ut dot ee
More information: https://crypto.cs.ut.ee/Main/OpenPositions
University of Luxembourg
Closing date for applications:
Contact: Jean-Sebastien Coron - jean-sebastien.coron@uni.lu
More information: http://www.crypto-uni.lu/vacancies.html
Radboud University, Nijmegen, The Netherlands
The candidate will work on the hardware security of symmetric-key ciphers. Topics of interest include:
- hardware implementations
- side-channel analysis
- fault analysis
- investigation of countermeasures
Your profile You hold a Master’s degree in mathematics, computer science, engineering, or a related field or expect to obtain such a degree soon. You have good programming skills and some experience with at least one of the following: cryptography, side-channel attacks or hardware description languages. You have a strong interest in cryptography and embedded systems security and especially their real-world deployment.
To apply please visit: https://www.ru.nl/en/working-at/job-opportunities/phd-position-hardware-security-of-symmetric-key-ciphers
Only applications via the official portal will be considered. Application deadline: 31 March 2025 Start date: flexible
Closing date for applications:
Contact: Dr. S. Mella
More information: https://www.ru.nl/en/working-at/job-opportunities/phd-position-hardware-security-of-symmetric-key-ciphers
22 March 2025
Input-Output Group - remoe
As an Applied Cryptography Researcher, you must be a cryptographer with a strong understanding of practical aspects of using cryptography in real world settings. You have the exciting challenge of working on bleeding-edge research and technology, always with a focus on the market's needs. You will work side by side with architects and engineers implementing novel cryptographic primitives that you may have also designed yourself. The scope is everything from Post-Quantum prototypes to hand-optimisation of existing primitives to completely new systems. To support you on this challenge, we have cryptography researchers, software architects, product managers, project managers, formal methods specialists and QA test engineers, with whom you will have high bandwidth communications.
Who you are:
PhD in Computer Science/Engineering or Applied Mathematics. A minimum of 4-5 years development experience in the field Expert knowledge of applied cryptography & best practices Expert knowledge of ZK protocols, such as PlonK and IPA commitment scheme Expert knowledge of elliptic curve cryptography Expert knowledge of post quantum security techniques Familiarity with blockchain cryptography and constructions Practical experience with implementation of cryptographic primitives Expert in terms of cryptographic design Good understanding of implementation and engineering constraints. Security sensibility related to cryptographic implementation Excellent theoretical cryptography and mathematical knowledge
Closing date for applications:
Contact: Marios Nicolaides
More information: https://apply.workable.com/io-global/j/DE859C73F4/
University of South Florida, Tampa, Florida
This is an urgent call for interested applicants. A funded Ph.D. student position is available for Fall 2025 to work on different aspects of Cryptographic Engineering in the new Bellini College of Artificial Intelligence, Cybersecurity, and Computing with Dr. Mehran Mozaffari Kermani. We are looking for motivated, talented, and hardworking applicants who have background and are interested in working on different aspects of Cryptographic Engineering with emphasis on hardware/software implementation, and side-channel attacks.
Please send email me your updated CV (including list of publications, language test marks, and references), transcripts for B.Sc. and M.Sc., and a statement of interest to: mehran2 (at) usf.edu as soon as possible.
Research Webpage: https://cse.usf.edu/~mehran2/
Closing date for applications:
Contact: Mehran Mozaffari Kermani
Mid Sweden University, Deptartment of Computer and Electrical Engineering, Sundsvall, Sweden
Closing date for applications:
Contact: Mikael Gidlund https://www.miun.se/en/personnel/g/mikaelgidlund/
More information: https://www.miun.se/en/work-at-the-university/career/jobs/vacancy/postdoctoral-researcher-in-wireless--network-security-and-trustworthy-ai/#gsc.tab=0
Tenure-Track Faculty in all areas related to Information Security and Artificial Intelligence (f/m/d
CISPA Helmholtz Center for Information Security
All applicants are expected to grow a research team that pursues an internationally visible research agenda. To aid you in achieving this, CISPA provides institutional base funding for three full-time researcher positions and a generous budget for expenditures. Upon successful tenure evaluation, you will hold a position that is equivalent to an endowed full professorship at a top research university.
In view of the current geopolitical landscape and in order to further strengthen research in information security and trustworthy AI in Germany and Europe, we have decided to invite a further round of applications of renowned candidates with an outstanding track record in Information Security, Artificial Intelligence, or related areas, including Cybersecurity and Privacy, Machine Learning and Data Science, Efficient Algorithms and Foundations of Theoretical Computer Science, Software Engineering, Program Analysis and Formal Methods.
The application deadline is April 8, 2025 23:59 AoE with interviews starting in mid April 2025.
CISPA values diversity and is committed to equality. We provide special dual-career support. We explicitly encourage female and diverse researchers to apply.
Closing date for applications:
Contact: career@cispa.de
21 March 2025
TU Wien, Department of Computer Science, Vienna
Tasks: Deep interest in scientific problems and the motivation for independent and goal-oriented research Independent teaching or participation in teaching and supervision of students Participation in organizational and administrative tasks of the research division and the faculty
Your profile: - Completion of an excellent doctorate in Computer Science or a closely related field
-Strong background in cryptography, privacy-preserving mechanisms, or data security
- In-depth knowledge and experience in at least one subject area: secure computation, differential privacy, anonymous communication systems, privacy-preserving machine learning, cryptocurrencies, cryptographic protocols, identity management, homomorphic encryption, or zero-knowledge proofs
An outstanding publication record in top security, privacy, and applied cryptography conferences and journals, such as e.g., ACM CCS, Crypto, Eurocrypt, Usenix Security, NDSS, EEE S&P, PETS Experience in teaching and supervising students, with enthusiasm for advancing knowledge in the field of privacy-enhancing technologies Excellent organizational and analytical skills, combined with a structured and detail-oriented approach to work Team player with strong problem-solving abilities, creative thinking, and a passion for tackling real-world privacy challenges
Closing date for applications:
Contact: Univ. Prof. Dr. Dominique Schroeder
More information: https://jobs.tuwien.ac.at/Job/247325
19 March 2025
UCSD Cryptography Group, Dept of Comp Sci & Eng, La Jolla, CA, USA
Applications are sought for a post-doc position in the cryptography group (CSE Department, UCSD) with Mihir Bellare. Dates are flexible.
Topics of interest include application-relevant theory of two-party computation that in particular continues work such as https://eprint.iacr.org/2024/1476, and provable security for symmetric cryptography, in particular authenticated encryption. Open to considering other topics as well.
Needed background is experience in, and facility with, formal definitions and proofs in the provable-security style.
Apply: To apply, please complete this Google form: https://docs.google.com/forms/d/1iOOKWI1kfU348b6Aw53FILEOu5qIDOnUoB9ngyK5wh8
Closing date for applications:
Contact: Mihir Bellare mbellare AT ucsd DOT edu
More information: https://cseweb.ucsd.edu/~mihir/
Università della Svizzera italiana
Closing date for applications:
Contact: Stefan Wolf, http://usi.to/nbk
More information: https://content.usi.ch/sites/default/files/storage/attachments/inf/inf-assistant-professor-2025.pdf
Friedrich-Alexander-Universität Erlangen-Nürnberg
The Research Training Group "Cybercrime and Forensic Computing" aims to systematically analyze research questions arising from the interaction between computer science and criminal law. More information about the project can be found at https://cybercrime.fau.de.
The following aspects are particularly relevant to the PhD position in the area of Hardware Security:- Computer Architecture
- Embedded Systems
- System-level Design Automation
- Side-channel Analysis
Applicants should have an excellent academic record, hold an MSc or an equivalent university degree in computer science or related disciplines, and have the goal to finish a PhD degree within three years.
For the particular position in hardware security, applicants should have an understanding of computer architectures (particularly RISC-V), hardware description languages, SoC design, and FPGA tools. Applicants should be team-oriented, open-minded, and communicative, with an interest in both theoretical and practical aspects of hardware security and embedded system design.
Closing date for applications:
Contact: Felix Freiling (felix.freiling@fau.de) for general questions and the application process, Jürgen Teich (juergen.teich@fau.de) and Stefan Wildermann (stefan.wildermann@fau.de) for questions about the position on hardware security.
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
- Hardware Security Verification: We explore how to perform efficient pre-silicon security verification with respect to physical implementation attacks (Side-Channel Analysis / Fault-Injection Analysis).
- Physical Implementation Attacks: We deepen the (theoretical) understanding of active and passive physical implementation attacks to build formal attacker models for security verification.
- Secure Hardware Design: We investigate how to build secure hardware circuits that can resist physical implementation attacks.
- Your CV, including a transcript of records.
- A brief cover letter describing your research interests.
- Contact details of 2-3 potential references.
Closing date for applications:
Contact: Pascal Sasdrich (pascal.sasdrich@rub.de)
Gachon University, South Korea
Closing date for applications:
Contact: Professor Seong Oun Hwang
More information: https://ai-security.github.io/index_e.htm
Chalmers University of Technologyrsity
Closing date for applications:
Contact: Only applications via the official portal are considered valid.
More information: https://www.chalmers.se/en/about-chalmers/work-with-us/vacancies/
Pompeu Fabra University
Closing date for applications:
Contact: randp.dtic@upf.edu
More information: https://www.upf.edu/documents/1656590/294524599/Bases+ENG-TTPT-2025-8+ENGLISH.docx.pdf/8d0201ec-ba05-868e-699b-0db42e026f85?t=1741351921540