What a lovely hat

Is it made out of tin foil .

IACR logo

International Association for Cryptologic Research

Open positions in cryptology.

Submit a job IACR provides a listing of open positions with a focus on cryptology. To advertise a job opportunity, please use the button to the right.

Submissions should include the organization, title, description, a URL for further information, contact information, and a closing date (which may be "continuous"). The job will be posted for six months or until the closing date. Submissions in other formats than text will not be posted. There can be no attachments.

This is intended to be a free service from an IACR member to the IACR membership. The content of the job posting is the responsibility of the person requesting the posting and not the IACR. Commercial enterprises who want to advertise their openings should identify at least one of their employees who is a member of IACR.

Applied Cryptographer

Post-doc in quantum cryptanalysis, university of bordeaux, department of mathematics (imb); bordeaux, france.

We are recruiting a postdoc to work with us (Razvan Barbulescu and Alice Pellet-Mary) on quantum cryptanalysis. More precisely, we are interested in

  • quantum cryptanalysis of lattice problems (LWE, SIS, shortest vector problem, ...)
  • quantum cryptanalysis of pre-quantum cryptography (e.g., optimizing quantum algorithms for discrete logarithm and factorization)

The starting date is flexible, between September 2024 and September 2025.

The deadline for application is June 30th.

More information about the position and how to apply are available at https://apelletm.pages.math.cnrs.fr/page-perso/documents/positions/HQI_post-doc.pdf

Assistant Professor in Verification of Cryptographic Implementations

Eindhoven university of technology.

  • A team player,
  • holding a PhD in an area related to cryptography or formal methods,
  • experienced in doing high quality research, demonstrated, for example, by publications in top tier venues on cryptography, security, or formal methods,
  • that is also interested in teaching students about their research.
  • A fun team, open for collaborations,
  • supporting you in applying for personal grants, and growing into the role of a professor,
  • with a large network for collaborations in academia and industry,
  • providing funding for a first PhD student and travel, and
  • employment conditions of a Dutch university (including two additional salaries per year and 40+ vacation days).

Post-Doc in Lattice-Based Cryptography

King's college london.

We are recruiting a postdoc to work with us on "practical advanced post-quantum cryptography from lattices". Here "advanced" does not mean Functional Encryption or Indistinguishability Obfuscation, but OPRFs, Blind Signatures, Updatable Public-Key Encryption, even NIKE.

Cryptanalysis of newfangled assumptions, constructions from standard and new lattice assumptions, proof-of-concept implementations, higher-level protocols, hybrids etc are all in scope. If in doubt, drop us an e-mail and we can discuss.

Key data of the position:

Salary: The salary will be paid at Grade 6, £43,205 – £50,585 per annum or at Grade 7, £51,974 to £61,021 per annum, including London Weighting Allowance.

Duration: This post will be offered on a fixed-term contract for 2 years, not exceeding 31st December 2028. This is a full-time post.

Cryptography & Cybersecurity Consultant

Phd student, university of birmingham, birmingham, united kingdom.

The primary research theme for the call is in the foundations and cryptanalysis of post-quantum cryptosystems. The exact projects could be tailored to match the candidate's background and interests.

Ph.D. student in Lattice-Based Cryptography and Zero-Knowledge Proofs

Ibm research europe, zurich, phd student, university of new south wales, assistant professor in security and network engineering, university of amsterdam, the netherlands, assistant or associate professor in cybersecurity.

The School of Computer Science is looking to strengthen the existing Security and Privacy Research group. The available positions are linked to the chair in Applied Cryptography (held by Elisabeth Oswald): were are thus looking for applicants with a specific interest in applied cryptography in the context of hardware and embedded systems security (e.g. pre-silicon leakage and fault analysis, secure embedded software development, statistical side channel and fault evaluation techniques, machine and deep learning for side channels).

Senior Cryptographer Engineer

Phd student in security of ai hardware, university at albany, suny, department of electrical and computer engineering; albany, new york, ph.d. students in cryptography, university of wollongong, australia, postdoctoral researcher, sapienza university of rome, italy, multiple academic teaching positions, xiamen university malaysia, sepang, malaysia.

Xiamen University Malaysia is now seeking highly motivated, committed and qualified individuals for academic teaching positions in computer science and cyber security.

Candidates in computer science and cyber security are welcome to apply. The ideal candidate is expected to be able to support general computing subjects, as well as cyber security specialization subjects. Applicants must possess a PhD degree in a related discipline.

  • Digital Forensics and Investigation
  • Network Traffic Monitoring and Analysis
  • Advanced Network Attack and Defence Technology
  • Malware Analysis
  • Cryptanalysis
  • Blockchain Technology

HOW TO APPLY Applicants are invited to submit a digital application packet to: [email protected] and [email protected]

  • Your detailed and current CV with publication (*Asterisk to indicate corresponding author, include Indexing & Quartile);
  • Cover letter;
  • List of courses from the above that the candidate can support;
  • Evidence of academic qualifications (Bachelor, Master & PhD Certificate; Bachelor, Master & PhD Transcripts and Professional Certificates);
  • 3-5 Full-Text publications (if applicable);
  • Teaching evaluation (if applicable);
  • Two academic references (at least one of them is the applicant’s current/most recent employer).

Faculty of engineering, Bar-Ilan University, Israel

Ph.d. student.

I am looking for Ph.D. students in the area of analysing and preventing physical side channels in embedded devices. Two positions are available, which, as usual in the UK, enable the post holder to cover their tuition fees as well as enable them to cover their living expenses.

  • Pre-silicon modelling and analysis: you should be familiar with utilising a typical HW design flow, power simulation tools, and you should have an interest in developing skills in leakage modelling as well as analysis.
  • Statistical detection and analysis methods: you should be comfortable with probability theory and statistics, and you should have an interest in exploring sophisticated statistical approaches in the context of exploiting and detecting leakage. This research may also touch on statistical learning methods.
  • Implementation and analysis of post-quantum schemes: you should be familiar with low level software implementations (aka Assembly programming), and have an interest in exploring implementation options (potentially also considering dedicated hardware, e.g. the impact of dedicated instructions) to develop secure and reasonably efficient post-quantum implementations.

If you feel that you fit with one (or several) of the three topics, or, if you believe that you can make a good case for another topic, then please get in touch (see contact info below). Please send me a transcript of records, and a short (1 page) statement explaining why you want to do a PhD with me). If I think that you are a viable candidate, I will guide you through the application process.

I am now a faculty member and thus part of the Birmingham Centre for Security and Privacy. You can find information about this research group here: https://www.birmingham.ac.uk/research/centre-for-cyber-security-and-privacy. This is a sizeable research group, which offers companionship via other PhD students and staff members, as well as opportunities via many good relationships with industry.

I-2421 – POST DOC IN SOFTWARE AND DATA SECURITY

Luxembourg institute of science and technology, university of new brunswick, computer science; fredericton, canada, i-2425 – post-doc in wireless network security, applied cyptographer, fully-funded phd position in lattice-based privacy enhancing technologies, monash university; melbourne, australia.

  • highly competitive scholarships to cover tuition fees, health insurance and living expenses (as stipend),
  • opportunities to collaborate with leading academic and industry experts in the related areas,
  • opportunities to participate in international grant-funded projects,
  • collaborative and friendly research environment,
  • an opportunity to live/study in one of the most liveable and safest cities in the world.

Requirements. A strong mathematical and cryptography background is required. Some knowledge/experience in coding (for example, Python, C/C++, SageMath) is a plus. Candidates must have completed (or be about to complete within the next 8 months) a significant research component either as part of their undergraduate (honours) degree or masters degree. They should have excellent English verbal and written communication skills.

How to apply. please first refer to mfesgin.github.io/supervision/ for more information. Then, please fill out the following form (also clickable from the advertisement title): https://docs.google.com/forms/d/e/1FAIpQLScOvp0w397TQMTjTa6T7TKqri703Z-c3en0aS654w6nl4_EFg/viewform

Embedded Crypto Software Developer (m/f/d)

Nxp semiconductors gratkorn/austria, hamburg/germany, eindhoven/netherlands & toulouse/france.

  • You will develop crypto algorithms (incl. Post Quantum Crypto) based on specifications, being involved from the coding/programming, test, code review, release stages.
  • You will align with our innovation team, architectural team, hardware teams and support teams to develop the algorithms which contribute to a complete security subsystem in all of NXP's business lines.
  • Bachelor + 3-5 years of relevant experience Or​ You are a graduate with a Master or PhD Degree in Computer Science, Electronics Engineering, Mathematics, Information Technology, Cryptography
  • You have a passion for technology, you bring ideas to the table and you are proud of your results.
  • We offer you the opportunity to learn and build on your technical knowledge and experience in some of the following areas: algorithm development including post quantum cryptography (DES, AES, RSA, ECC, SHA and many more)
  • embedded software development in C and Assembly
  • work with ARM Cortex M and RISC V platforms
  • Work on hardware and software countermeasures against side channel (SCA) and fault attacks, (FA).

Research Positions on Zero-Knowledge, Blockchain and MPC protocols, Ph.D. & Post-Doc

University of edinburgh and zk lab, pqshield ltd, research and development, phd internship, nokia bell labs; antwerp, belgium.

  • You are currently doing a PhD or PostDoc
  • Some familiarity with one of the areas: FHE, MPC or ZKP
  • Both applied and theoretical researchers are welcome
  • Fully funded internship with benefits (based on Belgian income standards)
  • Internship any time from now until the end of 2024
  • Possibility to visit local university crypto groups (e.g. COSIC KU Leuven)
  • A wonderful desk with a view of the Zoo of Antwerp (elephants and bisons visible)
  • Having access to the best beers and chocolates in the world

PhD student (fully funded)

Monash university, melbourne, australia.

At the Department of Software Systems and Cybersecurity (SSC) at Monash, we have several openings for PhD positions. The topics of interest are post-quantum cryptography (based on lattices and/or hash), their applications, and their secure and efficient software and hardware implementations.

  • We provide highly competitive scholarships opportunities to collaborate with leading academic and industry experts in the above-mentioned areas.
  • There will be opportunities to participate in (inter)nationally funded projects.
  • We have a highly collaborative and friendly research environment.
  • You will have an opportunity to live/study in one of the most liveable and safest cities in the world.

The positions will be filled as soon as suitable candidates are found.

  • Some mathematical and cryptography backgrounds.
  • Some knowledge/experience in coding (for example, Python, C/C++, and/or SageMath) is a plus.
  • Must have completed (or be about to complete within the next 6 months) a significant research component either as part of their undergraduate (honours) degree or masters degree.
  • Should have excellent verbal and written communication skills in English.

Ph.D. Position (Fully Funded)

Cea-list france & university of paris-saclay, france, postdoctoral researchers in post-quantum cryptography, institute of software chinese academy of sciences, phd position in cryptography and privacy engineering, technical university of darmstadt, germany.

The Cryptography and Privacy Engineering Group (ENCRYPTO) @CS Department @Technical University of Darmstadt offers a fully funded position as Doctoral Researcher (Research Assistant/PhD Student) in Cryptography and Privacy Engineering to be filled as soon as possible and initially for 3 years with the possibility of extension.

You'll work in the collaborative research center CROSSING funded by the German Research Foundation (DFG). In our project E4 Compiler for Privacy-Preserving Protocols, we build compilers to automatically generate optimized MPC protocols for privacy-preserving applications. See https://encrypto.de/CROSSING for details. As PhD@ENCRYPTO, you primarily focus on your research aiming to publish&present the results at top venues.

We demonstrate that privacy is efficiently protectable in real-world applications via cryptographic protocols. Our open and international working environment facilitates excellent research in a sociable team. TU Darmstadt is a top research university for IT security, cryptography and CS in Europe. Darmstadt is a very international, livable and well-connected city in the Rhine-Main area around Frankfurt.

  • Completed Master's degree (or equivalent) at a top university with excellent grades in IT security, computer science, or a similar area.
  • Extensive knowledge in applied cryptography/IT security and very good software development skills. Knowledge in cryptographic protocols (ideally MPC) is a plus.
  • Experience and interest to engage in teaching.
  • Self-motivated, reliable, creative, can work independently, and striving to do excellent research.
  • Our working language is English: Able to discuss/write/present scientific results in English. German is beneficial but not required.

Technical University of Munich, Germany

Postdoctoral researchers, mohammed vi polytechnic university (um6p), phd student or post-doc in sustainable trust anchor for iot, csem, neuchâtel ch.

Collaborating with two experienced teams in security, digital hardware and software, you will contribute to the development of an embedded anchor of trust for future generation of sustainable IoT devices, enabling features such as post quantum cryptography, threshold cryptography, distributed architectures, or reconfigurability over the air. You will be working closely with a diverse team of engineers and researchers, and you will take a leading role in transforming a vision into tangible IPs.

  • Research in applied cryptography and implementations for embedded devices.
  • Implement cryptography and security primitives for embedded devices; mainly HW/SW co-design.
  • Develop Proof of concepts based on advanced cryptography topics.
  • Harden security modules against side channel attacks, software attacks and other threats.
  • Adopt a holistic approach to design and implement robust features yielding solid foundations for end-to-end security.
  • Propose innovative security IPs, challenge them against state of the art and review them with peers.
  • PhD graduate or an MSc graduate.
  • Background in one or more of these fields: digital design, embedded software design and applied cryptography.
  • A high motivation to progress and excel in the field of applied cryptography and embedded security.
  • Experience in digital hardware or embedded software development.
  • Programming skills in VHDL, C, Python (or equivalent).
  • Fluent in English. French or German are an advantage.
  • Natural curiosity and ability to adapt to new situations.
  • Autonomous and hands-on, motivated to take initiative in the development of innovative solutions.
  • Open-minded attitude and well-developed team-spirit.

Post-docs and PhD Residencies

We have postdoc and PhD residency positions available at SandboxAQ [1]. We seek people interested in doing research in the areas of post-quantum cryptography, privacy, and machine learning applied to cybersecurity. The positions are remote, but allow for travel to collaborate with team members. The postdoc residencies are initially for two years, but with the option to extend it to up to three years, on mutual agreement. PhD residencies are up to one year.

  • Carlos Aguilar Melchor: https://dblp.org/pid/71/4606.html
  • Martin Albrecht: https://dblp.org/pid/92/7397.html
  • Nina Bindel: https://dblp.org/pid/167/3021.html
  • James Howe: https://dblp.org/pid/163/8680.html
  • Andreas Hülsing: https://dblp.org/pid/27/1744.html
  • Nicolas Gama: https://dblp.org/pid/49/4575.html
  • Sandra Guasch Castelló: https://dblp.org/pid/86/8292.html
  • Raphael Labaca-Castro: [email protected]
  • Parth Mishra: [email protected]
  • PQC : [email protected] and [email protected]

Senior Research Scientist - PQC

Sanboxaq (usa, remote; europe, remote; canada, remote).

The SandboxAQ team is looking for a Research Scientist to help functionalize the next generation of cryptographic systems. A successful candidate will be comfortable with research in post-quantum cryptography. We are open to strong candidates that reinforce existing expertise of the team as well as candidates extending our expertise. They will be part of a team of diverse cryptographers and engineers, where they will play a key role in efficient and effective enablement of the technologies being developed. They can learn more about what we’ve been doing so far by checking out the publications of our permanent researchers: Carlos Aguilar Melchor, Martin Albrecht, Nina Bindel, James Howe, Andreas Hülsing, and Anand Kumar Narayanan

Ph.D. internship or Post-Doc

Uclouvain crypto group, louvain-la-neuve, belgium, tu wien, security and privacy research unit.

  • Master degree in computer science or equivalent (degree completion by employment start)
  • Excellent English, communication, and teamwork skills
  • Background in formal methods (e.g., automated reasoning, type systems, or proof assistants) or cryptography
  • Experience in research is a plus
  • A job in an internationally renowned group, which regularly publishes in top security venues, and consists of an international, diverse, and inclusive team with expertise in formal methods, cryptography, security, privacy, and blockchains
  • Diverse research topics in formal methods for security and privacy, with a specific focus on cryptographic protocols and blockchains
  • An international English-speaking environment (German not required)
  • A competitive salary
  • Flexible hours

Postdoc Position in Zero Knowledge Proof Application and Acceleration

University of california san diego, department of electrical and computer engineering; san diego, ca.

  • Ph.D. in Computer Engineering, Computer Science, or a closely related field
  • Strong ability in at least C/C++ or Rust
  • Familiarity with popular open-source zero-knowledge proof frameworks
  • Publication record in top venues, with proven research record around zero-knowledge proofs
  • Strong theoretical understanding of zero-knowledge proofs and its various constructions
  • Ability to work on-site in San Diego

Postdoc Position in Privacy-Preserving Computation

  • Ph.D. in Computer Science, Computer Engineering, or a closely related field
  • Strong ability in at least C/C++, Python, or Rust
  • Familiarity with popular open-source privacy-preserving computation frameworks
  • Publication record in top venues, with proven research record in applied cryptography or adjacent field
  • Strong applied cryptography skills

Software Security Researcher

Technology innovation institute, hardware security researcher, quantstamp, remote/ anywhere, post-doc, research assistant/associate, assistant/associate/full professor, shanghai jiao tong university.

Northeastern University

Academic Catalog 2023-2024

Cybersecurity, phd.

A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Students who choose the PhD in Cybersecurity program have a strong desire to pursue academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the college’s  Master of Science in Cybersecurity  program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to  gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science

A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a National Center of Academic Excellence in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations

The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern University’s Khoury College of Computer Sciences, the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities

Access to research projects at Northeastern’s research centers focused on security:

The Cybersecurity and Privacy Institute :  The mission of Northeastern's Cybersecurity and Privacy Institute is to safeguard critical technology. Forging partnerships with experts in industry, government, and academia worldwide, the Institute’s faculty and students develop, protect, and enhance technologies on which the world relies—from mobile devices and “smart” IoT applications to tomorrow’s self-driving cars and delivery drones. Their expertise spans algorithm auditing; cloud security; cryptography; differential privacy; embedded device security; internet-scale security measurements; machine learning; big data; security, malware, and advanced threats; network protocols and security; web and mobile security; and wireless network security.

The International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware, and vulnerability analysis; intrusion detection; and other computer security issues.

The ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

The benefits of the Boston area:

  • World-renowned for academic and research excellence, the Boston area is also home to some of the nation’s largest Department of Defense contractors and government and independent labs such as MIT Lincoln Lab, MITRE, and Draper Lab.

Degree Requirements

The PhD in Cybersecurity degree requires completion of at least 48 semester credit hours beyond a bachelor’s degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master’s degree en route to the PhD.

Doctoral Degree Candidacy

A student is considered a PhD degree candidate after  completing the core courses with at least a 3.500 GPA, with no grades lower than a B in the core courses, and either publishing a paper in a strong conference or journal or passing an oral exam that is conducted by a committee of three cybersecurity faculty members and based on paper(s) written by the student.

One year of continuous full-time study is required after admission to the PhD candidacy. During this period, the student will be expected to make substantial progress in preparing for the comprehensive examination.

Teaching Requirement

All cybersecurity PhD students must satisfy the teaching requirement in order to graduate. This requirement is fulfilled when the student works as a teaching assistant or instructor of record for one semester and during this semester:

  • Teaches at least three hours of classes
  • Prepares at least one assignment or quiz or equivalent

PhD students are expected to satisfy the teaching requirement some time after completing their first year and at least one semester prior to scheduling their PhD defense. 

Dissertation Advising

The doctoral dissertation advising team for each student consists of two cybersecurity faculty members, one in a technical area. When appropriate, the second faculty advisor will be from the policy/social science area.

Dissertation Committee

With the help of the advisor, a student selects the committee, consisting of at least four members, to be approved by the PhD cybersecurity curriculum committee. The four members must include the advisor, two internal members, and an external member.

Comprehensive Examination

A PhD student must submit a written dissertation proposal and present it to the dissertation committee. The proposal should identify the research problem, the research plan, and the potential impact of the research on the field. The presentation of the proposal will be made in an open forum, and the student must successfully defend it before the dissertation committee after the public presentation.

Dissertation Defense

A PhD student must complete and defend a dissertation that involves original research in cybersecurity.

Awarding of Master’s Degrees

Students who enter the PhD in Cybersecurity program with a bachelor’s degree have the option of obtaining a master's degree from one of the departments participating in the program. To do so, they must meet all of the department’s degree requirements.

Bachelor’s Degree Entrance

Complete all courses and requirements listed below unless otherwise indicated.

Teaching Qualifying exam and area exam Annual review Dissertation proposal Dissertation committee Dissertation defense

Core Requirements

A grade of B or higher is required in each core course. A cumulative 3.500 grade-point average is required for the core requirement.

Electives and Tracks

Dissertation, program credit/gpa requirements.

48 total semester hours required Minimum 3.000 GPA required

Incoming PhD in cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.

Refer to the PhD Cybersecurity overview for admission to candidacy requirements.

Refer to the PhD Cybersecurity  overview  for residency requirements.

Refer to the PhD Cybersecurity  overview for teaching requirements.

Refer to the PhD Cybersecurity  overview for dissertation advising requirements.

Refer to the PhD Cybersecurity  overview for dissertation committee requirements.

Refer to the PhD Cybersecurity  overview  for comprehensive examination requirements.

Refer to the PhD Cybersecurity  overview  for dissertation defense and completion requirements.

Core Requirement

Students  are  required to  take all  core courses  unless otherwise  determined by  the program.  Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.

Students  are  required to  take all  courses  unless otherwise  determined by  the program.

Minimum 16 semester hours required Minimum 3.000 GPA required

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

Cryptography Research Group

Paul G. Allen School of Computer Science & Engineering University of Washington

phd cryptography

The Cryptography Group in the Paul G. Allen School of Computer Science & Engineering carries out research on a wide range of topics in the foundations and applications of cryptography. These include public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, zero-knowledge proofs, anonymous credentials, post-quantum and quantum cryptography, information-theoretic cryptography, and more.

We meet weekly for a reading group/seminar . Also subscribe to seattle-crypto for annoucements of cryptography-related events in the Seattle area.

Check out our cryptography classes .

Our research has been supported by NSF, DARPA, the Simons Foundation, the Sloan Foundation, CISCO, JP Morgan, and Microsoft.

Related groups: [UW Theory] [UW Security & Privacy] [MSR Cryptography, Security, and Privacy] [UW Blockchain Lab]

phd cryptography

Graduate Students

phd cryptography

Former Members

John Retterer Moore MS 2015

Wei Dai MS 2016 → UCSD (PhD) → Bain Capital Crypto (Research Partner)

Binyi Chen PhD 2019 → Google → Espresso Systems (Chief Cryptographer)

Michael Agun PhD 2019 → Western Digital

Pratik Soni PhD 2020 → CMU (postdoc) → University of Utah (Assistant Professor)

Xihu Zhang MS 2022 → Oracle

Ashrujit Ghoshal PhD 2022 → CMU (postdoc)

Viet Tung Hoang Postdoc 2015-16 → Florida State University ( Assistant Associate Professor)

Christian Matt Postdoc 2017-18 → Concordium (Senior Researcher)

Aishwarya Thiruvengadam Postdoc 2017-18 → TU Darmstadt (Postdoc) → IIT Madras (Assistant Professor)

Marshall Ball Postdoc 2020-21 (CI Fellow) → New York University (Assistant Professor)

Joseph Jaeger Postdoc 2019-21 → Georgia Institute of Technology (Assistant Professor)

Tianren Liu Postdoc 2019-21 → Peking University (Assistant Professor)

30 cryptography PhD positions

Filtered by.

  • cryptography

Refine Your Search

  • Scholarship 24
  • Research Job 6
  • Luxembourg 3
  • United Kingdom 3
  • Netherlands 2
  • Technical University of Denmark 4
  • NTNU - Norwegian University of Science and Technology 3
  • University of Luxembourg 3
  • NORWEGIAN UNIVERSITY OF SCIENCE & TECHNOLOGY - NTNU 2
  • Technical University of Munich 2
  • University of Innsbruck 2
  • ; Newcastle University 1
  • ; The University of Edinburgh 1
  • CEA, Leti 1
  • Grenoble INP - Institute of Engineering 1
  • NTNU Norwegian University of Science and Technology 1
  • Universitat Oberta de Catalunya 1
  • University of Agder 1
  • University of Amsterdam 1
  • University of Newcastle 1
  • University of Oslo 1
  • University of Twente (UT) 1
  • Computer Science 19
  • Mathematics 3
  • Materials Science 2
  • Chemistry 1
  • Engineering 1

PhD Studentship in Foundations of Quantum Computing and Quantum Cryptography

cryptography ”. Project description: Many quantum cryptographic protocols rely on cryptographic tasks like bit-commitment and coin-flipping, which are impossible to achieve perfectly in classical systems but can

PhD Student in Cryptography

16.02.2024, Wissenschaftliches Personal The position for a PhD student in Cryptography (m/f/d, initially for three years, 100% position) is available in the newly formed research group led by Lorenz

Postdoc Fellow in (post) quantum security of proof systems

security. In particular, the subgroup ''Quantum Lab'' research directions include post-quantum cryptography , quantum cryptography , deniability in quantum cryptography and communication, quantum key exchange

Researcher (PhD), for the KISON group of the IN3 (Internet Interdisciplinary Institute) of the UOC.

. Essential knowledge of Networks, Data Security, Applied Cryptography and Latex. Knowledge of qualitative and quantitative data analysis techniques. English level from B2 of the common framework of reference

University Assistant (PhD position)

to: write a dissertation in the area of cryptography for secure and privacy friendly computation research in the area of design and analysis of cryptographic functions for secure and privacy friendly

Doctoral researcher (PhD candidate) in Computer Science

, part of the Laboratory of Algorithmics, Cryptography and Security (LACS), embedded in the Department of Computer Science (DCS) of Faculty of Science, Technology and Medicine (FSTM), is currently looking

PhD Thesis: Enhancing the performance of microsensors through chaos

into MEMS performance but also pave the way for exciting applications, for example in the field of cryptography . The PhD candidate will benefit from Grenoble’s thriving scientific environment and will be

PhD Studentship - On Demand Entangled Photons for Quantum Optics

including quantum cryptography and quantum computing. This PhD project will develop an ultra-efficient platform to generate on-demand entangled photons for the future of quantum technologies. We are looking

PhD fellowship in Neuroimaging (ref 261229)

promises massive impacts on fields ranging from communication and cryptography to sensing and computing. Importantly, quantum sensors harness the rapid interactions between quantum systems and their

Searches related to cryptography

  • computer science
  • mathematics
  • postdoctoral
  • computer science cryptography
  • coding theory

phd cryptography

  • Ph.D. Program

Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department . All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research fellowships, or teaching fellowships. As a PhD candidate, you will share in the excitement of discovery as you collaborate with our faculty on cutting edge research . You also will acquire strong, independent research skills and begin to develop your own skills and reputation as a member of the research community.

You will find the work here challenging and personally rewarding. Students who complete our PhD program are well-prepared for careers in academia, research, government and industry. Please visit our Graduate Admissions Information page for application requirements, deadlines, and other important information.

Prospective Ph.D. students should review our publications and related security papers and contact us at [email protected] .

Research Areas

  • Health and Medical Security
  • Cryptography & Privacy
  • Graduate Studies at ISI
  • MSSI Course Distribution
  • Capstone Project
  • Dual-Degree Opportunities
  • Cybercorps: Scholarship for Service Program
  • Part-Time and Online Programs (Engineering for Professionals)

Johns Hopkins University | Whiting School of Engineering

  • Who’s Teaching What
  • Subject Updates
  • MEng program
  • Opportunities
  • Minor in Computer Science
  • Resources for Current Students
  • Program objectives and accreditation
  • Graduate program requirements
  • Admission process
  • Degree programs
  • Graduate research
  • EECS Graduate Funding
  • Resources for current students
  • Student profiles
  • Instructors
  • DEI data and documents
  • Recruitment and outreach
  • Community and resources
  • Get involved / self-education
  • Rising Stars in EECS
  • Graduate Application Assistance Program (GAAP)
  • MIT Summer Research Program (MSRP)
  • Sloan-MIT University Center for Exemplary Mentoring (UCEM)
  • Electrical Engineering
  • Computer Science
  • Artificial Intelligence + Decision-making
  • AI and Society
  • AI for Healthcare and Life Sciences
  • Artificial Intelligence and Machine Learning
  • Biological and Medical Devices and Systems
  • Communications Systems
  • Computational Biology
  • Computational Fabrication and Manufacturing
  • Computer Architecture
  • Educational Technology
  • Electronic, Magnetic, Optical and Quantum Materials and Devices
  • Graphics and Vision
  • Human-Computer Interaction
  • Information Science and Systems
  • Integrated Circuits and Systems
  • Nanoscale Materials, Devices, and Systems
  • Natural Language and Speech Processing
  • Optics + Photonics
  • Optimization and Game Theory
  • Programming Languages and Software Engineering
  • Quantum Computing, Communication, and Sensing
  • Security and Cryptography
  • Signal Processing
  • Systems and Networking
  • Systems Theory, Control, and Autonomy
  • Theory of Computation
  • Departmental History
  • Departmental Organization
  • Visiting Committee
  • Explore all research areas

Our research is focused on making future computer systems more secure.

We bring together a broad spectrum of cross-cutting techniques for security, from theoretical cryptography and programming-language ideas, to low-level hardware and operating-systems security, to overall system designs and empirical bug-finding.  We apply these techniques to a wide range of application domains, such as blockchains, cloud systems, Internet privacy, machine learning, and IoT devices, reflecting the growing importance of security in many contexts.

phd cryptography

Latest news in security and cryptography

Qs ranks mit the world’s no. 1 university for 2024-25.

Ranking at the top for the 13th year in a row, the Institute also places first in 11 subject areas.

QS World University Rankings rates MIT No. 1 in 11 subjects for 2024

The Institute also ranks second in five subject areas.

This tiny chip can safeguard user data while enabling efficient computing on a smartphone

Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.

Department of EECS Announces 2024 Promotions

The Department of Electrical Engineering and Computer Science (EECS) is proud to announce multiple promotions.

Study: Smart devices’ ambient light sensors pose imaging privacy risk

The ambient light sensors responsible for smart devices’ brightness adjustments can capture images of touch interactions like swiping and tapping for hackers.

Upcoming events

Finding balance in academia, doctoral thesis: making sense of training large ai models, doctoral thesis: hybrid magnonics in antiferromagnets and cavity spintronic devices, doctoral thesis: guiding deep probabilistic models, doctoral thesis: designing for participation and power in data collection and analysis.

Security and Cryptography

We use cookies to help our site work, to understand how it is used, and to tailor ads that are more relevant to you and your interests.

By accepting, you agree to cookies being stored on your device. You can view details and manage settings at any time on our cookies policy page.

Person pointing finger at screen

Cryptography

Offering an arsenal of techniques to provide effective protection against the increasing cyber threat, cryptography is an integral part of many of our research projects.

With outstanding expertise in this field, we focus on advanced techniques and applications such as high-function encryption schemes and digital signatures, authentication and key exchange protocols, and cryptographic solutions for privacy-preserving identity management, secure data sharing and information exchange.

Global authority on cryptography

Our Centre’s research into hardware security and cryptography is led by Professor Liqun Chen , previously principal research scientist in the Security and Manageability Laboratory at Hewlett Packard Labs. Professor Chen has invented or co-invented cryptographic solutions which have been incorporated into international standards and used in applications millions of people use every day.

Having been instrumental in developing the Trusted Platform Module (TPM) – a hardware chip that ensures security by integrating cryptographic keys and algorithms in devices – Professor Chen is currently focused on helping to develop a Quantum-Resistant TPM and researching other aspects of post-quantum cryptography.

Professor Chen serves as a UK expert on the development of international standards for cryptographic mechanisms (ISO/IEC JTC 1 SC 27 Working Group 2). In addition to reviewing a range of this working group’s ISO/IEC standards, she directly serves as:

  • Editor of ISO/IEC 11770-7, IT Security technology – Key management – Part 7: Cross-domain password-based authenticated key exchange
  • Co-editor of ISO/IEC 20008-3, IT Security technology – Anonymous digital signatures – part 3: Mechanisms using multiple public keys

Professor Chen is also involved in the British Standard Institutes IST/33-2 sub-committee, serving as its vice chairman. This committee makes the UK’s contributions to ISO/IEC JTC 1 SC 27/WG 2.

Read more about the Future TPM project .

Student projects

Our PhD students are conducting an important body of research in the field of cryptography, with a number sponsored by external companies and government. Two students are collaborating with ObjectTech – a company aimed at delivering ‘seamless travel’ through airports, borders and events – to explore lattice-based cryptography for blockchain applications, making them more secure against future technological advances.

Other student projects are focused on post-quantum cryptography research, developing algorithms resistant to attacks by quantum computers which will be required by Trusted Platform Modules in the future.

Cryptography Laboratory

Top: Igor Carboni, Seung Geol Choi, Tal Malkin, Moti Yung

Bottom: Kwangsu Lee, Fernando Krell, George Argyros, Anthi Orfanou

phd cryptography

Our interests cover a broad variety of topics, including: secure computation, cryptographic complexity, strong public key encryption, private data mining, information-theoretic cryptography, cryptocurrencies, hardware side channel attacks and cryptographic counter measures, and connections to learning theory.

RECENT NEWS

Cryptography Laboratory Columbia University Department of Computer Science 500 West 120th Street New York, NY 10027

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications open

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Choose your programme

Please read the Application Guidance before proceeding with your application.

Year of entry: 2024-2025

Got questions get in touch.

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's
  • Publications

Stanford University

phd cryptography

I am a PhD student in the Applied Cryptography Group at Stanford University . My advisor is Dan Boneh . I got my bachelor’s in Computer Science and Mathematics from Georgia Tech . My area of research is Cryptography and Computer Security.

Gates Computer Science Building, Room 494 353 Serra Mall Stanford, CA 94305

Email: skim13@cs.stanford.edu

  • Utility Menu

University Logo

Applied Cryptography and Society

ACS logo

David C Parkes

George F. Colony Professor of Computer Science, Harvard Paulson School Co-Director, Harvard Data Science Initiative [email protected]

Professor Kung

William H. Gates Professor of Computer Science and Electrical Engineering, Harvard Paulson School Vinton Hayes Senior Research Fellow in Electrical Engineering [email protected]

Professor Mitzenmacher

Michael D Mitzenmacher

Thomas J. Watson Professor of Computer Science, Harvard Paulson School [email protected]

Professor Chong

Stephen Chong

Gordon McKay Professor of Computer Science, Harvard Paulson School Co-Director of Undergraduate Studies, Computer Science [email protected]

Shrutarshi Basu

Shrutarshi Basu

Postdoc in Computer Science [email protected]

headshot

Francisco J. Marmolejo-Cossío

Postdoc in Computer Science (starting July 2021) [email protected]

Mattheus V. X. Ferreira

Mattheus V. X. Ferreira

Postdoc in Computer Science (starting Sept. 2021) [email protected]

Yonatan Sompolinsky

Yonatan Sompolinsky

Postdoc in Computer Science [email protected]

Surat Teerapittayanon

Surat Teerapittayanon

Postdoc in Computer Science [email protected]

PhD students

Anitha Gollamudi

Anitha Gollamudi

PhD Student in Computer Science [email protected]

Eric Knorr

PhD Student in Computer Science [email protected]

Daniel Moroz

Daniel Moroz

PhD Student in Computer Science [email protected]

Master's and Undergraduate Students

Ben Altschuler

Ben Altschuler

Undergraduate in Computer Science [email protected]

Michael Neuder

Michael Neuder

Masters Student in Computational Science and Engineering [email protected]

Rithvik Rao

Rithvik Rao

Undergraduate in Computer Science and Economics [email protected]

Ran Ben Basat

Ran Ben Basat

Alumni Assistant Professor at University College London [email protected]

Ann Marie King

Ann Marie King

Faculty Coordinator [email protected]

Quantiki

Quantum Information Portal and Wiki

Fully funded phd position in (post-)quantum cryptography at bochum, job type: , application deadline: , employer web page: .

The groups of Cryptology and Quantum Information (Alexander May and Michael Walter) at Ruhr University Bochum are looking for an excellent candidate for a fully funded Ph.D. position as part of Quantum-Safe Internet (QSI) , a Marie Curie Innovative Training Network (MSCA-ITN) . The QSI network involves top-ranking partner universities from France, Italy, Germany, the Netherlands, Denmark, Spain, the UK, and Switzerland, as well as industrial partners. At Bochum, you can expect an excellent research environment, including the Center of Excellence CASA and the Max-Planck Institute for Security and Privacy .

You will conduct research in algorithms for classical and quantum cryptanalysis and publish/present the results at top venues for research in classical and quantum cryptography and IT Security. You will be jointly supervised by Alexander May and Michael Walter.

Your profile:

  • Master’s degree or equivalent in computer science, mathematics, theoretical physics, or a related field.
  • Outstanding grades in classes related to cryptography, (quantum) algorithms, theoretical CS, or mathematics. (Familiarity with provable security and/or a strong mathematical background are a plus.)
  • Excellent communication/writing skills in English. (No German required.)
  • Compliance with the MSCA-ITN mobility rule: You must not have resided or carried out your main activity (work, studies, etc.) in Germany for more than 12 months in the 36 months immediately before your recruitment date.
  • Full-time employment for the duration of the PhD (four years at Ruhr-University Bochum).
  • A well-rounded training offered by the QSI network, covering a range of topics related to secure communications in the quantum era, as well as complementary training intended to enhance your personal development.
  • Generous travel budget that allows for, e.g., exposure to different sectors via planned placements and attendance of summer schools.

The position is to be filled as soon as possible. We strongly encourage applications from members of any underrepresented group in our research area.

To apply or for questions, contact [email protected] .

Applications should contain the following in a single PDF:

  • Cover letter describing your background and research interests
  • CV, including transcripts
  • Contact details of 2-3 potential references
  • A link to your MSc thesis (draft), if available

Deadline for application: Sep 28, 2022.

Search this site

  • Create new account
  • Request new password
  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support

PhD Projects in Cryptography

PhD projects in Cryptography are one of the great research daises. It helps scholars to create a good impact on the research world. In fact, the main scope of this area is to bring out the  “data privacy, ease of use, and veracity.”  For this reason, it uses complex math and logic to  create strong encryption and decryption methods. We have listed some interesting ideas in which PhD projects in cryptography can be implemented,

As well, cryptography is present in our daily life applications as follows,

  • Remote electronic polling
  • ATM, smart card
  • biometric-based smartphone passwords
  • military communications
  • e-transaction

Up-to-date Cryptographic Techniques

  • Elliptic Curve Cryptography
  • Post Quantum Cryptography
  • Pairing Based Cryptography
  • Public Key Infrastructure (PKI) Testing
  • Random Bit Generation
  • Homomorphic Encryption
  • Block Encryption and Message Digest

Other Aspects of Security

  • Certificate Generation and Authorities
  • Blockchain Technology
  • Pseudo-Random Function
  • Secret Key Distribution
  • Message Authentication Code
  • Hashing and Digital Signature

Our experts have a scholarly mind to reach the goal line of best security through above all approaches. And also, we are good in other algorithms as follows,

AES, El-Gammal, 3DES, SHA-256, MD5, RC4/5/6, ECDSA, IDEA, Blowfish, Twofish, DEAL, CAST-256, MARS, and etc.

Then in recent days, we are enduring our research on  ‘lightweight cryptography.’  That is to say, it has the aim to attain effective  resource use  despite any domain. On the whole, we are keen on all our activities from top to bottom. To the end, we assure you that you hold the “Grade A” final work from us. Thus have faith in PhD projects in Cryptography to complete your research.

Here, we have enlisted few more research concepts from our PhD projects in Cryptography,

Practical Cryptanalysis - Public Key Cryptosystem using Morphism of Polynomials Problem

A Robust Elliptic Curve Cryptography-Based Mutual Authentication Scheme for Telecare Medical Information Systems(TMIS)

Securing Edge Devices in the Post-Quantum in IoT Using Lattice-Based Cryptography

Secure Authentication based on Delegation for Telecare Medicine Information Systems

A Novel Efficient ECC-Based Pairing-Free CP-ABE for Internet of Things

Encryption and Key Agreement using Security Formalizations and Their Relationships in Information-Theoretic Cryptography

A Cloud-Based Secure Services Management using Cognitive and Biometric Methodologies  

Key Distribution System based on Identity for Link Layer Security in AMI Networks

Tolerating Sensitive-Leakage in Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware IoT

Node Localization using LLE based on Patch with Selective Neighborhood

Secure Communication on 5G Nets : True Random Number Generator Approach based on Visible Spectrum

An Efficient QC-LDPC and QC-MDPC Codes based Public Key Encryption Scheme for Cryptanalysis

An Algebraic Codes-Based Quantum Symmetric Cryptosystem

Self-Reference Detection and Discrete Modulation and Continuous-Variable Quantum Key Distribution

QR Codes-Based Visual Cryptography Scheme With Meaningful Shares

Smart Building :A Lightweight and Flexible Encryption Scheme for Sensitive Data Security

Smart Grid-Based An Anonymous Self-Certified Key Distribution Scheme using Elliptic-curve cryptography

An Efficient Client-Side Deduplication of Encrypted Data in Cloud-Based Public Auditing

Authorized public cloud storage auditing scheme based on Identity with hierarchical structure for large-scale user groups

Blind Proxy Re-Signature Scheme using Polynomials Isomorphisms

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Phd Projects In Visual Cryptography

Phd Projects In Web Technology

Phd Projects In System Cybernetics

Phd Projects In Digital Forensics

Phd Projects In Webservice

Phd Projects In Systems And Cybernetics

Phd Projects In Information Forensics Security

Phd Projects In Security

Phd Projects In Networking

Phd Projects In Information Security

Phd Consultancy Services

Phd Projects In Information Technology

Phd Projects In Augmented Reality

Phd Projects In Cybersecurity

Phd Projects In Dependable And Secure Computing

COMMENTS

  1. Open Positions in Cryptology

    We are looking for one PhD student who will work on cryptography and privacy-preserving machine learning. The position is a fully funded PhD position. The candidate must hold a Master's degree in Computer Science, Electrical and Computer Engineering, or a related area, and a have a strong background in mathematics and cryptography and good ...

  2. Computer Science (Cybersecurity), PhD

    The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. ... including applied cryptography, computer and network security, computer forensics, data and information security and software security. ...

  3. cryptography PhD Projects, Programmes & Scholarships

    FindAPhD. Search Funded PhD Projects, Programmes & Scholarships in cryptography. Search for PhD funding, scholarships & studentships in the UK, Europe and around the world.

  4. Cybersecurity, PhD

    Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...

  5. NYU Cryptography Group

    The NYU Cryptography Group researches various aspects of cryptography, from definitions and proofs of security, to cryptographic algorithms and protocol design. Ultimately, we aim to enable the construction and deployment of secure information systems and computing infrastructures. On a high level, our research includes:

  6. Cryptography Research @ UW

    The Cryptography Group in the Paul G. Allen School of Computer Science & Engineering carries out research on a wide range of topics in the foundations and applications of cryptography. These include public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, zero-knowledge proofs, anonymous credentials, post-quantum and quantum ...

  7. 36 cryptography PhD positions

    PhD Student in Cryptography. Technical University of Munich | Germany | about 1 month ago. 16.02.2024, Wissenschaftliches Personal The position for a PhD student in Cryptography (m/f/d, initially for three years, 100% position) is available in the newly formed research group led by Lorenz.

  8. Ph.D. Program

    Ph.D. Program. Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department. All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research ...

  9. Applied Cryptography Group

    Applied Cryptography Group. The Applied Crypto Group is a part of the Security Lab in the Computer Science Department at Stanford University. Research projects in the group focus on various aspects of network and computer security. In particular the group focuses on applications of cryptography to real-world security problems.

  10. PDF A Graduate Course in Applied Cryptography

    A Graduate Course in Applied Cryptography Dan Boneh and Victor Shoup Version 0.5, Jan. 2020. Preface Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at

  11. Security and Cryptography

    Security and Cryptography. Our research is focused on making future computer systems more secure. We bring together a broad spectrum of cross-cutting techniques for security, from theoretical cryptography and programming-language ideas, to low-level hardware and operating-systems security, to overall system designs and empirical bug-finding.

  12. Cryptography Research

    The Cryptography Group is part of the Theory and Security groups in the EECS Department at the University of California, Berkeley.. Research in the group spans topics in cryptography from theory to applications. We study foundational questions on subjects such as computing on encrypted data, functional encryption, program obfuscation, verifiable computation, zero-knowlege proofs, and others.

  13. UCSD CSE -- Security and Cryptography

    Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego.Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography ...

  14. Cryptography research

    Our PhD students are conducting an important body of research in the field of cryptography, with a number sponsored by external companies and government. ... Other student projects are focused on post-quantum cryptography research, developing algorithms resistant to attacks by quantum computers which will be required by Trusted Platform Modules ...

  15. Cryptography Laboratory at Columbia University

    The Cryptography Lab at Columbia University is a research group developing sound mathematical foundations for applications requiring security. The lab is headed by Tal Malkin at the department of Computer Science , and is in the intersection of the Theory of Computation group and the Systems Security Center. We are also affiliated with the ...

  16. Cybersecurity MPhil/PhD

    Who this course is for. This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today's societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

  17. Sam Kim

    I am a PhD student in the Applied Cryptography Group at Stanford University. My advisor is Dan Boneh. I got my bachelor's in Computer Science and Mathematics from Georgia Tech. My area of research is Cryptography and Computer Security. Contact. Gates Computer Science Building, Room 494 353 Serra Mall Stanford, CA 94305 . Email: skim13@cs ...

  18. Computer Science (cryptography) PhD Projects, Programmes ...

    PhD Scholarship in Quantum-Safe Security Measures for IoT-based Intelligent Transport Systems. UNSW Sydney School of Computer Science and Engineering (CSE) A PhD scholarship is available for applicants with outstanding research potential and an interest in quantum-safe security measures for IoT deployments. Read more.

  19. Faculty

    Applied Cryptography and Society School of Engineering and Applied Sciences Harvard University 150 Western Avenue Allston MA 02134 [email protected]

  20. PhD Cryptography Jobs, Employment

    Cryptography Research Scientist (FHE) Zenith Electronics, LLC. Hybrid work in Santa Clara, CA. $115,000 a year. Stay abreast of the latest developments in cryptography and privacy-enhancing technologies by participating/following related standards, conferences and…. Posted 30+ days ago ·.

  21. Fully funded PhD Position in (Post-)Quantum Cryptography at Bochum

    The groups of Cryptology and Quantum Information (Alexander May and Michael Walter) at Ruhr University Bochum are looking for an excellent candidate for a fully funded Ph.D. position as part of Quantum-Safe Internet (QSI), a Marie Curie Innovative Training Network (MSCA-ITN).The QSI network involves top-ranking partner universities from France, Italy, Germany, the Netherlands, Denmark, Spain ...

  22. What kind of careers can I pursue with a PhD? : r/crypto

    My blog, Why I left Cryptography explains how having a PhD and doing crypto research didn't work for me, which comes down to this: I eventually decided that where I live was more important than my career, and that place did not have many opportunities for continuing research. However, at the end you will see that I found related work (but not research) and having the PhD in crypto has been a ...

  23. PhD Projects in Cryptography

    PhD projects in Cryptography are one of the great research daises. It helps scholars to create a good impact on the research world. In fact, the main scope of this area is to bring out the "data privacy, ease of use, and veracity." For this reason, it uses complex math and logic to create strong encryption and decryption methods.We have listed some interesting ideas in which PhD projects ...

  24. 2024-2025 CSE Graduate Course Offerings

    These are TENTATIVE offerings for the 2024-2025 academic year. Be sure to read CSE Graduate Courses home page for quarter-by-quarter updates. Course #. Title. Fall 2024. Winter 2025. Spring 2025. CSE 200. Computability & Complexity.

  25. ‎Screaming in the Cloud: Building Smarter Authorization Systems with

    This episode explores the intricacies of authorization in software development with Sam Scott, CTO and co-founder of Oso. This conversation highlights the subtle yet critical differences between authentication and authorization, and why understanding these distinctions is pivotal for securing applic…

  26. Making Sentence Embeddings Robust to User-Generated Content

    Lydia Nishimwe is a third-year PhD candidate at Inria and Sorbonne Université (France) under the supervision of Dr. Rachel Bawden and Dr. Benoît Sagot. Her thesis is centered around making NLP models robust to user-generated content (UGC), specifically posts from social media websites (e.g. Twitter, Reddit).