We, and third parties, use cookies on our website. We use cookies to ensure that our website functions properly, to store your preferences, to gain insight into visitor behavior, but also for marketing and social media purposes (showing personalized advertisements). By clicking 'Accept', you agree to the use of all cookies. In our Cookie Statement. you can read more about the cookies we use and save or change your preferences. By clicking 'Refuse' you only agree to the use of functional cookies.
.jpg)
Are you fascinated by the theoretical underpinnings of security that allow for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team of young and motivated researchers? We are seeking a PhD student to carry out cutting-edge research in theoretical computer science, with an expected focus on cryptography.

Are you fascinated by the theoretical underpinnings of security that allow for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team of young and motivated researchers? We are seeking a PhD student to carry out cutting-edge research in theoretical computer science, with an expected focus on cryptography.
Cryptography’s task is to provide tools for maintaining the privacy and integrity of digital data. Unfortunately, almost all currently deployed public-key cryptography is known to be vulnerable if an attacker has access to a quantum computer. Given the near-term deployment of quantum computing technologies, the time to deploy post-quantum secure cryptography is now. Further, in a world with quantum computers, one can hope to find new cryptographic powers by exploiting quantum phenomena.
Code-based cryptography not only offers plausible security against quantum attacks; it also leads to practically efficient implementations of powerful cryptography such as secure multiparty computation and (non-)interactive proofs. However, our theory of its security is severely wanting. Firstly, unlike its close cousin of lattice-based cryptography, we lack a satisfactory theory of security reductions. Secondly, many recent proposals lack sufficient cryptanalysis. A possible direction of this PhD project is to fill in these holes and thereby offer a better foundation for the security of code-based cryptography.
The PhD candidate will greatly benefit from the active and growing community of theoretical computer science researchers within Amsterdam. Specifically, nearby experts from the CWI cryptology group and QuSoft will offer fertile collaborations on these topics.

Cryptography’s task is to provide tools for maintaining the privacy and integrity of digital data. Unfortunately, almost all currently deployed public-key cryptography is known to be vulnerable if an attacker has access to a quantum computer. Given the near-term deployment of quantum computing technologies, the time to deploy post-quantum secure cryptography is now. Further, in a world with quantum computers, one can hope to find new cryptographic powers by exploiting quantum phenomena.
Code-based cryptography not only offers plausible security against quantum attacks; it also leads to practically efficient implementations of powerful cryptography such as secure multiparty computation and (non-)interactive proofs. However, our theory of its security is severely wanting. Firstly, unlike its close cousin of lattice-based cryptography, we lack a satisfactory theory of security reductions. Secondly, many recent proposals lack sufficient cryptanalysis. A possible direction of this PhD project is to fill in these holes and thereby offer a better foundation for the security of code-based cryptography.
The PhD candidate will greatly benefit from the active and growing community of theoretical computer science researchers within Amsterdam. Specifically, nearby experts from the CWI cryptology group and QuSoft will offer fertile collaborations on these topics.
You are expected to:
We are looking for a candidate with:
A temporary contract for 38 hours per week for the duration of 4 years (the initial contract will be for a period of 18 months and after satisfactory evaluation it will be extended for a total duration of 4 years). The preferred starting date is as soon as possible. This should lead to a dissertation (PhD thesis). We will draft an educational plan that includes attendance of courses and (international) meetings. We also expect you to assist in teaching undergraduates and master students.
The gross monthly salary, based on 38 hours per week and dependent on relevant experience, ranges between € 3,059 to € 3,881 (scale P). This does not include 8% holiday allowance and 8,3% year-end allowance. The UFO profile PhD Candidate is applicable. A favourable tax agreement, the ‘30% ruling’, may apply to non-Dutch applicants. The Collective Labour Agreement of Universities of the Netherlands is applicable.
Curious about our extensive secondary benefits package? You can read more about it here.
You are expected to:
We are looking for a candidate with:
A temporary contract for 38 hours per week for the duration of 4 years (the initial contract will be for a period of 18 months and after satisfactory evaluation it will be extended for a total duration of 4 years). The preferred starting date is as soon as possible. This should lead to a dissertation (PhD thesis). We will draft an educational plan that includes attendance of courses and (international) meetings. We also expect you to assist in teaching undergraduates and master students.
The gross monthly salary, based on 38 hours per week and dependent on relevant experience, ranges between € 3,059 to € 3,881 (scale P). This does not include 8% holiday allowance and 8,3% year-end allowance. The UFO profile PhD Candidate is applicable. A favourable tax agreement, the ‘30% ruling’, may apply to non-Dutch applicants. The Collective Labour Agreement of Universities of the Netherlands is applicable.
Curious about our extensive secondary benefits package? You can read more about it here.
The Faculty of Science has a student body of around 8,000, as well as 1,800 members of staff working in education, research or support services. Researchers and students at the Faculty of Science are fascinated by every aspect of how the world works, be it elementary particles, the birth of the universe or the functioning of the brain.
The mission of the Informatics Institute (IvI) is to perform curiosity-driven and use-inspired fundamental research in Computer Science. The main research themes are Artificial Intelligence, Computational Science and Systems and Network Engineering. Our research involves complex information systems at large, with a focus on collaborative, data driven, computational and intelligent systems, all with a strong interactive component.
The Theory of Computer Science (TCS) group does research on the theoretical foundations of computer science. The aim is to seek greater understanding of the fundamental computational techniques and their inherent limitations.
Want to know more about our organisation? Read more about working at the University of Amsterdam.
The Faculty of Science has a student body of around 8,000, as well as 1,800 members of staff working in education, research or support services. Researchers and students at the Faculty of Science are fascinated by every aspect of how the world works, be it elementary particles, the birth of the universe or the functioning of the brain.
The mission of the Informatics Institute (IvI) is to perform curiosity-driven and use-inspired fundamental research in Computer Science. The main research themes are Artificial Intelligence, Computational Science and Systems and Network Engineering. Our research involves complex information systems at large, with a focus on collaborative, data driven, computational and intelligent systems, all with a strong interactive component.
The Theory of Computer Science (TCS) group does research on the theoretical foundations of computer science. The aim is to seek greater understanding of the fundamental computational techniques and their inherent limitations.
Want to know more about our organisation? Read more about working at the University of Amsterdam.
If you feel the profile fits you, and you are interested in the job, we look forward to receiving your application. You can apply online via the button below. We accept applications until and including 1 May 2026. The reviewing process will begin on 20 March 2026 and will continue until the position is filled.
Applications should include the following information:
Please make sure to provide ALL requested documents mentioned above. You can use the CV field to upload all requested documents, including the motivation letter, as one single pdf file.
Only complete applications received within the response period via the link below will be considered. Please do not send any applications by email.
A knowledge security check can be part of the selection procedure.
(for details: national knowledge security guidelines)
Only complete applications received within the response period via the link below will be considered.
If you have any questions or do you require additional information? Please contact:
If you feel the profile fits you, and you are interested in the job, we look forward to receiving your application. You can apply online via the button below. We accept applications until and including 1 May 2026. The reviewing process will begin on 20 March 2026 and will continue until the position is filled.
Applications should include the following information:
Please make sure to provide ALL requested documents mentioned above. You can use the CV field to upload all requested documents, including the motivation letter, as one single pdf file.
Only complete applications received within the response period via the link below will be considered. Please do not send any applications by email.
A knowledge security check can be part of the selection procedure.
(for details: national knowledge security guidelines)
Only complete applications received within the response period via the link below will be considered.
If you have any questions or do you require additional information? Please contact:








