We are looking for motivated and talented individuals interested in applied cryptography, blockchain security, and post-quantum / quantum cryptography. We offer a rigorous, collaborative research environment at IISER Thiruvananthapuram with strong connections to the international cryptographic research community.
Call for Ph.D. Candidates
We are actively looking for highly motivated Ph.D. candidates in:
- Applied Cryptography — Searchable Encryption, Privacy-Preserving Computation, Secure Cloud Computing, Encrypted Graph Analytics.
- Blockchain & Layer-2 Technologies — Ethereum security, VDFs, consensus, post-quantum signatures.
- Candidates interested in Quantum Cryptography are also encouraged to apply.
Independent Fellowship Holders (CSIR/UGC-JRF, INSPIRE, etc.)
Candidates with an independent fellowship can apply directly at any time of the year. Please apply via the Google Form and send an email with subject: "Query related to PhD, Direct route".
Regular Ph.D. Admission Process
Apply through the regular IISER TVM Ph.D. admission process during official cycles (Vasanth / Sharad batches). Shortlisted candidates are invited for online interviews.
Eligibility
- Master's degree (M.Sc., M.S., M.Tech.) in Mathematics, Statistics, Computer Science, Engineering — highly preferred.
- Bachelor's degree (B.E./B.Tech.) in CS, IT, ECE, or related disciplines — also eligible.
- Prior knowledge of cryptography is not mandatory.
Research Internship (approx. 6 months)
6-Month Research Internship
Your application must include a separate PDF (in addition to your CV) containing:
- Subjects taken along with your confidence level in three preferred courses.
- Confidence level in: Linear Algebra, Abstract Algebra, Number Theory, Graph Theory, Algorithms, Programming in C, etc.
Apply via Research Internship Form →
IISER TVM students may send a direct email.
Summer / Winter Internship (approx. 2 months)
Summer / Winter Research Internship
Topics: cryptography, post-quantum cryptography, quantum cryptography, blockchain security. Coding knowledge is an advantage. Supervisor available primarily during May–August.
Expected Background
Core Mathematics & CS
- Linear algebra, abstract algebra, number theory — essential for cryptographic proofs.
- Probability theory and discrete mathematics.
- Algorithms and data structures; programming proficiency (C, Python, or equivalent).
Desirable for Cryptography Research
- Familiarity with symmetric/asymmetric cryptographic primitives.
- Understanding of security proofs and security models (ROM, QROM, simulation-based security).
- Exposure to lattice-based problems (LWE, SIS) — helpful but not required.
Desirable for Blockchain Research
- Basic understanding of distributed systems and consensus protocols.
- Familiarity with Ethereum, smart contracts, or Layer-2 concepts.
Contact
Dr. Laltu Sardar
School of Data Science, IISER Thiruvananthapuram
laltu.sardar@iisertvm.ac.in |
laltu-sardar.github.io