Job Description
Key Responsibilities
- Conduct rigorous verification of existing NMC protocols to ensure their robustness against potential vulnerabilities and attacks.
 - Review and refine technical written materials such as whitepapers, research reports, and documentation to maintain accuracy and clarity.
 - Develop and document new security proofs for established NMC protocols, employing advanced mathematical and cryptographic techniques.
 - Optimize existing protocols to enhance their efficiency, reduce computational overhead, and improve scalability for real-world applications.
 - Design and implement protocol variants that cater to different operational requirements, such as synchronous/asynchronous communication, computational/ITS (Intellectual Property Security) models, and passive/active adversary scenarios.
 - Collaborate with cross-functional teams to design novel protocols from scratch, integrating cutting-edge cryptographic research and industry best practices.
 - Prepare and deliver internal presentations to educate colleagues on complex cryptographic concepts, protocol designs, and security methodologies.
 - Engage in regular brainstorming sessions to explore new ideas, propose innovative solutions, and contribute to the strategic direction of cryptographic research.
 - Stay updated with the latest advancements in cryptography and network security to ensure the protocols remain state-of-the-art and compliant with evolving standards.
 - Document all research processes, findings, and protocol modifications in a clear and structured manner for future reference and team collaboration.
 
Job Requirements
- PhD in Computer Science, Mathematics, or a related field with a focus on cryptography and network security.
 - Proven expertise in protocol design, security proofs, and formal verification methodologies.
 - Strong proficiency in cryptographic algorithms, including symmetric/asymmetric encryption, hash functions, and digital signatures.
 - Excellent analytical skills to identify and mitigate security risks in protocol implementations.
 - Ability to work independently and collaboratively in a remote environment, with strong communication skills for internal presentations.
 - Experience with tools such as formal verification frameworks (e.g., Tamarin, ProVerif), cryptographic libraries (e.g., OpenSSL, libsodium), and programming languages (e.g., Python, C++).
 - Knowledge of adversary models, including static/mobile adversaries, boolean/arithmetic operations, and attack scenarios like replay attacks, man-in-the-middle attacks, and side-channel attacks.
 - Strong written and verbal communication skills to articulate complex technical concepts clearly and concisely.
 - Ability to conduct thorough literature reviews and synthesize findings from academic papers and industry publications.
 - Excellent problem-solving skills to address challenging cryptographic problems and develop innovative solutions.
 - Proficiency in LaTeX for writing technical documentation and research papers.
 - Experience with cloud computing platforms and distributed systems for protocol testing and deployment.
 - Understanding of blockchain technologies and their security implications, if applicable to the role.
 - Ability to work with minimal supervision while maintaining high standards of accuracy and security.
 - Strong time management skills to meet project deadlines and deliverables in a remote work environment.
 


