| Workshop: MPC Security in Practice | Internships |
|---|---|
| Aarhus University | Aarhus University |
| 18 May 2026 | May-August 2026 |
| co-located with TPMPC 2026 |
About
Secure multi-party computation (MPC) has been studied theoretically for decades now, and we are starting to see deployment. While MPC security guarantees have been well-established in theoretical models, the security of actual (open-source) implementations is currently understudied. We believe there is a disconnect between the theory of MPC, where protocols are designed and analyzed on paper, and the reality of MPC implementations.
MPC in the Wild is a research project that aims to study the real-world implementation security of MPC protocols, in particular, the gap between assumptions on the theory side and implementation choices made in practice.
Workshop: MPC Security in Practice
On 18 May, 2026, we are organising a 1-day workshop on MPC Security in Practice as part of TPMPC 2026.
Contributed talks
We will solicit contributed talks on topics related to the project. Submissions will be handled as part of the TPMPC submission process, details to be announced.
Internships
We are looking for multiple interns to work with us on the project during Summer 2026. Interns are expected to be current or recent PhD students with a relevant background in at least one of the following research areas:
- Modeling of MPC (security) in general, or of real-world aspects of other types of cryptographic protocols
- Attacks on implementations of advanced cryptographic protocols such as MPC, ZK, or related protocols
- Implementations of MPC protocols and related protocols
In rare cases, we may also consider master or bachelor students with relevant expertise.
Timeline
| Application deadline | 7 January 2026 (AoE) |
| Tentative kick-off in Aarhus | 17 May 2026 |
| Workshop and TPMPC | 18-21 May 2026 |
| Internship | until around 14 August |
Interns are expected to participate in the full program. If you are interested but feel you cannot commit to the full duration (e.g. for medical reasons, care obligations, …) please mentions this in your application and we will see if we can find a solution.
Location
The internship will take place in the Cryptography and Security group at Aarhus University, Denmark.
How to apply
What we offer
Interns will be working on pre-agreed research projects with Peter Scholl and Sabine Oechsner, and possibly other members of the Cryptography and Security group. We will cover travel costs to and from Aarhus as well as a stipend to cover living expenses in Denmark. If needed, we can also offer support with visas and finding accommodation.
Research
Below, you can find some research results that led to or came out of this project:
- Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, and Peter Scholl. IEEE S&P 2025
- Covert Attacks on Machine Learning Training in Passively Secure MPC. Matthew Jagielski, Rahul Rachuri, Daniel Escudero and Peter Scholl
- Who Verifies the Verifiers? Lessons Learned From Formally Verified Line-Point Zero-Knowledge. Sabine Oechsner, Vitor Pereira, and Peter Scholl. Communications in Cryptology, 2025
Team
MPC in the Wild is run by
- Sabine Oechsner (VU Amsterdam) and
- Peter Scholl (Aarhus University).
Support
The project is supported by a Cryptanalysis Grant from Zama.