San Francisco /
We’re building infrastructure for the future of the internet.
Mem is a distributed, privacy-focused protocol to support the next generation of decentralized applications being built for web3.
With Mem, users hold the keys to their data and can take it wherever they wish. APIs are no longer pegged to specific versions and can update themselves. Information can be exchanged without compromising privacy. This is only a small subset of what is possible with the tools we're building.
We don’t expect you to be an expert on everything in this list, but the more the better:
• In-depth knowledge of elliptic-curve cryptography, threshold signature schemes, multi-party computation.
◦ secp256k1, Ed25519, X25519, SHA2, SHA3, Blake3, ECDSA, Argon2
◦ Shamir’s secret sharing, Pallier cryptosystem, Damgard-Jurik cryptosystem
• Deep understanding of cryptographic techniques for differential privacy, selective disclosure, and non-repudiation.
◦ BBS+ signautures, k-anonymity, authenticated encryption, message authentication codes (MACs)
• Deep understanding of cryptographic primitives, strategies for designing cryptographic protocols, and formal verification methods.
◦ Merkle-Damgard constructions, sponge construction, HAIFA
◦ Digital signatures, symmetric and asymmetric key cryptography, private information retrieval, mix networks, commitment schemes
◦ Dolev-Yao model, pi-calculus, BAN logic
• Advanced knowledge of strongly typed languages or systems programming in C/C++, Rust, Go.
• Experience with of key management systems and best practices, like AWS KMS and Keycloak
• Experience with of hardware security modules (HSMs), iOS secure enclave, AWS HMS
• Knowledge and experience with standards from bodies like NIST (FIPS, AAL) and RSA (PKCS)
• Understanding of PKI, PGP, cryptographic certificates
◦ X.509 format, TLS, mTLS, HTTPS, DNS
• Experience with identity- and role-based access control management; authentication and authorization protocols.
◦ OAuth 2.0, OpenID, SAML 2.0, Multi-factor authentication
You’d like working here if the following describes you:
• Passion for creating effective and practical cryptographic schemes.
• Desire to work on deep technical problems that will have a large impact on internet infrastructure.
• Collaborate across teams to produce efficient and secure cryptographic modules.
• More than comfortable playing red team on both own and other’s work.
• Motivated and self-directed, with the ability to survey a problem space and anticipate bottleneck, and produce detailed spec docs when necessary.
All positions are full time unless otherwise noted.