-
, and autonomy. You will join cross-disciplinary research teams working on prototype systems that integrate acoustic modems, sensor arrays, signal processing algorithms, and AI-enabled control
-
areas of interest in the mathematics of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely
-
the mathematics of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely related area. Responsibilities
-
, to requirements specification, to development and deployment. Creating and maintaining detailed system specifications and associated documentation based on system requirements, hardware components, algorithmic
-
of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely related area. Responsibilities for this position
-
in the mathematics of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely related area