Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. Within the department, the Secure and Networked Systems Division works broadly with research within Networked systems, Applied AI/ML, Computer Security and Cryptography. The division runs several research
-
teaching opportunities can be arranged if desired. The ideal candidate should have experience with machine learning, particularly in deep learning or related areas. No prior knowledge of cryptography is
-
environment. Preferred Qualifications: Cryptography: candidates should demonstrate in-depth understanding of modern cryptography, including, but not limited to: symmetric and asymmetric ciphers, elliptic-curve
-
areas of interest in the mathematics of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely
-
, such as quantum sensing, quantum cryptography and quantum computation, with experiment limitations implemented as mathematical constraints. The applicant should have a a mastery of linear algebra
-
within the Department of Electrical and Information Technology works broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has around 20 members
-
. We are looking for candidates whose work focuses on the broader area of Theory of Computing which includes complexity theory, algorithms, quantum computing, cryptography, differential privacy
-
like you? Then join our accomplished team! Your personal sphere of influence: The research group “Foundations of Cryptography” within the research group “Theory and Applications of Algorithms
-
, operating systems, programming languages, formal methods, real-time systems, security and cryptography, and theory of computation and algorithms. In addition, members of the Department collaborate closely
-
of Cryptography” within the research group “Theory and Applications of Algorithms” at the department of Computer Science focuses on provable security of cryptographic schemes. We develop new security definitions