Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
this website: http://www.crypto-uni.lu/vacancies.html Your profile A PhD degree in cryptography Competitive research record in cryptography Fluent written and verbal communication skills in English are mandatory
-
and collaboration skills - Good academic proficiency in English (C1) - Expertise in cryptography is an advantage Website for additional job details https://emploi.cnrs.fr/Offres/CDD/UMR8243-TIFKON-007
-
such as post-quantum cryptography/system, quantum security, AI for security, security for AI, advanced security practice and advanced privacy enhancing technologies provides security and integrity of data
-
(please explicitly specify in your application): wireless security; embedded software security with an applied focus on Linux and Android; applied cryptography, including PQC, anonymous credentials, etc
-
within SCI and across other departments within Pitt, and initiatives like the $11.6M Western Pennsylvania Quantum Information Core (https://www.pitt.edu/pittwire/features-articles/pitt-investment-pa
-
for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team
-
intérêt d'une part pour des calculs effectifs de variétés tropicales, et d'autre part, pour l'étude de familles de systèmes polynomiaux issues notamment de la cryptographie post-quantique. Le point de
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
include signal processing, coding and modulation; the role of entanglement; error detection and correction; cryptography and security; and information processing in integrated quantum computers and in
-
motivated and enthusiastic Lecturer in Cyber Security. We welcome applicants who have experience in Ethical Hacking, System Penetration, Secure Software Development, Information Security and Cryptography