Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
are considered a bonus ▪ Knowledge in cryptography ▪ Experience with SDR platforms (e.g., USRP, NI VST, Ettus devices) Our offer ▪ Participation in a cutting‑edge research project with high societal impact
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Successful candidates will join the new Systems and Network Security Group led by Prof. Vincent
-
, Department of Computing invites applications for a 3-year position as doctoral researcher in the field of post-quantum cryptography. The fixed-term position starts as soon as possible on mutual agreement, and
-
, Department of Computing invites applications for a 2-year position as postdoctoral researcher in the field of post-quantum cryptography. The fixed-term position starts on mutual agreement, and the duration
-
, such as quantum sensing, quantum cryptography and quantum computation, with experiment limitations implemented as mathematical constraints. The applicant should have a a mastery of linear algebra
-
Cryptography , Applied Physics , artificial gauge fields , Artificial Intelligence , Astronomy , Astronomy and Astrophysics , Astroparticle Physics , astrophysics , Astrophysics (astro-ph) , Astrophysics
-
engineering field, including cryptography and network security, operating systems, computer forensics, and cyber-physical systems security. Other duties include contribution to the undergraduate and graduate
-
algebra, cryptography, number theory, and geometry. The ideal candidate will bring strong expertise in information theory or coding theory, with a research profile that aligns with one or more of the
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and