Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
—such as bent, plateaued, and almost perfect nonlinear (APN) functions—and the design of linear codes with prescribed properties useful for cryptography, including minimal, self-orthogonal, LCD and optimal
-
knowledge in several of the following areas: operating systems, computer systems architecture, cryptography, databases, networks Proven didactic skills Experience in scientific publishing This vacancy is open
-
Institute . It is embedded in the Discrete Mathematics cluster , offering close connections with researchers in applied algebra, cryptography, number theory, and geometry. The ideal candidate will bring
-
that also overlap with security (e.g., algorithms in the field, cryptography) are encouraged to apply. As per CSRankings.org, WSU is ranked in the Top 20 in design automation, Top 50 in cryptography
-
cryptography in programmable networked systems over resource-constrained setups. • Steer applied research directions in the areas of applied cryptosystems, trusted execution environments, programmable security
-
of cybersecurity including, but not limited to, symmetric and public-key cryptography, post-quantum cryptography, quantum algorithms in cryptography, or a closely related area. Responsibilities for this position
-
quantum security, post-quantum cryptography/system and security practice in general has been considered as important technologies which are indispensable to future network society built by quantum
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Large vision-language models (LVLMs) can describe driving scenes and support decisions [Li25], but
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
The Project Manager is a two-year, renewable, term role that provides project and financial management support for the Privacy and Cryptography Lab in the Computer Science Department within the College