Sort by
Refine Your Search
-
Category
-
Country
-
Employer
-
Field
-
ballot may leak the voter’s preferences if published publicly in plaintext, as the ranking order can reveal detailed information about the voter’s identity. Therefore encryption is necessary to hide
-
. The project will investigate how advanced and modern cryptographic protocols, such as zero-knowledge proofs, secure multiparty computation, homomorphic encryption, exotic signatures, and their post-quantum
-
importance in the field of cybersecurity and data protection, offering tools for data encryption and authentication. While public-key cryptography is crucial for exchanging the key or signing data, symmetric
-
continue reading! Join Us! Our modern society relies upon numerous electronic devices that use encryption to communicate and operate securely. However, even strong cryptography can break when the device
-
for Encrypted IoT Traffic Please note, this is open to home students only. PhD Studentship:cyberQuarter funded. The Studentship is available for an October 2025 start. A PhD studentship that comprises tax-free
-
APISID Use Used for targeting purposes to profile the interests of website visitors in order to display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted
-
and outreach activities of the department. The following topics are indications of possible research directions. - Post-quantum cryptography and fully-homomorphic encryption (Jean-Sébastien Coron
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and