Sort by
Refine Your Search
-
Country
-
Employer
-
Field
-
security requirements. Taking an interdisciplinary approach, you will combine post-quantum cryptography and cyber security with methodologies from the social sciences to guide system design and evaluation
-
Deadline: 30 June 2025 A fully funded 3.5 year PhD position is available to work on the project titled “Scalable benchmarking for digital quantum computers based on blind testing”. This position is
-
Deadline: 30 June 2025 A fully funded four-year PhD position is available to work on the project titled “Real-world quantum verification and benchmarking of noisy hardware”. This position is a
-
and outreach activities of the department. The following topics are indications of possible research directions. - Post-quantum cryptography and fully-homomorphic encryption (Jean-Sébastien Coron
-
Your Job: Random unitaries are a ubiquitous tool in quantum information and quantum computing, with applications in the characterization of quantum hardware, quantum algorithms, quantum cryptography
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services