Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
-Knowledge Proofs (ZKP). Attribute-Based Encryption (ABE). Post-Quantum Cryptography (PQC). Languages: Scientific English proficiency. Also of interest: The ability to work independently and as part of a team
-
technologies. Preferred Qualifications: Post-quantum cryptography and quantum‐secure systems engineering; Secure and trustworthy AI/ML systems; Quantum communications and quantum network security; Hardware trust
-
for Theory of Quantum Technologies University of GdańskCountryPolandState/ProvincepomorskieCityGdańskPostal Code80309StreetJana Bażyńskiego 1AGeofield Contact State/Province pomorskie City Gdansk Website https
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
faculty Position Location: Singapore, Singapore 637371, Singapore [map ] Subject Area: Post-Quantum Cryptography Appl Deadline: none (posted 2025/08/27 05:00 AM UnitedKingdomTime) Position Description
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
. · Artificial Intelligence, Machine Learning, and Data-Driven Systems – edge AI, embedded intelligence, and neuromorphic computing. · Cybersecurity & Privacy – hardware and IoT security, post-quantum cryptography
-
will involve cryptographic design and analysis to support secure, practical implementations for real-world quantum-resistant cryptography. The main application topics will be cryptographic voting, secure
-
. Classical cryptographic techniques face inherent limitations, especially regarding future threats from quantum computers or AI-driven adversarial strategies. Physical layer security offers a promising
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and