Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
to the background of the applicant. Familiarity with cryptography and/or quantum optics is an advantage. Teaching experience will also be a valuable asset. What we offer We offer the applicant the opportunity
-
of cryptographic algorithms through solving polynomial systems of equations. It is crucial for building confidence in quantum safe cryptography, as well as novel symmetric encryption algorithms designed for use with
-
research internships. Criteria of the candidate: PhD in the field of Cryptography, Computer security or any related field. Strong publication record in high impact conferences / journals. Very good
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
. The successful candidate will be joining the Quantum Information Theory group led by Prof. Dr. Antonio Acin and will be working on on the quantum cryptography protocols and applications, from security proofs
-
Applied Physics (PAP). MAS covers diverse topics ranging from pure mathematics to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and
-
Research, Optimisation including Optimal Control, Information Theory including Coding Theory, Cryptography, Quantum Computing, Financial and Actuarial Mathematics, Mathematical Economics, Mathematical and
-
-Knowledge Proofs (ZKP). Attribute-Based Encryption (ABE). Post-Quantum Cryptography (PQC). Languages: Scientific English proficiency. Also of interest: The ability to work independently and as part of a team
-
Application deadline: All year round Research theme: Post-Quantum Cryptography UK only This 3.5-year PhD project is fully funded and home students, and EU students with settled status, are eligible
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and