Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
-
Field
-
for protecting privacy in an ever more interconnected world? Are you willing to take on the challenge of upgrading cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team
-
Cryptography , Applied Physics , artificial gauge fields , Artificial Intelligence , Astronomy , Astronomy and Astrophysics , Astroparticle Physics , astrophysics , Astrophysics (astro-ph) , Astrophysics
-
scientific fields, and holders of a curriculum that reveals an adequate profile and background for the activity to be developed. Experience in the field of quantum cryptography will be considered a plus
-
to the background of the applicant. Familiarity with cryptography and/or quantum optics is an advantage. Teaching experience will also be a valuable asset. What we offer We offer the applicant the opportunity
-
-Knowledge Proofs (ZKP). Attribute-Based Encryption (ABE). Post-Quantum Cryptography (PQC). Languages: Scientific English proficiency. Also of interest: The ability to work independently and as part of a team
-
Application deadline: All year round Research theme: Post-Quantum Cryptography UK only This 3.5-year PhD project is fully funded and home students, and EU students with settled status, are eligible
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
, such as quantum sensing, quantum cryptography and quantum computation, with experiment limitations implemented as mathematical constraints. The applicant should have a a mastery of linear algebra
-
. Classical cryptographic techniques face inherent limitations, especially regarding future threats from quantum computers or AI-driven adversarial strategies. Physical layer security offers a promising
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and