Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
- Nature Careers
- University of Luxembourg
- MOHAMMED VI POLYTECHNIC UNIVERSITY
- University College Cork
- University of Turku
- CNRS
- Carnegie Mellon University
- Chinese Academy of Sciences
- Ecole Normale Supérieure de Lyon
- Ludwig-Maximilians-Universität München
- Rutgers University
- Technical University of Denmark
- University of Lund
- Xi'an Jiaotong - Liverpool University
- 4 more »
- « less
-
Field
-
to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
) at the University of Luxembourg contributes multidisciplinary expertise in the fields of Mathematics, Physics, Engineering, Computer Science, Life Sciences and Medicine. Through its dual mission of teaching and
-
, Cryptography, Computer Science, or closely related areas. Proven track record of research in post-quantum cryptography, or a closely related area. About PQC-X The Post-Quantum Cryptography Migration
-
: Postdoctoral Position Location: Munich, Bavaria 80333, Germany Subject Area: Quantum Information Science Appl Deadline: (posted 2026/03/07 05:00 AM UnitedKingdomTime, listed until 2026/09/08 04:59 AM
-
25 Jan 2026 Job Information Organisation/Company CNRS Department Institut de Recherche en Informatique Fondamentale Research Field Computer science Mathematics » Algorithms Researcher Profile First
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 05-Mar-26 Location: Pittsburgh, PA Categories: Academic/Faculty Internal Number: 182578 The Computer Science
-
Description of the workplace The Division of Secure and Networked Systems at the Department of Electrical and Information Technology conducts broad research in cryptography, computer security
-
10 Feb 2026 Job Information Organisation/Company MOHAMMED VI POLYTECHNIC UNIVERSITY Research Field Computer science Researcher Profile Recognised Researcher (R2) Established Researcher (R3
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
) enables computations to be performed directly on encrypted data without knowledge of the deciphering key, offering significant potential for privacy-preserving deep learning. However, conventional neural