Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
: Implement post quantum cryptography on the IoT devices. Research and evaluate the existing post quantum cryptography protocol. Assist in writing research papers for the internation conferences. Coordinate and
-
: Implement post quantum cryptography on the IoT devices. Research and evaluate the existing post quantum cryptography protocol. Assist in writing research papers for the internation conferences. Coordinate and
-
computational models. · Developing quantum networks, and quantum cryptographic systems, including post-quantum cryptography. Minimum required qualifications · A PhD or equivalent terminal degree in
-
include signal processing, coding and modulation; the role of entanglement; error detection and correction; cryptography and security; and information processing in integrated quantum computers and in
-
motivated and enthusiastic Lecturer in Cyber Security. We welcome applicants who have experience in Ethical Hacking, System Penetration, Secure Software Development, Information Security and Cryptography
-
engineering Computer science -> Cybernetics Positions: PhD postion Type of contract: Temporary Job status: Full-time Hours per week: 40 How to apply: https://www.fei.vsb.cz/en/applicant/doctoral-study/ Select
-
at home in a strongly international, diverse, and cooperative community like ours. Furthermore, we are looking to welcome someone who fosters collaboration at all levels. Our ideal candidate has: A PhD
-
departments within the School of Engineering, with 60 active faculty, and more than 1,000 PhD, MS, and BS students. Throughout our long history (2019 marked our 125th anniversary), we have set the tone for
-
PhD Positions Application Deadline 1 May 2026 - 23:00 (Europe/Paris) Country France Type of Contract Temporary Job Status Full-time Offer Starting Date 1 Jul 2026 Is the job funded through the EU
-
sectors. You are expected to embrace and actively contribute to our mission which is to strengthen, advance and integrate foundational and applied research in cybersecurity and cryptography in order to