-
verification of security protocols and systems, cryptographic algorithms and protocols, analysis of the security of cryptographic algorithms, post-quantum security. More details can be found on the CSE Web site
-
Designs Hardware-Software Co-design for Machine Learning Applications Verification of digital designs Electronic Design Automation (EDA) for AI Hardware; AI and Cloud-Enhanced EDA High-Performance Multicore
Enter an email to receive alerts for hardware-verification "https:" positions