Sort by
Refine Your Search
-
Employer
- University of Groningen
- Utrecht University
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology (TU/e)
- Radboud University
- Leiden University
- University of Amsterdam (UvA)
- University of Twente
- Vrije Universiteit Amsterdam (VU)
- AcademicTransfer
- CWI
- Eindhoven University of Technology
- University of Twente (UT)
- 3 more »
- « less
-
Field
-
join the Digital Security group (DiS) as a PhD candidate! Symmetric-key algorithms play a fundamental role in modern cryptography, offering tools for data encryption and authentication. These algorithms
-
algorithms, focusing on SNN few-shot, synergic (local-global) and asynchronous learning strategies suitable for real-time and embedded systems scenarios. Finally, you will benchmark the developed system
-
assets, in combination with other types of power system assets (batteries, etc.). From a research perspective, this can involve techniques from algorithmic game theory and AI-based mechanism design
-
new post-quantum cryptography algorithms to secure critical infrastructure. However, these new algorithms are still susceptible to physical attacks, while current testing infrastructures to assess
-
ultrasound physics, reconstruction algorithms, and data acquisition techniques to ensure high-quality inputs; Collaborate with clinicians: Work with medical specialists to validate the clinical utility of your
-
data. Without doubt, AES (Advanced Encryption Standard) and Keccak/SHA-3 (Secure Hash Algorithm 3) are the two most used and famous symmetric cryptography algorithms. Winners of the standardization
-
the context of algorithmic personalization and GenAI. It brings together expertise on media and journalism studies, digital literacy and inclusion, argumentation theory and AI, combining argumentation theory
-
technology at our industrial partners. You will work in the cyber analytics and CISE labs in the Algorithmics and Software Engineering Research groups at the Software Technology department under supervision
-
structure, and of the force and tidal field that has been shaping the cosmic web. The basic detection algorithms to infer the overall structure of the cosmic web are the various versions of the scale-space
-
denotational correctness proofs as well as new probabilistic and differential inference algorithms) and systems (e.g., high performance, functional array programming DSLs) to tackle challenging probabilistic and