33 computational-physics-phd PhD positions at Chalmers University of Technology in Sweden
Sort by
Refine Your Search
-
4 Mar 2025 Job Information Organisation/Company Chalmers University of Technology Research Field Physics » Condensed matter properties Physics » Solid state physics Technology » Nanotechnology
-
Reference Number 304--1-13691 Is the Job related to staff position within a Research Infrastructure? No Offer Description We invite applications for several PhD positions in experimental quantum computing
-
28 Feb 2025 Job Information Organisation/Company Chalmers University of Technology Research Field Engineering » Materials engineering Biological sciences » Other Physics » Other Researcher Profile
-
of your doctoral thesis. Participating in teaching and departmental duties, which may account for up to 20% of your working hours. The doctoral program is designed to lead to a PhD within four years of full
-
Application Deadline 30 Mar 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Reference Number 304--1
-
) Country Sweden Application Deadline 31 Mar 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme
-
We are looking for a PhD student to join the Crypto Team and Security Group at Chalmers with Christoph Egger as main supervisor. Depending on the interests of the applicant, possible research topics
-
Application Deadline 30 Apr 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Reference Number 304--1
-
: M.Sc. degree (or equivalent) in Physics, Mathematics, Computer Science, or a related field, corresponding to at least 240 higher education credits. Proficiency in conducting literature reviews. Expertise
-
services running on top of optical network infrastructure vulnerable to physical-layer attacks. By developing a new, bottom-up approach to network security and incorporating a physical-layer perspective into