Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
-
Field
-
talented Postdoctoral researchers in the area Blockchain and IoT. The successful candidates will primarily be working on the following topics (but not limited to): Quantum Cryptography IoT Security
-
currently looking for motivated and talented Postdoctoral researchers in the area of Artificial Intelligence for Cybersecurity and Quantum Cryptography. The successful candidates will primarily be working
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
members. Topics of interest include: provable security, post-quantum security, transparency logs, fine-grained and bounded space cryptography, and foundational cryptography. Project overview The Post
-
live in. Your role The successful candidate will join the Applied Crypto Group led by Prof. Jean-Sebastien Coron. The candidate will contribute to projects in cryptography. He will perform the following
-
Applications should include: Curriculum Vitae (including your contact address, work experience, publications, and contact information for 3 referees) Cover letter indicating the research area of interest and your motivation Early application is highly encouraged, as the applications will be...
-
, -- mathematical theory for artificial intelligence, -- optimization and numerical computation over manifold, -- systems and control theory, -- algebraic computation theory and cryptography. The position is for two
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
candidate should have (or expect to soon be awarded) a PhD in quantum information theory (including some aspects of quantum computing, quantum cryptography and/or quantum communication) and some experience in
-
-doctoral researcher position. Led by Prof. Nektarios Tsoutsos, the Trustworthy Computing Group specializes in the broader areas of cybersecurity, applied cryptography, computer architecture, hardware