Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
-
Field
-
and computer science and be fluent in oral and written English. Specific depth in mathematics, computer security or encryption is valuable but not a requirement. It is an advantage if you have previous
-
be fluent in oral and written English. Specific depth in mathematics, computer security or encryption is valuable but not a requirement. It is an advantage if you have previous experience from research
-
. The project will investigate how advanced and modern cryptographic protocols, such as zero-knowledge proofs, secure multiparty computation, homomorphic encryption, exotic signatures, and their post-quantum
-
importance in the field of cybersecurity and data protection, offering tools for data encryption and authentication. While public-key cryptography is crucial for exchanging the key or signing data, symmetric
-
continue reading! Join Us! Our modern society relies upon numerous electronic devices that use encryption to communicate and operate securely. However, even strong cryptography can break when the device
-
APISID Use Used for targeting purposes to profile the interests of website visitors in order to display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
, Biology and Mathematics, Humanoid Robotics, Cognitive Science, Mechnotronics, Advanced Manufacturing, Cyber security, Encryption and decryption, Petroleum and Petro-Chemical Engineering, Science of Climate