Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- University of Luxembourg
- Nature Careers
- Chalmers University of Technology
- ; Manchester Metropolitan University
- CNRS
- DAAD
- Danmarks Tekniske Universitet
- Eindhoven University of Technology (TU/e)
- Forschungszentrum Jülich
- Institute of Mathematics
- NTNU - Norwegian University of Science and Technology
- Queensland University of Technology
- Radboud University
- Technical University of Denmark
- Technical University of Munich
- University of Bergen
- University of Twente (UT)
- University of Tübingen
- 8 more »
- « less
-
Field
-
within Computer Science, Mathematics, Electrical Engineering, or a closely related subject area. You must have a Master's degree in Computer Science, Mathematics, or a closely related area or equivalent
-
Background The rise of quantum computers could break many existing encryption methods, making post-quantum cryptography (PQC) vital for future security. Digital signatures, which act like electronic
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
Your Job: Random unitaries are a ubiquitous tool in quantum information and quantum computing, with applications in the characterization of quantum hardware, quantum algorithms, quantum cryptography
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
conferences. Requirements Master’s degree (or equivalent) in Computer Science, Bioinformatics, Mathematics, or a related field Background or interest in (some of) the following areas: Cryptography (e.g., secure
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular