Sort by
Refine Your Search
-
Category
-
Country
-
Employer
- University of Luxembourg
- Karlsruhe Institute of Technology (KIT)
- Karlsruher Institut für Technologie (KIT)
- Ariel University
- King's College London
- Luleå tekniska universitet
- NTNU Norwegian University of Science and Technology
- Nature Careers
- Simula UiB AS
- The University of Manchester
- University of Primorska
- University of Sheffield
- 2 more »
- « less
-
Field
-
Application deadline: All year round Research theme: Post-Quantum Cryptography UK only This 3.5-year PhD project is fully funded and home students, and EU students with settled status, are eligible
-
, or a model of instruction-set level semantics. We are also interested in cryptography, namely ZKVMs, FHE, game-based proofs (a la Easycrypt), and their models via Lean and MLIR, large-scale SAT/SMT
-
interdisciplinary junior research group, we are opening up a new field of research at the interface of cryptography, engineering, and natural sciences. The project runs for five years and is funded by the Carl-Zeiss
-
, such as quantum sensing, quantum cryptography and quantum computation, with experiment limitations implemented as mathematical constraints. The applicant should have a a mastery of linear algebra
-
to avoid becoming obsolete before they are decommissioned. By studying and developing knowledge in post-quantum cryptography, existing methods against post-quantum attacks are improved, which in turn ensures
-
new field of research at the interface of cryptography, engineering, and natural sciences. The project runs for five years and is funded by the Carl-Zeiss-Stiftung . Further information can be found
-
new field of research at the interface of cryptography, engineering, and natural sciences. The project runs for five years and is funded by the Carl-Zeiss-Stiftung. Further information can be found here
-
up a new field of research at the interface of cryptography, engineering, and natural sciences. The project runs for five years and is funded by the Carl-Zeiss-Stiftung. Further information can be
-
—such as bent, plateaued, and almost perfect nonlinear (APN) functions—and the design of linear codes with prescribed properties useful for cryptography, including minimal, self-orthogonal, LCD and optimal
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and