Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
-
Field
-
., exploring entropic information measures and their properties, quantum communication and cryptography, or learning theory. Qualifications Experience in quantum information, in particular in at least one of the
-
26 Jan 2026 Job Information Organisation/Company Simula UiB Department Cryptography Research Field Mathematics » Applied mathematics Computer science » Informatics Researcher Profile First Stage
-
, cryptography, security, game theory, or a closely related area (ML acceptable with strong theory depth). You will have strong mathematical maturity with evidence of producing rigorous, security-relevant theory
-
cryptography. An emerging profile in research in cyber security, cyber resilience or cyberpsychology. Evidence of publications in reputed refereed journals and presenting at conferences. Evidence of
-
(Ariane) core. The role is structured in two research phases, covering lightweight cryptography (ASCON) and Post-Quantum Cryptography (PQC), and will contribute to high-impact scholarly publications and
-
Applied Physics (PAP). MAS covers diverse topics ranging from pure mathematics to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and
-
to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and applied physics, including quantum information, condensed matter physics, biophysics, and
-
to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and applied physics, including quantum information, condensed matter physics, biophysics, and
-
to the applications of mathematics in cryptography, computing, business, and finance. PAP covers many areas of fundamental and applied physics, including quantum information, condensed matter physics, biophysics, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and