Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Nature Careers
- University of Luxembourg
- MOHAMMED VI POLYTECHNIC UNIVERSITY
- CNRS
- Carnegie Mellon University
- Chinese Academy of Sciences
- DURHAM UNIVERSITY
- Durham University
- Durham University;
- Ecole Normale Supérieure de Lyon
- Fraunhofer-Gesellschaft
- Ludwig-Maximilians-Universität München
- Max Planck Institute for Security and Privacy, Bochum
- Technical University of Munich
- Universitat Pompeu Fabra - Department / School of Engineering
- University of Lund
- Xi'an Jiaotong - Liverpool University
- 7 more »
- « less
-
Field
-
, multi-party computation, fully homomorphic encryption, as well as zero-knowledge proofs. The ideal candidate has a strong background in cryptography and data security and privacy. The successful candidate
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/satellite
-
or related areas. No prior knowledge of cryptography is required. Expertise in optimization or efficient algorithm design will be considered an asset. Applications should include a CV, a list of publications
-
, including but not limited to embedded/hardware security, security of AI systems, (post-quantum) cryptography, quantum algorithms, confidential computing/trusted execution, or microarchitectural security. Key
-
, -- stochastic analysis, -- mathematical theory for artificial intelligence, -- optimization and numerical computation over manifold, -- systems and control theory, -- algebraic computation theory and cryptography
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and