Jobs

All our offers

+Filter by technology challenge

  • Cyber security : hardware and sofware
  • Energy efficiency for smart buildings, electrical mobility and industrial processes
  • Solar energy for energy transition
  • Green & decarbonated energy including bioprocesses and waste recycling
  • Additive manufacturing, new routes for saving materials
  • Support functions
  • Advanced hydrogen and fuel-cells solutions for energy transition
  • Instrumentation nucléaire et métrologie des rayonnements ionisants
  • Artificial Intelligence & data intelligence
  • New computing paradigms, including quantum
  • Emerging materials and processes for nanotechnologies and microelectronics
  • Advanced nano characterization
  • Photonics, Imaging and displays
  • Communication networks, IOT, radiofrequencies and antennas
  • Smart Energy grids
  • Numerical simulation & modelling
  • Stockage d'énergie électrochimique y compris les batteries pour la transition énergétique
  • Cyber physical systems - sensors and actuators
  • Health and environment technologies, medical devices
  • Factory of the future incl. robotics and non destructive testing

+Filter by contract type

  • Fixed term contract
  • Permanent contract
  • phD
  • PostDoc
  • Internship

+Filter by institute

  • CEA-Leti
  • CEA-List
  • CEA en Région

+Filter by location

  • Bordeaux – Pessac
  • Cadarache – Aix-en-Provence
  • Grenoble
  • Lille
  • Nantes
  • Paris – Saclay
  • Quimper
  • Toulouse - Labège

+Filter by Level of study

  • Level 4
  • Level 5 / Level 6
  • Level 7
  • Level 8
Number of results : 3
  • phD Physical-attack-assisted cryptanalysis for error-correcting code-based schemes

    The security assessment of post-quantum cryptography, from the perspective of physical attacks, has been extensively studied in the literature, particularly with regard to the ML-KEM and ML-DSA standards, which are based on Euclidean lattices. Furthermore, in March 2025, the HQC scheme, based on error-correcting codes, was standardized as an alternative key encapsulation mechanism to ML-KEM....

    Learn more Apply

  • phD Electron beam probing of integrated circuits

    The security of numerical systems relies on cryptographic chains of trust starting from the hardware up to end-user applications. The root of chain of trust is called a “root of trust” and takes the form a dedicated Integrated Circuit (IC), which stores and manipulates secrets. Thanks to countermeasures, those secrets are kept safe from extraction...

    Learn more Apply

  • phD Implementation of TFHE on RISC-V based embedded systems

    Fully Homomorphic Encryption (FHE) is a technology that allows computations to be performed directly on encrypted data, meaning that we can process information without ever knowing its actual content. For example, it could enable online searches where the server never sees what you are looking for, or AI inference tasks on private data that remain...

    Learn more Apply

en_USEN

Contact us

We will reply as soon as possible...