国际学生入学条件
An Honours Bachelor degree in Computer Science or Engineering (or equivalent degree) with at least a 78% standing.
Three references, at least two academic
Proof of English language proficiency, if applicable. TOEFL 100 (writing 26, speaking 26), IELTS 7.5 (writing 7.0, speaking 7.0)
展开 IDP—雅思考试联合主办方
雅思考试总分
7.5
了解更多
雅思考试指南
- 雅思总分:7.5
- 托福网考总分:100
- 托福笔试总分:160
- 其他语言考试:PTE (Academic) - 68 (writing 65, speaking 65)
CRICOS代码:
申请截止日期: 请与IDP顾问联系以获取详细信息。
课程简介
The David R. Cheriton School of Computer Science has an international reputation in teaching, academics, research, and employment. We attract exceptional students from all over the world to study and conduct research with our award-winning faculty. You can participate in research projects in a wide variety of topics with our internationally acclaimed researchers. Our research spans the field of computer science, from core work on systems, theory and programming languages to human-computer interaction, DNA and quantum computing to theoretical and applied machine learning, just to name a few. As a graduate student, you will: Access research-intensive lab spaces. Gain the opportunity to publish your work in top conferences and journals. Present at premier conferences in front of peers, industry leaders, researchers, and experts in your field. As a graduate student, you will have the independence to pursue your preferred area of research with a faculty supervisor, or complete eight courses to fulfill your degree requirements through the coursework option<br><br>The Cryptography, Security, and Privacy (CrySP) research group carries out research in a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness and usability in deployed systems. Some examples are: (Distributed) cryptographic protocols. Designing interactive protocols to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes, identification schemes, broadcast encryption and oblivious transfer. Efficient cryptographic algorithms and their implementation. Designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes, signature schemes, message authentication codes, key establishment protocols, and pairing-based cryptography. Cryptographic hash functions. Analyzing the security of iterated design techniques and the random oracle model and constructing families of universal hash functions. Privacy-preserving communications networks. Creating privacy-preserving communications networks with better security, privacy, efficiency, and scalability properties than existing ones.
展开