国际学生入学条件
A four-year Honours Bachelor degree or its equivalent in mathematics or in a closely related field with a 78% overall average or its equivalent for undergraduate work.
Applicants from foreign countries must normally take the Graduate Record Examinations (GRE) General Test and Subject Tests.
Three references, normally from academic sources
Proof of English language proficiency, if applicable. TOEFL 90 (writing 25, speaking 25), IELTS 7.0 (writing 6.5, speaking 6.5)
展开 IDP—雅思考试联合主办方
雅思考试总分
7.0
了解更多
雅思考试指南
- 雅思总分:7
- 托福网考总分:90
- 托福笔试总分:160
- 其他语言考试:PTE (Academic) - 63 (writing 65, speaking 65)
CRICOS代码:
申请截止日期: 请与IDP顾问联系以获取详细信息。
课程简介
在经典密码学中
Combinatorics is the study of discrete structures and their properties. Many modern scientific advances have employed combinatorial structures to model the physical world, and recent advances in computational technology have made such investigations feasible. In particular, since computers process discrete data, combinatorics has become indispensable to computer science. Optimization, or mathematical programming, is the study of maximizing and minimizing functions subject to specified boundary conditions or constraints. With the emergence of computers, optimization experienced a dramatic growth as a mathematical theory, enhancing both combinatorics and classical analysis. The functions to be optimized arise in engineering, the physical and management sciences, and in various branches of mathematics. The MMath degree involves about a year of graduate courses and either a research report or thesis supervised by a faculty member.<br><br>In classical cryptography, some algorithm, depending on a secret piece of information called the key, which had to be exchanged in secret in advance of communication, was used to scramble and descramble messages. (Note that, in a properly designed system, the secrecy should rely only on the key. It should be assumed that the algorithm is known to the opponent.) In 1976, a new type of cryptosystem, called an asymmetric or public-key system was conceived. In these systems, the roles of encryption and decryption are sufficiently separated that the key for one of these functions can be publicly disclosed, while the other can be maintained in secret. This eliminates the need for the exchange of keys in secret prior to communication. These constructions are based on the computational infeasibility of solving certain hard mathematical problems such as integer factorization. The search for appropriate hard problems and the design and analysis of related public key systems has given rise to a very active and stimulating area of research. Research, both theoretical and practical, in various areas of cryptography, security and privacy is being undertaken at the Centre for Applied Cryptographic Research (CACR) at Waterloo. Some areas of focus for cryptographers in the C&O department include elliptic and hyperelliptic curve cryptography, pairing-based cryptography, quantum-safe cryptography, and the design and analysis of cryptographic protocols.
展开