国际学生入学条件
An Honours Bachelor degree in Computer Science or Engineering (or equivalent degree) with at least a 78% standing.
Resume
Supplementary information form (SIF)
The SIF contains questions specific to your program, typically about why you want to enrol and your experience in that field. Review the application documents web page for more information about this requirement
If a statement or letter is required by your program, review the writing your personal statement resources for helpful tips and tricks on completion
Transcript(s)
References
Three references are required, at least two academic
Proof of English language proficiency, if applicable
TOEFL 93 (writing 22, speaking 22), IELTS 6.5 (writing 6.0, speaking 6.5)
展开 IDP—雅思考试联合主办方
雅思考试总分
6.5
了解更多
- 雅思总分:6.5
- 托福网考总分:93
- 托福笔试总分:160
- 其他语言考试:PTE (Academic) - 63 (writing 65, speaking 65)
课程简介
The David R. Cheriton School of Computer Science has an international reputation in teaching, academics, research, and employment. We attract exceptional students from all over the world to study and conduct research with our award-winning faculty. You can participate in research projects in a wide variety of topics with our internationally acclaimed researchers. Our research spans the field of computer science, from core work on systems, theory and programming languages to human-computer interaction, DNA and quantum computing to theoretical and applied machine learning, just to name a few. As a graduate student, you will: Access research-intensive lab spaces. Gain the opportunity to publish your work in top conferences and journals. Present at premier conferences in front of peers, industry leaders, researchers, and experts in your field. As a graduate student, you will have the independence to pursue your preferred area of research with a faculty supervisor, or complete eight courses to fulfill your degree requirements through the coursework option<br><br>The Cryptography, Security, and Privacy (CrySP) research group carries out research in a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness and usability in deployed systems. Some examples are: (Distributed) cryptographic protocols. Designing interactive protocols to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes, identification schemes, broadcast encryption and oblivious transfer. Efficient cryptographic algorithms and their implementation. Designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes, signature schemes, message authentication codes, key establishment protocols, and pairing-based cryptography. Cryptographic hash functions. Analyzing the security of iterated design techniques and the random oracle model and constructing families of universal hash functions. Privacy-preserving communications networks. Creating privacy-preserving communications networks with better security, privacy, efficiency, and scalability properties than existing ones.
展开