Get free PhD updates, every week | SIGN UP NOW Get free PhD updates, every week | SIGN UP NOW

We have 19 cryptography PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

Discipline

Discipline

All disciplines

Location

Location

All locations

Institution

Institution

All Institutions

PhD Type

PhD Type

All PhD Types

Funding

Funding

All Funding


cryptography PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

We have 19 cryptography PhD Projects, Programmes & Scholarships PhD Projects, Programmes & Scholarships

PhD saved successfully

Boolean functions for cryptography

Encrypting data is essential for ensuring the security of our electronic communications. The ciphers in current use are built from smaller components, one of them being a cryptographic Boolean function. Read more

Cryptography based on tropical algebra

The project is on algebraic cryptography based on tropical algebra or tropical geometry or related mathematical structures. You will cryptanalyze the existing protocols and create new protocols. Read more

EPSRC Centre for Doctoral Training in Delivering Quantum Technologies

 4-year PhD programme in quantum technology and quantum systems engineering. Quantum technologies involve control and manipulation of quantum states to achieve results not possible with classical matter, transforming measurement, communication and computation. Read more

Blockchain Technology and Decentralised Finance (DeFi) : The Bridge to the Future of Finance

Blockchain and Distributed Ledger Technology (DLT) provide building blocks of the so-called “Internet of Value”, since they enable recording of interactions and transfer “value” referring to any record of ownership of asset - for example, money, securities, land titles – and ownership of specific information like identity, health information as well as other personal data. Read more

Chaos-based Multimedia Encryption and Watermarking Schemes

For the past two decades, researchers have reported a close relationship between chaos and cryptography. Encryption based on chaos theory - such as, logistic and tent maps - has several characteristics such as pseudo randomness, ergodicity and strong dependence on initial conditions. Read more

Fast and Secure Multi-party Computation Techniques

Multi-party computation (MPC) protocols enable multiple parties — each holding their own private data — to evaluate a computation without ever revealing any of the secret data held by each party. Read more

Behavioural Analysis for Ransomware Detection

Edinburgh Napier University’s Cyber Security and Forensics Research Group focuses on applied research in core areas of threat analysis and detection, digital forensic triage, trust, identity and cryptography, and has had successful real world impact with several spin-out companies, including in the area of Ransomware. Read more

Filtering Results