Higher degree research

Higher degree research

Prospective Research Students

ACAC would like to give an opportunity for an enthusiastic student to make a valuable contribution to the area of cryptography and quantum computation.

This page is to provide some information for prospective research students to start preparing the application.

Please contact ICS Student Services (enquiries@ics.mq.edu.au) if you need further assistance.

How to apply

Domestic Research Students

Most information that you require can be obtained from the Higher Degree Research Office Booklet.

From this source, you can access information on admission and entry requirements, forms & supporting document requirements, fees and scholarships.

International Research Students

Admission to Postgraduate Research candidate requires to provide evidence of proficiency in English.

The Macquarie International site provides important information for prospective international students concerning visas, life at Macquarie, student services and study abroad.

You can also access information on admission and entry requirement, forms & supporting document requirements, feesand scholarships.

Applications are typically reviewed from October for students starting in the following year and the outcome is available in November. Please see the important dates for your reference.

Available Scholarships

Information about scholarships, eligibility and application process can be found at Scholarships.

Additional financial support can be obtained by undertaking teaching duties - Postgraduate Research Teaching Supplement.

Potential supervisors from ACAC

DOCHE, Dr Christophe: Number Theory and Cryptography

MANS, A/Prof Bernard: Graph Theory, Complexity Theory, Distributed Computing, Quantum Computation

McCALLUM, Dr Scott: Algebraic and Symbolic Computation

PIEPRZYK, Prof Josef: Cryptography and Information Security, Quantum Cryptography

SHPARLINSKI, Prof Igor: Complexity Theory, Computational Number Theory, Quantum Computation

WANG, Dr Huaxiong: Cryptography and Information Security

Back to the top of this page