Messages for Prospective Members

UEC Undergraduate Students Interested in IWL

The theory of cryptography is a field of study that logically and scientifically examines the security of information systems. To advance research in this field, it is desirable to have a fundamental understanding of discrete mathematics, such as logic, sets, and mappings, and a basic knowledge of cryptography. These topics are covered in Discrete Mathematics, which is a basic course in Cluster II. At a minimum, you should have a reasonable grasp of the content covered in Discrete Mathematics and should find the subject matter engaging. While any gaps in knowledge can be supplemented, those who struggle with logical reasoning may find the research challenging. This field is well-suited for individuals who enjoy deep, thorough thinking—whether independently or through discussion.

After being assigned to IWL, you will aim to develop the following skills through the study of cryptography:

  • You aim to develop the ability to appropriately collect information from literature and other sources and to accurately understand it. In particular, rather than blindly accepting textbook content, you should strive to reproduce what you have learned independently.
  • You should work on systematically organizing and structuring your understanding and expressing it in your own words.

The above skills serve as a foundation for conducting research for those who continue to the master's program, but they are also generally essential abilities for those entering the workforce. If possible, you are encouraged to aim for a presentation at symposiums on cryptography and information security held in the latter half of the academic year.

Students Applying for a Master's Degree

It is desirable to conduct your graduation research on cryptography or a related topic. You are expected to study the fundamental knowledge, which includes not only cryptography but also probability theory, information theory, and computational theory, necessary for research by yourself. We will not teach you the fundamental topics individually. Note that we will tell you the necessary areas to review before enrollment once their admission is confirmed, so there is no need to worry in advance. What is most important is having a strong interest in these theoretical concepts. If you want to join IWL at the point of entering the master's program, please make sure to contact us (Profs. Iwamoto and Watanabe) as early as possible before applying and, if feasible, visit the open day events.

After joining IWL, you will aim to acquire the following skills and experiences through research in cryptography and information security:

  • You should develop the ability to think logically and proactively, taking ownership of your work in a creative and autonomous manner. While being supervised by us, you should strive to lead and manage research projects yourself.
  • You should aim to achieve both a comprehensive understanding of your field and a meticulous grasp of specific details, ensuring that you can accurately communicate specialized knowledge without misunderstandings.
  • You are expected to experience all essential aspects of research and contribute new insights to your field in some way. In particular, you should strive to gain expertise in your specific research area that surpasses even that of us.

In principle, IWL does not accept research students (研究生) as a path to entering the master's program. While we acknowledge that there are many talented students, our focus is on engaging with the official members of the laboratory. We appreciate your understanding in this regard.

Students Applying for a Ph.D.

You should have obtained (or be expected to obtain) a master’s degree in information security, have some form of achievement in cryptography, and possess at least some of the following qualities:

  • The ability to logically structure thoughts and articulate ideas.
  • Persistence in thoroughly thinking through complex problems.
  • Attention to detail, ensuring even seemingly minor points are carefully examined.

Furthermore, you should have generally acquired the foundational knowledge expected to be learned by the master’s level, as mentioned above. If you want to join IWL from the doctoral program must contact us as early as possible before applying to discuss their past research and future research plans. If feasible, you are also encouraged to attend open day events.

After joining IWL, you will engage in cutting-edge research in cryptography and information security, aiming to develop the ability to conduct independent research as professional researchers. More specifically, research activities will be conducted with the following goals in mind:

  • You should strive to deeply explore your specialized field and build your own distinct research direction. We will be your supervisors, but please keep in mind that we serve only as consultants; the ultimate goal is not just to reach the forefront of research but to develop a comprehensive and expert-level understanding of the field.
  • While deepening expertise in a specific research area, you should also cultivate a broad interest in related topics, expanding your academic scope while maintaining a comprehensive understanding of the field as a whole. Acquiring extensive knowledge in cryptography and information security will enable you to become highly capable professionals in society.
  • A good researcher is not only capable of conducting outstanding research but also proficient in communicating specialized knowledge effectively to different audiences. Emphasis will be placed on outreach activities, fostering the ability to convey complex information clearly and accurately not only to experts but also to non-specialists.

By fostering these skills and perspectives, you will be equipped to contribute meaningfully to the academic and professional world of cryptography and information security.