Advanced studies

Studia_zaawansowane_desktop

Why? How? These are our favorite questions. We are curious about the world and driven to create new technologies for the benefit of society. We want to understand what we see in the data. That is why we carry our fundamental research in numerical linear algebra, cryptology, quantum computing and quantum communication, and control theory.

Have you ever watched anything on the Internet? Or have you ever listened to music? For example, while driving an autonomous car or flying a plane (on autopilot)? And have you heard of machine learning? Sure you have! Well, matrix algorithms and linear algebra are behind it all.

 

 

Mathematical formulas on a white board

Numerical linear algebra is the computational engine of modern science and technology. It’s a fascinating area of research bringing together many branches of mathematics. We are working on the new theory of matrix (meta)factorization, compression of AI models, and computational challenges of machine learning. We are looking for new algorithms for data reconstruction, matrix completion, compressed sensing, and sparse sensor placement. All that fuels our AI and cybersecurity systems.

#Meta-factorization

#Matrix completion

 

 

Cryptology, classical and post-quantum cryptography algorithms and systems, information theory, number theory, discrete mathematics, error-correcting codes, linear codes, and, if that wasn’t enough for anyone, quantum mechanics. We are working on all this while developing our cyber security technologies. It is not a secret that we are having fun.

#Meta-factorization and encryption functions

 

Quantum computing and quantum communication are on the front lines of science and technology development, at the frontier of what we know and what we can learn about the world. We are working on the theory of quantum computing, we address the challenges of quantum state estimation, and we develop quantum key distribution technology. And we take a look at what the world is made of.

 

We are working on:

  • Matrix meta-factorization theory
  • Matrix completion algorithms
  • Low-rank approximations
  • Randomized numerical linear algebra
  • DMD/SINDy
  • Control theory
  • AI models compression
  • Sparse sampling
  • Convergence of machine learning algorithms
  • Generation of cryptographic keys
  • Classical and post-quantum cryptography
  • Quantum computing
  • Measurement and estimation of quantum states
  • Fundamentals of secure quantum communication

Selected Publications

Articles

Mirosław Kutyłowski, Adrian Cinal, Przemysław Kubiak, Denys Korniienko, "Authenticated Multicast in Tiny Networks via an Extremely Low-Bandwidth Medium", Applied Sciences, 14(17), 2024, 7962.
Antonina Krajewska, Ewa Niewiadomska-Szynkiewicz, "Clustering Network Traffic Using Semi-Supervised Learning", Electronics, 13(14), 2024, 2769.
Antonina Krajewska, "Learning causal theories with non-reversible MCMC methods", Control and Cybernetics, 50(3), 2021, 326-361.
Mirosław Kutyłowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada, "The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography", Privacy Enhancing Technologies Symposium, , 2023, 170-183.
Mirosław Kutyłowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada, "Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication", Advances in Cryptology (CRYPTO), Lecture Notes in Computer Science, vol. 14082, ed. Helena Handschuh, Anna Lysyanskaya, Springer, Cham, 2023, 759-790.
Dominik Bojko, Jacek Cichoń, Mirosław Kutyłowski, "Sliding Window Sampling over Data Stream – a Solution Based on Devil’s Staircases", 2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA), , 2023, 1-9.
Przemysław Błaśkiewicz, Mirosław Kutyłowski, Anna Lauks-Dutka, "Darknet signatures", 2023 International Conference on Data Security and Privacy Protection (DSPP), , 2023, 232-237.
Jacek Cichoń, Mirosław Kutyłowski, Patryk Stopyra, "Creating small ad hoc networks: Swift presence notification strategies", Vehicular Communications, 45, 2024, 1-13.
Michał Wroński, Łukasz Dzierzkowski, "Base of exponent representation matters -- more efficient reduction of discrete logarithm problem and elliptic curve discrete logarithm problem to the QUBO problem", Quantum Information and Computation, 24(7-8), 2024, 0541-0564
Mateusz Leśniak, Michał Wroński, Elżbieta Burek, "The Possible Impact of Quantum Annealing on Cybersecurity", Safety and Defense, 10(1), 2024, 42-56.
Adrian Cinal, Gabriel Wechta, Michał Wroński, "Hybrid Approach to Public-Key Algorithms in the Near-Quantum Era", In: Franco, L., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2024. Lecture Notes in Computer Science, vol. 14837. Springer, Cham, 2024,
Mateusz Leśniak, Elżbieta Burek, Michał Wroński, "Unsafe Mechanisms of Bluetooth, Stream Cipher Cryptanalysis with Quantum Annealing", In: Franco, L., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2024. Lecture Notes in Computer Science, vol. 14837. Springer, Cham, 2024,
Michał Wroński, Elżbieta Burek, Łukasz Dzierzkowski, Olgierd Żołnierczyk, "Transformation of Elliptic Curve Discrete Logarithm Problem to QUBO Using Direct Method in Quantum Annealing Applications", Journal of Telecommunications and Information Technology, 1(1), 2024, 75-82.
Elżbieta Burek, Krzysztof Mańk, Michał Wroński, "Searching for an Efficient System of Equations Defining the AES Sbox for the QUBO Problem", Journal of Telecommunications and Information Technology, 4(4), 2023, 30-37.