Ing. Ivana Trummová

Projects

Design of efficient parallel algorithms for solution of important engineer's problems

Program
Studentská grantová soutěž ČVUT
Code
SGS20/212/OHK3/3T/18
Period
2020 - 2022
Description
The proposed project is based on previous research results in the field of parallel and distributed algorithms for solution of some important engineer's problems. More specifically, the project is going to focus 1) on the methodology and algorithms for a systematic evaluation of sparse matrix and tensor storage formats that would allow a complex understanding of their properties, 2) on the application of machine learning in network security, 3) on the most advanced computer science methods in astronomy to allow preprocessing, storing, sharing, and analyzing of petabytes of data flowing continuously from astronomical instruments, 4) on the research of algorithms for multithreaded memoization system focused on their effective implementation and parallelization.

Security Solutions for Selected Cryptographic Systems and Networks

Program
Studentská grantová soutěž ČVUT
Code
SGS23/211/OHK3/3T/18
Period
2023 - 2025
Description
The project has three main goals. The first goal deals with malware detection using machine learning. The focus will be on problems of malware classification and creating and defending against adversarial samples. The second goal belongs to the field of cryptanalysis of ciphers using side channels. The research will focus on ciphers that have made it to the finals of the post-quantum cipher competition organized by NIST. The last goal will be to systematically describe blockers and barriers in deploying and using cryptographic tools.

Side channel attacks on post-quantum cryptography algorithms

Program
Promoting the mobility of researchers and workers in the framework of international cooperation in R&D
Provider
Ministry of Education, Youth and Sports
Code
8J23FR012
Period
2023 - 2024
Description
The project deals with the design (and implementation) of new side-channel attacks on the postquantum algorithms, as well as the design (and implementation) of countermeasures that will prevent these attacks.