Contact

Motivated students are encouraged to apply to join us. The field of analog and mixed-signal integrated circuit design is an interesting and dynamic research area.

Graduate admission: Please note that I receive a lot of emails regarding the graduate admissions mostly from international students. However, only a select few will be picked and will be admitted to the research group.

I try to reply back as soon as I can, but there are times that due to busy schedule, applicants won't hear back from me for some time. Please keep your emails short and to the point, and do not send the same email repeatedly.

You can contact me via email by sending your resume to: mitramir AT uwindsor DOT ca




CURRENT OPENING

  • Post-Doc position in Post Quantum Cryptography One Post-Doc position in Post Quantum Cryptography is open to receive applications. Potential research topics include cryptanalysis, implementation, and theory, in particular for those that have hands-on experience with the design, implementation and/or analysis of cryptosystems submitted to NIST’s post-quantum standardization project. the most desirable candidate has a track record in some aspects of post-quantum cryptography, but researchers with a strong background in practical implementations of a broad research spectrum going from mathematical aspects to the practical side such as implementation aspects. Research topics include but are not limited to: Secure cryptographic implementations in hardware: FPGA/ASIC design for post-quantum / lightweight crypto, homomorphic encryption, or multi-party computation Implementation attacks: side-channel analysis and fault attacks Machine learning: theoretical analysis or application experience with an emphasis on neural network security and their implementation.

Post-Doc Position in Secure Hardware The research group explores the hardware realization of Random number generation and physical unclonable function (PUF) implementation in ASIC and/or FPGA logic devices. This includes all steps of design, characterization, and security evaluation of the design. Familiarity with machine learning algorithms in order to use intelligent attacks on the PUF and evaluate their effectiveness against these attacks is a plus. Design of hardware systems that are resistant to passive and active physical attacks Detection of Trojan hardware in order to ensure the safety and security of the design.