EPSRC logo
EPSRC Support by Research Area in Theoretical Computer Science

Research areas are used to describe EPSRC's portfolio of excellent long term research and high quality postgraduate training.

Grants are classified using one or more research areas. All the grants listed below have some relevance to this research area. The value of the investment is the total awarded by EPSRC and does not reflect the proportion assigned to this research area.

We always try to ensure that grants on the web contains the most recent information but it is possible that some might be slightly out of date.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
Academic Centre of Excellence in Cyber Security Research - University of Northumbria at NewcastleBriggs, Professor PNorthumbria, University ofFac of Health and Life Sciences 48,574
Algebraic complexity theory via the algebraic geometry and representation theory of generalised continued fractionsIkenmeyer, Dr CUniversity of WarwickComputer Science 290,624
Algebraic Methods for Quantified ConstraintsMartin, Dr B DDurham, University ofComputer Science 520,766
Algorithms and Complexity for Economic Environments (ACEE)Filos-Ratsikas, Dr AUniversity of EdinburghSch of Informatics 394,491
Algorithms, Dynamics and Connections with Phase TransitionsEfthymiou, Dr CUniversity of WarwickComputer Science 309,801
An Abstraction-based Technique for Safe Reinforcement LearningBelardinelli, Dr FImperial College LondonComputing 302,082
Asynchronous Scientific Continuous Computations Exploiting Disaggregation (ASCCED)Vandierendonck, Professor HTKQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 202,213
Below the Branches of Universal TreesSchewe, Professor SUniversity of LiverpoolComputer Science 202,160
Beyond One Solution in Combinatorial OptimisationMeeks, Dr KUniversity of GlasgowSchool of Computing Science 1,363,670
Boolean functions with optimal stability of their cryptographic indicators under restriction of the inputsSalagean, Dr AmLoughborough UniversityComputer Science 335,434
CapC: Capability C semantics, tools and reasoningBatty, Professor MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Professor TMUniversity of CambridgeComputer Science and Technology 1,202,313
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 3,474,398
Centre for Spatial Computational LearningConstantinides, Professor GAImperial College LondonElectrical and Electronic Engineering 1,211,769
Communication Complexity of Graph Algorithms (GraphCom)Mukhopadhyay, Dr SUniversity of SheffieldComputer Science 281,966
Computing over Compressed Graph-Structured DataWild, Dr SUniversity of LiverpoolComputer Science 415,344
Computing with proteionidsAdamatzky, Professor AUniversity of the West of EnglandFaculty of Environment and Technology 701,011
Construction of Post-quantum Signature Schemes based on LatticesSarkar, Dr SUniversity of WarwickComputer Science 12,340
COSTRA -- The Cost of Winning StrategiesTotzke, Dr PUniversity of LiverpoolComputer Science 349,044
Design and Verification of Time-Critical Byzantine Fault-Tolerant SystemsRahli, Dr VUniversity of BirminghamSchool of Computer Science 396,533
Driving Behaviour in Multi-Winner Elections (BMW)Elkind, Professor EUniversity of OxfordComputer Science 461,653
Driving Behaviour in Multi-Winner Elections (BMW)Polukarov, Dr MKings College LondonInformatics 504,648
Efficient Spectral Algorithms for Massive and Dynamic GraphsSun, Dr HUniversity of EdinburghSch of Informatics 1,205,706
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
Enhancing Group Search with Graph TechniquesHoffmann, Dr RUniversity of St AndrewsComputer Science 165,165
EPSRC Centre for Doctoral Training in Cloud Computing for Big DataWatson, Professor PNewcastle UniversitySch of Computing 3,523,116
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 6,323,611
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 6,063,927
EPSRC Centre for Doctoral Training in Distributed Algorithms: the what, how and where of next-generation data scienceMaskell, Professor SUniversity of LiverpoolElectrical Engineering and Electronics 4,896,240
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,522,797
Establishing Electrically Programmable Reaction Arrays as Universal Chemical ComputersCronin, Professor LUniversity of GlasgowSchool of Chemistry 733,213
Exploiting sparsity in large-scale optimizationScott, Professor JASTFC Laboratories (Grouped)Scientific Computing Department 76,281
Foundations of the Finite Model Theory of ConcatenationFreydenberger, Dr DDLoughborough UniversityComputer Science 397,698
Games for GoodTotzke, Dr PUniversity of LiverpoolComputer Science 493,930
Imperative programs from proofsPowell, Dr T R JUniversity of BathComputer Science 311,440
Integrated Simulation at the Exascale: coupling, synthesis and performanceBetcke, Professor TUCLMathematics 304,731
Integrated Simulation at the Exascale: coupling, synthesis and performanceWells, Professor GNUniversity of CambridgeEngineering 630,806
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Inverse design of periodic crystalsKurlin, Professor VUniversity of LiverpoolComputer Science 202,213
KidneyAlgo: New Algorithms for UK and International Kidney ExchangePaulusma, Professor DDurham, University ofComputer Science 262,778
KidneyAlgo: New Algorithms for UK and International Kidney ExchangeManlove, Professor DUniversity of GlasgowSchool of Computing Science 456,946
Learned Exascale Computational Imaging (LEXCI)Pereyra, Dr MHeriot-Watt UniversityS of Mathematical and Computer Sciences 40,274
Learned Exascale Computational Imaging (LEXCI)McEwen, Professor JUCLMullard Space Science Laboratory 972,421
Making Systems Answer: Dialogical Design as a Bridge for Responsibility Gaps in Trustworthy Autonomous SystemsVallor, Professor SUniversity of EdinburghSch of Philosophy Psychology & Language 559,682
Mathematical Foundations of Intelligence: An "Erlangen Programme" for AIBronstein, Professor MUniversity of OxfordComputer Science 8,567,300
Multilayer Algorithmics to Leverage Graph Structure (MultilayerALGS)Meeks, Dr KUniversity of GlasgowSchool of Computing Science 765,538
NAfANE: New Approaches for Approximate Nash EquilibriaDeligkas, Dr ARoyal Holloway, Univ of LondonComputer Science 500,163
New Horizons in Multivariate Preprocessing (MULTIPROCESS)Maadapuzhi Sridharan, Dr RUniversity of WarwickComputer Science 545,674
New perspectives towards Woodall's Conjecture and the Generalised Berge-Fulkerson ConjectureAbdi, Dr ALondon School of Economics & Pol SciMathematics 422,542
New proximal algorithms for computational imaging: From optimisation theory to enhanced deep learningRepetti, Dr AHeriot-Watt UniversityS of Mathematical and Computer Sciences 284,313
New Techniques for Resolving Boundary Problems in Total SearchFearnley, Dr JUniversity of LiverpoolComputer Science 441,269
Nominal String DiagramsZanasi, Dr FUCLComputer Science 429,666
Nominal String DiagramsGhica, Professor DRUniversity of BirminghamSchool of Computer Science 429,879
Optimisation for Game Theory and Machine LearningGoldberg, Professor PUniversity of OxfordComputer Science 624,351
PKC-Sec: Security Analysis of Classical and Post-Quantum Public Key Cryptography AssumptionsGranger, Dr RUniversity of SurreyComputing Science 297,923
POST: Protocols, Observabilities and Session TypesYoshida, Professor NUniversity of OxfordComputer Science 1,243,069
Post-Quantum Blockchains Based on FALCON++Ling, Dr CImperial College LondonElectrical and Electronic Engineering 897,476
Post-Quantum Cryptography: a Cryptanalysis ApproachPetit, Dr CUniversity of BirminghamSchool of Computer Science 1,663,949
Promise Constraint Satisfaction Problem: Structure and ComplexityKrokhin, Professor ADurham, University ofComputer Science 1,385,237
Property Testing for Quantum Engineering (ProTeQE)Datta, Professor AUniversity of WarwickPhysics 202,437
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionDavenport, Professor JHUniversity of BathComputer Science 505,757
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionEngland, Dr MCoventry UniversityCtr for Fluid and Complex Systems 421,951
Quantitative verification of software families based on coalgebraic modal logic and gamesBeohar, Dr HUniversity of SheffieldComputer Science 235,841
Quantum Enhanced and Verified Exascale Computing - QEVECKendon, Professor VMUniversity of StrathclydePhysics 1,007,642
Query EvaluationChen, Dr HKings College LondonInformatics 475,688
REPHRAIN: National Research centre on Privacy, Harm Reduction and Adversarial Influence online (Phase II)Rashid, Professor AUniversity of BristolComputer Science 756,638
REPHRAIN: Research centre on Privacy, Harm Reduction and Adversarial Influence onlineRashid, Professor AUniversity of BristolComputer Science 6,972,599
Resources in ComputationAbramsky, Professor SUCLComputer Science 1,792,395
Revolutionising Operational Safety and Economy for High-value Infrastructure using Population-based SHM (ROSEHIPS)Worden, Professor KUniversity of SheffieldMechanical Engineering 6,326,800
SAIS: Secure AI assistantSLomuscio, Professor ARImperial College LondonComputing 396,174
SAIS: Secure AI assistantSSuch, Professor JMKings College LondonInformatics 1,155,316
SECCOM: Securing composable hardware platformsGoodacre, Professor JUniversity of Manchester, TheComputer Science 789,633
Semantics-Directed Compiler Construction: From Formal Semantics to Certified CompilersHutton, Professor GUniversity of NottinghamSchool of Computer Science 466,425
Semantics-Directed Compiler Construction: From Formal Semantics to Certified CompilersGhica, Professor DRUniversity of BirminghamSchool of Computer Science 446,229
Social foundations of cryptographyDowling, Dr BUniversity of SheffieldComputer Science 59,617
Social Foundations of CryptographyMedrado, Dr AMLUniversity of WestminsterWestminster Sch of Media & Communication 74,370
Social Foundations of CryptographyAlbrecht, Professor MKings College LondonInformatics 725,498
Software Environment for Actionable & VVUQ-evaluated Exascale Applications (SEAVEA)Coveney, Professor PUCLChemistry 728,470
Software Environment for Actionable & VVUQ-evaluated Exascale Applications (SEAVEA)Groen, Dr DBrunel University LondonComputer Science 287,922
Solver Feedback Loops for Automated Constraint ModellingNightingale, Dr PWUniversity of YorkComputer Science 307,728
StreamDG: Streaming Processing of Massive Dynamic GraphsKonrad, Dr CUniversity of BristolComputer Science 248,776
The next level of SAT solving for very hard problemsKullmann, Dr OSwansea UniversityCollege of Science 839,938
The Science of Solving Hard Subgraph ProblemsMcCreesh, Dr CUniversity of GlasgowSchool of Computing Science 360,843
Theoretical Foundations of Modern Parallel and Distributed AlgorithmsCzumaj, Professor AUniversity of WarwickComputer Science 552,577
Towards Directed Model CategoriesKavvos, Dr AUniversity of BristolComputer Science 70,581
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
Turing AI Fellowship: Rigorous time-complexity analysis of co-evolutionary algorithmsLehre, Professor PUniversity of BirminghamSchool of Computer Science 1,254,385
Two-way automata: limitations and frontiersChistikov, Dr DUniversity of WarwickComputer Science 280,432
Uni-pi: safety, adaptability and resilience in distributed ecosystems, by constructionDardha, Dr OUniversity of GlasgowSchool of Computing Science 409,562
Unlocking the Potential of Neural Architecture Search (UPNAS)Crowley, Dr E JUniversity of EdinburghSch of Engineering 273,786
Untargeted Attacks in (Password-Based) CryptographyFarshim, Dr PDurham, University ofComputer Science 265,225
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Using Robust Graph Clustering to Detect Fake NewsMallmann-Trenn, Dr FKings College LondonInformatics 295,373
Variational Quantum Algorithms for Structured LatticesLing, Dr CImperial College LondonElectrical and Electronic Engineering 562,376
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 96
Total Value of Grants: £105,688,324

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).