Pure mathematics
Proofs, invariants, algebraic objects, and abstraction used on concrete problems.
Zaiku Group works on problems involving cryptographic security, privacy guarantees, scientific data, model behaviour, and computation.
Homological structure
Homology is a useful example. Kernels, images, and invariants give us a way to compute what changes, what is preserved, and where an obstruction appears.
Zaiku Group applies pure mathematics to software, cryptography, scientific AI, privacy technology, and applied R&D.
A project may look like ordinary software work while the hard part is mathematical. It may depend on a cryptographic assumption, a privacy claim, a modelling choice, a stability issue, or a dataset that does not support the conclusion people want to draw.
We help research and engineering groups check the maths, review assumptions, build working products, and train internal teams when the missing knowledge is mathematical.
The name Zaiku is inspired by the Japanese Yosegi-Zaiku puzzle box. Intricate construction, hidden mechanisms, and parts that only work when they fit together precisely.
Proofs, invariants, algebraic objects, and abstraction used on concrete problems.
Modelling, working product development, evaluation, and technical review.
Cryptographic and statistical methods for constrained, sensitive, or distributed data.
Model behaviour, uncertainty, diagnostics, and the limits of what data can support.
Sakurai is a platform for researchers and engineers working with mathematics, privacy-enhancing technologies, and quantum computing.
A research platform for mathematical tools, privacy-enhancing technologies, and quantum computing experiments.
It brings together tools for computation, experimentation, protocol study, and mathematical training.
Access is currently invite-only. Public access will follow once the core tools are stable enough for wider use.
Request accessAlgebraic, analytical, and computational tools for research and engineering work.
Federated learning, zero-knowledge proofs, homomorphic encryption, and differential privacy.
Quantum algorithms, post-quantum cryptography, and the mathematical foundations needed to study them properly.
We help teams check the mathematical claims inside a product, model, protocol, or research programme before those claims become expensive to repair.
Experimental records, sensor outputs, images, logs, and spreadsheets rarely arrive ready for modelling. We help organise the problem before model selection, evaluation, anomaly detection, or failure analysis.
Post-quantum readiness, lattice-based cryptography, migration planning, protocol review, and internal training for teams preparing for quantum-era security.
Federated learning, zero-knowledge proofs, homomorphic encryption, differential privacy, and secure data collaboration. We treat each method as an engineering choice with mathematical constraints.
Modelling assumptions, optimisation, numerical methods, dynamical systems, simulation design, and analysis of technical outputs.
Knowledge graphs, typed workflows, compositional systems, category-theoretic abstractions, and formal methods in software design.
Workshops, reading groups, technical training, and curriculum design for teams that need stronger mathematics in-house.
We focus on sectors where errors in modelling, security, privacy, or data analysis can have serious operational, financial, or safety consequences.
Clinical, biomedical, and preclinical R&D produce complex data under tight constraints. We support mathematical modelling, privacy-preserving analysis, scientific AI, and evidence workflows where the data must be handled carefully.
Financial systems depend on models, risk assumptions, security controls, and high-integrity data flows. We support cryptography, privacy technology, mathematical risk analysis, optimisation, and model review.
Security-critical systems need clear assumptions, well-reviewed protocols, and careful handling of sensitive or distributed data. We support cryptographic review, post-quantum readiness, secure computation, and technical training.
Engineering, materials, devices, and scientific workflows often combine messy data with difficult models. We help organise data, simulations, and failure analysis using suitable mathematics.
We choose the mathematics according to the problem, whether the work calls for algebra, topology, analysis, probability, optimisation, or cryptography.
Groups, rings, fields, representations, coding theory, and cryptographic constructions.
Homology, cohomology, and topological invariants for structured data, networks, and higher-order relationships.
Operators, Hilbert spaces, spectral methods, inverse problems, signals, and machine learning models with analytic structure.
Manifolds, curvature, geometric structure, continuous models, simulation, and non-Euclidean optimisation.
Compositional systems, typed interfaces, workflows, software architecture, and knowledge representation.
Uncertainty, inference, signal structure, information flow, diagnostics, and model assessment.
Constrained optimisation, variational methods, numerical search, design trade-offs, and operational tuning.
Protocol design, threat modelling, and mathematical security analysis across classical and post-quantum settings.
QF Academy is our education arm. It teaches the mathematics behind modern tools, models, and protocols, with an emphasis on proofs, problem sheets, and guided study.