Coding Theory and Cryptography

From SIAG-AG

(Difference between revisions)
Jump to: navigation, search
Revision as of 21:20, 9 February 2015 (edit)
Blekherman (Talk | contribs)

← Previous diff
Revision as of 14:13, 12 February 2015 (edit) (undo)
Blekherman (Talk | contribs)

Next diff →
Line 1: Line 1:
-Post quantum cryptography has become so important because quantum computers would be built in the future and so many of our current cryptosystems based on the hardness of the problem of factorization of integers and discrete log problems would be broken.+Coding Theory is the study of reliable communication and Cryptography is
- +the study of secret communication. It is important to note that some of the
-There are three main areas in post quantum cryptography. These are codes based cryptography, lattices based cryptography, and polynomial based cryptography. We invited top researchers in each area and discuss current research with the connection of Coding Theory, Algebra, Number Theory, and Algebraic Geometry.+coding theoretical techniques can be used to study cryptography in secret
 +sharing schemes, bent functions, McEliece cryptosystems, etc. Recently,
 +Carlet, Kim, Sole, et al. introduced a new class of linear codes, called
 +Complementary Information Set codes, in order to study side channel
 +attacks. Moreover, public key cryptosysems based on codes such as McEliece
 +cryptosystems are still considered secure under quantum algorithm.
 +Therefore, the aim of this minisymposium is to invite active researchers in
 +each area and discuss current research with the connection of Coding
 +Theory, Cryptography, Algebra, Number Theory, and Algebraic Geometry.
* Jung Hee Cheon (Seoul National University, S. Korea) * Jung Hee Cheon (Seoul National University, S. Korea)

Revision as of 14:13, 12 February 2015

Coding Theory is the study of reliable communication and Cryptography is the study of secret communication. It is important to note that some of the coding theoretical techniques can be used to study cryptography in secret sharing schemes, bent functions, McEliece cryptosystems, etc. Recently, Carlet, Kim, Sole, et al. introduced a new class of linear codes, called Complementary Information Set codes, in order to study side channel attacks. Moreover, public key cryptosysems based on codes such as McEliece cryptosystems are still considered secure under quantum algorithm. Therefore, the aim of this minisymposium is to invite active researchers in each area and discuss current research with the connection of Coding Theory, Cryptography, Algebra, Number Theory, and Algebraic Geometry.

  • Jung Hee Cheon (Seoul National University, S. Korea)
  • Jon-Lark Kim (Sogang University, S. Korea)
  • Daniel Smith (University of Louisville)
  • Kirill Morozov (Kyushu University, Japan)
Views
Personal tools