SEAMS-UGM-ITB Summer Course on Coding Theory and Cryptography

SEAMS-UGM-ITB Summer Course on Coding Theory and Cryptography

Brief Information

Date:
July 15-26, 2019
Place:
Department of Mathematics, Universitas Gadjah Mada
Lecturers:
Dr. Al. Sutjijana, Dr. Diah Junia Eksi Palupi, Dr. Djoko Suprijanto (in confirmation), Dr. Mardhani Riasetiawan, Dr. Ridi Ferdiana, Dr. Pekik Nurwantoro, Dr. Raditya Weda Bomantara, Dr. Frederic Ezerman, Dr. Romar de la Cruz, Dr. Guo Jian, Dr. Khoa Nguyen, Dr. Ivan Tjuawinata, Dr. Lin Fuchun, Dr. Wei Lei, Dr. Buket Ozkaya, Dr. Jakub Breier, and others (from Sekolah Tinggi Sandi Negara)
Fee:
Domestic Participant
Rp 1.200.000,00 (SEAMS UGM Participant)
Rp 1.500.000,00 (Others)
International Participant
US$ 150

Course Description

Modern cryptology is currently at the confluence of two major streams in science, mathematics, and computing. The first stream is the projected arrival of quantum computing technologies at a scale which is large enough to render the current cryptographic standards insecure. Massive engineering challenges remain to be solved before we reach such an era. The community, however, has been embarking in the tasks of designing and rigourously testing quantum-secure cryptographic protocols. Most candidates rely on intractable problems in coding theory, lattices, hash functions, or multilinear maps. A close scrutiny on their respective theory and deployments, both in softwares and hardwares, provides diverse topics of possible research directions to pursue. Many of them will be long-term enough for PhD research work and for an institute-wide effort as well as regional or international collaboration.

The second stream is harder to label, although perhaps already tangible in their societal influences. It appears as some combination of big data, machine learning, and the internet of things. It involves the deployment of algorithmics in the generation, linkage, and studies of massive data which is harvested, computed, stored, analysed, and transmitted in and through devices which are interconnected. There are many concerns that cryptology can play a role in addressing. These include privacy rights and law enforcement. Interconnected devices are harder to secure. Cyber threats and crimes by nature are extremely hard to contain in the usual geographical or legal boundaries. Protocols for multiparty computations, secret sharing, zero-knowledge proof, authentication, signature, and distributed ledger can be useful tools when well-callibrated.

The above considerations underline our plan. The Algebra Research Group at the Department of Mathematics, Universitas Gadjah Mada (UGM), in collaboration with the Algebra Research Group at Institut Teknologi Bandung (ITB), endorsed by the Southeast Asian Mathematical Society (SEAMS) is organizing a Summer Course on Coding Theory and Cryptography. We have lined up a series of preparatory lectures and topical talks by speakers from relevant areas of research: mathematics, physics, and computer science. While putting the emphasis on the theoretical aspects, we include experts in applied cryptography in the esteemed list of speakers.

The workshop has the following aims.

  1. To highlight the importance and impact of cryptology in daily life;
  2. To nurture the next generation of domain experts and enlightened practitioners in the region, e.g. ASEAN or Asian and locally in Indonesia;
  3. To kickstart intensive collaborations between UGM and other institutions;
  4. To earnestly explore multidisciplinary collaborations among mathematicians, computer scientists, physicists, and electrical engineers.
  5. To recruit potential postgraduate students.

Learning Outcome

Upon completion, we expect the participants to:

  1. have a deeper knowledge on the sophisticated and multidisciplinary background required to do advanced investigations in cryptography;
  2. know how to use tools from physics, mathematics, and computing in cryptography;
  3. be able to mention major protocols and open problems;
  4. be strongly motivated to do further studies in cryptography.

Method

The first week will be dedicated mostly to tutorials to discuss preparatory materials. A series of talks on hot topics permeate the second week. We have designed the program to include ample time in between sessions for informal discussion and networking.

Schedule

To download the (tentative) course schedule, click button below.

Share