Dr. Al. Sutjijana, Dr. Diah Junia Eksi Palupi, Dr. Mardhani Riasetiawan, Dr. Ridi Ferdiana, Dr. Intan Muchtadi-Alamsyah, Dr. Pekik Nurwantoro, Dr. Santi Indarjani, Dr. Lin Sok, Dr. Raditya Weda Bomantara, Dr. Lin Fuchun, Mr. Risman Adnan, Dr. Romar de la Cruz, Dr. Guo Jian, Dr. Khoa Nguyen, Dr. Ivan Tjuawinata, Dr. Chang Zuling, Dr. Benjamin Tan, Dr. Somphong Jitman, Dr. Jakub Breier, Dr. Frederic Ezerman, and Dr. Buket Ozkaya
Modern cryptology is currently at the confluence of two major streams in science, mathematics, and computing. The first stream is the projected arrival of quantum computing technologies at a scale which is large enough to render the current cryptographic standards insecure. Massive engineering challenges remain to be solved before we reach such an era. The community, however, has been embarking in the tasks of designing and rigourously testing quantum-secure cryptographic protocols. Most candidates rely on intractable problems in coding theory, lattices, hash functions, or multilinear maps. A close scrutiny on their respective theory and deployments, both in softwares and hardwares, provides diverse topics of possible research directions to pursue. Many of them will be long-term enough for PhD research work and for an institute-wide effort as well as regional or international collaboration.
The second stream is harder to label, although perhaps already tangible in their societal influences. It appears as some combination of big data, machine learning, and the internet of things. It involves the deployment of algorithmics in the generation, linkage, and studies of massive data which is harvested, computed, stored, analysed, and transmitted in and through devices which are interconnected. There are many concerns that cryptology can play a role in addressing. These include privacy rights and law enforcement. Interconnected devices are harder to secure. Cyber threats and crimes by nature are extremely hard to contain in the usual geographical or legal boundaries. Protocols for multiparty computations, secret sharing, zero-knowledge proof, authentication, signature, and distributed ledger can be useful tools when well-callibrated.
The above considerations underline our plan. The Algebra Research Group at the Department of Mathematics, Universitas Gadjah Mada (UGM), in collaboration with the Algebra Research Group at Institut Teknologi Bandung (ITB), endorsed by the Southeast Asian Mathematical Society (SEAMS) is organizing a Summer Course on Coding Theory and Cryptography. We have lined up a series of preparatory lectures and topical talks by speakers from relevant areas of research: mathematics, physics, and computer science. While putting the emphasis on the theoretical aspects, we include experts in applied cryptography in the esteemed list of speakers.
The workshop has the following aims.
- To highlight the importance and impact of cryptology in daily life;
- To nurture the next generation of domain experts and enlightened practitioners in the region, e.g. ASEAN or Asian and locally in Indonesia;
- To kickstart intensive collaborations between UGM and other institutions;
- To earnestly explore multidisciplinary collaborations among mathematicians, computer scientists, physicists, and electrical engineers.
- To recruit potential postgraduate students.
Upon completion, we expect the participants to:
- have a deeper knowledge on the sophisticated and multidisciplinary background required to do advanced investigations in cryptography;
- know how to use tools from physics, mathematics, and computing in cryptography;
- be able to mention major protocols and open problems;
- be strongly motivated to do further studies in cryptography.
The first week will be dedicated mostly to tutorials to discuss preparatory materials. A series of talks on hot topics permeate the second week. We have designed the program to include ample time in between sessions for informal discussion and networking.
Click here to download the course schedule.
Undergraduate students or master studens (or graduates) can apply to participate the summer course through the website:
The registration will be closed in
June 17, 2019 June 24, 2019 July 2, 2019.
- Create an account via https://admission.ugm.ac.id/registration/ugmfw/register/view_register We will send you an email containing a verification.
- Open your email to verify your account.
- Log in by using your account via https://admission.ugm.ac.id/registration/.
- Open Tab "Summer Course", and apply "SEAMS-UGM-ITB Summer Course on Coding Theory and Cryptography (Domestic/Foreign Participant)"
- Fill in the form.
- The OIA UGM will verify your data. Please wait for the Letter of Offer and an invoice.
- Do payment.
- After verifying your payment, the OIA UGM will issue the Letter of Acceptance.
There are three types of grant for joining the summer course.
- free fee (including kits, luncheons and 2 times coffee during the summer course, excursion)
The registration fee that you have paid will be reimbursed.
- free accomodation at university guest (one room for two people) providing by organizer).
Participants who are interested in applying for the grant, please kindly fill in the Grant Application Form. The filled form should be sent to:
no later than
June 12, 2019 June 24, 2019 July 2, 2019.
Please also attach your curriculum vitae (CV) and a short essay about your motivation joining the summer course.
Note: Make sure that you have did the registration through https://admission.ugm.ac.id/registration/ugmfw/register/view_register before you apply for the grant.
The decision for grants would be announced on July 3, 2019 (07.00 AM local time).