Skip to main content
FUN MOOC
  • News
  • Courses
  • FormaPro
  • Organizations
  • About FUN
  • FAQ
  • You are here:
  • Home
  • Courses
  • Code-Based Cryptography

Code-Based Cryptography

Ref. 41006
CategoryComputer science and programmingCategoryMaths and statisticsCategoryTools for research
  • Duration: 5 weeks
  • Effort: 15 hours
  • Pace: ~3 hours/week
  • Languages: English

Description

This archived course remains open to registrations although it is not facilitated by the course teachers: its contents are no longer updated and may therefore no longer be up to date.
The last version of this Mooc Code-Based Cryptography dates back to June 2016.
If you register, you can freely consult the read-only resources but all collaborative spaces are closed (forums, wiki and other collaborative exercises): you cannot interact with the teaching team or with other learners. Furthermore, you will not be able to obtain an attestation of achievement for this course.

We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.

The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.

Format

The course contents are structured around 5 weeks, however all the contents will be available from the opening of the MOOC. Each week the teachers propose video lectures and exercises.

This session is open for ever. This is an archived Mooc.

Prerequisites

Knowledge about linear algebra, finite field and complexity theory is required.

Targeted Audience

This course is intended for undergraduate and Master’s degree students in mathematics or computer science.

Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.

More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course.

Assessment and certification

We remind you that no attestation of achievement for this course will be delivered at the end of the course.

Course plan

  • Week 1: Error-Correcting Codes and Cryptography
  • Week 2: McEliece Cryptosystem
  • Week 3: Message Attacks (ISD)
  • Week 4: Key Attacks
  • Week 5: Other cryptographic constructions relying on coding theory

Course team

Irene Marquez Corbella

Categories

Irene Márquez-Corbella is post-doctoral researcher of FSMP (Fondation Sciences Mathématiques de Paris) at Inria (France).

Nicolas Sendrier

Categories

Nicolas Sendrier obtained a Ph.D. (1991) and an "Habilitation à Diriger des Recherches" (2002) from University Paris 6.

Matthieu Finiasz

Categories

Matthieu Finiasz obtained his PhD from Inria in 2004.

Organizations

Inria

License

License for the course content

Attribution-NonCommercial-NoDerivatives

You are free to:

  • Share — copy and redistribute the material in any medium or format

Under the following terms:

  • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • NonCommercial — You may not use the material for commercial purposes.
  • NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.

License for the content created by course participants

Attribution-NonCommercial-NoDerivatives

You are free to:

  • Share — copy and redistribute the material in any medium or format

Under the following terms:

  • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • NonCommercial — You may not use the material for commercial purposes.
  • NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
FacebookTwitterLinkedin

Learn more

  • Help and contact
  • About FUN
  • Newsletters
  • Legal
  • Privacy policy
  • User's charter
  • General Terms and Conditions of Use
  • Sitemap
  • Cookie management
Logo FUN Mooc powered by Richie