This archived course remains open to registrations although it is not facilitated by the course teachers: its contents are no longer updated and may therefore no longer be up to date.
The last version of this Mooc Code-Based Cryptography dates back to June 2016.
If you register, you can freely consult the read-only resources but all collaborative spaces are closed (forums, wiki and other collaborative exercises): you cannot interact with the teaching team or with other learners. Furthermore, you will not be able to obtain an attestation of achievement for this course.
We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.
The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.
The course contents are structured around 5 weeks, however all the contents will be available from the opening of the MOOC. Each week the teachers propose video lectures and exercises.
This session is open for ever. This is an archived Mooc.
Knowledge about linear algebra, finite field and complexity theory is required.
Targeted Audience
This course is intended for undergraduate and Master’s degree students in mathematics or computer science.
Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.
More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course.
We remind you that no attestation of achievement for this course will be delivered at the end of the course.
Catégories
Catégories
Vous êtes autorisé à :
Selon les conditions suivantes :
Vous êtes autorisé à :
Selon les conditions suivantes :