Passer au contenu de cette vue

Table of Contents

Introduction  
  Course Presentation  
Guide: Learning Platform  
Guide: Discussion Forums  
Week 1: Error-Correcting Codes and Cryptography support
1.1. Introduction I - Cryptography support
1.2. Introduction II - Coding Theory support
1.3. Encoding (Linear Transformation) support
1.4. Parity Checking support
1.5. Error Correcting Capacity support
1.6. Decoding (A Difficult Problem) support
1.7. Reed-Solomon Codes support
1.8. Goppa Codes support
1.9. McEliece Cryptosystem support
Exercises Week 1  
Course Documents & References  
Week 2: McEliece Cryptosystem support
Survey: profile and expectations  
2.1. Formal Definition support
2.2. Security-Reduction Proof support
2.3. McEliece Assumptions support
2.4. Notions of Security support
2.5. Critical Attacks - Semantic Secure Conversions support
2.6. Reducing the Key Size support
2.7. Reducing the Key Size - LDPC codes support
2.8. Reducing the Key Size - MDPC codes support
2.9. Implementation support
Exercice Week 2  
Course Documents  
Week 3: Message Attacks (ISD) support
3.1. From Generic Decoding to Syndrome Decoding support
3.2. Combinatorial Solutions: Exhaustive Search and Birthday Decoding support
3.3. Information Set Decoding: the Power of Linear Algebra support
3.4. Complexity Analysis support
3.5. Lee and Brickell Algorithm support
3.6. Stern/Dumer Algorithm support
3.7. May, Meurer, and Thomae Algorithm support
3.8. Becker, Joux, May, and Meurer Algorithm support
3.9. Generalized Birthday Algorithm for Decoding support
3.10. Decoding One Out of Many support
Week 3 - Exercises  
Course Documents & References  
Week 4: Key Attacks support
Survey: work time and satisfaction  
4.1. Introduction support
4.2. Support Splitting Algorithm support
4.3. Distinguisher for GRS codes support
4.4. Attack against subcodes of GRS codes support
4.5. Error-Correcting Pairs support
4.6. Attack against GRS codes support
4.7. Attack against Reed-Muller codes support
4.8. Attack against Algebraic Geometry codes support
4.9. Goppa codes still resist support
Week 4 - Exercises  
Course Documents  
Week 5: Other Cryptographic Constructions Relying on Coding Theory support
5.1. Code-Based Digital Signatures support
5.2. The Courtois-Finiasz-Sendrier (CFS) Construction support
5.3. Attacks against the CFS Scheme support
5.4. Parallel-CFS support
5.5. Stern's Zero-Knowledge Identification Scheme support
5.6. An Efficient Provably Secure One-Way Function support
5.7. The Fast Syndrome-Based (FSB) Hash Function support
Week 5 exercises  
Course Documents  
Survey: follow up on the Mooc and opinion