[{"data":1,"prerenderedAt":404},["ShallowReactive",2],{"navigation-en":3,"mooc-cryptography-en":222},[4,96,126,130,196,200,204,214,218],{"title":5,"path":6,"stem":7,"children":8},"Blog","/blog","blog",[9,12,16,20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84,88,92],{"title":10,"path":6,"stem":11},"News","blog/index",{"title":13,"path":14,"stem":15},"100 000+ people registered to Inria's MOOCs on FUN","/blog/100000-mooc-users","blog/100000-mooc-users",{"title":17,"path":18,"stem":19},"AI in education : A Mooc and learning resources for teachers","/blog/ai4t","blog/ai4t",{"title":21,"path":22,"stem":23},"MOOC \"Binaural hearing for robots\"","/blog/binaural","blog/binaural",{"title":25,"path":26,"stem":27},"MOOC \"Bioinformatics: genomes and algorithms\"","/blog/bioinfo","blog/bioinfo",{"title":29,"path":30,"stem":31},"MOOC \"Code-based Cryptography\"","/blog/crypto","blog/crypto",{"title":33,"path":34,"stem":35},"[Infographic] MOOC Code-Based Cryptography 2","/blog/crypto-2-infographic","blog/crypto-2-infographic",{"title":37,"path":38,"stem":39},"MOOC Environmental impacts of digital technologies","/blog/impact-num","blog/impact-num",{"title":41,"path":42,"stem":43},"Mooc \"Internet Measurements: a Hands-on Introduction\"","/blog/int-measure","blog/int-measure",{"title":45,"path":46,"stem":47},"[Infographic] MOOC Internet Measurements","/blog/int-measure-infographie","blog/int-measure-infographie",{"title":49,"path":50,"stem":51},"MOOC Introduction to a Web of Linked Data","/blog/introduction-to-a-web-of-linked-data","blog/introduction-to-a-web-of-linked-data",{"title":53,"path":54,"stem":55},"MOOC \"Internet of Things with Microcontrollers: a hands-on course\"","/blog/iot","blog/iot",{"title":57,"path":58,"stem":59},"MOOC \"Mobile Robots and Autonomous Vehicles\"","/blog/mob-robots","blog/mob-robots",{"title":61,"path":62,"stem":63},"[Infographic] MOOC Mobile Robots 2","/blog/mob-robots-2-infographic","blog/mob-robots-2-infographic",{"title":65,"path":66,"stem":67},"MOOC \"Introduction to functional programming in OCaml\"","/blog/ocaml","blog/ocaml",{"title":69,"path":70,"stem":71},"MOOC «Live Object Programming in Pharo» : new edition based on Pharo v8.0 !","/blog/pharo-8","blog/pharo-8",{"title":73,"path":74,"stem":75},"[Infographic] Pharo MOOC through figures","/blog/pharo-infographie","blog/pharo-infographie",{"title":77,"path":78,"stem":79},"Mooc Reproducible research: new self-paced session from March 20, 2020!","/blog/rr","blog/rr",{"title":81,"path":82,"stem":83},"Reproducible Research II","/blog/rr2","blog/rr2",{"title":85,"path":86,"stem":87},"Mooc Smart cities: Take up the challenges of cities in the digital era.","/blog/smart-cities","blog/smart-cities",{"title":89,"path":90,"stem":91},"MOOC Teaching Digital Sciences and Technology","/blog/snt","blog/snt",{"title":93,"path":94,"stem":95},"ePoc release: Fundamentals of Manipulation Robotics","/blog/sortie-epocrobotique","blog/sortie-ePocRobotique",{"title":97,"path":98,"stem":99,"children":100},"All our ePocs","/epocs","epocs/1.index",[101,102,106,110,114,118,122],{"title":97,"path":98,"stem":99},{"title":103,"path":104,"stem":105},"Internet des objets et vie privée","/epocs/internet-des-objets-et-vie-privee","epocs/Internet-des-objets-et-vie-privee",{"title":107,"path":108,"stem":109},"Produire mon 1er ePoc","/epocs/produire-mon-premier-epoc","epocs/Produire-mon-premier-epoc",{"title":111,"path":112,"stem":113},"Smartphone et vie privée","/epocs/smartphone-et-vie-privee","epocs/Smartphone-et-vie-privee",{"title":115,"path":116,"stem":117},"Le smartphone et la planète","/epocs/smartphone-planete","epocs/Smartphone-planete",{"title":119,"path":120,"stem":121},"B.A.-BA des data","/epocs/babadata","epocs/babadata",{"title":123,"path":124,"stem":125},"C'est quoi l'IA ?","/epocs/c-est-quoi-ia","epocs/c-est-quoi-ia",{"title":127,"path":128,"stem":129},"","/","index",{"title":131,"path":132,"stem":133,"children":134},"All of our MOOCs","/moocs","moocs/1.index",[135,136,140,144,148,152,156,160,164,168,172,176,180,184,188,192],{"title":131,"path":132,"stem":133},{"title":137,"path":138,"stem":139},"Advanced object oriented design and development with Pharo","/moocs/advanced-ood","moocs/advanced-ood",{"title":141,"path":142,"stem":143},"Binaural hearing for robots","/moocs/binauralhearing","moocs/binauralhearing",{"title":145,"path":146,"stem":147},"Bioinformatics, Genomes and Algorithms","/moocs/bioinfo-en","moocs/bioinfo-en",{"title":149,"path":150,"stem":151},"Code-based Cryptography","/moocs/cryptography","moocs/cryptography",{"title":153,"path":154,"stem":155},"Environmental impacts of digital technologies","/moocs/impactnum","moocs/impactnum",{"title":157,"path":158,"stem":159},"Internet Measurements - A Hands-on Introduction","/moocs/internetmesure","moocs/internetmesure",{"title":161,"path":162,"stem":163},"Internet of Things with Microcontrollers: a hands-on course","/moocs/iotmicrocontroleur","moocs/iotmicrocontroleur",{"title":165,"path":166,"stem":167},"Mobile Robots and Autonomous Vehicles","/moocs/mob-robots","moocs/mob-robots",{"title":169,"path":170,"stem":171},"Live Object Programming in Pharo","/moocs/pharo-programming","moocs/pharo-programming",{"title":173,"path":174,"stem":175},"Machine learning in Python with scikit-learn","/moocs/pythonsckitlearn","moocs/pythonsckitlearn",{"title":177,"path":178,"stem":179},"Reproducible research - methodological principles for transparent science","/moocs/recherchereproductible","moocs/recherchereproductible",{"title":181,"path":182,"stem":183},"Reproducible Research II - Practices and tools for managing computations and data","/moocs/rr2","moocs/rr2",{"title":185,"path":186,"stem":187},"Technological challenges of participatory smart cities","/moocs/smartcitychallenge","moocs/smartcitychallenge",{"title":189,"path":190,"stem":191},"Nom du MOOC","/moocs/template","moocs/template",{"title":193,"path":194,"stem":195},"Introduction to a Web of Linked Data","/moocs/weblinkdata","moocs/weblinkdata",{"title":197,"path":198,"stem":199},"Privacy Policy","/privacy","privacy",{"title":201,"path":202,"stem":203},"All our productions","/productions","productions",{"title":205,"path":206,"stem":207,"children":208},"Our serious games","/serious-games","serious-games/1.index",[209,210],{"title":205,"path":206,"stem":207},{"title":211,"path":212,"stem":213},"Phone Impact","/serious-games/phone-impact","serious-games/phone-impact",{"title":215,"path":216,"stem":217},"Inria Learning Lab","/team","team",{"title":219,"path":220,"stem":221},"Legal Notice","/terms","terms",{"id":223,"title":149,"assesment":224,"body":225,"date":389,"description":390,"draft":391,"extension":392,"image":393,"investment":224,"lang":394,"licence":396,"meta":397,"navigation":398,"path":150,"seo":399,"status":400,"stem":151,"trailer":401,"type":224,"url":402,"__hash__":403},"moocs_en/moocs/cryptography.md",null,{"type":226,"value":227,"toc":382},"minimark",[228,233,245,259,270,274,280,290,301,305,339,343,346,366,369],[229,230,232],"h2",{"id":231},"course-description","Course description",[234,235,236,237,241,242],"p",{},"This archived course remains open to registrations although it is not facilitated by the course teachers: its contents are no longer updated and may therefore no longer be up to date.\nThe last version of this Mooc Code-Based Cryptography dates back to June 2016.\nIf you register, ",[238,239,240],"strong",{},"you can freely consult the read-only resources"," but all collaborative spaces are closed (forums, wiki and other collaborative exercises): you cannot interact with the teaching team or with other learners. Furthermore, ",[238,243,244],{},"you will not be able to obtain an attestation of achievement for this course.",[234,246,247,248,251,252,255,256],{},"We all use ",[238,249,250],{},"cryptography"," in our daily lives. The security of the most popular ",[238,253,254],{},"Public-Key Cryptosystems"," are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: ",[238,257,258],{},"Code-Based Cryptography is a powerful and promising alternative.",[234,260,261,262,265,266,269],{},"The objective of this course is to present the ",[238,263,264],{},"state of the art of these cryptosystems."," This MOOC covers the essentials that you should know about this hot topic in ",[238,267,268],{},"Cryptography and Coding Theory",": the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.",[229,271,273],{"id":272},"who-is-this-course-for","Who is this course for?",[234,275,276,277],{},"This course is intended for ",[238,278,279],{},"Undergraduate and Master's degree students in mathematics or computer science.",[234,281,282,285,286,289],{},[238,283,284],{},"Postgraduate students and researchers"," from the disciplines of ",[238,287,288],{},"computer algebra, coding theory and cryptography"," can also benefit from this course.",[234,291,292,293,296,297,300],{},"More widely, ",[238,294,295],{},"mathematicians, physicists or engineers"," interested in information and communication technologies and ",[238,298,299],{},"every person who wants to know more about cryptography, coding theory or code-based cryptography"," can be interested in this course",[229,302,304],{"id":303},"course-outline","Course outline",[306,307,308,315,321,327,333],"ul",{},[309,310,311,312],"li",{},"Module 1: ",[238,313,314],{},"Error-Correcting Codes and Cryptography",[309,316,317,318],{},"Module 2: ",[238,319,320],{},"McEliece Cryptosystem",[309,322,323,324],{},"Module 3: ",[238,325,326],{},"Message Attacks (ISD)",[309,328,329,330],{},"Module 4: ",[238,331,332],{},"Key Attacks",[309,334,335,336],{},"Module 5: ",[238,337,338],{},"Other cryptographic constructions relying on coding theory",[229,340,342],{"id":341},"pedagogical-team","Pedagogical team",[234,344,345],{},"Authors:",[306,347,348,354,360],{},[309,349,350,353],{},[238,351,352],{},"Irene MARQUEZ CORBELLA",", Post-doctoral researcher of FSMP (Fondation Sciences Mathématiques de Paris), Inria",[309,355,356,359],{},[238,357,358],{},"Nicolas SENDRIER",", Ph.D (1991) & \"Habilitation à Diriger des Recherches\" (2002), Université Paris 6",[309,361,362,365],{},[238,363,364],{},"Matthieu FINIASZ",", Ph.D (2004), Inria",[234,367,368],{},"Pedagogical support:",[306,370,371,377],{},[309,372,373,376],{},[238,374,375],{},"Christelle MARIAIS",", Learning engineer, Inria Learning Lab",[309,378,379,376],{},[238,380,381],{},"Isabelle Rey",{"title":127,"searchDepth":383,"depth":383,"links":384},2,[385,386,387,388],{"id":231,"depth":383,"text":232},{"id":272,"depth":383,"text":273},{"id":303,"depth":383,"text":304},{"id":341,"depth":383,"text":342},"2015-03-16","Explore the future of secure communication with Code-Based Cryptography!",false,"md","/images/mooc/pcrypto.png",[395],"en","CC BY-NC-ND",{},true,{"title":149,"description":390},"closed","https://www.youtube.com/embed/3R297Ws7uR8?si=eTRjaMdbJYaCzDWB","https://www.fun-mooc.fr/en/courses/code-based-cryptography/","m7eApU05GcRnEsLBMgPbusqtrHJuSP6oQDmTseuUBdQ",1775223071330]