

{"id":698,"date":"2015-03-16T13:57:28","date_gmt":"2015-03-16T12:57:28","guid":{"rendered":"https:\/\/mooclab.inria.fr\/?p=698"},"modified":"2017-02-21T17:46:40","modified_gmt":"2017-02-21T16:46:40","slug":"mooc-code-based-cryptography","status":"publish","type":"post","link":"https:\/\/learninglab.inria.fr\/en\/mooc-code-based-cryptography\/","title":{"rendered":"MOOC &#8220;Code-based Cryptography&#8221;"},"content":{"rendered":"<p><center><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/3R297Ws7uR8\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/center><\/p>\n<p style=\"text-align: left;\">We all use <b>cryptography<\/b> in our daily lives. The security of the most popular <b>Public-Key Cryptosystems<\/b> are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: <b>Code-Based Cryptography is a powerful and promising alternative.<\/b><\/p>\n<p style=\"text-align: left;\">The objective of this course is to present the <b>state of the art of these cryptosystems<\/b>. This MOOC covers the essentials that you should know about this hot topic in <b>Cryptography and Coding Theory<\/b>: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.<\/p>\n<p>This course is intended for <b>undergraduate and Master\u2019s degree students in mathematics or computer science<\/b>. <b>Postgraduate students and researchers<\/b> from the disciplines of <b>computer algebra, coding theory and cryptography<\/b> can also benefit from this course. More widely, <b>mathematicians, physicists or engineers<\/b> interested in information and communication technologies and <b>every person who wants to know more about cryptography, coding theory or code-based cryptography<\/b> can be interested in this course.<\/p>\n<p>It is taught by <b>Ir\u00e8ne Marquez-Corbella, Nicolas Sendrier from <a class=\"external text\" href=\"https:\/\/www.rocq.inria.fr\/secret\/index.php\" rel=\"nofollow\">SECRET team<\/a><\/b>(Inria) and Matthieu Finiasz <a class=\"external text\" href=\"https:\/\/www.cryptoexperts.com\/CryptoExpert\" rel=\"nofollow\">(CryptoExpert)<\/a>.<\/p>\n<p><strong>Programme :<\/strong><\/p>\n<p>Week 1\u00a0: Error-Correcting Codes and Cryptography<br \/>\nWeek 2\u00a0: McEliece Cryptosystem<br \/>\nWeek 3\u00a0: Message Attacks (ISD)<br \/>\nWeek 4\u00a0: Key Attacks<br \/>\nWeek 5\u00a0: Other cryptographic constructions relying on coding theory<\/p>\n<p>Get the latest news about this course on Twitter: <span data-reactid=\".0\"><a class=\"_quickSearchPopup hash\" title=\"CodeBasedCrypto\" href=\"https:\/\/twitter.com\/search?q=%23CodeBasedCrypto&amp;src=typd\">#CodeBasedCrypto<\/a><\/span><\/p>\n<h3><strong>Track record and links:<\/strong><\/h3>\n<p>Session 1\u00a0: May 25 to June 28, 2015<br \/>\nSession 2\u00a0: May 23 to July 26, 2016<\/p>\n<ul>\n<li><a href=\"https:\/\/www.france-universite-numerique-mooc.fr\/courses\/inria\/41006\/session01\/about\">course presentation page<\/a> on FUN<\/li>\n<li>The videos and the slides of the MOOC can be downloaded on <a href=\"https:\/\/www.canal-u.tv\/producteurs\/inria\/cours_en_ligne\/code_based_cryptography\">Canal U<\/a><\/li>\n<li><a href=\"https:\/\/learninglab.inria.fr\/en\/infographie-mooc-code-based-cryptography-2\/\">Infographic of the 1st session<\/a><\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based\u2026<\/p>\n<p class=\"continue-reading-button\"> <a class=\"continue-reading-link\" href=\"https:\/\/learninglab.inria.fr\/en\/mooc-code-based-cryptography\/\">Read more<i class=\"crycon-right-dir\"><\/i><\/a><\/p>\n","protected":false},"author":405,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"summary_large_image","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1],"tags":[41,42,11],"class_list":["post-698","post","type-post","status-publish","format-standard","hentry","category-cours","tag-cryptographie","tag-cryptography","tag-mooc"],"_links":{"self":[{"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/posts\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/users\/405"}],"replies":[{"embeddable":true,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/comments?post=698"}],"version-history":[{"count":7,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/posts\/698\/revisions"}],"predecessor-version":[{"id":1511,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/posts\/698\/revisions\/1511"}],"wp:attachment":[{"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/categories?post=698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/learninglab.inria.fr\/en\/wp-json\/wp\/v2\/tags?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}