Download presentation
Presentation is loading. Please wait.
Published bySheila Neal Modified over 9 years ago
1
Coding, Crypto and Security at TU/e
2
Mathematics and Computer Science https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/
3
Mathematics Centre for Analysis, Scientific Computing and Applic. https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-mathematics/centre-for-analysis-scientific- computing-and-applications-casa/ Stochastics https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-mathematics/section-stochastics-sto/
4
Mathematics Discrete Mathematics https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-mathematics/section-discrete-mathematics- dm/
5
Discrete Mathematics - Coding Theory and Cryptology www.win.tue.nl/cc - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry www.win.tue.nl/.../discrete-algebra-and-geometry - Combinatorial Optimization www.win.tue.nl/.../combinatorial-optimization-co
6
Coding Theory and Cryptology Coding Theory error correcting codes information theory algebra, combinatorics, geometry, statistics … Cryptology secret messages, hash functions digital signatures, certificates secure multi-party computation, protocols internet auctions, electronic elections algorithms, number theory, …
7
Coding Theory and Cryptology Tanja Lange crypto on (hyper)elliptic curves code based crypto www.hyperelliptic.org/tanja Berry Schoenmakers cryptographic protocols multi-party computation www.win.tue.nl/~berry
8
Coding Theory and Cryptology Ruud Pellikaan algebraic geometry codes code based crypto www.win.tue.nl/~ruudp Benne de Weger lattice based crypto hash functions algorithmic number theory www.win.tue.nl/~bdeweger
9
Coding Theory and Cryptology Ruben Niederhagen parallel architectures http://polycephaly.org Andreas Huelsing digital signature schemes quantum-computer aided attacks https://huelsing.wordpress.com/
10
Coding Theory and Cryptology Thijs Laarhoven lattice based crypto hash functions http://www.thijs.com Jan-Jaap Oosterwijk digital watermarks http://www.win.tue.nl/~joosterw
11
Coding Theory and Cryptology Putranto Hadi Utomo Binary Puzzles Constrained Arrays http://putranto.staff.uns.ac.id/
12
Cryptographic Implementations Dan Bernstein cryptographic implementations cr.yp.to/djb.html cryptographically protect every Internet packet against espionage, corruption, and sabotage
13
Cryptographic Implementations Andreas Hulsing hash-based signature schemes http://huelsing.wordpress.com Tony Chou fast implementations code-based cryptosystems sites.google.com/a/crypto.tw/blueprint
14
Cryptographic Implementations Chitchanok Chuengsatiansup elliptic and hyperelliptic curve cryptography pairing-based cryptography side-channel analysis https://sites.google.com/site/cchuengs Christine van Vredendaal algorithmic cryptanalysis http://scarecryptow.org
15
Security Sandro Etalle www.win.tue.nl/~setalle network intrusion detection protection of industrial control systems access control and trust management usage control and privacy protection verification of security protocols.
16
Security Milan Petkovic win.tue.nl/~petkovic Information security Secure data management Boris Skoric security1.win.tue.nl/~bskoric Secure key storage Anti-counterfeiting
17
Institute: EIPSI - EI/ΨEI/Ψ EIPSI www.win.tue.nl/eipsi/www.win.tue.nl/eipsi/ - Coding Theory and Cryptology www.win.tue.nl/cc - Cryptographic Implementations eindhoven.cr.yp.to - Security www.win.tue.nl/sec
18
The Kerckhoffs Institute The Kerckhoffs Institute for Computer Security www.kerckhoffs-institute.org/ The institute is a collaboration between: - University of TwenteUniversity of Twente - Eindhoven University of TechnologyEindhoven University of Technology - Radboud University NijmegenRadboud University Nijmegen Offers a 2-year master track in computer security as part of a computer science master programme
19
MasterMath Dutch Master's Degree Program in Mathematics www.mastermath.nl/
20
Computer Science Information Systems https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-computer-science/section-information- systems-is/ Security and Embedded Networked Systems https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-computer-science/section-security-and- embedded-networked-systems-sens/
21
Computer Science Algorithms and Visualization https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-computer-science/section-algorithms-and- visualization-av/ Model Driven Software Engineering https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/research/research- programs-computer-science/section-model-driven- software-engineering-mdse/
22
Data Science http://wwwis.win.tue.nl/~wvdaalst/data_science/data_s cience.html van der Aalst http://wis.win.tue.nl/~wvdaalst/ MOOC: Process Mining: Data science in Action https://www.coursera.org/course/procmin /
23
EIT Digital Master School https://www.tue.nl/en/university/departments/mathema tics-and-computer-science/news/11-11-2015-newly- established-eit-digital-data-science-program-at-the- master-school-kick-off
24
Brochures and weblinks 1 Graduate Programs https://www.tue.nl/en/education/tue-graduate- school/graduate-programs/ Overview Academic Programs http://flippingbooks.tue.nl//internet/folder-internationale- werving/index.html#
25
Brochures and weblinks 2 Industrial and Applied Mathematics https://www.tue.nl/en/education/tue-graduate- school/graduate-programs/industrial-and-applied- mathematics-graduate-program/ PhD program Industrial and Applied Mathematics https://www.tue.nl/en/education/tue-graduate- school/graduate-programs/industrial-and-applied- mathematics-graduate-program/phd-program- industrial-and-applied-mathematics/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.