- Science Info Lycée Profs : conférences de formation des professeurs du secondaire en science informatique. (68)
- Colloquium Jacques Morgenstern : recherches en STIC - nouveaux thèmes scientifiques, nouveaux domaines d’application, et enjeux (50)
- Science Info Lycéens : contenus d'enseignements pour les lycéens en science informatique. (2)
- Forum des lauréats en informatique et mathématiques appliquées 2013 (11)
- Inria Joint Laboratory
- Les enjeux du Web 3.0 dans le secteur culturel (8)
- Colloque Interfaces (2)
- Cours en ligne
- Web sémantique et Web de données
- Bases de données relationnelles : comprendre pour maîtriser
- Bioinformatique : algorithmes et génomes
- Mobile Robots and Autonomous Vehicles
- Live Object Programming in Pharo
- 1 : Welcome on Board and Syntax Discovery (11)
- 2 : Pharo Syntax, Blocks and Inspector (16)
- 3 : Design, Class Methods and Collections (14)
- 4 : Inheritance & Lookup and Web Development (15)
- 5 : Exception, Debugging and Reflection (14)
- 6 : Rethink Lookup and Advanced Object-Oriented Design (12)
- 7 : More on Object-Oriented Design and Testing (11)
- Code-Based Cryptography
- Binaural Hearing for Robots
- Internet Measurements: a Hands-on Introduction
- Bioinformatics: Genomes and Algorithms
- Accessibilité numérique
- Rencontres autour d'un sujet scientifique : Unithé ou café
- Séminaires scientifiques

Inria
Code-Based Cryptography
We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.
The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.
TARGETED AUDIENCE
This course is intended for undergraduate and Master’s degree students in mathematics or computer science.
Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.
More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course.
PRE-REQUISITES
Knowledge about linear algebra, finite field and complexity theory is required.
COURSE SYLLABUS
Click on a link below to access the videos of the course.
Part 1: Error-Correcting Codes and Cryptography
Part 2: McEliece Cryptosystem
Part 3: Message Attacks (ISD)
Part 4: Key Attacks
Part 5: Other cryptographic constructions relying on coding theory
The material of this course come from a MOOC delivered on France Université Numérique : https://www.fun-mooc.fr/courses/inria/41006S02/session02/about
- 1: Error-Correcting Codes and Cryptography (9)
- 2: McEliece Cryptosystem (9)
- 3: Message Attacks (ISD) (10)
- 4: Key Attacks (9)
- 5: Other cryptographic constructions relying on coding theory (7)