Program overview




Mathematical Foundations


Coding and Cryptography


Applied Cryptology


Workshop and Tutorial Registration form
    MSWord | PDF | PS

Membership Application form
    MSWord | PDF | PS



       Academic matter






Part 2. Coding and Cryptography

Tutorial on Coding and Cryptography, 3 - 7 September 2001

Speakers and Topics (as of 2 July 2001) :

A. Barg (USA)

Extremal problems of coding theory

E. Dawson (Australia)

Issues in design and analysis of stream ciphers

C.P. Xing (Singapore)

Algebraic-geometry codes

T. Matsumoto (Japan)

Detecting and revoking compromised keys

D.Y. Pei (China)

Authentication schemes

Workshop on Coding and Cryptography, 10 - 13 September 2001

Invited Speakers (as of 2 July 2001) : A. Barg (USA), H. Niederreiter (Singapore), E. Okamoto (Japan), T. Okamoto (Japan), D.Y. Pei (China), N. Sendrier (France), N.J.A. Sloane (USA), P. Solé (France).

Description : The workshop is part of the inaugural program of the Institute for Mathematical Sciences on coding theory and data integrity which will run from July to December 2001. There will be invited talks and shorter contributed talks. Specific topics include (but are not limited to) constructions of codes, asymptotic theory of codes, decoding algorithms, public-key cryptosystems, digital signature schemes, authentication schemes, applications of curves and codes to cryptography, and lattice-based cryptology.

Call for Papers : Authors of contributed papers should e-mail an abstract of 300 - 500 words to H. Niederreiter ( by June 22, 2001. Authors of accepted papers will be notified by July 6, 2001.



Please complete the registration form (MSWord|PDF|PS) and fax or email to us not later than 30 July 2001.