Download - Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science
![Page 1: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/1.jpg)
Coding, Crypto and Security at TU/e
![Page 2: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/2.jpg)
Mathematics and Computer Science
Mathematics and Computer Sciencehttps://www.tue.nl/en/university/departments/mathematics-and-computer-science/
![Page 3: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/3.jpg)
MathematicsCentre for Analysis, Scientific Computing and Applic.https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-mathematics/centre-for-analysis-scientific-computing-and-applications-casa/
Stochasticshttps://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-mathematics/section-stochastics-sto/
![Page 4: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/4.jpg)
Mathematics
Discrete Mathematics https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-mathematics/section-discrete-mathematics-dm/
![Page 5: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/5.jpg)
Discrete Mathematics
- Coding Theory and Cryptology www.win.tue.nl/cc - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry www.win.tue.nl/.../discrete-algebra-and-geometry - Combinatorial Optimization www.win.tue.nl/.../combinatorial-optimization-co
![Page 6: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/6.jpg)
Coding Theory and Cryptology
Coding Theoryerror correcting codesinformation theoryalgebra, combinatorics, geometry, statistics …
Cryptologysecret messages, hash functionsdigital signatures, certificates
secure multi-party computation, protocolsinternet auctions, electronic electionsalgorithms, number theory, …
![Page 7: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/7.jpg)
Coding Theory and Cryptology
Tanja Langecrypto on (hyper)elliptic curvescode based crypto
www.hyperelliptic.org/tanja
Berry Schoenmakerscryptographic protocolsmulti-party computation
www.win.tue.nl/~berry
![Page 8: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/8.jpg)
Coding Theory and Cryptology
Ruud Pellikaanalgebraic geometry codes
code based crypto www.win.tue.nl/~ruudp
Benne de Wegerlattice based cryptohash functionsalgorithmic number theory
www.win.tue.nl/~bdeweger
![Page 9: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/9.jpg)
Coding Theory and Cryptology
Ruben Niederhagen parallel architectures http://polycephaly.org
Andreas Huelsing digital signature schemes quantum-computer aided attacks https://huelsing.wordpress.com/
![Page 10: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/10.jpg)
Coding Theory and Cryptology
Thijs Laarhovenlattice based crypto
hash functions http://www.thijs.com
Jan-Jaap Oosterwijkdigital watermarks
http://www.win.tue.nl/~joosterw
![Page 11: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/11.jpg)
Coding Theory and Cryptology
Putranto Hadi Utomo Binary Puzzles Constrained Arrays http://putranto.staff.uns.ac.id/
![Page 12: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/12.jpg)
Cryptographic Implementations
Dan Bernstein cryptographic implementations cr.yp.to/djb.html
cryptographically protect every Internet packet against espionage, corruption, and sabotage
![Page 13: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/13.jpg)
Cryptographic Implementations
Andreas Hulsing hash-based signature schemes http://huelsing.wordpress.com
Tony Chou fast implementations code-based cryptosystems sites.google.com/a/crypto.tw/blueprint
![Page 14: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/14.jpg)
Cryptographic Implementations
Chitchanok Chuengsatiansupelliptic and hyperelliptic curve cryptographypairing-based cryptographyside-channel analysishttps://sites.google.com/site/cchuengs
Christine van Vredendaalalgorithmic cryptanalysis http://scarecryptow.org
![Page 15: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/15.jpg)
Security
Sandro Etallewww.win.tue.nl/~setalle
network intrusion detectionprotection of industrial control systemsaccess control and trust managementusage control and privacy protectionverification of security protocols.
![Page 16: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/16.jpg)
Security
Milan Petkovicwin.tue.nl/~petkovic Information securitySecure data management
Boris Skoricsecurity1.win.tue.nl/~bskoric Secure key storage Anti-counterfeiting
![Page 17: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/17.jpg)
Institute: EIPSI - EI/Ψ
EIPSI www.win.tue.nl/eipsi/
- Coding Theory and Cryptology www.win.tue.nl/cc - Cryptographic Implementations eindhoven.cr.yp.to - Security www.win.tue.nl/sec
![Page 18: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/18.jpg)
The Kerckhoffs Institute
The Kerckhoffs Institute for Computer Security www.kerckhoffs-institute.org/ The institute is a collaboration between: - University of Twente - Eindhoven University of Technology - Radboud University Nijmegen
Offers a 2-year master track in computer security as part of a computer science master programme
![Page 19: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/19.jpg)
MasterMath
Dutch Master's Degree Program in Mathematics
www.mastermath.nl/
![Page 20: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/20.jpg)
Computer Science
Information Systems https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-computer-science/section-information-systems-is/
Security and Embedded Networked Systems https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-computer-science/section-security-and-embedded-networked-systems-sens/
![Page 21: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/21.jpg)
Computer Science
Algorithms and Visualization https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-computer-science/section-algorithms-and-visualization-av/
Model Driven Software Engineering https://www.tue.nl/en/university/departments/mathematics-and-computer-science/research/research-programs-computer-science/section-model-driven-software-engineering-mdse/
![Page 22: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/22.jpg)
Data Science
http://wwwis.win.tue.nl/~wvdaalst/data_science/data_science.html
van der Aalsthttp://wis.win.tue.nl/~wvdaalst/
MOOC:Process Mining: Data science in Actionhttps://www.coursera.org/course/procmin
/
![Page 23: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/23.jpg)
EIT Digital Master School
https://www.tue.nl/en/university/departments/mathematics-and-computer-science/news/11-11-2015-newly-established-eit-digital-data-science-program-at-the-master-school-kick-off
![Page 24: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/24.jpg)
Brochures and weblinks 1
Graduate Programs https://www.tue.nl/en/education/tue-graduate-school/graduate-programs/
Overview Academic Programshttp://flippingbooks.tue.nl//internet/folder-internationale-werving/index.html#
![Page 25: Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science](https://reader036.vdocuments.site/reader036/viewer/2022062413/5a4d1b4b7f8b9ab0599a58a8/html5/thumbnails/25.jpg)
Brochures and weblinks 2
Industrial and Applied Mathematicshttps://www.tue.nl/en/education/tue-graduate-school/graduate-programs/industrial-and-applied-mathematics-graduate-program/ PhD program Industrial and Applied Mathematicshttps://www.tue.nl/en/education/tue-graduate-school/graduate-programs/industrial-and-applied-mathematics-graduate-program/phd-program-industrial-and-applied-mathematics/