License: Creative Commons Attribution-NoDerivs 3.0 Unported license (CC BY-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.STACS.2010.2441
URN: urn:nbn:de:0030-drops-24416
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2010/2441/
Stern, Jacques
Mathematics, Cryptology, Security
Abstract
In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and Hellman in 1976.
This community has developped many challenging lines of research. I will only focus on some of these, and moreover I will adopt an extremely specific perspective: for each chosen example, I will try to trace the original mathematics that underly the methods in use.
Over the years, maybe due to my original training as a mathematician, I have come to consider that linking recent advances and challenges in cryptology and security to the work of past mathematicians is indeed fascinating.
The range of examples will span both theory and practice: I will show that the celebrated RSA algorithm is intimately connected to mathematics that go back to the middle of the XVIIIth century. I will also cover alternatives to RSA, the method of "provable security", as well as some aspects of the security of electronic payments.
BibTeX - Entry
@InProceedings{stern:LIPIcs:2010:2441,
author = {Jacques Stern},
title = {{Mathematics, Cryptology, Security}},
booktitle = {27th International Symposium on Theoretical Aspects of Computer Science},
pages = {33--34},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-939897-16-3},
ISSN = {1868-8969},
year = {2010},
volume = {5},
editor = {Jean-Yves Marion and Thomas Schwentick},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
address = {Dagstuhl, Germany},
URL = {http://drops.dagstuhl.de/opus/volltexte/2010/2441},
URN = {urn:nbn:de:0030-drops-24416},
doi = {10.4230/LIPIcs.STACS.2010.2441},
annote = {Keywords: Mathematics, Cryptology, Security}
}
Keywords: |
|
Mathematics, Cryptology, Security |
Collection: |
|
27th International Symposium on Theoretical Aspects of Computer Science |
Issue Date: |
|
2010 |
Date of publication: |
|
09.03.2010 |