Information information

Note the essentials
  • Duration : 18 May to 17 July 2015
  • Address : ISI Kolkata, 203 B T Road, Kolkata 700 108

Your first points of contact are
  • Dr. Goutam Paul -- regarding the Lecture Series
  • Mr. Amarjit Basu (+91 89021 32348) -- regarding any logistics issue
  • Mr. Bappa Pal (+91 98740 40045) -- regarding hostel accommodation

Resources
  • Library Facility : First Floor, S N Bose Building (aka Library Building)
  • Computer Centre : Fourth Floor, S N Bose Building (aka Library Building)
  • Medical Unit : Hostel Campus (aka 205 B T Road campus of ISI)

Lectures lectures

The following schedule is tentative, and subject to change.

Cryptology Lecture Series (First Week):
Basic Primitives - Constructions and Analysis

Venue: NAB-I, Kolmogorov Building, ISI Kolkata

Date First Half (11:00 - 13:00) Second Half (14:00 - 16:00)
18 May Orientation and Basic Block Ciphers
Instructor: Goutam Paul
Number Theory and RSA
Instructor: Sourav Sen Gupta
19 May Key Management (10:30 - 12:30)
Instructor: Sushmita Ruj
Advanced Block Ciphers (DES, AES)
Instructor: Goutam Paul
20 May Statistics in Cryptology
Instructor: Bimal Roy
DLP, DHP and ElGamal
Instructor: Sourav Sen Gupta
21 May Visual Cryptography (10:30 - 11:30)
Instructor: Bimal Roy
Elliptic Curve Cryptography
Instructor: Sourav Sen Gupta
22 May Signatures and PKI (10:00 - 12:00)
Instructor: Binanda Sengupta
Stream Ciphers
Instructor: Goutam Paul

Cryptology Lecture Series (Second Week):
Security Notions

Venue: ASU Seminar Room, 8th Floor, Library Building

Date First Half (11:00 - 13:00) Second Half (14:00 - 16:00)
25 May IND-CPA Security, Random Oracles
Instructor: Rishiraj Bhattacharyya
One-Way Functions
Instructor: Avijit Dutta
26 May IND-CCA Security, OAEP
Instructor: Rishiraj Bhattacharyya
Hard-core Bit
Instructor: Avijit Dutta
27 May PRG, PRF, PRP
Instructor: Avijit Dutta
Coefficient H Technique
Instructor: Avijit Dutta
28 May Hash Proof Systems, Cramer Shoup
Instructor: Rishiraj Bhattacharyya
Code-based Gaming Techniques
Instructor: Avijit Dutta
29 May Digital Signatures, FDH, PSS
Instructor: Rishiraj Bhattacharyya
Message Authentication
Instructor: Avijit Dutta

Cryptology Lecture Series (Third Week):
Advanced Primitives - Constructions and Analysis

Venue: NAB-I, Kolmogorov Building, ISI Kolkata

Date First Half (11:00 - 13:00) Second Half (14:00 - 16:00)
01 June Introduction to Lattices
Instructor: Sumit Kumar Pandey
Analysis of Stream Ciphers - I
Instructor: Subhamoy Maitra
02 June LLL Algorithm
Instructor: Sumit Kumar Pandey
Analysis of Stream Ciphers - II
Instructor: Subhamoy Maitra
03 June Babai's Nearest Plane, GGH
Instructor: Sumit Kumar Pandey
Complexity Theory in Crypto - I
Instructor: Debajyoti Bera
04 June NRTU : Design and Attacks
Instructor: Sumit Kumar Pandey
Complexity Theory in Crypto - II
Instructor: Debajyoti Bera
05 June Hard Problems on Lattices
Instructor: Sumit Kumar Pandey
Secret Sharing
Instructor: Rana Barua

Special Invited Lectures:
Miscellaneous Topics in Cryptology, Discrete Maths, and allied domains

Time and Venue: mentioned along with individual lectures in the list below.

Date First Half Second Half
08 June (11:00 - 13:00, NAB-1)
Finding Top-k r-combinations and related problems - I
Instructor: Subhashis Majumder
(14:00 - 16:00, NAB-1)
Finding Top-k r-combinations and related problems - II
Instructor: Subhashis Majumder
09 June (10:00 - 13:00, ASU Seminar Room)
Algorithms for Spread of Influence in Social Graphs
Instructor: Subhashis Majumder
(14:00 - 16:00, ASU Seminar Room)
Quantum Cryptography
Instructor: Goutam Paul
 
23 June   (14:00 - 16:00, NAB-2)
Cryptographic Boolean Functions - I
Instructor: Sugata Gangopadhyay
24 June   (14:00 - 16:00, CVPR Seminar Room)
Cryptographic Boolean Functions - II
Instructor: Sugata Gangopadhyay
25 June   (14:00 - 16:00, NAB-2)
Cryptographic Boolean Functions - III
Instructor: Sugata Gangopadhyay

 

Coordinator

The Summer Internship in Cryptology 2015 is coordinated by Dr. Goutam Paul.

You may reach him at

EMail   goutam.paul@isical.ac.in
Office   Room 809, 8th Floor, S N Bose Building
or Room 406, 3rd Floor, Deshmukh Building

Important Dates

  • 10 Jan 2015 -- Notification
  • 16 Jan 2015 -- Application Open
  • 15 Feb 2015 -- Application Deadline
  • 15 Mar 2015 -- Initial Selection
  • 18 May 2015 -- Start of Internship
  • 17 Jul 2015 -- End of Internship

References

  • Douglas Stinson
    Cryptography : Theory and Practice
    CRC Press (Third Edition), 2005
  • J Katz and Y Lindell
    Introduction to Modern Cryptography
    Chapman and Hall / CRC, 2007
  • Neal Koblitz
    Number Theory and Cryptography
    Springer (Second Edition), 1994
  • A Menezes, P Oorschot, S Vanstone
    Handbook of Applied Cryptography
    CRC Press (Fifth Printing), 2001
    http://cacr.uwaterloo.ca/hac/
  • William Stallings
    Cryptography and Network Security
    Prentice Hall (Fifth Edition), 2010
  • Victor Shoup
    Computational Num Th and Algebra
    Cambridge University Press, 2008
    http://shoup.net/ntb/
  • Oded Goldreich
    The Foundations of Cryptography (Vol 1)
    Cambridge University Press, 2007
  • S Goldwasser and M Bellare
    Lecture Notes on Cryptography
    https://cseweb.ucsd.edu/~mihir/papers/gb.html