Tutorial Workshop on

Many Facets of Cryptology




Jointly Organized by

Department of Computer Science & Engineering, Jadavpur University

and

Centre of Excellence in Cryptology, Indian Statistical Institute

Dates: October 14-15, 2011, Location: TEQIP Building, JU

Cryptology is the art and science of hiding information. The subject dates back to thousands of years. Historically, the main purpose of cryptology has been confidentiality, i.e., a sender and receiver would communicate over a public channel in such a way that no eavesdropper can decipher the meaning of the message. However, as human beings have evolved from ancient stone age into modern digital age, newer usages and utilities of cryptology have been discovered. Now-a-days, cryptology is prevalent in every sphere of life, e.g., mobile communications, e-commerce, netbanking, paid television channels, copy protection, identity verification etc., only to name a few. In this tutorial workshop, we plan to peep into the many facets of this fascinating subject and reveal the mathematical and computational underpinnings that lay its foundations.


Convener & Program Coordinator: Dr. Goutam Paul (Assistant Professor, Dept. of CSE, JU)

Official poster of the event: JU-ISI Tutorial Workshop Poster



Program Schedule

Oct 14, 2011

Friday

09:00-09:30

Registration

09:30-10:00

Inauguration

10:00-11:00

Introduction to Cryptology

by Prof. Bimal Roy, Director, ISI Kolkata

11:00-11:30

Tea Break

11:30-12:30

Broadcast Encryption

by Mr. Sanjay Bhattacherjee, ASU, ISI Kolkata

12:30-13:30

Cryptology from Theoretical Computer Science Perspective

by Mr. Rishiraj Bhattacharyya, CoEC, ISI Kolkata

13:30-14:30

Lunch

14:30-15:30

Authentication

by Dr. Mridul Nandi, ASU, ISI Kolkata

15:30-16:00

Tea Break

16:00-17:00

Security Studies vs. Cryptology

by Prof. Chandan Mazumdar, CSE, JU

Oct 15, 2011

Saturday

10:00-11:00

Number Theory in Cryptology

by Dr. Abhijit Das, CSE, IIT Kharagpur

11:00-11:30

Tea Break

11:30-12:30

Identity Based Encryption

by Prof. Rana Barua, SMU, ISI Kolkata

12:30-13:30

Boolean Functions in Cryptology

by Dr. Sugata Gangopadhyay, Mathematics Dept., IIT Roorkee

13:30-14:30

Lunch

14:30-15:30

Cryptographic Hardware Implementation Issues

by Mr. Sourav Sen Gupta, CoEC, ISI Kolkata

15:30-16:00

Tea Break

16:00-17:00

Quantum Cryptography

by Prof. Guruprasad Kar, PAMU, ISI Kolkata



Participation Policy

The workshop is targeted to Science & Engineering students of Jadavpur University (JU) and Bengal Engineering & Science University (BESU). Intended participants must send a registration request to cseju.coecisi@gmail.com with the following information:

1.   Name (Surname first)

2.   University & Department

3.   Degree pursuing & Year of study

4.   Contact Address

5.   Mobile Number

6.   Email id

Please type all information in the body of the email, and DO NOT send any attachment. The organizers will respond with a confirmation email.

Deadline of Registration Request: September 30, 2011.

Registration Confirmation Email will be sent out during: October 08-12, 2011.

Participants must bring their student ID and a printout of the confirmation email to attend the workshop.

Note: Due to seat limitation, the number of registered participants to be admitted is 100. Generally, the registration requests would be processed on first-come-first-serve basis. Though students from any science and engineering discipline of JU/BESU are encouraged to apply, depending on the number of requests received, preference may be given to CSE / ETC / Mathematics students.