Joux's Recent Index Calculus Results, Part II: The Function Field Sieve and Joux's Improvements.

Speaker: 

Joshua Hill

Institution: 

UCI

Time: 

Tuesday, June 4, 2013 - 3:00pm

Host: 

Location: 

RH 340N

In this talk, I describe the Function Field Sieve algorithm and its
application to solving the discrete log problem, highlighting Joux's
recent advancements that reduce the heuristic work factor to L(1/4 + o(1)).

Subspace codes for network error correction

Speaker: 

Fangwei Fu

Institution: 

Chern Institute of Mathematics, Nankai University

Time: 

Tuesday, April 23, 2013 - 3:00pm to 4:00pm

Host: 

Location: 

RH 340N

Subspace codes were introduced by Koetter and Kschischang in 2007 as network error- correcting codes. Constant dimension codes is an important class of subspace codes. In this talk, we review and survey some bounds, constructions, decoding algorithm and application background for subspace codes and constant dimension codes.

Candidate Multilinear Maps from Ideal Lattices

Speaker: 

Sanjam Garg

Institution: 

UCLA

Time: 

Tuesday, May 7, 2013 - 3:00pm

Host: 

Location: 

RH 340N

We describe plausible lattice-based constructions with properties that approximate the sought-after multilinear maps in hard-discrete-logarithm groups, and show an example application of such multilinear maps that can be realized using our approximation. The security of our constructions relies on seemingly hard problems in ideal lattices, which can be viewed as extensions of the assumed hardness of the NTRU function. This is joint work with Craig Gentry and Shai Halevi.

Small-bias sets and the subset sum problem

Speaker: 

Jiyou Li

Institution: 

Shanghai Jiaotong University

Time: 

Tuesday, January 22, 2013 - 2:00pm

Location: 

RH306

A subset $X$ in $\{0,1\}^n$ is a called an $\epsilon$-biased set if for any nonempty subset $T\subseteq [n]$ the following condition holds. Randomly choosing an element $x\in X$, the parity of its T-coordinates sum has bias at most $\epsilon$. This concept is essentially equivalent or close to expanders, pseudorandom generators and linear codes of certain parameters. For instance, viewing $X$ as a generator matrix, an $\epsilon$-biased set is equivalent to an $[|X|, n]_2$-linear code of relative distance at least $1/2-\epsilon$. For fixed $n$ and $\epsilon$, it's a challenging problem to construct smallest $\epsilon$-biased sets. In this talk we will first introduce several known constructions of $\epsilon$-bias sets with the methods from number theory and geometrical coding theory. Then we will present a construction with a conjecture, which is closely related to the subset sum problem over prime fields.

Isolated Curves for Hyperelliptic Curve Cryptography

Speaker: 

Wenhan Wang

Institution: 

University of Washington

Time: 

Tuesday, February 5, 2013 - 2:00pm to 3:00pm

Host: 

Location: 

RH306

The endomorphism rings of ordinary jacobians of genus two curves defined over finite
fields are orders in quartic CM fields. The conductor gap between two endomorphism rings is
defined as the largest prime number that divides the conductor of one endomorphism ring but not
the other. We call a genus two curve isolated, if its endomorphism ring has large conductor gap
(>=80 bits) with any other possible endomorphism rings. There is no known algorithm to explicitly
construct isogenies from an isolated curve to curves in other endomorphism classes. I will
explain results on criteria for a curve to be isolated, as well as the heuristic asymptotic
distribution of isolated genus two curves.

Pages

Subscribe to RSS - Cryptography