Coding theory and Cryptography

  • P.O. Box 513, Department of Mathematics and Computer Science

    5600 MB Eindhoven

    Netherlands

Organization profile

Introduction / mission

The Coding Theory and Cryptology group performs research from theory to ptracice

Organisational profile

The main activities in our group are related to:

Coding Theory
This is the mathematical theory of encoding information in such a way that it becomes resistant to transmission errors. The main topics are the study of the properties of various codes (cyclic codes, BCH-codes, MDS-codes, algebraic-geometric codes) and the construction of efficient decoding algorithms for these codes.

Cryptology
This is the mathematical theory of protecting information against unauthorized access (privacy), determining if a message has been altered by a third party (integrity), adding a signature to an electronic document and verifying the identity. 

The group is part of the Department of Mathematics and Computer Science within the section Discrete Mathematics and of EI/Ψ, the Eindhoven Institute for the Protection of Systems and Information. 

Fingerprint Dive into the research topics where Coding theory and Cryptography is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Hash functions Engineering & Materials Science
Decoding Engineering & Materials Science
Program processors Engineering & Materials Science
Curve Mathematics
Polynomials Engineering & Materials Science
Elliptic Curves Mathematics
Costs Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1991 2019

1 Citation (Scopus)
2 Downloads (Pure)

A new class of irreducible pentanomials for polynomial-based multipliers in binary fields

Banegas, G., Custódio, R. & Panario, D., 1 Nov 2019, In : Journal of Cryptographic Engineering. 9, 4, p. 359–373 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Polynomials
Time delay
Costs

Application of complementary dual AG codes to entanglement-assisted quantum codes

Pereira, F. R. F., Pellikaan, R., La Guardia, G. G. & De Assis, F. M., 1 Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 2559-2563 5 p. 8849685

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Entanglement
Towers
Error-correcting Codes
Redundancy
Algebraic-geometry Codes

A reaction attack against cryptosystems based on LRPC codes

Samardjiska, S., Santini, P., Persichetti, E. & Banegas, G., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer International Publishing Switzerland, p. 197-216 20 p. (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Decoding
Standardization

Activities 2018 2019

  • 4 Contributed talk
  • 1 Invited talk

Entanglement-assisted Quantum Error Correcting Codes from Algebraic Geometry Codes

Francisco Fernandes Pereira (Speaker)
30 Nov 2019

Activity: Talk or presentation typesContributed talkScientific

Entanglement-Assisted Quantum AG Codes

Francisco Fernandes Pereira (Speaker)
17 Jul 2019

Activity: Talk or presentation typesInvited talkScientific

Quantum BCH and Reed-Solomon Entanglement-Assisted Codes

Francisco Fernandes Pereira (Speaker)
7 Mar 2019

Activity: Talk or presentation typesContributed talkScientific

Press / Media

PQCrypto and NIST Events: InfoSec Global, ...

Andreas T. Hülsing

12/04/18

1 item of Media coverage

Press/Media: Expert Comment

Report on NSA 'payments' to RSA fuels controversy

L.A.M. (Berry) Schoenmakers

23/12/13

2 items of Media coverage

Press/Media: Expert Comment

Student theses

Achieving differential privacy in secure multiparty computation

Author: Thissen, K., 15 May 2019

Supervisor: Schoenmakers, B. (Supervisor 1), Koster, R. (. (External person) (External coach) & van Liesdonk, P. (External coach)

Student thesis: Master

File

Analysis of the WireGuard protocol

Author: Wu, S., 24 Jun 2019

Supervisor: Lange, T. (Supervisor 1), Appelbaum, J. (Supervisor 2) & Donenfeld, J. A. (External person) (External coach)

Student thesis: Master

File

Brabocoin: an educational cryptocurrency based on Bitcoin

Author: van den Berg, D. P., Dekker, D., van den Eerenbeemt, S. & Wessel, S., 18 Apr 2019

Supervisor: de Weger, B. (Supervisor 1) & Skoric, B. (Supervisor 2)

Student thesis: Bachelor

File