Projects per year
Organization profile
Introduction / mission
The two chairs within DM maintain the tw main research areas: the more applied coding theory and cryptology and the more fundamental discrete algebra and geometry.
Highlighted phrase
The section DM is interested in all mathematical problems of a discrete nature.
Organisational profile
The section DM has two chairs:
The chair for Coding Theory and Cryptology (CC) performs research in theoretical and applied areas of both topics:
Coding Theory is the mathematical theory of encoding information in such a way that it becomes resistant to transmission errors. The main topics are the study of the properties of various codes (cyclic codes, BCH-codes, MDS-codes, algebraic-geometric codes) and the construction of efficient decoding algorithms for these codes.
Cryptology is the mathematical theory of protecting information against unauthorized access (privacy), determining if a message has been altered by a third party (integrity), adding a signature to an electronic document and verifying the identity.
Discrete Algebra and Geometry
Phenomena throughout mathematics and the natural sciences have discrete algebraic aspects, often along with analytical counterparts. While the latter are typically modelled using real numbers, differential equations, and numerical computations, describing the discrete-algebraic aspects involves objects like nite elds, graphs, polynomials, groups, algebras, and symbolic computations. The Discrete Algebra and Geometry (DAG) group at the TU/e develops the mathematics needed for such a description.
Fingerprint
Network
Profiles
-
Jacob R. Appelbaum
- Mathematics and Computer Science, Coding Theory and Cryptology - Former Doctoral Candidate
Person: Prom. : doctoral candidate (PhD)
-
Tomer Ashur
- Mathematics and Computer Science, Coding Theory and Cryptology - Assistant Professor
Person: UD : Assistant Professor
Projects
- 1 Active
-
A note on the primitive cohomology lattice of a projective surface
Peters, C. A. M., 2022, (Accepted/In press) In: Pure and Applied Mathematics Quarterly. XX, X, 11 p.Research output: Contribution to journal › Article › Academic › peer-review
Open Access -
Communication in a world of pervasive surveillance: Sources and methods: Counter-strategies against pervasive surveillance architecture
Appelbaum, J. R., 25 Mar 2022, Eindhoven: Eindhoven University of Technology. 327 p.Research output: Thesis › Phd Thesis 1 (Research TU/e / Graduation TU/e)
Open AccessFile -
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform.
Hövelmanns, K., Hülsing, A. & Majenz, C., 2022, In: CoRR. abs/2203.10182Research output: Contribution to journal › Article › Academic
Prizes
-
Algorithms for coping with uncertainty and intractability
Bansal, Nikhil (Recipient), 2013
Prize: ERC › Consolidator › Scientific
-
-
A solid theory for post-quantum cryptography
Hülsing, Andreas T. (Recipient), 2019
Prize: NWO › Vidi › Scientific
Activities
-
Mixed-Integer Programming Techniques for the Connected Max-k-Cut Problem
Christopher Hojny (Speaker)
4 Jun 2020Activity: Talk or presentation types › Invited talk › Scientific
-
Multi-league scheduling; how to schedule thousands of matches
Roel Lambers (Speaker)
13 Jan 2020Activity: Talk or presentation types › Contributed talk › Scientific
-
Symretopes and Symresacks: A Framework for Deriving Generic and Problem Specific Symmetry Handling Inequalities
Christopher Hojny (Speaker)
9 Dec 2019Activity: Talk or presentation types › Invited talk › Scientific
Press / Media
-
-Eindhoven University of Technology : KNAW acknowledges innovative research by TU/e researcher with Early Career Award
19/11/21
1 item of Media coverage
Press/Media: Expert Comment
-
KNAW acknowledges innovative research by TU/e researcher with Early Career Award
18/11/21
2 items of Media coverage
Press/Media: Expert Comment
-
= KNAW Acknowledges Innovative Research by Eindhoven University of Technology Researcher With Early Career Award
18/11/21
1 item of Media coverage
Press/Media: Expert Comment
Student theses
-
A characterization of the special linear and unitary Lie algebra via its extremal geometry
Author: Oostendorp, M. G. C., 31 Aug 2018Supervisor: Cuypers, F. G. M. T. (Supervisor 1)
Student thesis: Master
File -
Achieving differential privacy in secure multiparty computation
Author: Thissen, K. K. A., 15 May 2019Supervisor: Schoenmakers, B. (Supervisor 1), Koster, R. P. (External person) (External coach) & van Liesdonk, P. P. (External coach)
Student thesis: Master
File -
A group-theoretical analysis of solvability, solutions and solution strategies of permutation puzzles
Author: Rijpert, D. T. A., 15 Aug 2019Supervisor: Cuypers, H. (Supervisor 1)
Student thesis: Bachelor
File