Cryptology Workshop
CAM 2005, a national conference on applied mathematics,
will be held on the weekend of
This year the conference will take the form of a cryptology workshop designed for
the nonspecialist. The workshop
will begin with 3 lectures with the intention of giving someone with no
background in cryptology an introduction to the subject. The workshop will be
of interest to graduate students, advanced undergraduate students, and faculty
who are not experts in cryptology. The speakers will be D. J. Bernstein (
Travel funds are available to deter the expenses of participants. Graduate students, junior faculty, women, minorities, and persons with disabilities are especially encouraged to participate and to apply for support. Early application for support is encouraged.
For further information or to apply for support, contact an organizer:
Dr. Jesse Byrne, jbyrne@ucok.edu
;
tel: 405-974-5575 or Dr. Charlotte Simmons, cksimmons@ucok.edu
;
tel: 405-974-5316.
Speaker Biographies
Dr. Robert Lewand is Professor of Mathematics and Computer
Science at
Dr. Alice Silverberg is Professor of Mathematics and
Computer Science at the
Dr. Daniel J.
Bernstein is Professor of Mathematics, Statistics, and Computer Science at the
University of Illinois at Chicago. He completed his Ph.D. at the University of
California at Berkeley in 1995. Dr. Bernstein was a Sloan Research Fellow and
has held visiting positions at MSRI and at the University of Sydney. He has
received numerous grants from the NSF and has given invited addresses across
the US and in France, Germany, London, Canada, Australia, Austria and China.
Dr. Bernstein is the author of the computer software qmail and djbdns, and a
proponent of license-free software. As a result of the court case Bernstein v. United States, software was
declared protected speech under the First
Amendment and national restrictions on encryption
software were overturned.
Cryptology Conference
(includes mathematical underpinnings of cryptology, additive,
multiplicative, affine and keyword schemes)
(includes the
4:10 - 5:00 Polyalphabetic Substitution Ciphers, Part 2 Dr. Robert Lewand
(includes Playfair's System and Hill's System)
(includes how it works, why it works, and (time permitting)
some variations on the system).
Dr.
D. J. Bernstein,
Dr.
Alice Silverberg,