NSF Logo IPAM Logo UCLA Logo

Securing Cyberspace: Applications and Foundations of Cryptography and Computer Security

September 11 - December 15, 2006

Program Poster PDF

Hotel Accommodation and Air Travel

Participants

Organizing Committee

Don Blasius (UCLA, Mathematics)
Dan Boneh (Stanford University, Computer Science)
Shafi Goldwasser (Massachusetts Institute of Technology, Computer Science)
Eyal Kushilevitz (Technion - Israel Institute of Technology, Computer Science)
Arjen Lenstra (Lucent Technologies Bell Laboratories, Computing Sciences Research Center)
Rafail Ostrovsky (UCLA, Computer Science)
Joseph Silverman (Brown University, Mathematics)

Activities

There will be an active program of research activities, seminars and workshops throughout the period and core participants will be in residence at IPAM continuously for these fourteen weeks. The program will open with tutorials, and will be punctuated by four major workshops and a culminating workshop at UCLA's Lake Arrowhead Conference Center. Several distinguished senior researchers will be in residence for the entire period. Between the workshops there will be a program of activities involving the long-term and short-term participants, as well as visitors.

Scientific Overview

Cryptography represents one of the most amazing unanticipated applications of pure mathematics to the real world. Without it, internet commerce would be unthinkable. Mathematical tools, in combination with theoretical computer science, have become a critical cornerstone for many Internet-based and wireless applications. Indeed, security, privacy and fault-tolerance have become key requirements for many emerging applications.

As remarkable as the first generation of insights into cryptography and computer security were, they have not in fact brought us bullet-proof security, as new challenges and attacks has arisen. The setting of the Internet-based applications has become far more complex; the potential attacks more numerous and sophisticated. Initial "stand-alone" requirements for security were replaced by a need for security in far more complex environments, where complicated interactions with multiple participants and with multiple and often diverse goals must nevertheless be made resilient against sophisticated attack models. As our society becomes ever more "paperless" in areas that include medical applications, taxation, information exchange, and even household electronics and appliances, the issues of security and privacy become ever more important. Examples include electronic voting and election protocols, zero-knowledge proofs, on-line shopping, electronic cash, stronger notions of encryption and of electronic bidding protocols, data mining and more general multi-party computations with strong security and composability notions. Often, deep mathematical results are used from diverse areas to analyze security and robustness of these protocols, including algebra, combinatorics, number theory, arithmetic algebraic geometry, probability theory, and coding theory. The purpose of this program is to crystallize fundamental problems that are posed by cryptographic applications and stimulate cross-disciplinary exchanges which will accelerate research-both on mathematical foundations needed by cryptographers and on cryptographic applications.

This program is being coordinated with the Fields Institute's Fall 2006 Thematic Program in Cryptography.

Participation

This long-term program will involve a community of senior and junior researchers. The intent is for long-term participants to have an opportunity to learn about cryptography and computer security from the perspective of multiple fields--notably mathematics, and computer science--and to meet a diverse group of people and have an opportunity to form new collaborations. In addition to these activities, there will be opening tutorials, four workshops, and a culminating workshop at Lake Arrowhead.

Full and partial support for long-term participants is available, and those interested are encouraged to fill out an online application at the bottom of this page. Support for individual workshops will also be available, and may be applied for through the online application for each workshop. We are especially interested in applicants who are interested in becoming core participants and participating in the entire program (September 11 - December 15, 2006), but give consideration to applications for shorter periods. Funding for participants is available at all academic levels, though recent PhD's, graduate students, and researchers in the early stages of their career are especially encouraged to apply.

Encouraging the careers of women and minority mathematicians and scientists is an important component of IPAM's mission and we welcome their applications.

Contact Us:

Institute for Pure and Applied Mathematics (IPAM)
Attn: SC2006
460 Portola Plaza
Los Angeles CA 90095-7121
Phone: 310 825-4755
Fax: 310 825-4756
Email: ipam@ucla.edu
Website: http://www.ipam.ucla.edu/programs/sc2006/


Home  |  People  |  Events  |  Programs  |  Visitor Info

Issues with this webpage? Please contact IPAM Webmaster