[av_image src=’http://sciencex.mipa.ugm.ac.id/wp-content/uploads/sites/548/2019/07/Screen-Shot-2019-07-14-at-20.43.06-1030×201.png’ attachment=’4038′ attachment_size=’large’ align=’center’ styling=’circle’ hover=’av-hover-grow’ link=” target=” caption=” font_size=” appearance=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ copyright=” animation=’no-animation’ av_uid=’av-jy30fod4′ custom_class=” admin_preview_bg=’rgb(34, 34, 34)’][/av_image]

[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2qabnn’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy46j0vb’ custom_class=” admin_preview_bg=”]

Opening Ceremony

[/av_textblock]

[av_video src=’https://www.youtube.com/watch?v=1oybol1_ZDw&t=591s’ mobile_image=” attachment=” attachment_size=” format=’16-9′ width=’16’ height=’9′ conditional_play=” av_uid=’av-jy46ibpt’ custom_class=”]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2qabnn’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy46j0vb’ custom_class=” admin_preview_bg=”]

Program Teaser

[/av_textblock]

[av_video src=’https://www.youtube.com/watch?v=JJuwNI50Kuo&feature=youtu.be’ mobile_image=” attachment=” attachment_size=” format=’16-9′ width=’16’ height=’9′ conditional_play=” av_uid=’av-jy46ibpt’ custom_class=”]
[/av_one_half]

[av_tab_section transition=’av-tab-no-transition’ padding=’default’ tab_pos=’av-tab-above-content’ content_height=” tab_padding=’default’ initial=’2′ id=” av_element_hidden_in_editor=’0′ av_admin_tab_active=’2′ bg_color=” color=’#000000′ av_uid=’av-jy31e4jn’ custom_class=”]
[av_tab_sub_section tab_title=’Day 1 – July 15, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Introduction to Coding Theory

Speaker: Dr. AI Sutjijana
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Introduction to Cryptography

Speaker: Dr. Diah Junia Eksi Palupi
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Cryptography in Computation

Speaker: Dr. Mardhani Riasetiawan
[/av_textblock]

[/av_one_third][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 2 – July 16, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Cryptography in Computation

Speaker : Dr. Ridi Ferdiana
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Intro to Elliptic Curve Cryptography

Speaker: Dr. Intan Muchtadi-Alamsyah
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Code over Rings

Speaker: Dr. Intan Muchtadi-Alamsyah
[/av_textblock]

[/av_one_third][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 3 – July 17, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Introduction to Quantum Physics

Speaker: Dr. Pekik Nurwantoro
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Randomness in Cryptography

Speaker: Dr. Santi Indarjani
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Randomness in Cryptography

Speaker: Dr. Santi Indarjani
[/av_textblock]

[/av_one_third][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 4 – July 18, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Orthogonal Matrices and Applications

Speaker : Dr. Lin Sok
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Topological Quantum Codes 1

Speaker : Dr Raditya Weda Bomantara
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Topological Quantum Codes 2

Speaker : Dr Raditya Weda Bomantara
[/av_textblock]

[/av_one_third][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 5 – July 19, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Coding for Secrecy Part 1

Speaker : Dr. Lin Fuchun
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Coding for Secrecy Part 2

Speaker : Dr. Lin Fuchun
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Fraud/Anomaly Detection with GAN

Speaker : Mr. Risman Adnan
[/av_textblock]

[/av_one_third][/av_tab_sub_section]
[/av_tab_section]

[av_video src=’https://youtu.be/Cd5e-19fvZg’ mobile_image=” attachment=” attachment_size=” format=’16-9′ width=’16’ height=’9′ conditional_play=” av_uid=’av-jy55t1g7′ custom_class=”]

[av_tab_section transition=’av-tab-no-transition’ padding=’default’ tab_pos=’av-tab-above-content’ content_height=” tab_padding=’default’ initial=’1′ id=” av_element_hidden_in_editor=’0′ av_admin_tab_active=’2′ bg_color=” color=” av_uid=’av-jy31e4jn’ custom_class=”]
[av_tab_sub_section tab_title=’Day 6 – July 22, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_fourth first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Introduction to Secret Sharing

Speaker : Dr. Romar de la Cruz
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Secret Sharing Protocols

Speaker : Dr. Romar de la Cruz
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Hash Functions

Speaker : Dr. Guo Jian
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

General Intro to Cryptanalysis

Speaker : Dr. Guo Jian
[/av_textblock]

[/av_one_fourth][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 7 – July 23, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_fourth first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Lattice-based PKC Part 1

Speaker: Dr. Khoa Nguyen
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Lattice-based PKC Part 2

Speaker: Dr. Khoa Nguyen
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Differential Cryptanalysis

Speaker: Dr. Ivan Tjuawinata
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Multi Party Computations

Speaker: Dr. Ivan Tjuawinata
[/av_textblock]

[/av_one_fourth][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 8 – July 24, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_fourth first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Cryptographic Sequences

Speaker : Dr. Chang Zuling
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Introduction to Good Integers

Speaker : Dr. Somphong Jitman
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Coding Application of Good Integers

Speaker : Dr. Somphong Jitman
[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Fully Homomorphic Encryption

Speaker : Dr. Benjamin Tan
[/av_textblock]

[/av_one_fourth][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 9 – July 25, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Automated Fault Analysis of Block Cipher Implementations

Speaker : Dr. Jakub Breier
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Code-based PKC

Speaker : Dr. Frederic Ezerman
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Quantum Stabiliser Codes

Speaker : Dr. Frederic Ezerman
[/av_textblock]

[/av_one_third][/av_tab_sub_section][av_tab_sub_section tab_title=’Day 10 – July 26, 2019′ vertical_align=’middle’ icon_select=’icon_top’ icon=’ue919′ font=’entypo-fontello’ tab_image=” tab_image_style=” color=” background_color=” src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ av_uid=’av-lo3i77′ custom_class=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-krhdoj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Cryptography in Payment Systems

Speaker : Dr. Jakub Breier
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-ijjakj’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Linear Complementary Dual Codes

Speaker : Dr. Buket Ozkaya
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” title_attr=” alt_attr=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-hd3qab’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jy31g5ro’ custom_class=” admin_preview_bg=”]

Applications of LCD Codes

Speaker : Dr. Buket Ozkaya
[/av_textblock]

[/av_one_third][/av_tab_sub_section]
[/av_tab_section]