2017 International Workshop on Computational Mathematics
Ewha Womans University, Seoul, December 14 -17, 2017
Organized by Ewha Institute of Mathematical Sciences (EIMS)
BK 21 plus, Department of Mathematics, Ewha Womans University
Sponsored by National Research Foundation of Korea
| Cryptography and Coding | Applied Analysis and its Applications | Computational Statistics and Applied Probability |
Cryptography and Coding, Posco 452
Friday, December 15
09:00~09:50 Registration & Opening remark
10:00~11:00 Plenary Lectures
Global-Local-Integration-based Radial Basis Function Computational Methods
Benny Y.C. HON (City University of Hong Kong)
11:10~12:10 Plenary Lectures
Cryptology, isoperimetric problems and shadows
Gyula O. H. Katona (Alfred Renyi Institute of Mathematics)
12:10~14:00 Lunch, ECC Food Court
14:00~14:50 Invited Lecture
New Constructions of Asymptotically Optimal Codebooks with Multiplicative Characters
Qin Yue (Nanjing University)
15:00~15:40 Invited Lecture
Be selfish and avoid dilemmas: fork after withholding (FAW) attacks on bitcoin
Yongdae Kim (KAIST)
15:50~16:30 Invited Lecture
Self-dual codes and antiorthogonal matrices over Galois rings
Sunghyu Han (Korea Tech University)
16:40~17:20 Invited Lecture
Quantum security of NMAC and other schemes
Aaram Yun (UNIST)
17:20~18:00 Invited Lecture
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon (Seoul National University)
18:00~20:00 Banquet, ECC CathayHo
Saturday, December 16
09:10~09:50 Invited Lecture
Infinite Sidon sets contained in sparse random sets of integers
Sang June Lee (Duksung Women’s University)
10:00~11:00 Plenary Lectures
Modeling multivariate insurance losses with risk and queueing theoretic applications
Jae Kyung Woo (University of New South Wales)
11:10~12:00 Invited Lecture
Physical Attacks on Lattice-Based Signatures and Their Countermeasures
Mehdi Tibouchi (NTT)
12:00~14:00 Photo time & Lunch, ECC Food Court
14:00~14:40 Invited Lecture
Optimal binary LCD codes
Jon-Lark Kim (Sogang University)
15:00~15:40 Invited Lecture
Private Database Queries using Fully Homomorphic Encryption for Finite Extension Fields
Hyung Tae Lee (Chonbuk National University)
15:50~16:30 Invited Lecture
Security Analysis of Improved Cubic UOV Signature Schemes based on Multivariate Quadratic Equations
Cheol-Min Park (NIMS)
16:50~17:50 Contributed Talk
Two-point algebraic geometry codes on norm-trace curves
Boran Kim (Ewha Womans University)
A simple three round multiparty computation via multi-key FHE without setup
Eunkyung Kim (Ewha Womans University)
The classification of self-dual codes over Galois rings of small lengths.
Whan-Hyuk Choi (Kangwon National University)