Table of contents

  • This session has been presented October 07, 2008.

Description

  • Speaker

    Amin Shokrollahi - EPFL

A Fountain code is a code of fixed dimension and a limitless block-length. This is a new class of codes with very interesting applications. In this talk I will show how Fountain codes can be applied to the problem of reliable, robust, and speedy transmission of data over a heterogeneous network from one or multiple transmitters to one or multiple receivers. I will then talk about applications to the design of reliable end-to-end data transmission systems in unreliable unicast, multicast, or even peer-to-peer networks. In the last part of the talk I will introduce two classes of probabilistic Fountain codes that are used in commercial systems today. These codes, called LT- and Raptor codes, have very efficient encoding and decoding algorithms. I will introduce the mathematical theory of these codes and give some insights into their design.

Next sessions

  • Predicting Module-Lattice Reduction

    • December 19, 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Paola de Perthuis - CWI

    Is module-lattice reduction better than unstructured lattice reduction? This question was highlighted as `Q8' in the Kyber NIST standardization submission (Avanzi et al., 2021), as potentially affecting the concrete security of Kyber and other module-lattice-based schemes. Foundational works on module-lattice reduction (Lee, Pellet-Mary, Stehlé, and Wallet, ASIACRYPT 2019; Mukherjee and Stephens[…]
    • Cryptography

  • Attacking the Supersingular Isogeny Problem: From the Delfs–Galbraith algorithm to oriented graphs

    • January 23, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Arthur Herlédan Le Merdy - COSIC, KU Leuven

    The threat of quantum computers motivates the introduction of new hard problems for cryptography.One promising candidate is the Isogeny problem: given two elliptic curves, compute a “nice’’ map between them, called an isogeny.In this talk, we study classical attacks on this problem, specialised to supersingular elliptic curves, on which the security of current isogeny-based cryptography relies. In[…]
    • Cryptography

Show previous sessions