About the speakers for the tutorial sessions
The objectives of the tutorial is to introduce its audience to
the basics of current technological progress in the field of
Cryptology. This year the following four researchers would be
providing four tutorial sessions. A brief bigraphical sketch
for these researchers are provided below.
Prof.Roy is a faculty of the Applied Statistics Unit of the
Indian Statistical Institute, Calcutta. His research interests
are Combinatorics, Design of Experiments, Optimization, and
Cryptology. He has researched extensively in the field of stream
ciphers. He is closely associated with the Cryptology Research
Society of India (CRSI) and has contributed greatly to the birth of the INDOCRYPT series of conferences.
V. Kumar Murty got his Ph. D. from Harvard University under
John Tate. He held visiting positions at the Institute for
Advanced Study, Princeton and at the Tata Institute of
Fundamental Research. Since 1987, he has been at the
University of Toronto where he is Professor of Mathematics. He
is also the Director of the GANITA Laboratory and Chair of the
Department of Mathematical and Computational Sciences at the
University of Toronto at Mississauga. Kumar is a Fellow of the
Royal Society of Canada and a Fellow of the Fields Institute.
His field of expertise is number theory and arithmetic
geometry. He is a frequent visitor to the Institute of
Mathematical Sciences in Chennai where he is an Adjunct
Professor.
Anish Mathuria is an Associate Professor at DA-IICT,
Gandhinagar. He is co-author of the book "Protocols for
Authentication and Key Establishment". Prior to joining
DA-IICT, he worked at the University of Massachusetts at
Dartmouth, USA, IBM Tokyo Research Laboratory, Siemens, and
Datamatics. He has a PhD in Computer Science from the
University of Wollongong, Australia.
Kapali Viswanathan is contributing to the efforts at SETS for
nucleating a world-renowned research and development team in
the area of cryptology and information security. His PhD thesis
titled, "Compliant Cryptology Protocols" was explored the
relationships between various classes of protocol applications,
which were otherwise considered differently. This doctoral
work was carried-out at the Information Security Research
Centre, Queensland University of Technology, Brisbane,
Australia, under the supervision of Prof.Colin Boyd, Prof.Ed
Dawson, and Prof. Bill Caelli. His primary interests are
cryptology protocol analysis and design. His associated
interests, which are consuming most of his time presently,
include robust secrecy systems design and secure information
systems.